gram 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/qat_adf_ctl\x00', 0x101000, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000300), &(0x7f0000000380)=0x4) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r2, &(0x7f0000000040)={0xffffffffffffffca, 0x4d}, 0x7) mkdir(&(0x7f0000000080)='./file0\x00', 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c}) write$P9_RGETATTR(r2, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) r3 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x475, 0x228001) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000180)={0x11}) write$P9_RREADDIR(r2, &(0x7f00000003c0)={0xa6, 0x29, 0x1, {0x0, [{{}, 0x0, 0x0, 0x7, './file0'}, {{}, 0x0, 0x0, 0x7, './file0'}, {{}, 0x0, 0x0, 0x7, './file0'}, {{}, 0x0, 0x0, 0x7, './file0'}, {{}, 0x0, 0x0, 0x7, './file0'}]}}, 0xa6) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r3, 0x40485404, &(0x7f0000000480)={{0x0, 0x0, 0x7fffffff, 0x1, 0x3}, 0x100, 0x7fff}) unshare(0x50000) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@cache_fscache='cache=fscache', 0x2c}]}}) ioctl$TIOCCBRK(r3, 0x5428) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) 09:30:06 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) recvmmsg(r0, &(0x7f0000000940)=[{{&(0x7f0000000300)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f00000007c0), 0x0, &(0x7f0000000840)=""/202, 0xca}}], 0x1, 0x101, &(0x7f0000000a00)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000059b198925062b265b0000000000000000000000009500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 09:30:06 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8d762070") unshare(0x40000000) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x101002, 0x0) getsockopt$nfc_llcp(r1, 0x118, 0x1, &(0x7f0000000040)=""/63, 0x3f) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000080)={'gretap0\x00', 0x5}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000180)={'nat\x00'}, &(0x7f00000000c0)=0x54) 09:30:06 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000080)={0x0, 0xfb}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000100)={0x8, 0x0, 0x4, 0xff, r1}, 0x10) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'bond0\x00'}, @IFLA_ADDRESS={0xc, 0x1}]}, 0x40}, 0x1}, 0x0) 09:30:06 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)="2e2f6367726f75702e63707500eac5bea7af575a45fddd5af3a7709295a69e7bc5fd0592bf2a4dc8ace908be8842141ca2a714ed0163d4afd8ac48123d4869e05556a93347d6a7430e03a5f2beb186f16bacf2e4dcdcf3b9ff1d99165ce38d996e7798fe471d9a0d81acd08788fcc9892a2487efcde7a649614b14ba1c18", 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)="6e6f746966795f6f6e5f72656c65617365e6", 0x2, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x200000000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000300)='/dev/input/mouse#\x00', 0xfffffffffffff001, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f0000000340)={0x7b, 0x0, [0x6, 0xcf, 0x6, 0x3f]}) sendfile(r1, r1, &(0x7f0000000080), 0x1000000000400) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r3, 0xc1205531, &(0x7f00000000c0)={0x0, 0x3, 0x7fffffff, 0x8001, [], [], [], 0x6, 0x8, 0x6, 0x100000001, "965669d96b2a1a233f0e3c206f449f40"}) 09:30:06 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x9, &(0x7f0000000000)="025cc83d6d345f01000000") r1 = socket(0x15, 0x80005, 0x0) bind$inet(r1, &(0x7f0000002240)={0x2, 0x0, @loopback=0x7f000001}, 0x10) r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xa0000, 0xc) getdents64(r2, &(0x7f0000000080)=""/245, 0xf5) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000002c0)) getsockopt(r1, 0x114, 0x8, &(0x7f0000af0fe7)=""/13, &(0x7f000033bffc)=0x290) getsockname$inet6(r2, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c) [ 101.551082] IPVS: ftp: loaded support on port[0] = 21 [ 101.630849] IPVS: ftp: loaded support on port[0] = 21 09:30:07 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x400000, 0x0) read(r0, &(0x7f0000003600)=""/4096, 0x1000) syncfs(r0) dup2(r0, r0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={r0, 0x1, 0x1, 0x7, &(0x7f0000000040)=[0x0], 0x1}, 0x20) 09:30:07 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = fcntl$dupfd(r0, 0x406, r0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000300)=0x2, 0x4) vmsplice(r0, &(0x7f0000000200)=[{&(0x7f00000000c0)="4219316f23c38919441563983f21b27237442089c3462598f1ac7e21ce96", 0x1e}, {&(0x7f0000000100)="433a84b2e2db46c49310d31a45c06375ddf3594bf8d588032067b71d4c163b8dcdbb017d6db17c67a459e2701df15ad565f357e75aeb270d1ecad1baa293d9c940cfeec4e658a6b21d3aae7d18d50109348c979ebc09846d04b06f6551e1a0b1dc144a912c2a6ec47ffbd98aa40d9cec59adefc06369120c0f7c57627319f1f261d524dbf3d48f5fcae7878f31473ccc2196efce532a3a189c3989a4a6c4ef761d1d6889b01a7ba7496fd4d71ca076f4c780184b041a518b8ceac7f8bfeb3039ccc6e26875141206bea0f4eebebb30fd59db64ed11f361c593fde2f3166571934763b5969e6c8a152991b993ae486505bb5d6d55ea9b1b7b04c588507b", 0xfd}], 0x2, 0x1) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000340)='vcan0\x00') r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(r2, 0x40046104, 0x0) ioctl$PIO_UNIMAP(r2, 0x4b67, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0xffffffff, 0x4550000000000}, {0x6, 0x4}, {0x5, 0x360032ae}, {0x401, 0x3}, {0x1ff}]}) syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x0, 0x400000) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f00000002c0)={r0, 0x0, 0xb537, 0x0, 0xff}) 09:30:07 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x82, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000001400)='net/udp6\x00') dup2(r0, r2) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, &(0x7f0000000040)=0x2, 0x4) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000080)={{{@in=@multicast2, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) fchown(r1, r3, r4) 09:30:07 executing program 1: r0 = memfd_create(&(0x7f0000000100)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) write(r0, &(0x7f0000000080)="a8", 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x8000000004, 0x11, r0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000180)=@assoc_value={0x0}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000200)=@assoc_value={r1}, &(0x7f0000000240)=0x8) sendfile(r0, r0, &(0x7f0000317000), 0xff8) fanotify_mark(r0, 0x80, 0x8000028, r0, &(0x7f00000000c0)='./file0\x00') ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)=0x0) syz_open_procfs(r2, &(0x7f0000000040)='attr/keycreate\x00') mq_timedsend(0xffffffffffffffff, &(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)) 09:30:07 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x100, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000280)={0x0, 0xf6, &(0x7f0000000300)="83c05c60771cfebfcb73178609b2be5f33ec6714b70307bf6837da24afc5da1bda70837e91a1b2beb84a138890a681ec4463ad32c1b951639550498d51d60708a1d43604486e50a93ebe2cc4e130e7b5fcd8febb82c10a3b395f9a01ad9c0c637599c2565242f32537d675da88c7bebdf20bc96a874d53661590597d2622ca5fe01412f8df7bc1f646de2622cace58c14f2495e5379af22cc188db463595479cf9793e98bd64de23c78f98847179bd383f97d5c818f53eeb5ceb16ac0face86819541fe4540b762d0fd67282420583f395c5ae8c1d1dd59592c6b17cf1ad03b4d0dccee5408e355ba7cd4220872ee77b9b8ae1111b08"}) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000240)={'bcsh0\x00'}) ioctl$SG_GET_SG_TABLESIZE(r0, 0x227f, &(0x7f0000000480)) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040)={0x7715, 0x5, 0xffffffff, 0x3}, 0x14) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f0000000100), &(0x7f0000000080)=0x68) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) accept$inet6(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000440)=0x1c) 09:30:07 executing program 5: pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB='$\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0f0000000000000000000000"], 0x24}, 0x1}, 0x0) 09:30:07 executing program 6: socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) socket$kcm(0xa, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x4, 0x4, 0x1}, 0xc0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000002c0)={r0, &(0x7f0000000200)="03d557f4f22770f7e50eb4f560e8ead28a63c96dacc2d5c5db97", &(0x7f0000000240)=""/21}, 0x18) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r0, &(0x7f0000000000)='o', &(0x7f0000000040)=""/250}, 0x18) 09:30:07 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0xb2, 0x20101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000013c0)='ramfs\x00', 0x0, &(0x7f000000a000)) chroot(&(0x7f0000000280)='./file0\x00') setns(r0, 0x50000000) umount2(&(0x7f0000000180)='./file0\x00', 0x400000000000005) 09:30:07 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x76, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000000200)=0x1, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0x3) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) shutdown(r0, 0x1) setsockopt$inet_tcp_int(r0, 0x6, 0x36, &(0x7f0000000040)=0x9, 0x4) 09:30:07 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x20, 0x1d, 0xffffffffffffffff, 0x0, 0x0, {0x20000000005}, [@nested={0xc, 0x1, [@typed={0x8, 0x0, @pid}]}]}, 0x20}, 0x1}, 0x0) r1 = add_key(&(0x7f0000000040)='cifs.spnego\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x3}, &(0x7f00000001c0)="6a78c2b9d7093e4be54ec60dfb570f2ff2b49fc9921456eb04708312abb6dfbc7de35d8b3b426d7fd215311aa08075491f9b45cf4bc13d423f121c5d426addc9a0655495918610bd5e0cfc9ce5d715c2783b713844c6e524a88eb2813a38880449d7e6c88f11", 0x66, 0xfffffffffffffffa) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x98, r2, 0x400, 0x70bd2d, 0x25dfdbfe, {0xb}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7fff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xff}, @IPVS_CMD_ATTR_DEST={0x40, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x983d}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@dev={0xfe, 0x80, [], 0x21}}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xbe6f}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x4}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x20}, @IPVS_CMD_ATTR_DAEMON={0x4, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20}}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}]}, 0x98}, 0x1, 0x0, 0x0, 0x4000080}, 0x1) modify_ldt$write(0x1, &(0x7f0000000240)={0x101, 0x20001000, 0x6000, 0x1, 0x22d0a882, 0xff, 0x1, 0x3, 0x3, 0x7fffffff}, 0x10) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000140)='wlan0-$${{\x00') 09:30:07 executing program 4: add_key(&(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000400), 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x100, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x800, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000000c0)={r1, r2}) r3 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r4) 09:30:07 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x00') ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000040)={{0x2, 0x4e21}, {0x1, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x2, {0x2, 0x4e20, @rand_addr}, 'veth0\x00'}) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x94013, r0, 0x0) r1 = request_key(&(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000180)='proc,\x00', 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f00000001c0)='veth0\x00') ioctl$KVM_IRQ_LINE_STATUS(r0, 0xc008ae67, &(0x7f0000000000)={0x9, 0x4}) 09:30:07 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f00000001c0)={0x18, 0x0, {0x3, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'bond0\x00'}}, 0x1e) r2 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x3, 0x10c80) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000100)=ANY=[@ANYBLOB="0400c7b41d00077a4679a2d09070c13666000000000000000000000000000000"], 0xc) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r3, 0x8937, &(0x7f0000000040)={'bond0\x00', r4}) [ 102.490319] QAT: Invalid ioctl [ 102.496680] hrtimer: interrupt took 20466 ns [ 102.516150] QAT: Invalid ioctl 09:30:07 executing program 2: r0 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x0, 0x1) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x55, "1f5cdcdfc271d77ef6f71b43787e50bd2546678df7e97d89b66f34fb22e65424ab6cdf04bf139981c05fa0e02271c67885ddb05aa66fe66bb48b7677e1b5de06e10ca46f2546653964c99148d03567111e72921df9"}, &(0x7f0000000100)=0x5d) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000240)={r1, @in6={{0xa, 0x4e24, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x100000001}}, 0xe3e, 0x3, 0xce6b, 0x100000001, 0x7}, &(0x7f0000000300)=0x98) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000180)="025cc80a2b345f8f762070") r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX3(r3, 0x541c, &(0x7f0000000080)=0x3) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCNXCL(r4, 0x540d) 09:30:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x5, 0x600000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendfile(r1, r2, &(0x7f00000000c0)=0x17, 0xfffffffffffffffb) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0xa0000, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r3, 0x50, &(0x7f0000000200)}, 0x10) ioctl$BLKTRACESTOP(r3, 0x1275, 0x0) recvmsg(r2, &(0x7f0000000100)={&(0x7f0000000180)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000040)=[{&(0x7f00000016c0)=""/209, 0x20001791}], 0x1, &(0x7f00000017c0)=""/201, 0xc9}, 0x0) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f0000000300)) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x4, 0x2040) [ 102.591932] netlink: 'syz-executor7': attribute type 1 has an invalid length. 09:30:07 executing program 3: mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x1001, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) getsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f00000000c0), &(0x7f0000000040)=0xffffff14) r1 = getpgrp(0x0) ptrace$peek(0x3, r1, &(0x7f0000000000)) 09:30:07 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000001c0)="025cc83d6d345f8f762070") r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000140)="000000000000000000000000000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6287c64dbea37a", 0x0) pwritev(r2, &(0x7f00000000c0)=[{&(0x7f0000000080)="1f", 0x1}], 0x1, 0x81a06) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x1001000, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client', 0x2c}, {@mmap='mmap', 0x2c}, {@nodevmap='nodevmap', 0x2c}, {@cache_mmap='cache=mmap', 0x2c}]}}) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r2) sendfile(r2, r1, &(0x7f0000000000), 0x20000102010007) 09:30:07 executing program 6: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x4}, 0x1c) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') fsetxattr(r1, &(0x7f0000000000)=@random={'os2.', 'pagemap\x00'}, &(0x7f0000000080)='\x00', 0x1, 0x2) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) [ 102.639462] netlink: 'syz-executor7': attribute type 1 has an invalid length. 09:30:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000640)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x1, 0x0, "0d77bded7125338de47145b71f2226c0b6950feba57b7d52d9e6d13509bb602e4818224696dafe09c25ed1d5e1e8dd9525d4425e2c4707a00f8dd47a4c19b884282e4f743e00c7a3eff599b13d518d10"}, 0xd8) ioctl$TIOCOUTQ(0xffffffffffffff9c, 0x5411, &(0x7f0000000180)) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="025cc83d6d345f8f762070") r2 = socket(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xfffffdef, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000200)=0x0) ioctl$TIOCSPGRP(r3, 0x5410, &(0x7f0000000240)=r4) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) dup2(r2, r0) 09:30:08 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") pipe2(&(0x7f0000000140), 0x4000) r1 = socket$packet(0x11, 0x5, 0x300) r2 = socket$netlink(0x10, 0x3, 0x4) write(r2, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) socket$packet(0x11, 0x2, 0x300) r3 = dup3(r1, r0, 0x80000) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000080)=0xdf20, 0x4) ioctl(r2, 0x47, &(0x7f00000000c0)="59f7431a7e749e3e5fbcb2d46acea38bff64d6343846f4dac4807c7595df40ac3a3f457a0e14d6b2b78fe8effedb23beee365491040b4ded6281e16627b56329eb557c649944868e8e56") setsockopt$IP_VS_SO_SET_EDIT(r3, 0x0, 0x483, &(0x7f0000000040)={0x3f, @empty, 0x4e21, 0x2, 'sed\x00', 0x0, 0x68, 0x14}, 0x2c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000), 0x4) recvmmsg(r2, &(0x7f0000004700)=[{{&(0x7f0000003100)=@ipx, 0x80, &(0x7f0000004340), 0x0, &(0x7f0000004380)=""/143, 0x8f}}, {{&(0x7f0000004440)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000004640), 0x0, &(0x7f0000004680)=""/72, 0x48}}], 0x2, 0x0, 0x0) 09:30:08 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x5000aea5, &(0x7f0000000180)={"c00cd19c26a73310e02d9c4097b800ad801f709bc843d8ee8fec7aba88129afb5b0a4fae1a83e98c5921769e7f09eff795b56364483a36edded34a3811eb1180069fa2743af0985b77fe6a427cd33dfad9eb709d712e5c1cbfac5759319705f0bd8fa9b03bde324ea79dbb0bb7f0c64100fba5f0562a4dcab0cf46f94bec96435e7550825219b08bf5f04ccbcde7b6a92227a84adbf7219719bf8e48eca65b029a8d0b8e09641ea4834c9f2b7ff13f0a987b38190def43e71fcc329575bdc35d09c18ab922b75f7858dd9f4e95b189601940c4e8c068e1e64b85f8e8de4dff536fb54b73ff9d284a46192d8b3f5c2bed49b26a2b1ebeba90d1a0aea73a40204f52f31c1c154bf32a040c6dc55513cb4c711b7ccf8517cb82c230ff0bf6206d7191da63931fca617e482ee54fdc6c9e0cc342dcdd570bf058cb20fb544bc8df0b3f9582549504bd0bba93a6fa7f934102d84dc7f421097c9b1fe058dc08d98b063652e2dc08a551d2a8439b1ade94b7aa96aa659171b1fa48dcb15ef76b9c4c93457092af1280dee66454ac73b477e2ffb6aa671fa50c9cf4870fd1a8b4cb952071c0ac520454dfee704912f1bdb15d1c65f7d5d1a10385fa4f62e7b42f1c1e177d8fdd0380890e4cd37d3ba0e4b17061025e194621785598b328f0e89be20508254878d222a95e9877eaac7088a7e3344ddfcee5aca0590c90c1c8a92417d94bd34f3cf1780a12d27389f79b38a693ea5cd6c49dc81ceaadf6d45aebdef804cdb90eb6827ea4279db9111c484cc783ca396ebcb697c903170d0256e8d62d6d044a61d0fc450f3a28b13eea41b0626ea314def36a9f2db0a7729656223a5261020ea9eaee9c541a5cc8bc20f09508860c25a6edaa20e094e1bf22fe232d799012b5e55880145a3e5469524fde005a94e249a9d4dae9496ebdbaae8dbd5ec6f7e99f581fa2103d6713f2f2514e7cf2c56f0ce25e1e8161709f9bc7a34489c3a21bab0fa710afd3512c980a6e9fa5f65e1e12237f342ece53be1b1976878c7af4cfd752e16b5fd1044b88fff3bed0528c2730ce9253c94340775805339817e3a97ec2596dd749ca45dd592fed479a632171c60b684ae1bbf1329fa51e6c59fc039dabe790e7542795438a9622ef9c67581d0d7df676ea5f8b7222b2f9fa964b1af28085e2bb54c0134a303b8d9645021ab6b6b58ceebaffa00cc860e62481d0b2c09630fb09b69358b4b4df5cab36069ed31d8a796f0568d6dd8dc8c71710037917e6883a0c75815fdd0fa471da90cc85545591c2b08b05b3097464a79aa6e066d377ccfd6adfa755285060a80c51a0c8d036664d40ab8cd887f34bcf592707f8fcc1efbf66c4d23319e236e282d9416d38c511a019c2aa1b2edef602d93cf289a48fa5d292b50db4b712c78c2bfe6f7aab793e728678fcc58b5a5aa8a8896572fd"}) 09:30:08 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = userfaultfd(0x0) r2 = socket(0x1b, 0x1, 0x800) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000080)={{0x2, 0x4e22, @broadcast=0xffffffff}, {0x306, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x20, {0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}, 'ip6gre0\x00'}) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000f6bfe8)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000000)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r1, 0xc020aa04, &(0x7f0000000040)={{&(0x7f0000404000/0x600000)=nil, 0x600000}}) 09:30:08 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x10) r1 = accept(r0, &(0x7f0000000000)=@nfc, &(0x7f00000000c0)=0x80) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000100)={'TPROXY\x00'}, &(0x7f0000000140)=0x1e) 09:30:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000270ff2)='net/fib_trie\x00') bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-256-generic\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) sendfile(r2, r0, &(0x7f0000a2effc)=0xe, 0x1) 09:30:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={&(0x7f0000000040)={0x10, 0x34000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x26, 0x829, 0x0, 0x0, {0x4}}, 0x14}, 0x1}, 0x0) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f00000000c0)='./file0\x00', r1, r2) socket$bt_rfcomm(0x1f, 0x3, 0x3) 09:30:08 executing program 6: syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0xfff, 0x0, &(0x7f00000006c0), 0x8000, &(0x7f0000000200)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYBLOB="8bae7487dd024f318651622a1a8ec30ddca8e0da173e427008b701ba4d598be7c7df4a97b92379bfdd10e5a1d49f7b32f5d1800b4e49f38729c4ab38e3f3d6411495bfaaed1411ccc7db5eb4709a291bf6f01ccc4da83c9f46c3e9c4b6a67dba1c92bedbc1af80c15767ade8c1f6e962f58a332141fef1c713e0d1e93e5abeeaa417e01ed38069a28fd73dbc964377b7cc6489f0502f152b643574302cf7c0de257c21d171edb3c533b94fbe783961cac096cce9530ddc46d55c2213ee3ab5554d782f616c1d1e3f92aec9c9718e12765260c8dbe77191489b645d57bcb9b67b9831f10a81ec0c93e9860469d155072c0625", @ANYRES32, @ANYRESDEC], @ANYRES32=0x0, @ANYRES16, @ANYBLOB="55d48c06a6330b236baf9250443362c69f8e938994dd89877ec76660b30744e59b1b68de5a93316f93", @ANYRES16=0x0]) 09:30:08 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x10, 0x3, 0xfffffffffffffbff) r2 = socket$packet(0x11, 0x3, 0x300) connect$bt_l2cap(r1, &(0x7f0000000100)={0x1f, 0x7, {0x5, 0x3ff, 0xffff, 0x10000, 0x8, 0x7fff}, 0x6, 0x3}, 0xe) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000000400)=0x1, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000003c0)={0xffffffffffffffff, 0x7, 0x1, 0x4, &(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3}, 0x20) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000020707031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000080)={0x1, 0x8, 0x200, 0x0, 0x59, 0xfffffffffffffffd, 0x1f, 0xb83aa91, 0x0}, &(0x7f00000000c0)=0x20) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000240)='%keyring+\x00', 0xffffffffffffff9c}, 0x10) ioctl$EVIOCGSND(r4, 0x8040451a, &(0x7f0000000640)=""/248) connect$bt_l2cap(r4, &(0x7f0000000300)={0x1f, 0x5, {0x400, 0x80, 0x2, 0x6, 0x1, 0x9}, 0x6, 0x101}, 0xe) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000480)=ANY=[@ANYRES32=r3, @ANYBLOB="eb00000098fae7caec720270c85146486ad5ee26c89fae93cb28c9b3ac68a0b214564648af58ff4d1910c30162dcae3da9e25806a1eb6344e11ca21e879795249ba5bf7bb23626533cddb281b8c78ebc89723898677d90d607838085e34f00a2ea3bafcdac2daba3e6a4a050f99fad7556594344386b8b44ec3248770ab3265c7f717049a6a92a6aecd3a3443e62a3d5895995db37ce74f559a965ce91288f19025eb7c599f819b02bbcc161b461d5699ca5e43e65d7079f14bf0bda2f564566d8ed7b457ae629285b7f1871b690849bd5eadfa5a1101f8edc61d38ee94bdd09ae5b7493fe2737cd958552edbbf0b58289207da53167698889726222984283529e71161d7b8552ce3169e85e0be71f45a6150ce76caf2fb09f4bb4b44eeeba3a56d32c020c3a083d2e4376e8d07a937f30f9c7dfc82f4c6ce7508efcc65d03e47b5390faf77744069e51c0ac7a0f37defa26dd5bba7c3dd6806b95067b74adb04c128c579b196b04f37da47379c39b963bd55c10d7a905f4858f1f14c1f80bf9a4ca79546a6f2151a282a2b3d957f894a4543e2ad9fae7c684bd8b00"], &(0x7f0000000200)=0xf3) getitimer(0x0, &(0x7f0000000140)) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x7, 0x2, {0x8, '@keyring'}}, 0x11) 09:30:08 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x76, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000000200)=0x1, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0x3) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) shutdown(r0, 0x1) setsockopt$inet_tcp_int(r0, 0x6, 0x36, &(0x7f0000000040)=0x9, 0x4) 09:30:08 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x1ca, &(0x7f0000000280)="025cc83d6d345f8f762070") mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x103001, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x1000000000016) r2 = dup(r0) ioctl$KVM_GET_LAPIC(r2, 0x8400ae8e, &(0x7f00000002c0)={"f02252b5616ef2a10216fd77a88b33d676ab2c6b54337797d014a1ce8f118dc337099381d8a75e901caeb9686356a86d60d1a76b27cdeb6f8556c0572c84377e49c3dd77d88ae18b85a80756073be5968bae7b1768c6192b9e9bd0aa5a78d92b6df7228c80ba3a4dd941bb5217f6d8762d6f5f33b137d80d7caa4a22c2b229f34444cf13172418dace865771527e05f52ea5a20a357a2f6761c609e7bc9c43bbf43df2ce703e45d61dac9502070997f73075ba46364b17149085fa33dde5c3e834a753cf8465e707c353b548217d50a9014110a912c756a8279f7e04178e1bd8dbb31e86c22484813fb57db8a138a730bbd3bd0a1bfe98ebff3ce53e652b2d8c86132f8df80f91f61608a3de4d5bd1b58508f278e9dc4ac48f5c565f68442dbbfc7895f149ff4568adcbbf8d90afffd0404738ff45bccec8d3914c20ad0b1d5e918fbb5f9cb47a7917b2d6c38fdb1f27e80e9913ba592e8ee23897abab5ed76a27289a5d184ecf8549ef026e362bdcb94128c1dbc6b879ddb3f5c5fa950dd90dc7e061ba9cffe69b5d93f35f24135e8ed055dd5bc36941c2e1a8cd30972a43e82ec665d1ee3a27f0148b18f7c5044830b303596ab65bc476052e6dede7d059304d09abb622634b7859891765eaeac9104ebceec1875c21be6eac9ca4ed13ed0688064f60999d1e97f06a85a29da6d5ff700e31df98ccbbbef69192a57d3617a82e700cc408f08053376268d8080b9157636dd6b0a23f0301515b0bf132fd37fffb360bf9d8bcaad381a34f22df9457898c40bcb4a68a55a66f120456bf5e958be4e5c6eba1af24c86d2aeb6c19ba0db45f4520f48981141879521dcfae0bf70f493bc4fb81acfa30a5dfb04036df354e155494ef9090e69f9aeabe9180c4ef14c2d4a99a832549958b6d5e28513e7a3ade6e4b8887876e6cf11dea20e45c92a852aeccb6e5a5f5c66ae8fed56b7dc0cf96aaddcd970866c68be53572709e2fb627d68fda25f0a99eb8c18085e3c04686a0ac3c5cedfb71c823a4abda1814de0d541ed005e5a037f045c61dee23f3091bab2b1084dbc8057f5ef951423ee162ca3d62dda11ddea2d86a8b939aae142e481de8b74310200510d9319645beccf4c6feb73d5a158946c75506a32c6f82a739400ce01dc02e64d273ffa866b0fa6c323cabc77ed92a0c945cedcba68f668f505fa2efe1e9399b240453695097464693c88fd218041a782a201c306a2b7fc07d183cb4add7cb70898cfc3e1885649b31c6ab46ddefd5f9936a59784f407f942f5cfbd4ef5651ed1d27d88d0b346e9d0bca9acee83d0201861ec7e179fb03837bb6ebc1870f1434d7fe0293aa3443e7e8f73107f61c668dafb58d536b9e4c5871dee9b156939ece5d947dbc1692bccd0e670166d95bd396ce5c1603d0ee76a2ae633279946f2662189913f6b51967db38"}) open$dir(&(0x7f0000296ff8)='./file0\x00', 0x0, 0x0) 09:30:08 executing program 7: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$read(0x4, r0, &(0x7f0000000a80)=""/56, 0x38) keyctl$setperm(0x5, r0, 0x803) syz_mount_image$nfs(&(0x7f0000000000)='nfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xa, &(0x7f0000000940)=[{&(0x7f0000000240)="35833f1ee284da8456fdeaf7ace43519cb1054a6fa2a2f415bce413d01a3368266ccc290fa46b3672d6c320b47fb2bd16c8fe752cbe49387ffe01a9ba77472ee747e51ec55a5128385fb9fcdee086ad833a48f2d9b9edda1a737482de8a85bd243877e77bf7d8516d972d04f81989276182dc23088a711d91fdf585e3c2a6caf48db92608aaf6f137fab9f5ce9f2343db0df9c3737d6ea2f09131fdb0ffa47266c22ed6865fd58f9270cc1dce9402ea8e59a972449fd17e225378b3c15cdc3b41991147419898b5de1efe5ad7fecfb378cd642819fdecfaf4002a2fe795b", 0xde, 0x3695e12f}, {&(0x7f0000000100)="bd5dfead167a57dc78176e68cb5e410287ea2f76a9", 0x15, 0x5}, {&(0x7f0000000340)="03b0073a98f8a193f2e7057139c3bbe98d414d9b90095b0e378d014fd5ab9e5f09e6bbda2b2abe245fa0458d09794a28d78277f85a01653915b96ecd4babeba35a45f557c7eb5cc1a95308062f01b73b88d9c1d2f830788bcb8d155b3e201c65063e377590a9f61903c9362e537e0a437f961c7f8257ce34c0c286c9bc49c5c7a282", 0x82, 0x2}, {&(0x7f0000000400)="ad4ae201f4f72bde1b22e9d755db7ccbdd2a2f6b93569096c78cece95e67d14840817e98364159f94e20be5aa821e02c381f8d2fa6b74e9ed4dd508fa7c68d0abb7acb6a3a9960a9cf5869167e", 0x4d, 0xc3}, {&(0x7f0000000480)="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", 0xfe, 0x3}, {&(0x7f0000000140)="7fc77d952a9729c410758394dd13dff1c8cbe51101ce9b442970a32031038cb9d4686063a3932c2d55df9d8cfdcef18f3ec2af", 0x33, 0xd4dd}, {&(0x7f0000000580)="4382b0e2021bdb5114139ad1b47cf151fb336279db55961c426d7ed91ba29c959ac40078ad0cedb55c40153df27e37ddebdbee38bb5cac3770a212f4543108bc157f8975f7646690f9f1f3c9e1d9aaf79cce176aa8454f840453fe38fe98dac4ae7ea91b0b98a390834ad460330931df48181db5bda48512299f94ea8a390321ee8b5c87dede046b538e10fd29ebd22eaed1f2f5922d9dd5dc46d7cf41d228bb9dedfb69daf93787afb3c8671831cfe6013e67d54c282b0250b2f2349a6d4d0c9b", 0xc1, 0x1ff}, {&(0x7f0000000680)="cc3629e8da72def347e31d561c5812f57454f37c08da2573da6bddb22a4ce24a0f1dc2c1a7e4792b51ac782e118144d0cc4bba858654db9ba2cedfcd6a769cb86886831abc892d6b13da19f98013a82b3253e1b5b2f29a0aed141781c90456507196fb8d29b7c0e971d467b544df3df871f10ae455b505232b86bb21317d7cda53604da7856016536ef6466f5993ccacdda9372e5c915dba38dabdc0c2e6be898219b878da5fd4979efda14b63f6368f46e57620f987a403219277da0be5b07b18b23f732ecc7efa5d4828f5ce44037617fdb0e465", 0xd5, 0x7}, {&(0x7f0000000780)="3bbb24b84513f59afe67219d7ffd1e69e2ac5822bbca59c81fad5011813f04b159f918b5dccc6fe08cd0b97e232da317d29931da8ccaeff3fa5e4ebbf727071889b36dd35baf5ae8fc1b41c0e3a540d46b43c0fce17bf8fa149d65a44ae41d524c612c73737e9dfdbecc59ce5ac21ebd0a7cf29589ff4e6cfecdd1b5ee9e93a1978fabaad2ef42c9644a8f0679fcb5e0fd92cbd3f1949a079ead5aba4ca3453dc719e8726a26c6", 0xa7}, {&(0x7f0000000840)="b269496b30de29899202e33d7447a4980351f8614baaa8e046ae5db420ae8c911db2b51356de282c085c345a1470fa999817abae39195276a483d7f558d7737ff15a4dd4864355528d0c07707ceae1fd83d33f8d5c5e3ef469e1df898f5c3be11b3688ec8a3f290b444cf433d82bcf1b29182a02863cdb6c8f2b8dd2518c99299ff4c255df0c425470b7f91a90f1a70a80b582f6d60584689cc718decd8cfd8de91c9a4627884a1a337e9bbb24d6deaedf0e1acea3ca6fb0a9e3102ce48467e2b2b96a7b78637c2665b3386b0cd9f5eb5b7aa85dff4cc762c029364771abc5fcd2bbe9beefa1a01f26e3bed13e6f03e0e4d9680a4a75", 0xf6, 0x9}], 0x200c00, &(0x7f0000000a40)='keyring\x00') keyctl$describe(0x6, r0, &(0x7f0000000040)=""/91, 0x5b) [ 103.408694] hfsplus: unable to parse mount options 09:30:08 executing program 0: r0 = syz_open_dev$adsp(&(0x7f0000000280)='/dev/adsp#\x00', 0x529, 0x142) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0xffffffffffffffff, 0x1ffffc) setsockopt$sock_void(r0, 0x1, 0x7da01d9dd9278402, 0x0, 0x0) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000140), &(0x7f0000000040), 0x8) restart_syscall() write$evdev(r0, &(0x7f0000000000)=[{{0x77359400}}], 0xff5f) [ 103.451959] hfsplus: unable to parse mount options 09:30:08 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f00000001c0)=0x4, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000180)=0x200, 0x4) sendto$inet(r0, &(0x7f0000000000)="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", 0xfd, 0x20000000, 0x0, 0x0) getsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) 09:30:08 executing program 6: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000003080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000040)={&(0x7f0000000400)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f00000034c0), 0x0, &(0x7f0000000940)=""/42, 0x2a}, 0x202) sendmmsg(r0, &(0x7f000000d8c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)='#', 0x1}], 0x1}}], 0x1, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x6, 0x200) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f00000000c0)={{0x9, 0x6}, 'port0\x00', 0x40, 0x44, 0x3, 0x1, 0x6, 0xfffffffffffffffd, 0xffff, 0x0, 0x1, 0x2}) 09:30:08 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8910, &(0x7f0000000140)="001500002daa5cfa9e04ad1b9ea10f3b1aec1773bbd8f74ad249c9ac25fcc4cf92adc36e19ca638df9bccb2152064b8659f68fbbbc16cfcd3b8f875a07af2a28e60eeb0553a9aa513ada7c9c664cac7d7de0cfce6c9158566adfcedb9249f1c626c5853a097203bd7df506a7e7641363932e3f4996454008248bfd228f734c428ed9d99206002495962ca2ed04ff53a821b945abca475692da096cfa152772692a4b68d57cbdd038dcb39f18b1caa7b144839cb4a6785796e07c14ea717d90514a15b4d9241fc6c51dfc8caea0ad34b42f8632c54aeb9ec335caa297b7cc21feb1acc7e5d7ffe1388a3956d9802e54ad084f19ac5d7b8cb0ab961828d4752b41a1ec2c8e43ca0951cafc5530e9a67e342570eb4e28fb75d1095956d93f8d465b86c4789ca74c3370") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x1, 0x640000) ioctl$TIOCLINUX7(r2, 0x541c, &(0x7f0000000100)={0x7, 0xffffffff}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000009000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, &(0x7f0000000000)="0f01f7660f017b000f00d00fc75f810fc7a5000066b9b10b00000f32f30a1cba400066edf20f58db66b9800000c00f326635010000000f30", 0x38}], 0x1, 0x0, &(0x7f0000000040)=[@cr4={0x1}], 0x1) ioctl$KVM_GET_EMULATED_CPUID(r1, 0xc008ae09, &(0x7f0000000040)) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='/dev/kvm\x00', r1}, 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000340)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000380)=0x14) getsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f00000003c0)=@assoc_value={r4, 0x6}, &(0x7f0000000400)=0x8) fchdir(r2) 09:30:08 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-avx\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000240), 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="4c00000020000000000000000000000000000000ff020000000000000000000000000001e00000020000000000000000000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0], 0x4c}, 0x8}, 0x0) 09:30:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$ceph(&(0x7f0000000040)='ceph\x00', &(0x7f0000000080)='./file0\x00', 0x5, 0x2, &(0x7f0000000180)=[{&(0x7f00000000c0)="e2dbebdaebadefc0c3de0cf1af9f68b0bcf1663cea9dc7fcaecaee3d43e51df7f3b655b536d3b5e81634c55c320505f7109b8dee66facec1331d1911d1105ebc55d70f5de86a01b29a07580f71286ad7f7ee203912e12a0e11137679bbb7ee66372781f7642366984f9e3d15c3dc1d0ae36b17", 0x73, 0x7f}, {&(0x7f0000000140)="2890b9c6d57bce6ea6bba346", 0xc, 0xfff}], 0x800, &(0x7f00000001c0)='(vmnet0\x00') setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000008c0)=@broute={'broute\x00', 0x20, 0x3, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000000), &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000200000000000000000000000df80cffa02cf40c8a7a92c473a00c9976e207ef193000d080fa7f69978967aadd65628ed8130dde7e1f07"]}, 0x133) 09:30:08 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(aes-fixed-time)\x00'}, 0x58) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e22, 0x75, @dev={0xfe, 0x80, [], 0x1b}, 0x70f}}}, &(0x7f0000000080)=0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000a00)=ANY=[@ANYRES32=r4, @ANYBLOB="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"], &(0x7f0000000100)=0xe2) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000000c0)={0x0, 0x20000000040002}, 0xfffffffffffffcd0) r6 = socket(0xa, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000700)=[{0x8, 0x7}, {0xf, 0x48}, {0x8, 0x1ff}, {0x2, 0x400}, {0x3, 0x9431}, {0x0, 0x7}, {0x4, 0x3ff}, {0x7, 0x6}, {0xc, 0x1}], 0x9) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000580)) fstat(r6, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r7) r8 = socket(0x10, 0x2, 0x0) r9 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x5, 0x341200) readlinkat(r9, &(0x7f0000000400)='./file0\x00', &(0x7f0000000600)=""/68, 0x44) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setgroups(0x0, &(0x7f0000000000)) setresuid(0x0, r10, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000680)={r5, 0xffffffff}, &(0x7f00000006c0)=0x8) shmget$private(0x0, 0x4000, 0x1808, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$ipvs(&(0x7f00000005c0)='IPVS\x00') ptrace(0x4219, r2) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="71e67a15cdf0311cfc093a52a7d86bd1", 0x10) 09:30:08 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet6(0xa, 0x7, 0x1) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="b800000a1986478d2b00000000000000ff010000000000000000160000000001e000000100000000000000000000000000000000000000000a00080000000000c9f2e010f4eb0dce9bb163666303e823e02b989a0c364fe0cda8051252fcb324750c078315fc554836fb19a2515e8c56ed23abe5787a3e93ddc8827c271e102a39fc94dd6d2f58e24180d5", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x4}, 0x1}, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@ipv4={[], [], @remote}, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000080)={@local={0xfe, 0x80, [], 0xaa}, 0xb, r3}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000200)={@dev={0xfe, 0x80}, 0x0, 0x1}, 0x20) 09:30:08 executing program 2: r0 = semget$private(0x0, 0x1, 0x0) semop(r0, &(0x7f000002efe2)=[{0x0, 0x4}], 0x1) semop(r0, &(0x7f000001a000)=[{}, {}], 0x2) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x4402, 0x0) socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)=[0x2, 0x9]) [ 103.742682] ceph: device name is missing path (no : separator in /dev/loop1) [ 103.771869] kernel msg: ebtables bug: please report to author: Wrong len argument 09:30:09 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 'syz_tun\x00'}}, 0x1e) syz_emit_ethernet(0x14, &(0x7f00000000c0)={@dev={[0xaa, 0xaa, 0xaa, 0xaa]}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@generic={0x8864, "42a703000000"}}}, &(0x7f0000000180)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0xd8040, 0x0) connect$pptp(r1, &(0x7f0000000080)={0x18, 0x2, {0x3, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x1e) [ 103.799600] kernel msg: ebtables bug: please report to author: Wrong len argument [ 103.814311] ceph: device name is missing path (no : separator in /dev/loop1) [ 103.815987] hugetlbfs: syz-executor7 (6939): Using mlock ulimits for SHM_HUGETLB is deprecated 09:30:09 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087703, &(0x7f0000000040)="0800000077dc3a4e20") 09:30:09 executing program 3: r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f00000a9000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000dbf000), 0x3a8, 0x0, &(0x7f0000b2d000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000fc2000), 0x0, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback=0x7f000001}, 0x10) r1 = socket(0x15, 0x80005, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x80000001, 0x4) getsockopt(r1, 0x114, 0x2715, &(0x7f0000af0fe7)=""/13, &(0x7f000033bffc)=0x3e3) 09:30:09 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) pipe(&(0x7f0000000440)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r1) r3 = socket$l2tp(0x18, 0x1, 0x1) recvmsg(r3, &(0x7f0000003c40)={&(0x7f0000000740)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000003b00)=[{&(0x7f0000003a00)=""/200, 0xc8}], 0x1, &(0x7f0000003b40)=""/207, 0xcf, 0x5}, 0x2000) ioctl(r3, 0x6, &(0x7f0000000380)="8601789c8a59e017956588110592d597f9abc3c10c171f246c9d40ac063e8222937bd7b3a7410a2cfc17d7") socketpair$inet6_sctp(0xa, 0x10003, 0x84, &(0x7f0000002880)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f00000005c0)={0x0, 0x3, 0x0, 0x6, 0x8}, &(0x7f0000000600)=0xb) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/2, 0x2000, 0x800, 0x4c}, 0xffffffffffffff05) r6 = accept4(r4, &(0x7f00000002c0)=@in6, &(0x7f0000000140)=0x80, 0x80000) setsockopt$inet6_dccp_int(r6, 0x21, 0x0, &(0x7f00000006c0)=0x4, 0x4) bind$vsock_dgram(r6, &(0x7f00000004c0)={0x28, 0x0, 0x2711, @hyper}, 0x10) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x73, &(0x7f0000000640)={r5, 0x4, 0x30, 0xffffffff, 0x6}, &(0x7f0000000680)=0x18) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r6, 0x84, 0x1e, &(0x7f0000000580)=0x6, 0x4) r8 = socket$inet6(0xa, 0x1, 0x0) ioctl(r8, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000280)={&(0x7f0000000080)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000800)=""/4096, 0x1000}], 0x1, &(0x7f0000000140), 0x0, 0x3e0000000000000}, 0x40000040) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r9, 0x84, 0x6d, &(0x7f00000019c0)=ANY=[@ANYRES32=r5, @ANYBLOB="390000004f3f01b498a56f090000000000000011114c515a5dd5cee910aa15af93ebe474d4e4bf8123e768a90c178c8681adafd8df6b106a84e8658e7fb687eeb85288c30874aa7ee57466d240dd03e7618eb23cf1a0d5208fb77e85eb9cfd121441755b6c2f96b67054de80fae33eb476d47dc01abfede9d923ccb350c8e3ee1df0c1e36d0b56272e31786fc316ff3ed9b1baed22185ee1d75f50ee528e633221d90fe6ecbc9b41c31d3266eb78525502ffb5f491bf1b8aacc9e4fb291507e70fa68c7837205d3f73d643b298bf3685b7440aa6ca000000007a2ff1f33b0300151fa1079538db346a03b479f8e428c9e84ed4"], &(0x7f0000000340)=0x2) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r6, 0x84, 0x21, &(0x7f0000003900)=0x1, 0x4) r10 = socket$inet6(0xa, 0x3, 0x3a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r6, 0x84, 0x1a, &(0x7f0000001800)=ANY=[@ANYRES32=r7, @ANYBLOB="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"], &(0x7f0000003940)=0x2) sendmsg$netlink(r6, &(0x7f0000000700)={&(0x7f0000000500)=@proc={0x10, 0x0, 0x25dfdbff}, 0xc, &(0x7f0000000540)=[{&(0x7f0000003e00)=ANY=[@ANYBLOB="6c100000130003032bbd7000fcdbdf255c108400318713c6ad41fa67aa14c58a95e83bac3ad40d4bdfdcede91dc02d0086455ec603901354498842affe9aaf16fb8ea3d35130382d39e31c35badd67ae4bdeddb1a6257869f08d8c05b5ff42cbc0fef95654f335c845002de6b264ecece9aa34c4c8b685822ed3c7426c3cdea19f58004a2764b38a6c87188eb93a5cfbe3f4eccca8f339e4118c67ddc490d805d4a92bbe30a176b478fa83b704608ef50478b9d36bc93ae0926416fbbdc8af30585c95735b198060dc096b11200ea2ce5e31a2007894fd0bc974ba8a9a0ffb3da69986c7bbf2bf6895930df66709e21da12ca801b0644031174f4b771af30bdd4e2432e1effd7e201fd42409a2cd865f6f11b772682cdfdfe86b9add832b77024961f69ce62001af6ab12a2f2ed75e0f936aeff06865e33accd5756ef3663c94bdaeaf87174780eea14a691cf1f3e295227d1aa7c8540dbf8f99f91e43debec671f240d3fa1be279614dc64e01e51f4874ff55679c99586126cfccddf2838807818b2cae7bb51222be8c873aea00bcc5090666d19843121f81939de78966ba5d3c0ae11c4c07df333332cb1111f5d79773670d809a05fe16e7f23e84aeaec55e804cd5da0c131022a38aca98c629d267ea035d112c5afd89d88c7a64dfe76e86cb7fa230854c5a7b651a24b8ea9b0261414877529497ba37931bcfc11008dcd3c3adea2f41294c908289782cec9e11936576a06e7466bdc75e306eed4dab2926ee1c40c32cc4f7baea5c0a1b34ed80e050e2e2044018fbb755b1ce56339ad2653f2c2ac6a593c83343782f6b807a606e91d658fe16b62004a1cdffa1761e8cb85010b5e0a4f1cf6a54ea930e4ca37a19ed961fb9d0d858667fe17869b5440b0760251560e45d6607b5bd746e305e8a2ed6835447d39ecdadbc6c1199b106858e38f6c2e0bc7679ba258d6e86deeb64e7791a46af07d22df828a22045fb74fed662530c0ec4c7c2211614d8f1e99b9aaf08b4119d9191953ff66bcd36d4a4ca71c0ea4d8476e0e56a11f11b349f3be2517bb84c4a24be316b07cdf7e948c2a1d70b6c07a7f40a4c323116d3d3229ffde14c7c8055f87b09dff4998536f49ccf69f0faeafb87f5c79ad1c9418ffcf07a8858911cb85729d0c12ea4e7a52a302a277ad6aa9ef6ff80914b63a8356016b77391e72dda2be6c4e0838fef4a5e8c57ae93c3b848fc95d740d8c5d7a26ffd7efbca07821e0c84d0b8d5efc81739c4a5c37ae33305dad188c218aa10a64113549f724f167dc6c79733dc2a2b68d46df247dc850a6b8f548d6ff82689038c949ba70b539d8b35c93508541fabb2649db1d6dabaed41cbea4c8f46eff0222a1bbc73d5b8baa8a81c29e9f1e3f2ca7572a21c3a34638d53a3b454cc7da6b8379169d37827bbe6c888ff66fdaed8a59b59991e5b5cd5985203f1649ed2df08de205a143f18eca1adf2203324709b8282e8fd7e2d21578c68099ead69bf324b5fc703b96c4d0c1656847f9f274b2e21766a764507fac1a105b2a436db535cd2412d916b6ff1293f35b03714ac1a25b83d3de97a207b176e047776476afcbbdbe97020bd2534312dafba5d367047b3254d98246d170acbafe3043eba14e00afd04baa5f5a65de8731ed689de74e6004440137993cb9d16bb118ffbdaab0c96ace334db831d35842121af582e3cf7c80021184cebb8c134417c05338af3e82df855dfb69f6df973bd192350cb70be59a66736231d98eb199e060e24dea666512229ffa1789f8e7b362b215071c1dd1657bebd20a2c93a08785c414325f46c35b79000411338a10cdc6b7ffc1a07bf18da7dddf6bd674b27b1686f143748fc62851d1c9705333ebfe81efe48941837f607f02a39c4a4bad283f73bee90914380cd5d59bcf2fd5445e560361dac03d33da495e2049cd876991d4a81e3692a7fee47573b1e35f7a1d110ea0d566be1ef32af77b8d910b80f30b82376542e00b2d6b015c7217cfe34c323d8b3c66d5ffc85342d2ee11fcc51fbdf739e67d5421c1c615af8870b7bf97841a1d66f7e699a56f4393be36f47d67d81b6f8f031f4139938fda01316f33be041c64dbd0979bc0066bcfaa33182a1ff4e8fa2e6697581659ababbd6966cae68df669e420009d2ce268f1b467efea9fa0b8ab99048984be0a3eb5a642cf666c63d41924a9844a01e9a5542d61ccd26e2d8c7b70f4209f7e142f63a50cc7621f4d0cd9258051b3ac7d7f8c038d23a96cc128cd3531412bff02e995afeb1ec60a09a0cf6a2ec3f6a081b27f677174ed3ec98e8519bbc7ee2db1bc4eff644b5c51846106bb507d9c602703055b94c564e2e3a1989bbc02b143b92767a72465ec50d2977bfd6c8d57de9a2c1bbcec661bf9a5111f5903090aab214ef67d55a9e4473a88693687cb9181dda7a25753f6559f809a378032c3b132f6178a838e7d0210d2b21bfeac3450507d2e984b9042062ef498e6b141d2519805a4f76c5a5ae334fa233836a796e6179ed0d9f7fb15b6a9f64b383ca1cbbe3e8cc40604b02bb38451dee2aa84243751d3e81729873790be1441541e4fcfc17837f01629d48791957e9b78fc0fbdef270ff6b6d5cf0d69a39d861b6ccf733dc4414f22917aeebb9fcc8ecf4d8fddc501c96587422781b6809b0b95baf5717e46ba27b96bd59f9bbad5d8fdd7681b524a2fd043c4c1f8dc85aed8b16374d38621ed4f8221b2cbdaf3f160030491dc22b32a7bffafb31a6d77e0b7dbda436fff329ed75fe6063a9665b72c8aa12dab27314dd94deaf2d95bd796b4a58a3538a1083ffc9add4ecf83f6ab018d33126a290422f144f584daff29e0c60e4e2c3760c7266cf6fb9e6330282bc9b894a88bb8ceec2776bd7209e363ecb9cabc40b4fdee0e3876394b8ed3edae63a31048115ab15dddfda9848a3cf4f3958ce6b6f8f007f97fa81d8556e1c3d64e5148f749ee280f80066fd570450afc39820200000000000000093eb0c1d1837815cc157b1c325dc60d3cc020850e6f32fb231198f26e96136760e77bbf284d6d79b33760f2627749a5dd9b3934a87237f84ad44130e2abe37cb1344dfc69a95835728c3208b763093e850b586bb612b76a1cb551464187112a71622281eefccde69558d879aafa7d0511a25539faa1137e0f02345687aeea4964edf824f09d0b97892bcdc45d1af13053f4b676b85c8763e5a6ec9b80cbc5de89d74d9bc1b15cb36adb84060ae33229d361ba6cd5393b12bbada336ea1de2a4cc5756412dec55e04287e236db85b08fca3f912e5477d5f3e5e3f95440c8e8518c2696ab0fa71f84391b17497d3691bb486f9b85e66cbcffa31b48d1f3dd06fc60cac8b53f2e347029ade88130e001852ecee56ac81ccbb4c787c3b9990663dabd6873b4e6dd41dd8f5748fac656ad3cfe987839c369a18bb982f8e92a628d738a652ccea343fb23f808c36830e962b94bceade189efc4b504f5ca064a0695aaa973b6f83834e1f4e9ea7a630fb70e63520328b32cea8288ec16c72f33d2b3e8daa13e000fd3aeead62a647e8667e2af0b6dca8dd3c94e6f1c6ca1ffa19c9d12e32fcfba68186f8bf5c1c9afb60cbb7581a434c57c898d2706dacab6a4d23328201e08201401b3dc4066d4d474c35bcda7a5b32dd7d281d0157b28ea76c8208dde99c387c966051906501cfd77320ddde66715b08bd5b56db0608bde7fea2d9d49bb9fb3a1a01541982ed417ce2b43b46e6aae2c91e8e8f0b0ee9bc68f69564ac0bd92d3092bcfebfce8d2750767041d5f479568a88c6a2884784750e435febab2457a4c0011cafa73037110f8ba78ed590aaa27caecc5f22661aad29fde1d0be80c807f75020580ca80020c641003c26ada08c5576b20151682ece909131e6f4acdb241008a5445b05d1939968d88817413e5e68237dbf9bf275b572a79d4a3e3595a24372c0ec0fb4e656952bacb221e3b8b85dd1f827c4147080b26d7373cd7b42613b24a60227fef5475b121d744ca8557f2c1278fc2ee74cd5c835f0cb0bbafcaa3cae37a1afbe33f75f567f8848285007bd440c9fabfe2ebadb94d0097b523f2e771e8991039347686b1b204010f041874fcdcb2d0ff4b65ce25b0d0101bc4abdc18e7d93b78a315775c4fe9207a51dbf75aef2fa5cff63d134defc880387c766329f3f5f2a51fb810a343abc1c49785f1471a5dcb50a8cd016e15cbd564fdffb6d9a811bfd955ff5cff900ee2dbb291533bdadd67488c30c6dd189e39ab12c7eac13aee8eff92a948af6c6f8db33fa6501d07c30785bab2161dc8a93633ac13f102e6a0e2892a7d6bc3f2728f9c308d232062813ae413fbd103b6c544bf7ff85564a5d523c3bacf146c66bbba17b2253a894ff067430e44c35c39470e8858650ab1f5f89557d6701265ed42f353b4660e181e862dae7d19528677add2e102928aeba4524f788443dcbfbc7992a1aa74c2923be9e97f60ff1faffb03fb1b68f4da342f07242c86a0b90347c41fda81818e77b5cef283aeaac7fea6919d9c4f8ccdb7ba4dd9a55d6ff82605dce3b4554bcdaef749a67e7ac515c103cf7a31aeb5134af2ba117d00ce1ea99ce9e3a39031b42544564e41c23ee01dee3bd5723508dc13e97db070744c1cc3b5eb03311216e53a08c057377c0cd1dd27b3c071e93e611262820f07a785ac891149ca3efe14f15a0d90d8ad75f06f82259d552f6a5d991b2cf2f0bff6198cab83c8c1b8cf83cac03eae9a8b3eead42aff4394b33ad0948557024177dd628a73a942809505d0f67ec5dbdf179fa269c18d489a1dcd9919e16178aa54ca7bda4dc4ed17359bddb4a9273fd82c9806c01e06c484b988e1b19a46520dabb9d1219f8f4f79bc3d403994c97709f554067397781510a3399e424a178062cd7718c5c3d1e61783044801504ccab9bdf6275aa818f17aacf155d372d2ea21186703e55f058a563be3b2c6124f0b3f0e59b3af0df502b819646041cfe9f02267399b7a58c103a321b22e395675c5650b6f93f1ecb9e30e4120daa7192ffb6576ef8ca01578e97857f7da758b603de2b7d4b8f3b254f6aeb82ea4fea96bcd6a2eacd2f00f81186907b0cd8973e8944b8ce0bcf69539bd63e480aa54f5becd9e3d24779a409a7cf6d4698afdac485e980c29e380532cef862ca906e3dd1fb86509950b766c440ce4daaae0b98c62ac6cce40ab8f8113199c973df1425a7e5af392ebac7326d9c0ec46deb37af19abda51be08d3d5ae68dd7d21138023f8d5eded065666c50ea7b68c50937b660c0352eefd6c9af4d61b4c72a258f23a5a29c334e01c2e71721ab932521c3f81f6cbc69921776a3d0530095cf20bdf6e5197327b5bf02c6f6c214ed399ae2d8078eec83d101f18a10fa5e9ff2ae8fe5f3945f6ab26b67c9f7c9ad97639cee899e52d679d03c054db3e4e31b171d0b25684581aae385e36280ac48aa4ef9e2ca32ffba0f3c6d8cf0de3b569aae109cd172e19914bfd90d70ac804cfe85fb65e45db605f51a49f644b1f45aeee012ca9d502e57663f81d67ca19cf71e7441aa50f16df855dafa048dac09992c4f2843fbe67f635c62e7dd570349e4c25c1af8b1810918d6328dbfd7727a7e7417177338c203ec25828e6b00d6ad6722ddb317b6d80b6c666e82df37e9a97489266e232917e96a89f95ba117742a88fa6307da385ad58ab8db54c1e0edeba6551c06d35e3e617a5823733906332fdcbcd30f6a42b05c13688bbc32aa3f0bd2b816d7ed2cff87e1a9faf9c7b56c0711d1943aafd032be5e1d50e9c60fd2e9345a98b970615c8883fee0e42164533e4b2efed9d32d6463748ff4a734e1579354520eaf3ba2b433221148c7d7e5b1d1ee884cdc49f3573846a47453cafa3a9f9e9e1f60927f145925effbd32a0bcd9b7ca2e6ca88560000000000000000000000000000000"], 0x1}], 0x1, &(0x7f00000006c0), 0x0, 0x880}, 0x20044091) setsockopt$inet6_int(r10, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC(r10, 0x29, 0xcc, &(0x7f0000000200)={{0xa, 0x4e20, 0x9f, @dev={0xfe, 0x80}}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x8001]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r10, 0x29, 0xcc, &(0x7f00000003c0)={{0xa, 0x4e21, 0x7, @remote={0xfe, 0x80, [], 0xbb}, 0x8001}, {0xa, 0x4e21, 0x5, @empty, 0x1}, 0x9, [0x5, 0x40, 0x2, 0xcf41, 0x7, 0x800, 0x7, 0x1]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r10, 0x29, 0xcc, &(0x7f0000003c80)={{0xa, 0x4e23, 0x20a7, @mcast2={0xff, 0x2, [], 0x1}, 0x400000}, {0xa, 0x4e21, 0x349, @empty, 0x8}, 0x0, [0x3ff, 0xfffffffffffffff8, 0x3, 0x7, 0x8, 0x4, 0xfffffffffffffffd, 0x58ed07da]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r10, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}, {0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x0, [0x0, 0x0, 0xfffffffffffffffe]}, 0x5c) 09:30:09 executing program 4: syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='\x00']) r0 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f00000004c0), &(0x7f0000000540)=0x60) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000003, 0x80010, r0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x80, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f0000000400)={0x6, 0x0, 'client1\x00', 0xffffffff80000006, "4fcdc031ebb0fbd5", "f8736d3cebce94421da51ac22ea2eab6fbfa95d47fd154ab87ad0de71c219eb2", 0x1ff, 0x1}) mknod(&(0x7f0000000080)='./file0\x00', 0xc010, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000640)='iso9660\x00', &(0x7f0000000680)='./file0/../file0\x00', 0xca6f, 0x0, &(0x7f0000000740), 0x10000, &(0x7f0000000200)=ANY=[@ANYBLOB="696f63736f383835392d31352c00787b6a08457b51c99edaa65c995f9af1978130caf2a60e5588dc4282ed78c4b73748b573f1ab903f5c892f40906c79bbdec6543cf9a1450d86f9dd416e8a5f4b94e90226ee9248dca60ebdc16c67f8d26a8dd3866c2c715b289da9019e3f7558081cc9862b0e6368627ebcb323358c69829ff12ddb1e1daddcee28728360ec68447c68a66eaf37aed60b791522e6769e7b1a5b481244a6c64223fd51ea8f576a511a7ad93c978f85f213cdb77a0944dab6ae42ca8a6991fd3c8c2098860306279a741ed4308d610000000000000000b28aee60ca3f87ec4636e82c801ef45d30e85f3965eccc0097e96132da3771e2bfde940725c944003fe861b5753e38ec5c70f385a6800d6a885e5c3bb18ee5278e258cd51724bc0346cbaf950e96306053f35d64ee288e7b91e0cf834978345b51154741c15e244e8d3be0266f5036401e10a83eed6d538dba89415d0aef2ca679af7718d77b67041cb2ea3e4fef9c613ef955fe9fcf72d029577de6109cbfc89341f6bbce5412f0d542cf17190e2bd339023a1674d9d85671153e9e3d276b1b0404d0b0399f1eaeb163dbec0cd5ec8c24039372e27b3b970aa6c20f46702c096b28be0ea393d0d6f5c7c72e259b58a983"]) 09:30:09 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x5, 0x3, &(0x7f00000002c0)=[{&(0x7f00000000c0)="e08aa8a1ae34f39a4ab9ec619e3939205a95a495439b49b17e0390738b59c2c77a19973ecec19742cccb578bb8c773ca7c7b1e8310cd49022ee21e0631158d56a623bbf45723240bb3291650f9e547c46525ef45fd5873ef0e90350ff2206b3c9fee9d9e3c5f4534d7b61d688c06a6e1c5", 0x71, 0x5}, {&(0x7f0000000200)="e82e9e4c067e5d118a7472b04cc08c321691da6dac3a17b8c006646c04b34f0e9066c820dcb329f0084b2ca68c2cca5eed5b84684d5104616ffc167b5ac7c315fede36c8c7678f39cc5c7b9e0d4355544075bdb569b5ce45bc670ee2bf335b59c8e127c50549d5a2f25a1eb2ffbd844e1d5fd94412c820411482b0bfee5503ab9ade7e54aa3032231e5fdf6b5f155adafcb02e2066f7d3d6a647f862648ea0e0bd9b143be1cb9c", 0xa7, 0x2b}, {&(0x7f0000000140)="0b1c753d53cd4d838c1f", 0xa, 0x4}], 0x1800018, &(0x7f0000000180)={[{@init_itable='init_itable', 0x2c}, {@orlov='orlov', 0x2c}]}) ioctl$TCSETSF(r0, 0x5457, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0xb106}) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)) 09:30:09 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYBLOB="00000000000099ee75555834ebdb9dfeb6b1d747fac0e786bc54633a84d75d70d8a098acebf1b513ddb2229c444d365dc6b46889d7ad0879da1eb046a606488590990687533f4ec08aa13a4430ca173af1ddae4c04ee3ba88d17ca93f37b"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000380)=0x2, 0x4) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f00000003c0)=0x3) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)=0x1) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 104.319048] XFS (loop4): Invalid superblock magic number [ 104.380398] XFS (loop4): Invalid superblock magic number [ 105.100052] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 105.234626] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 09:30:11 executing program 0: r0 = socket(0x10, 0x2, 0x0) modify_ldt$read(0x0, &(0x7f0000000000)=""/50, 0x32) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) shmctl$IPC_SET(0x0, 0xc, &(0x7f0000000040)) 09:30:11 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x0, &(0x7f0000000380)=ANY=[]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000001300)={&(0x7f0000001340)='./file0/file0\x00', r1}, 0xc) r2 = fcntl$dupfd(r0, 0x406, r1) mknodat(r2, &(0x7f0000000080)='./file0/file0\x00', 0x84, 0x8) unlink(&(0x7f0000000180)='./file0/file0\x00') 09:30:11 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/fscreate\x00') epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x8000, 0x0) socket$unix(0x1, 0x1, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x4, &(0x7f0000000080), &(0x7f00000000c0)=0xc) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x2, 0x32, 0xffffffffffffffff, 0x0) close(r0) 09:30:11 executing program 6: r0 = eventfd(0x0) poll(&(0x7f000061aff8)=[{r0}], 0x1, 0x7fffffff) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x410040) ioctl$KVM_S390_UCAS_MAP(r1, 0x4018ae50, &(0x7f0000000040)={0x50, 0x1, 0x80000001}) write$eventfd(r0, &(0x7f0000000100), 0x8) 09:30:11 executing program 4: syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='\x00']) r0 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f00000004c0), &(0x7f0000000540)=0x60) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000003, 0x80010, r0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x80, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f0000000400)={0x6, 0x0, 'client1\x00', 0xffffffff80000006, "4fcdc031ebb0fbd5", "f8736d3cebce94421da51ac22ea2eab6fbfa95d47fd154ab87ad0de71c219eb2", 0x1ff, 0x1}) mknod(&(0x7f0000000080)='./file0\x00', 0xc010, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000640)='iso9660\x00', &(0x7f0000000680)='./file0/../file0\x00', 0xca6f, 0x0, &(0x7f0000000740), 0x10000, &(0x7f0000000200)=ANY=[@ANYBLOB="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"]) 09:30:11 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(wp256-generic)\x00'}, 0x58) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xffffffffffffff00, 0x0) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000080)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="776ae56d215a89f1bd7d9c6b17d71f4228b691711a5341f98c278ad9d18dd705ce80c8370c395eea04f636f00df97740a2ce7ac5b1b542eb53424414abca6d7936", 0x41) 09:30:11 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x10, 0x3, 0x101) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000000c0)=@get={0x1, &(0x7f00000001c0)=""/141, 0xfff}) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cuse\x00', 0x2000, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000100)=0x4) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000080)={0x1}, 0x4) getsockopt$sock_int(r0, 0x1, 0x31, &(0x7f0000000000), &(0x7f0000000040)=0x4) 09:30:11 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$dspn(&(0x7f00000002c0)='/dev/dsp#\x00', 0x9, 0x80) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f0000000300)=0x1) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f00000000c0), 0x14) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r4, 0x29, 0xb, &(0x7f0000000080)=0x8000000, 0x4) getsockopt$inet6_buf(r4, 0x29, 0x6, &(0x7f00000000c0)=""/177, &(0x7f0000000180)=0x19f) r5 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x8) r6 = dup(r3) syz_kvm_setup_cpu$x86(r5, r6, &(0x7f0000012000/0x18000)=nil, &(0x7f0000000040)=[@text16={0x10, &(0x7f00000001c0)="0f011f0f01190f20d86635080000000f22d8baf80c66b86cd5038c66efbafc0c66ed360f07d2828ebd0f009c0c00640fc7aa000066b80500000066b9001800000f01d90fc79d0000", 0x48}], 0x1, 0x5, &(0x7f0000000240)=[@dstype3={0x7, 0x6}, @cr0={0x0, 0x20000018}], 0x2) close(r3) close(r2) 09:30:11 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f0000000040)=0x15) r2 = socket$inet(0x2, 0x1, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0xfffffffffffffffc, 0x8972, 0xffffffffffffffff, 0x0) connect$inet(r2, &(0x7f00000e5000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) connect$inet(r2, &(0x7f00009322c4)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) 09:30:11 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x15e1960a) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000440)=ANY=[@ANYBLOB="0100000000000000b08c0000000000000600000000000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00z\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r0, @ANYBLOB="00000000050000000000000000000000000000000000000000000000", @ANYRES32=r1, @ANYBLOB="00000000b40a00000000000000000000000000000000000000000000", @ANYRES32=r1, @ANYBLOB="00000000010000000000000000000000000000000000000000000000", @ANYRES32=r1, @ANYBLOB="009967b597981c796e0000000000924a749f7f872ffabe4b000000000ef2b0ccbdc217c0f82494c547da96592cfffa067047ac3f56ce7b00326d1cf7bbaae28ca721c732e44c3502223b924fc563a48eca37dd6c", @ANYRES32=r1, @ANYBLOB="00000000030000000000000000000000000000000000000000000000"]) select(0x40, &(0x7f0000000000)={0x21f2c00000000000, 0x401, 0xa39, 0x100000001, 0x39a9, 0x101, 0x80000001, 0x8}, &(0x7f0000000040)={0xc2, 0x6, 0x0, 0x800, 0x27523afe, 0x1, 0x4, 0x5}, &(0x7f00000000c0)={0x100, 0xb0ef, 0xffffffff, 0x1, 0x100, 0x8000, 0xc1ba, 0xef}, &(0x7f0000000100)) r2 = dup(r1) name_to_handle_at(r2, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000060000003af0609fac3c6c143d9f8ce79a2eabb56162feb74a1f513d70c8a7f12978313fa5430a9d190702fc8605b97f315086d7abbe523ef93323c9b9f9f458141505593b7ec4066cac328df28498ebb9047bed36edb94d918355eabc01f0ffff763dac10bddeb9d15ed67c245686b6a270e6b311f0f0f4764271cdb0e2e38aa78b0caf205165690f1d1c6e9ecf72141ecc4eaf0b676d3793abc45b1a14cd198a4d2d4e336593b54502fcf7ebc28ccdd06f6b25126966ee0bc919400ffe"], &(0x7f0000000180), 0x1400) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@mcast2={0xff, 0x2, [], 0x1}, 0x4, 0x100000004, 0xff, 0x1, 0x0, 0x100000000}, 0x20) socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0)=0x30, 0x4) 09:30:11 executing program 0: syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6c, 0x0, @dev={0xac, 0x14, 0x14}, @remote={0xac, 0x14, 0x223, 0xbb}, {[@rr={0x7, 0x3}]}}, @icmp=@timestamp_reply={0xe}}}}}, &(0x7f0000000100)={0x0, 0x0, [0x0, 0x588, 0x2]}) 09:30:11 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x0, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x2000, 0x0) getdents(r2, &(0x7f0000000200)=""/120, 0x78) fstatfs(r0, &(0x7f0000000040)=""/46) ioctl$ASHMEM_SET_NAME(r1, 0x81007702, &(0x7f0000000100)='{$cgroup\x00') [ 106.566361] XFS (loop4): Invalid superblock magic number 09:30:11 executing program 0: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000080)=0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x40000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, &(0x7f0000000380)={{0x7, 0x6}, {0x101, 0x101}, 0x9ba, 0x6}) ioperm(0x145e, 0x8, 0x8da3) capset(&(0x7f000043fff8)={0x19980330, r0}, &(0x7f0000000000)={0xffffffff, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffe, 0xff}) r2 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0xff, 0x40080) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f0000000280)={'broute\x00', 0x0, 0x3, 0xc6, [], 0x8, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000180)=""/198}, &(0x7f0000000300)=0x78) ioctl$sock_inet_SIOCSIFNETMASK(r2, 0x891c, &(0x7f0000000400)={'syzkaller1\x00', {0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}) syslog(0x0, &(0x7f0000000040)=""/23, 0x2) 09:30:11 executing program 3: r0 = socket(0x2000000011, 0x3, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000000c0)="b177bd65c9cd5ec734769765e812ec997e9d3530ecdc907fcf41ba2582020766709b00406d653fd2e297431fcad216844269fd62be4908e56b61703d4c7bd7d35be9215813b9beafbead4d7e4c573d1d88a8", 0x52, 0x0) sendto$inet6(r0, &(0x7f0000000100), 0xfdde, 0x0, &(0x7f0000000080)={0xa, 0x20008100, 0x1, @dev={0xfe, 0x80}}, 0x1c) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getpeername(r0, &(0x7f0000000280)=@hci={0x0, 0x0}, &(0x7f0000000300)=0x80) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000340)={@ipv4={[], [], @multicast2}, 0x0}, &(0x7f0000000380)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000580)={{{@in=@multicast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000680)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000c40)={{{@in6=@mcast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000d40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000dc0)={'team0\x00', 0x0}) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000e00)={@empty, @broadcast, 0x0}, &(0x7f0000000e40)=0xc) accept$packet(r0, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000ec0)=0x14) getsockname$packet(r0, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000f40)=0x14) recvmmsg(r0, &(0x7f00000063c0)=[{{&(0x7f0000001040)=@xdp={0x0, 0x0, 0x0}, 0x80, &(0x7f0000002480)=[{&(0x7f00000010c0)=""/192, 0xc0}, {&(0x7f0000001180)=""/156, 0x9c}, {&(0x7f0000001240)=""/18, 0x12}, {&(0x7f0000001280)=""/4096, 0x1000}, {&(0x7f0000002280)=""/231, 0xe7}, {&(0x7f0000002380)=""/134, 0x86}, {&(0x7f0000002440)=""/56, 0x38}], 0x7, &(0x7f0000002500)=""/26, 0x1a}, 0x9}, {{0x0, 0x0, &(0x7f0000003640)=[{&(0x7f0000002540)=""/4096, 0x1000}, {&(0x7f0000003540)=""/231, 0xe7}], 0x2, &(0x7f0000003680)=""/4096, 0x1000, 0xffffffffffffffc1}, 0x8000}, {{&(0x7f0000004680)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000004b80)=[{&(0x7f0000004700)=""/47, 0x2f}, {&(0x7f0000004740)=""/43, 0x2b}, {&(0x7f0000004780)=""/39, 0x27}, {&(0x7f00000047c0)=""/233, 0xe9}, {&(0x7f00000048c0)=""/48, 0x30}, {&(0x7f0000004900)=""/12, 0xc}, {&(0x7f0000004940)=""/153, 0x99}, {&(0x7f0000004a00)=""/108, 0x6c}, {&(0x7f0000004a80)=""/196, 0xc4}], 0x9, &(0x7f0000004c40)=""/182, 0xb6, 0x80000000}, 0x4}, {{0x0, 0x0, &(0x7f0000004d80)=[{&(0x7f0000004d00)=""/71, 0x47}], 0x1, &(0x7f0000004dc0)=""/160, 0xa0, 0x8001}, 0x4}, {{&(0x7f0000004e80)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f00000062c0)=[{&(0x7f0000004f00)=""/11, 0xb}, {&(0x7f0000004f40)=""/56, 0x38}, {&(0x7f0000004f80)=""/166, 0xa6}, {&(0x7f0000005040)=""/34, 0x22}, {&(0x7f0000005080)}, {&(0x7f00000050c0)=""/32, 0x20}, {&(0x7f0000005100)=""/4096, 0x1000}, {&(0x7f0000006100)=""/198, 0xc6}, {&(0x7f0000006200)=""/69, 0x45}, {&(0x7f0000006280)}], 0xa, &(0x7f0000006380)=""/4, 0x4, 0x8}, 0x1}], 0x5, 0x1, &(0x7f0000006500)={0x77359400}) recvmsg(r0, &(0x7f0000006740)={&(0x7f0000006600)=@xdp={0x0, 0x0, 0x0}, 0x80, &(0x7f00000066c0)=[{&(0x7f0000006680)=""/48, 0x30}], 0x1, &(0x7f0000006700)=""/9, 0x9, 0x1}, 0x40) getsockname$packet(r0, &(0x7f0000006780)={0x0, 0x0, 0x0}, &(0x7f00000067c0)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000006980)={'bond_slave_1\x00', 0x0}) getpeername$packet(r0, &(0x7f00000069c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000006a00)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000006a40)={'vcan0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000006f40)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000240}, 0xc, &(0x7f0000006f00)={&(0x7f00000006c0)=ANY=[@ANYBLOB="4c040000", @ANYRES16=r1, @ANYBLOB="080027bd7000fedbdf250100000008000100", @ANYRES32=r2, @ANYBLOB="3c00020038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000200000008000100", @ANYRES32=r3, @ANYBLOB="b400020038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004000500000038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000400000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040005000000080007000000000008000100", @ANYRES32=r4, @ANYBLOB="4400020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000000000008000600", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="dc000200400001002400010071756575655f6964000000000000000000000000000000000000000000000000080003000300000008000400f7ffffff08000600", @ANYRES32=r7, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r8, @ANYBLOB="5c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000002c0004000100044003000000ff0008070400000002000002a60b00000800040602000000df0ef800ff03000008000100", @ANYRES32=r9, @ANYBLOB="3c00020038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000500000008000100", @ANYRES32=r10, @ANYBLOB="44000200400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000300000008000600", @ANYRES32=r11, @ANYBLOB="08000100", @ANYRES32=r12, @ANYBLOB="700102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r13, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b000000080004000100000008000700000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r14, @ANYBLOB="400001002400010071756575655f69640000000019000000000000000000000000000008000300030000000a0004000400000008000600c7fa13bb5535775d7689d7a71a71e983e80ab8ec000000", @ANYRES32=r15, @ANYBLOB="3c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000000c000400f30505200104000038000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400ffffff7f"], 0x44c}, 0x1, 0x0, 0x0, 0x14}, 0x4000) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000), &(0x7f0000000040)=0xb) lseek(r0, 0x0, 0x0) 09:30:11 executing program 4: syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xc00000000000000, 0x80) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x7ff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000002ff5)='/dev/vcsa#\x00', 0x2, 0x1) write(r0, &(0x7f00000010c0)="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", 0xfa3) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f0000000140), 0x0, 0xffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"872589d3d94cb1b1eb030b3a9c44087a"}}}}, 0xa0) 09:30:11 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$netlink(0x10, 0x3, 0x4) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000)={0x10, 0xf}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x48, 0x14, 0x7, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@generic="667e279639a91d7bd91397917daf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f423682a9447015739d53d5"]}, 0x48}, 0x1}, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2101000}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0xbc, r2, 0x0, 0x70bd2c, 0x25dfdbfe, {0x6}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1000}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x10001}, @IPVS_CMD_ATTR_DAEMON={0x6c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_bond\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x14}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x20}}]}]}, 0xbc}, 0x1, 0x0, 0x0, 0x40}, 0x4800) 09:30:11 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000018000)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000013ff1)={&(0x7f0000000140)=ANY=[@ANYBLOB="1800000018000152b207aa00000000000100000004000600"], 0x1}, 0x1}, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x101000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000240)={0x0, 0x1000, "ed8ec4a8b6baceb23a32ba708869b5f510e25559ec72ea704918edc693a238729ad019f70d55d5d4642d8bb35518ce9a40e72d1138ac5d601e896dc122ddfce2b69322ba859a3c33601261806da7824b91e29012190ced4c33a62ee66f526ea0f320acee076bb40abb05e13da01d913148df008f8575adb22cc4e14daf9cd0b11848c6b7edeed0197bb42fb239118102550b377e891db865b8320f54ea9d6d9be80abb2998dcea8e65febdea0ce97c53114f36c9d3038fe560d9c260a7e6da6ac30c22a979b98965b39c7e610a456ace0cb9026bdfc876678ab18d6c2285c96605762dc91864dbd9aedd7cc79104c746c45dcb2efacffed63cd8d5bbe094addb4a0ad4b4559b0093a62802f6a7d871ade2dbf46d18d9f4da12a41078dc1e0fdc47fe539bc139141bb9b47e35d9b4eb851455930e239ebd149c1345e12fbfda2a80268eee98be1168f7b9093f8b31c9518b32f1accda367e6604faba243353be0a9ab7ed69d4945f6ca25a5ce2cc5f5f46265e8cdf4b84bc5e452bdae326982bcf2e32229f6b608d7f4369fdf63c06a3d517029632f70a5217413110481287c46317389f7770163614886f99bbcbd16119fd36478e22e977df7f9eb94f71840d21ca87a9bfd43b6d89b9144274190baabb74b8a9b9f920873b0b97addaae91c28b3b842b8ab2fc7adef29b95e6872be014cebb34622b421220f0c5a18123d12b1f993b900ab17148be0ad3d9ec829be1c21ffda196d30618337548beb059d6c769d882ffc9aa1a16b61a11aeb21ead5db6df2dcc7dd7f1bef20f6d64d2c87cee82e0ac35c160840c173721b0438049518b5f79572094e7f0c63a9f07a4aa759b7df50dba7669b56a2191abf330cf82b4bc3fe056a4888b98f0eb7eb3971653890c47b5cf522c98caff26f0512c70103c3a420f45bd55416276162f7c1bc5fa220d1742aaffd6ca30633d5947fac03740d28c185a204654d9607766c69ee2a5e09324bc16ce396385383d8378bb2884988b11c380010abf5e39d7cdef4c31142d3f37e02778970ac8327df6bb3ee2ceb7233eb37cbd6639480e0fe7da4fcd50ea60c07154c230d428620ccf766018e902300305c8c033afd7565a30de585a393822944a854d2f695151fb6b695306f6c7830a0f40ec411082b1cee0d3d70ea51da529abcf52bb859cacd9cbe6752f4ce9346f939bd2c14df7c99492efb98e5dfe0238aaceb0e0ae22534669f9753bc553c92d4bef3805b76684629929b511cd4724a1799c6a35ca373438dedc5ed5cea4de557897f94e0de29c3375035d2a12b84e9320f8d19e6bd0ee16aa183f386b02e53c221f85265530355de78d7b5e7e41db9a79723ec4a5b18bbad45982fe31ec06f1a18b6242e5c1ca5408769f434453c6cd4462eb61983ea1a3c5c41b42d4f94431de132e72f91219739e4eddc6a721de5bce3afcc3ac5dc06d99a3a6112e7ad797080f77abb8b3a7f0b61ee7f4261adcc7bcb5acfba139806aaca4e763f4f4bcdb3df48e6da6a45cf9993617f4d97203172599f3d8cbef754d64d76b02eec9dc505e0dea94cda68d628b5d1a564a6c826fff9e4d541a0c029d7e8f624570201dffda3191b708d1a7abf51a434bf32f2c5c1d0599422c6d7096114b38627f7416526de7746bf4bc36a19db1a4cbc451958a8b4a088d5a1529bde3c893a68bae17c7fa518dc99f320b7d1e5eb2b4d3d907f2e698894a8086c1e151284d0e033a81cbe11e0aca6d969cfa7e6b6fe6774e33ccb103b7fb0de4e8cab524e6bf8f7e95c602f1b82cd41e44c12fe19a1574e20086eccdf9f8b35c5f72bb890f150789bde6b5fe8141ad0cc5372438864bf1b1af93bdc638eb20e0e12b7971377c8cb13ca047bdb06c59eb015e49e8e60b81242c9d02b68b9935e92243b4d828d6bc0cb0b693e3003d10c9ef6d27a494cbfd4f8a5db5104ececd3fb34cd8eb75f3687a7f8838cfd1fd2b6056337bd6d9ab8da2b4588517610b185add030558214a1376293b9cf956a9c4ee2c6179f859ed70149dc211c0a2f9f89196028812d0e1b4f8b129166e0b567513b9bc9dad46e1948dd6c286bb323bebe2886566838a7808ad0653d21eae30b114e96b0b164a0a5537dbfb684b53c4f191df6bd6cd413e9b5593ac64ba51c5ed9a285dde025f0977ce11c6bee49023fdb224eee96f29f5186a2e32a671e44f28f8aa46f036d78d66e3142768f4b326f328c7a990b726c82808b3411f10192eacfb44e9a218b47bc0537e7103232f589b0b9ed712653bcaf4c555faa0312974ab4f6cb08282aec0088a687ee180a6ac8ae1278900cdb5b336c4e6825d2cbbf7726530795bc0ef9c1e35322c3de5cb8326abdaf2e8533ace903a8df24d038507af655476392d4cfacc169d5ec590c212894a2b8138e4fb38a75c74ebd00c5570a07604115f92691b4e3768b0c763b2155277b1283c0fe2c701a27db0f428624b0d838e7d8fb9df8da734f913696b60ca9e31bb0ab64378b97e7b8a49e2dca7588138436d1d7b89058020d02ef66d37abeb07581c2661a8daa78f861c284cae2f56092f334dac13fdde205d04db2fbc74c5fad9fb6f4d34eac7e8aef54563bf10cd90233605009dae065bc57454d71b171385b5fa1e88c843fa66197162cb5ff366dfdcbec8ac7aa0bd055c42c89a29ecc10ab2184991a7b649b6611e6d72d253b950284bc18719b774d65894589617ece86380a9ea833d6c4d4ad579d9fe42157e37fa24dbde5ecbf2ccc780a8c89cbaf0d1b9095e5203f9077ccd2131d5cde2dc78b75325cda0e88821ba2a0c1edb12b053c2ecfcc595c195bdbf91709960ed85b8bb2d0f15ab6069c5faf2c865337aa5da8693d5a0f3e2f3d060961cb01525a8ca9334f30030f8ce1c3dac0a95c6affa173acb8ffe5d4e0e4149e68d01c3bccf94c3e5b96d434d588e521cc76a788a01ee7e95b6d8241c9ae4742f2379507d89bf65e501a9479a1293e40740a938b0b29d0bf9f3463f28f39a082a2eb69d08b14be3940c6d8230021c3cc86602ef5da58bceb62de2a1930adb37f2b4ace952d57b41a25f212f1e996dedda132099c57c70f9b8f2f85f31b0282777b461c4b4d82d5d22b2af0f0dbfbbbbd8ad0946dd110d0f0c8a17a9539148c777c1d24d47fa5d824b9bfd220c736ffbbea1e87258d40401b820eb70d7bd6eb40756c8165d77e0cd2eaddc51a406c7e9ed774c1c978950ab938039d43b9ae7b848065d6ce2effa50cfb1229bb009812f3626eec29e7fd44bcc19ee48d85532f80da860067715fe289a6df909ab757702015a4f27163470cd0ff5ac3454ffd64f464539a5861d906bfe4f8655cb519407dd9a8443feaf34ba1c388a52c6059cedc6e3f7f1c9e8f60a29658c5bcf49c3b90e9766527800095809f5b54839cf9828550504224566d4cf1c5231e08fb367e003227111bf5dbf76a0ff940be6f74853234dc24167659fa6fec99096559d759c8c5edf88e84a9e176bbb8ae30963d93d2e940cfcadbcedcbd7b8f4c85658ed9b8001fbbf1e42ac75dbed43a37bb2e47e5921743c2ba8fc4fc34f3aa2f5be16030cad6eb4feb1088ab7b1eb48aeeedc41b3ebc9519acf73758771ef05c70862786110a3086db4a8f3af21c52b933cd6b2510bf4c1af1727377199bad6c10a0f6d042c7372b6cae8eb255003ca9f69250882aabb2cacdeefadcc15a10c9e1afac917ab78b44b60a424319f4379599bb23a148dafb9fcb93279bd2c798320d23338f85caa97ebe123c18a17c2ca6a1093ba46005b23221cd3ff1177390290c811b4ffbf8d9e3423d56a75e4765e7b643797138c72eeab6ec394885a472e2e8aeb5fa3cc868303f46199aa44f8b999efa5afcb32ebd83a243e2223d94dbaf515a0919321836aa2398ba3e9ba6a97c33190e0402ceb5e8499845ed4fd0c524cd9a0ce9189cb49a8ac92b542bb9e7c631de59db76e72239d1c0e3b4d56b0e9085aaab4febd22a67297de800f9f1b42971fcfda3a335dfb02cb46f49f9c53c1af03288564398e4da5a328ef686d1a92843fbe16b3dc32c0faa798079901b1b7c16743128fcec742b60d7a833e05f9eca785c332df65185ba435b173e5643b0372eabaf850f3504e39d1050e839b6551d863da40e1586311bdea09ce3f73217e3fd112a51495277157a2d9e3e4bdbb8df2771767fa296503bbd48fc3ba0c4a41a01f7c1521a7c0719de028dfdd12bd0d23bb68a2339bce407c09fe8b0f2690c7f36da8a437319563e8338c4827d921878a8d4e05a6a753c8c176f8a7f62b9afa5b3b119402b14eaaac4400354e6908e349853cc41c53cb22bf4853918ed351e419e8ba61ec96e75a7e2b3379f6d839ca5cd197c958fbb9c0636053a6490457619b84ab4fec25e27c3dbf4112d1d33fdf84937181b6d865b9e6a1e2fc2ea3100040aa32bac422812181f3224fb9745a5096ada906fe49205212398301f51d0bb0e519fe2443727d86004d395095aa8fde30499d1c0455c4ff65610886983e72265be7c0ee7d64cb19ec96d53f1e434db0d764e9954fcfc1d440374095f985ca49a8ed302f1372dda0645ff8c152fd8593dd624980a2d151cd3ad059d5fc4695ddef66f450feee33ba219fcb88a2c1f10ad89727fea48254b770bc22adcf60ebc25f9c423dc5244597fca6e16e9c7c7a166e82c2351085affa096fe8989f8587277e24d4d09092d6df2710d1fdd6779cfbd3bf8875a4d86f217eac5d674334832edffd732afadc665bf9ff044d60b39c2aa33c64eb7cd7847705c20e161fde258cb92552030b82221e66896735b7cd1f732e3637fa2936461e4d802e7f967a5d52bb3162a7c420ff92e9e0b982a1105f92d0a4f43867917d70414731c8ecf96c3ed158def14582936a928e4070f3a2d0f65619fe84baa035b5c184ae6e40dffb0f281a877964071277d1caba7e9bf36271df6c101f943bce71d615c3ee259e01087e985aaa83f31f9b9e3fdedd7151987e31c9b7e5b961ffe1943b5e0b0bc43020dbfb3c3c83dc03ac5a5aa0175b7aeede3966f43c572a28016c7c6aab7ad6be1a35daa7e3dce0f73dda324fb5ab4c92aae2d6d7086c6ee342d915abe124774f90598c53cfa74a3c47550af4754074bc0dbc1df319d25ea527d2e2970a690bade765c4c067accb7220bb16075c7f18c17f01e5f96e66d6b4d156ba1ae61909b1396bd8a814811080c44980fa2547d044aa34430abba37df152f34d9702870881fb278bf4d06e4a0dab2f926a139c2cc8f0c252da95d9bb4c8a0c857a7f1403a321a098c4b2a73bd1b7b8e3d467d29b3081bcc12185c2845924a164ccbf9ba7b4479bdd90639201b1decf1f666988b56c31520bb45ef048f274fca6c6771be387f45602b8254a748bec88797a7c4e49751795b5907c0c45b043e3aae0a99d25c497cb699617bf34ca9c51653dcda9006a8b7c7f5b5ab52ebe220e34184c0c311a8211e737d5e6a01914e2a4ae4eb315721827717b08420bf1bd0387a8b3d62c371ba9fe5bc84e27e6a1cec4512376d3121c7a27f9e0ed4cb58b9093ae96e1f6403fa3e6b69a014da5dbf238b7f15da60594e8e45e4cece0420f70a6e84d59daff14a7a77df59809d9eb42078af7b6233325278c7761a7e2c1137d2da879e1c1a972161465e627fbc9a31363bb223c3386d157d892fde8fd5a2f37e7637ae22ffdebc31f78e5a6b21743156ae76dcfeb4a84fc8015f7f50f72032600d85362f4e43d9a30fcf9e193b385033d27ba19fce9ee0e448762d5703a4d7136d7bb5c3958ad322d2ef"}, &(0x7f0000000180)=0x1008) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000001280)={r2, @in6={{0xa, 0x4e21, 0x9, @empty, 0x480000000}}, 0x1000}, &(0x7f0000001340)=0x90) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x0, 0x100, 0x3, 0x4c4653a5}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000100)={r3, 0x2e, 0x2}, 0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000080)={r3, 0x6}, &(0x7f00000000c0)=0x8) 09:30:11 executing program 2: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x20000) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x28001, 0x0) ioctl$KVM_SET_TSS_ADDR(r0, 0xae47, 0xd000) [ 106.705562] capability: warning: `syz-executor0' uses 32-bit capabilities (legacy support in use) [ 106.736848] syz-executor0 (7097): Attempt to access syslog with CAP_SYS_ADMIN but no CAP_SYSLOG (deprecated). 09:30:12 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x88000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x10040, 0x0) linkat(r0, &(0x7f0000000180)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x1400) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl(r2, 0x1f, &(0x7f0000000100)="295ee1311f16f477671070") fstat(r2, &(0x7f0000000080)) syz_read_part_table(0x9140, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000080127008e030c00650000006400000000030d00f0043100c90000006400000000043200422020002d010000d306000055aa", 0x60, 0x1a0}]) [ 107.404598] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 107.413983] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 107.420466] loop5: unable to read partition table [ 107.425703] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 107.442500] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 107.451864] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 107.458501] loop5: unable to read partition table [ 107.463680] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 09:30:12 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f0000000040)={0x7b}) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f00000000c0)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000100)={0x1, 0x0, [{0x40000083}]}) ioctl$fiemap(r1, 0xc020660b, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 09:30:12 executing program 4: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe800, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb3c906d6b66732e666174000200000a020c02260af8", 0x16}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x0, 0x0) r1 = shmget(0x1, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_INFO(r1, 0x3, &(0x7f0000000200)=""/146) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f00000000c0)={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getrlimit(0x1, &(0x7f0000000100)) 09:30:12 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000600)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) 09:30:12 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x20000, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x44, 0x0, &(0x7f00000005c0)=[@reply={0x40406301, {0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x70, 0x28, &(0x7f0000000480)=[@ptr={0x70742a85, 0x0, &(0x7f0000000380), 0x1, 0x4, 0x35}, @fda={0x66646185, 0x5, 0x2, 0x9}, @ptr={0x70742a85, 0x1, &(0x7f0000000440), 0x1, 0x0, 0xd}], &(0x7f0000000500)=[0x68, 0x18, 0x38, 0x48, 0x0]}}], 0x8f, 0x0, &(0x7f0000000640)="16fee336633da3b6e4209b172a1e37c51b49310b481eb9c62616231517007eb87a79c814830e24975d02fb639c79bfc213a53f97eb0d37c734d8f435b4ffd50efe6c75640e49d98febff5153ccec139197af82a0a7a360787d9ba0cf27aeebd347f37d305274942509b15fa9a2dc9758de6cfcb57c6d7c596a8c54d9e908de089db6f039a6cabf68019c5ba6fd1e6c"}) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r3, &(0x7f0000000040)={0xffffffffffffffca, 0x4d}, 0x7) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000540)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@version_9p2000='version=9p2000', 0x2c}]}}) write$P9_RGETATTR(r3, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x109000, 0x0) ioctl$TCXONC(r4, 0x540a, 0x6) r5 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x7, 0x1a9a00) ioctl$KVM_GET_ONE_REG(r5, 0x4010aeab, &(0x7f0000000080)={0x9, 0x7fffffff}) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@access_client='access=client', 0x2c}]}}) 09:30:12 executing program 0: r0 = inotify_init1(0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000180)=0x9) fcntl$getownex(r0, 0x10, &(0x7f0000000cc0)={0x0, 0x0}) fcntl$setown(r0, 0x8, r1) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x6) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000080)={0x0, 0x8, 0xffffffff, 0x99dbe06, 0x80, 0x1, 0x2, 0xf8, {0x0, @in={{0x2, 0x4e24, @multicast1=0xe0000001}}, 0x800, 0xfffffffffffffffa, 0xff, 0x1, 0x4}}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f00000001c0)={r3, @in6={{0xa, 0x4e21, 0x10001}}, 0x0, 0x0, 0x3, 0x1ff, 0x4b}, &(0x7f0000000280)=0x98) write$binfmt_aout(r2, &(0x7f00000002c0)={{0x1cf, 0x7fffffff, 0x40, 0x39e, 0x39, 0x3ff, 0x25, 0xef4}, "2f9386d584296fed3a2058e501e4cead725cc96bcfe53207683357d433f8b9f3bc30569e8297dc4fd9de920e4d79c9a54c0dae592fab50bdee492898b9f55ddc59e95500bb14cc820d247e54cfcde8141d395ef152a98a25d73f6e41b98d41a24dd9e4eb85170bcfd72e15c2c72f0a5bfffef2ccc0d4e3b9fdc8051a42c36e5d6f75029ec292e48e5fa3004dd43ac519c96d5c49f1fc0be2fb0835397d6d54a9685f619195d8950cdba9d392008cb733c450aa", [[], [], [], [], [], [], [], [], []]}, 0x9d3) 09:30:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000200)={0x0, 0x7530}, 0x10) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000080)=[{0x7, 0x400}, {0x4, 0x42f}, {0x8, 0x5}, {0x2, 0x1}, {0x2, 0x9}, {0x0, 0x3}], 0x6) listen(r0, 0xffffffffffff8000) r1 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00'}) 09:30:12 executing program 1: r0 = getpid() sched_setattr(r0, &(0x7f0000000140)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x8000, 0x5c) ioctl$EVIOCGLED(r2, 0x80404519, &(0x7f0000000380)=""/4096) syz_open_procfs(r0, &(0x7f0000000000)='loginuid\x00') read(r1, &(0x7f0000fb6000)=""/28, 0x3f0) fchdir(r1) getpid() ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4c000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db6925400000009fb42f37658d701a400", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000180)={0xea46ddfff75b1b, @time={0x77359400}}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0xc08c5334, &(0x7f0000000240)) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) 09:30:12 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x88000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x10040, 0x0) linkat(r0, &(0x7f0000000180)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x1400) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl(r2, 0x1f, &(0x7f0000000100)="295ee1311f16f477671070") fstat(r2, &(0x7f0000000080)) syz_read_part_table(0x9140, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000080127008e030c00650000006400000000030d00f0043100c90000006400000000043200422020002d010000d306000055aa", 0x60, 0x1a0}]) [ 107.575887] FAT-fs (loop4): bogus sectors per cluster 0 [ 107.581370] FAT-fs (loop4): Can't find a valid FAT filesystem [ 107.592419] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 107.601873] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 09:30:12 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/tcp\x00') readv(r0, &(0x7f0000001380)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000080)={{0x2, 0x4e22, @broadcast=0xffffffff}, {0x306, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x48, {0x2, 0x4e23, @rand_addr=0x800}, 'nr0\x00'}) read(r0, &(0x7f0000000040)=""/15, 0xf) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) fcntl$getown(r1, 0x9) 09:30:12 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x6) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="580000001400192340834b80040d8c5602062200010400004001000000005800004824ca944f64009400050028825a003b5fbe907902008000f0fffefffffe03edf8fef5dd00000010000100000c0900fcff4d00040e05a5", 0x58}], 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x2000, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000200)={0x303, 0x33}, 0x4) write$P9_RLINK(r1, &(0x7f0000000100)={0x7, 0x47, 0x23}, 0x7) getsockopt(r1, 0x9, 0x5, &(0x7f0000000140)=""/96, &(0x7f00000001c0)=0x60) 09:30:12 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0xffffffffffffff7f) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000140)={0x0, 0x0, 0x20}, 0xc) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) sendto$inet6(r1, &(0x7f0000000280)="d3", 0x1, 0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="73797a311ec6b8f1997a19e085a2a6c1f5a22b31a2"], 0x3cb5) setsockopt$sock_timeval(r1, 0x1, 0x0, &(0x7f0000000180)={0x77359400}, 0x10) r2 = accept4(r0, 0x0, &(0x7f0000000080), 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x63, &(0x7f0000000040)={'NETMAP\x00'}, &(0x7f0000000100)=0x1e) write$binfmt_misc(r2, &(0x7f0000000000)={'syz0'}, 0x4) 09:30:12 executing program 7: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000a8eff8)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000ac5000), 0x4) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) close(r0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000000)={{{@in=@multicast1}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) 09:30:12 executing program 6: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000440)={&(0x7f0000000400)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000002700)=ANY=[@ANYBLOB="200000001a0001000000000000000000000000000004000000"], 0x20}, 0x1}, 0x0) [ 107.634297] FAT-fs (loop4): bogus sectors per cluster 0 [ 107.639756] FAT-fs (loop4): Can't find a valid FAT filesystem [ 107.650983] loop5: unable to read partition table [ 107.670953] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 09:30:12 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x482c0, 0x0) r2 = getuid() getgroups(0x8, &(0x7f0000000080)=[0xee01, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000200)={"6970646470300000000000005c2ea8db", {0x2, 0x4e20, @loopback=0x7f000001}}) getresuid(&(0x7f00000000c0)=0x0, &(0x7f0000000100), &(0x7f0000000140)) write$P9_RSTATu(r1, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r4], 0x6c) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000240)={0x0, 0x9}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000380)={r6, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, 0x9, 0x3, 0x1, 0x24a, 0x8}, &(0x7f0000000440)=0x98) preadv(r5, &(0x7f0000000600)=[{&(0x7f0000000500)=""/223, 0x200005df}], 0x1, 0x0) ioctl$KVM_GET_PIT(r1, 0xc048ae65, &(0x7f0000000640)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, &(0x7f00000002c0)={0x6, 0x2, {0x3, 0x1, 0x3, 0x3}}) [ 107.728653] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. 09:30:12 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$inet_buf(r1, 0x0, 0x26, &(0x7f0000000080)="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", 0x1000) bind$bt_rfcomm(r1, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0xffffffff}}, 0xa) 09:30:13 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = getpgid(0x0) r2 = getpid() r3 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x401, 0x1) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f00000000c0)={r3, r0, 0x100}) r4 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x9, 0x30800) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000040)=0xcd4, 0x8) r5 = fanotify_init(0x0, 0x0) write$vnet(r5, &(0x7f0000000400)={0x1, {&(0x7f0000000300)=""/153, 0x99, &(0x7f00000003c0)=""/47}}, 0x68) [ 107.770340] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. 09:30:13 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) migrate_pages(r1, 0x8, &(0x7f00000000c0)=0x8001, &(0x7f0000000100)=0x2) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000e15000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="71e66daf", 0x4) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001b00)={0x0, 0x0}) recvmmsg(r3, &(0x7f00000019c0)=[{{&(0x7f0000000e40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001380), 0x0, &(0x7f0000001400)=""/102, 0x66}}, {{&(0x7f0000001480)=@pppoe={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000001880), 0x0, &(0x7f0000001900)=""/189, 0xbd}}], 0x2, 0x0, &(0x7f0000001b40)={0x0, r4+10000000}) socket$nl_route(0x10, 0x3, 0x0) 09:30:13 executing program 0: mknod$loop(&(0x7f00000029c0)='./file0\x00', 0x6009, 0xffffffffffffffff) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='gfs2\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000140)={0x0, 0x3, 0x1, 0x7ecdf17b, 0x3, 0x9, 0x0, 0x7, {0x0, @in6={{0xa, 0x4e22, 0x4, @local={0xfe, 0x80, [], 0xaa}, 0x9}}, 0x0, 0x7fffffff, 0x9, 0x6, 0x1}}, &(0x7f0000000080)=0xb0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000200)={r1, 0x3}, 0x8) 09:30:13 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x1, 0x7fffffff, 0x0, 0x4}, 0x91) bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="e92be282346d61ac55"], &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000009f3d)=""/195}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x5, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x25}, [@ldst={0x7}], {0x95}}, &(0x7f00000001c0)='GPL\x00', 0x5, 0xc3, &(0x7f00000000c0)=""/195, 0x0, 0xfffffffffffffffd}, 0x48) r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x8, 0x60040) ioctl$KVM_ASSIGN_SET_INTX_MASK(r0, 0x4040aea4, &(0x7f0000000080)={0xffffffff, 0x5, 0x6, 0x7, 0x7}) 09:30:13 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000000)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) 09:30:13 executing program 6: syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x101042) r0 = syz_open_procfs(0x0, &(0x7f0000000400)="636c6561725f72656673008e44d157ec4a987d82766ad131e9f29c3b42e2cd28da550d5ae011f9a009cf596531908d3918598c993a4297b032385c65464537354eef638c9694880bbab59406e4aa926f62909ff2e83201133cca3cd1e706f118dd0f4ee2edff39d362f40cf63bb2d39da8d6f47d10f1c0fd8f809474c81ee36db344ed0eb5406df65a98fc21670015d7e5b143e83d76142bb9ea7824bdd8e2a83d1c9fef12afb31b8bde865644491bae40d2e9513036d9b1ab1ae6fb0e817a01e06bf1c5aafdaf1b949a450cd46529ced14f319cff5120298dd68fa4cfc5853ca06067880579254c21f24da9fffd66bb49232919f69401aa7a23f4cbb8223d3db0ed85ca3a4688ce23073814529d517ddc38a808dab9") r1 = syz_open_procfs(0x0, &(0x7f0000000040)='stat\x00') r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") sendfile(r0, r1, &(0x7f00000000c0), 0x1) 09:30:13 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x4) ioctl(r0, 0x7ff, &(0x7f0000000380)="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") r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x501000, 0x0) ioctl$TIOCMBIS(r1, 0x5416, &(0x7f0000000040)=0x7f) socket$inet_tcp(0x2, 0x1, 0x0) 09:30:13 executing program 1: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca, 0x4d}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000540)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_9p2000='version=9p2000', 0x2c}]}}) write$P9_RSYMLINK(r1, &(0x7f0000000500)={0x14, 0x11, 0x1}, 0x14) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB="2c6ac48993dd3d", @ANYRESHEX, @ANYBLOB=',\x00']) mount$9p_fd(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x0, &(0x7f0000000680)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c}) open(&(0x7f00000001c0)='./file0/file0\x00', 0x0, 0xfffffffffffffffc) 09:30:13 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000cc0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x19fd, 0x26f) sendmmsg(r0, &(0x7f0000004740)=[{{&(0x7f0000000580)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000a40)="91", 0x1}], 0x1}}], 0x1, 0x0) sendto(r0, &(0x7f0000000100)='I', 0x1, 0x0, &(0x7f0000000180)=@sco={0x1f}, 0x80) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x400080) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000200)={0x6, 0x4de, 0x4, 0x0, 0x0, [], [], [], 0x4, 0x23f}) timerfd_create(0x3, 0x80800) gettid() close(r0) 09:30:13 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mmap(&(0x7f0000600000/0x4000)=nil, 0x4000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000000140)=""/189, 0xbd, 0x2, &(0x7f0000000000)={0xa, 0x4e22, 0xc0, @local={0xfe, 0x80, [], 0xaa}, 0x800}, 0x1c) mincore(&(0x7f0000601000/0x600000)=nil, 0x600000, &(0x7f0000000080)=""/144) 09:30:13 executing program 4: r0 = userfaultfd(0x0) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000ffafe8)={0xaa}) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x3, 0x4000) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000f70ff0)={&(0x7f0000800000/0x4000)=nil, 0x4000}) 09:30:13 executing program 6: r0 = socket$rds(0x15, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001680)={'bridge0\x00', 0x0}) r3 = socket$pppoe(0x18, 0x1, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x1, 0x10) getsockopt$inet_sctp6_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r4, 0xc08c5335, &(0x7f00000000c0)={0x2, 0x0, 0x9, 'queue1\x00', 0x7}) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000180)={0x2, &(0x7f0000000040)=[{0x10000, 0x1, 0x9, 0x8001}, {0x1, 0xf77, 0xbd, 0x6}]}) connect$pppoe(r3, &(0x7f0000000080)={0x18, 0x0, {0x3, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'erspan0\x00'}}, 0x1e) sendmsg$nl_route(r1, &(0x7f00000018c0)={&(0x7f00000002c0)={0x10}, 0xc, &(0x7f0000001880)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3000000013000501000000000000000000000000", @ANYRES32=r2, @ANYBLOB="000000000007930004002b000c000100080000005ee710d0d58a2343cc11f387f2e9a41085cb9cffc57ba86f351fed15c0233f8989f47ac6219c22ca1b2f041c97fad9e5fdb95d8ef00d582bd0ce396a7b80b3f01820c0f44ef1282b1dff07e6ed0bf3f2e64ad71d696d2c0de95df5d606ecc15e3c92e4739ebb2658bc45c30b447d527d9587651500000000000000000000000000", @ANYRES32], 0x30}, 0x1}, 0x0) 09:30:13 executing program 2: keyctl$update(0x2, 0x0, &(0x7f0000371000)="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", 0x1001) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$set_timeout(0xf, r0, 0x7) getsockname(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, &(0x7f0000000100)=0x80) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000140)={0x0, @remote, @multicast1}, &(0x7f0000000180)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@multicast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@remote}}, &(0x7f00000002c0)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@remote={0xfe, 0x80, [], 0xbb}, @in=@rand_addr=0x1, 0x4e20, 0x4, 0x4e24, 0x9, 0x2, 0x80, 0x20, 0x1, r2, r3}, {0xfffffffffffffc00, 0x1, 0x9, 0x2499, 0x4, 0x5, 0x5, 0x1}, {0xc0, 0x2, 0x0, 0x3ff}, 0x0, 0x6e6bb8, 0x2, 0x1, 0x3, 0x3}, {{@in, 0x4d2}, 0x2, @in, 0x3503, 0x2, 0x1, 0xfff, 0x0, 0x3f, 0x100000001}}, 0xe8) 09:30:13 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000300)=ANY=[@ANYBLOB="1703000000000000040120c91000000000000000000000000000000001c204000000060000000000e0ff56bfdeb1522f8ed333ad6504230d823544140ed58d56c7bc1aca48645e4a7c563584f1d80d1a32d9fdc2d7d650357e907ea1905c9816dcfee54cbca1bd86ffc7eabafa3cb1e6b3335fbdb4d23e96c6cac0faaeff735e0ef74189de91638a00180308b820dc378965fa590b08b64dc306dd2a39952b5604352edb14f2c982a13cd91c1f3b913169b660673107870a562a904975491683baba41c1f2d3d3b3c0"], 0x28) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@mcast1, @in=@dev}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000000)=0xe8) 09:30:13 executing program 7: syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, &(0x7f00000001c0)={[{@gid={'gid', 0x3d}, 0x2c}]}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, &(0x7f00000001c0)) 09:30:13 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x8) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cuse\x00', 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000240)) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r1, &(0x7f000001e000/0x18000)=nil, &(0x7f0000000040)=[@text16={0x10, &(0x7f0000000000)="0f01cf0fc79a00010f01cf660f38df8f1f2d0f019d42000f65df260f013f0f005100b868000f00d066b8010000000f01d9", 0x31}], 0x1, 0x10, &(0x7f00000000c0)=[@cstype3={0x5}], 0x1) syz_kvm_setup_cpu$x86(r1, r4, &(0x7f000001b000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f0000000140)="b805000000b9008000000f01c1f080a4b000600000000fc3180f09c744240000000000c744240200080000c7442406000000000f0114240f08f3a5650f050f20da0f01cf", 0x44}], 0x1, 0x0, &(0x7f0000000380), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000340)={0x16, 0x98, 0xfa00, {&(0x7f00000001c0), 0x4, r5, 0x1c, 0x1, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xb}}}}, 0xa0) 09:30:13 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000100)={0x100, 0x8, 0x3ff, 0x8, 0x3}) 09:30:13 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x4080, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000005c0)) r1 = socket(0x100000000000010, 0x8000000000000003, 0x0) ioctl$sock_ifreq(r1, 0x8932, &(0x7f0000000140)={'gre0\x00', @ifru_ivalue}) [ 108.603986] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 09:30:13 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x88) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f0000000300)={{0x0, @broadcast=0xffffffff, 0x0, 0x0, 'wlc\x00'}, {@local={0xac, 0x14, 0x14, 0xaa}}}, 0x44) ioctl$sock_SIOCGIFCONF(r2, 0x8910, &(0x7f0000000240)=@req={0x28, &(0x7f0000000000)={'rose0\x00', @ifru_map={0x3f, 0x3, 0x5, 0x4, 0x80, 0x3ff}}}) r3 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x9, 0x8000) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000100)=0x2, 0x4) ioctl$TIOCPKT(r3, 0x5420, &(0x7f00000001c0)=0x4) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x400, 0x0) 09:30:13 executing program 0: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x10001, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000002900)=ANY=[]) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, &(0x7f0000000300)=0x9, 0x8, 0x7) r0 = open(&(0x7f00000001c0)='./file0/file0\x00', 0x3bffa, 0x0) io_setup(0x8000000000000006, &(0x7f0000000280)=0x0) ftruncate(r0, 0x800) syz_open_dev$rtc(&(0x7f0000002900)='/dev/rtc#\x00', 0x31, 0x80000) write$vnet(r0, &(0x7f0000002940)={0x1, {&(0x7f00000029c0)=""/225, 0x952f005dd524f7ae, &(0x7f0000000000)=""/8, 0x2, 0x2}}, 0xffffff79) io_submit(r1, 0x0, &(0x7f0000000400)) syz_mount_image$ceph(&(0x7f0000000180)='ceph\x00', &(0x7f0000000200)='./file0/file0\x00', 0x8, 0x8, &(0x7f0000002800)=[{&(0x7f0000002ac0)="532d13b5f41385a62bf1080a8baccd10aff442c5a76202395acb452cf7eb5b7de220544340cfc15932772b5ebbed3247385159b2f9770bbce6419dda26acd652ed4e9f1aae39fb7afa432dc56e279cdb466a9e36b64b782b5366c3e37ec603291e5134eb3593a56e197ff7de1b6e81ff16144213fd5b9497d35b6b3515b667d9fc0031db870b4b0b9830cb051584df0456551cba03588e4bc7266c891524af5d014add69f9da909500ca166ebd92e8277b2601f3c634f4d1bb1aabfb", 0xbc, 0x8}, {&(0x7f0000000540)="31b5dce74d4d4ae4c7b16323e81676364b8bab4afe73195121c062f155ea311e041e1efd6b9ffb6b1d999328efaa93d4b2adf5d1c38b6cacd36574a24957ede5ed6af030ff6e78555f3e9839f6787387f1635f892efb19894bee81e1a874d1131dc6af43d72bbdcb68dc832ce25c41bfe3ac07ef56925a97ed71d3941fdfa66830e0a1f36604c443612bd97a23118750c233c64afb9985fd65f239c33974b4722943658d6c8064d1c709e66cfbc694aaa98b2112adaed697f213d8cb7d54eea2070cb56c36a6ca0a29", 0xc9, 0x400}, {&(0x7f0000000640)="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", 0x1000}, {&(0x7f0000001640)="e800a0b3f836e7085dce8f89584df9bf03e0b839f484976cd23de9bfcada714422f4cbb9f72cef3889709302deeb1151addba1ccf316e6ead0072a0fe1ef9d7eb71535b5415519423761a6b07713a4a6e9b8c7fd491be597899c1726d5fd3b1a04f5385016ec1c2703a1b79667b2abff389f0ce5fffbcaf9d65cfbc49ca138020000001e73e74bfcacc381002f82f8dfa9f4693b770b608a24bc1c5c88dd164753424b3179df070a6e212ef42de0955b64ef530aa1f949b2729f952f662463d1630e08177921a8a3f22c57b4c1a0000000000000", 0xd4}, {&(0x7f0000001740)="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", 0x1000, 0xa}, {&(0x7f0000000380)="6c8272a5", 0x4, 0x3}, {&(0x7f0000000340)="4ae2500a78cc2eb234614d078c35b90739c95f270a2c0fdb09d9bc8424746bdab171b6d8120848d0a3", 0x29, 0x1}, {&(0x7f0000002b80)="53ecfa3fbc42ca5a065669421c06777839c0bf9447c28610d92a85a4fbbc7d897366cad44b34ece55dbb616e5b57903609299178c7f690425e81f19c8ea794dd2744be64b5fbd84c9a35c1f15d9446fea859853d0828f160259af83b98eaabba4936850fdca15579a29b844f231886184b99f93f95957678027b47de03c34c3b30e8675b87b347570fa6e8a5950c21cee58ae0891fc13e4f979f0da4fa80bf6c96c3d09ef77cf64230e20a0aebbe7a45596878d02e55ecdc90b324f9342cfb417cfe9ef4e134371cc1", 0xc9}], 0x1000, &(0x7f00000028c0)='\x00') [ 108.707314] ISOFS: Unable to identify CD-ROM format. 09:30:13 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) bind$nfc_llcp(r1, &(0x7f00000001c0)={0x27, 0x0, 0x2, 0x3, 0x2, 0x2, "d7d5b476437d664ba6a9ea984b03125509b09f0c7544a1e820dc142127163bb15c074b87a057b9ef43e25b3527f00e24371f2cc4532a11ec16d7cc4bbe9b7d", 0x25}, 0x60) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000100)) recvmsg(r2, &(0x7f0000006e40)={&(0x7f0000005a80)=@hci, 0x80, &(0x7f0000006d00), 0x0, &(0x7f0000006d40)=""/235, 0xeb}, 0x0) 09:30:13 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x10000000006, 0x0, 0x20000000, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x1, 0x0, 0x0, 0x0, 0x1}, 0x2c) mount(&(0x7f00009f8000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) [ 108.742448] IPVS: set_ctl: invalid protocol: 0 255.255.255.255:0 09:30:14 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) setpriority(0x1, 0x0, 0x0) [ 108.798077] ISOFS: Unable to identify CD-ROM format. [ 108.801170] IPVS: set_ctl: invalid protocol: 0 255.255.255.255:0 [ 108.813440] FAT-fs (loop0): Directory bread(block 128) failed [ 108.831608] FAT-fs (loop0): Directory bread(block 129) failed [ 108.857944] FAT-fs (loop0): Directory bread(block 130) failed [ 108.885787] FAT-fs (loop0): Directory bread(block 131) failed [ 108.907405] FAT-fs (loop0): Directory bread(block 132) failed [ 108.915492] FAT-fs (loop0): Directory bread(block 133) failed [ 108.921617] FAT-fs (loop0): Directory bread(block 134) failed [ 108.928258] FAT-fs (loop0): Directory bread(block 135) failed [ 108.934402] FAT-fs (loop0): Directory bread(block 136) failed [ 108.940415] FAT-fs (loop0): Directory bread(block 137) failed [ 108.973342] attempt to access beyond end of device [ 108.978325] loop0: rw=2049, want=310, limit=128 [ 108.983029] Buffer I/O error on dev loop0, logical block 309, lost async page write [ 108.990856] attempt to access beyond end of device [ 108.995811] loop0: rw=2049, want=311, limit=128 [ 109.000490] Buffer I/O error on dev loop0, logical block 310, lost async page write [ 109.008328] attempt to access beyond end of device [ 109.013274] loop0: rw=2049, want=312, limit=128 [ 109.017967] Buffer I/O error on dev loop0, logical block 311, lost async page write [ 109.026178] attempt to access beyond end of device [ 109.031135] loop0: rw=2049, want=313, limit=128 [ 109.035813] Buffer I/O error on dev loop0, logical block 312, lost async page write [ 109.043634] attempt to access beyond end of device [ 109.048570] loop0: rw=2049, want=326, limit=128 [ 109.053246] Buffer I/O error on dev loop0, logical block 325, lost async page write [ 109.061077] attempt to access beyond end of device [ 109.066034] loop0: rw=2049, want=327, limit=128 [ 109.070717] Buffer I/O error on dev loop0, logical block 326, lost async page write [ 109.078549] attempt to access beyond end of device [ 109.083494] loop0: rw=2049, want=328, limit=128 [ 109.088199] Buffer I/O error on dev loop0, logical block 327, lost async page write [ 109.096056] attempt to access beyond end of device [ 109.100996] loop0: rw=2049, want=329, limit=128 [ 109.105693] Buffer I/O error on dev loop0, logical block 328, lost async page write [ 109.114443] attempt to access beyond end of device [ 109.119385] loop0: rw=2049, want=2153, limit=128 [ 109.160306] attempt to access beyond end of device [ 109.165310] loop0: rw=2049, want=326, limit=128 [ 109.170026] Buffer I/O error on dev loop0, logical block 325, lost async page write [ 109.177986] attempt to access beyond end of device [ 109.182964] loop0: rw=2049, want=327, limit=128 [ 109.187690] Buffer I/O error on dev loop0, logical block 326, lost async page write [ 109.195541] attempt to access beyond end of device [ 109.200495] loop0: rw=2049, want=328, limit=128 [ 109.205205] attempt to access beyond end of device [ 109.210146] loop0: rw=2049, want=329, limit=128 [ 109.215855] attempt to access beyond end of device [ 109.220814] loop0: rw=2049, want=2153, limit=128 09:30:14 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r2, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r2, 0x0) connect(r1, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/unix\x00') ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x4e23, @multicast2=0xe0000002}}) sendfile(r1, r3, &(0x7f0000000000), 0x800000bf) 09:30:14 executing program 2: ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f00000002c0)={0x7, 0xffffffffffffff9c}) ioctl$fiemap(r0, 0xc020660b, &(0x7f0000000300)={0x5, 0x100000000, 0x7, 0x54b3, 0x4, [{0x47bf, 0x2, 0x5, 0x0, 0x0, 0x2100}, {0xfffffffffffffffa, 0x2, 0x4, 0x0, 0x0, 0x1000}, {0x3, 0x8, 0x971, 0x0, 0x0, 0x8}, {0x7ff, 0x1ff, 0x800, 0x0, 0x0, 0x80}]}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) poll(&(0x7f0000000100)=[{r1}], 0x1, 0x80) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000400)={0x0, 0x177, 0x5}) mq_timedreceive(r1, &(0x7f0000000240)=""/97, 0x61, 0x2, &(0x7f00000000c0)={0x0, 0x1c9c380}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) clock_adjtime(0x0, &(0x7f0000000140)={0x4, 0x69, 0x6, 0x9, 0x6, 0x0, 0x100000000, 0x40, 0xb5c5, 0x9, 0x6, 0x9, 0x8, 0x0, 0x886e, 0x80, 0x1, 0x80, 0x4, 0xfffffffffffffff9, 0x8, 0x5, 0x441a, 0x2, 0x7, 0x7}) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000440)=0x3692, &(0x7f0000000480)=0x1) ioctl$VHOST_SET_VRING_NUM(r1, 0x4008af10, &(0x7f0000000040)={0x3, 0x7}) [ 109.407593] 9pnet: Insufficient options for proto=fd [ 109.420085] 9pnet: Insufficient options for proto=fd 09:30:14 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x1000, 0x408043) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x86}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000200)={r2, @in={{0x2, 0x10001, @loopback=0x7f000001}}, 0x0, 0x3ff, 0x8001, 0x2, 0x8}, &(0x7f00000002c0)=0x98) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x100) mmap(&(0x7f00001ed000/0x4000)=nil, 0x4000, 0x0, 0x4012, r3, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000000)={&(0x7f00001ed000/0x1000)=nil, 0x1000}, &(0x7f0000000040)=0x10) fsync(r0) r4 = creat(&(0x7f0000000080)='./file0\x00', 0x2a) write$P9_RVERSION(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="150001000100000000000008003908003030302e75f15ba4f563f893c707eebf9821c75d9aa6cd83792dbe59f00b2dc7079a59fee91236347fea9f58cf89a4a3d10c75b52a781bbd7fde0f281b180b683f10820e1774d7b11bb04fb8c0e527136bbc0cfec6fa72f873907878d0abd17f02ea457be465875f23948d4b17d352877d1f26609ca38b5762c5a2bd76d9b78c797c879a8a27d0c59755122ccf180976c1b10780ed88a0e6"], 0x15) r5 = socket$key(0xf, 0x3, 0x2) ioctl$int_in(r5, 0x5452, &(0x7f0000000100)=0x8) 09:30:14 executing program 6: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) write$sndseq(r1, &(0x7f0000458000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @result}], 0x30) setsockopt$inet6_dccp_int(r0, 0x21, 0x1f, &(0x7f0000000040)=0x3, 0x4) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x800, 0x0) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000100)={0x34, 0x0, &(0x7f00000000c0)}) recvmmsg(r0, &(0x7f0000001ec0)=[{{&(0x7f0000000280)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000680)=""/148, 0x94}], 0x1, &(0x7f00000007c0)=""/4096, 0x1000}}, {{&(0x7f00000017c0)=@generic, 0x80, &(0x7f0000001dc0)=[{&(0x7f0000001cc0)=""/240, 0xf0}], 0x1, &(0x7f0000001e40)=""/74, 0x4a}}], 0x4000000000000f3, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="c86b4cb5050f0000"], 0x8) close(r1) 09:30:14 executing program 7: syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, &(0x7f00000001c0)={[{@gid={'gid', 0x3d}, 0x2c}]}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, &(0x7f00000001c0)) 09:30:14 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1, 0x0, 0x0, 0x3}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000280)={0xffffffffffffffff, 0x20000008}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer\x00', 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000780)={&(0x7f0000000080)=@vsock={0x28, 0x0, 0x2711, @any=0xffffffff}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000140)="7e5105f67883939a33acdf3fae4ead37fb8add39e8176244d67f8ebc01e1ad870014490b24c2bc50f79b4b84dd945ea6cc4e92e32e5c5f931bf4f928a2d27e6ceedb21d52d4afefafd576ac5a057137bf4959f236a5d5c570dfe01e97c536ccf0f510a1961ad358aa6e3f873601d41fe7ef86c1eaf498085a527f528c2314e52d259cf16d4f1788b1b7e2104dc18c5b9e74c91af1f8e35d0d4a2166ce510ffa39fc9627de8251dfaf8929623adf43fa9006980aca19f9460a947a0a358c877d7691b8629b230e65622eb2e6b8b0da8040681b85b8aca5da3974266ce4b4d55251f1f42e240", 0xe5}, {&(0x7f0000000000)="c7ab84d0b4a192067d96dffb843cc6fe9f9dff48cd53eee82b767b9a4cf2d9ed58ed273dca2c0f7a76281606bd873773951fbf", 0x33}, {&(0x7f0000000240)="11bf32d995e3bee020e1dccd54736c818a31c6444106ab6336004bf93c30ebb2c63288e4a48c2015924d24088fae735bc243e5f0a7ce52", 0x37}, {&(0x7f0000000300)="18a762d57c5a8061acc5bb6c02fd1e51358e1c4be75e1018df14ccea4c921514c9040c6cd3d8ce6eb40c1115a11895d2d0a29a60080feee2c49a91f4631848f956ca4df13f5566d3aa4f854efdab883e6b91", 0x52}, {&(0x7f00000003c0)="9cc6e08d5dc4bdb74d10242f0293e13fbc7e11fdb872694b688b39f81930c401eca760670f3fafaa4b491df17161c1956274a26695abddf1832b8f313f40a120fd8d0d7735e6a02932754c92e0e1a90c4c6df191b6b42d94d190578c874d9ef756ee8cb0af23101c859fd26b1e9d4183ff1353a2f95a3811a5e44672382b42b6780661f4ad9fd53a13af7e135a92feb94d068172ee3d050a7d56360a2dd93a01f6375ddfbd18375330f90473a34e27c11ff7e0deb4296441acc4cb82e5b2db0fb4bc09ce0fe3c046493be635b379659bdaa360f2c56614e13458b7d8d11afca7b758b662cc5bd960a88446f23263", 0xee}, {&(0x7f00000004c0)="5a30b2c06031896c15394693f751c7a45b05f6bde626441bed2115e59ac39f9ff0864234f92cd40fc16772d2648d3ac5372fde2e3eb6f162b7863b82799ed6ebf6146992b66111087a611e0f6afc7d40b66650ba2b4e932983334a1e671015443769731e77d9856a8baf5d71afdbda3ba26f1ae5d05fb497147d32f620e8f7e597f9475427878d2ba3af51025274", 0x8e}], 0x6, &(0x7f0000000600)=[{0x80, 0x100, 0x1000, "10d0dcc2851d4651af49d3bff47cf6ef5346223d828a01a814796bd4e5060292fd08cd773949c38b4bc8e98eb2ee7cecdd61fc3c4efeea24ef582a517b486a4c03f67ad19b23ebcdc801e978a305295cc71280ced8085c2d92b90aa81b8c978eb723cb562d926a1ee8eab0ff6680bd"}, {0xd0, 0x11f, 0x1, "148b5e3a5a2644ffdc67a283a19247190b724a73b70e86fe019e2149c61720a2d77b3bd770f90d9d059d923b50cc937a4d590b2514ffdefbe5f72e2d47557521c25a75dab8eebd961c39fb0ab19c91d50b71b6b008ffb10a18f6d1e23591d27bb0df6005911a96bab46cd3583aaa1c234e764c27e4eae38df8615694d732d875c1a1c264140922a153d1330d27efe5e65933ae5172fdc0132abe8795eafcf169c888d035f02e89f07b935ec8a700a5765d8e1a4aa7c5cd28d5733b6ed90614"}], 0x150}, 0x881) 09:30:14 executing program 3: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)=0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)=0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x180, 0x0) r4 = socket$nl_crypto(0x10, 0x3, 0x15) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, r2, &(0x7f0000000100)={r3, r4, 0x100}) renameat2(0xffffffffffffffff, &(0x7f0000001240)='.\x00', 0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x6) 09:30:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)=@deltaction={0x18, 0x31, 0x501, 0x0, 0x0, {}, [@TCA_ACT_TAB={0x4, 0x1}]}, 0x18}, 0x1}, 0x0) accept4(r0, &(0x7f0000000100)=@can, &(0x7f0000000000)=0x80, 0x80800) 09:30:14 executing program 1: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000280)={'mangle\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) ioctl$TIOCCBRK(r0, 0x5428) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) bind$inet6(r0, &(0x7f0000000300)={0xa, 0x8, 0xc24, @remote={0xfe, 0x80, [], 0xbb}, 0x8}, 0x1c) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.advise\x00', &(0x7f0000000100)='autofs\x00', 0x7, 0x1) keyctl$revoke(0x3, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000140)=0xf2, &(0x7f0000000240)=0x2) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000200)=0x3) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) 09:30:14 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000100)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000017000)=0xfffff7fffffffffd, 0x4) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000356ffc)=0xffffffffffffff40, 0x4) recvfrom$inet6(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x10042, 0x0, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @rand_addr=0x3f5}, 0x10) listen(r2, 0x0) listen(r1, 0x0) 09:30:14 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16, 0x200000000000000}], 0x800010, &(0x7f0000000000)=ANY=[]) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40001, 0x0) r0 = open(&(0x7f0000000080)='./file0/file0\x00', 0x3fffa, 0x0) connect$vsock_stream(r0, &(0x7f0000000100)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ftruncate(r0, 0x4993) ioctl$sock_netdev_private(r0, 0x89f6, &(0x7f0000000180)="8b9671111569da0008aa768543e7dc83ff4126c4d953e8295ef46488") 09:30:14 executing program 0: r0 = socket$inet(0x2, 0x3, 0x6) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x30000, 0x0) recvfrom$unix(r1, &(0x7f00000001c0)=""/15, 0xf, 0x0, &(0x7f0000000300)=@abs={0x0, 0x0, 0x4e21}, 0x6e) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2000) getsockopt$XDP_MMAP_OFFSETS(r2, 0x11b, 0x1, &(0x7f0000000380), &(0x7f0000000200)=0x60) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000040)=0x301, 0x4) clock_gettime(0x2, &(0x7f0000000080)) setsockopt$inet6_tcp_int(r1, 0x6, 0x1b, &(0x7f0000000280)=0x1fffe0, 0x4) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) ppoll(&(0x7f0000000240)=[{r0}], 0x1, &(0x7f0000000100)={r3, r4+30000000}, &(0x7f00000002c0), 0x8) write$P9_RAUTH(r2, &(0x7f00000000c0)={0x14, 0x67, 0x1, {0x10, 0x4, 0x6}}, 0x14) [ 109.641733] autofs4:pid:7358:autofs_fill_super: called with bogus options 09:30:14 executing program 5: socketpair$unix(0x1, 0x400000001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000000)='dev ', 0x0) ftruncate(r2, 0x40001) r3 = request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000180)='system!eth0]\x00', 0xfffffffffffffff8) keyctl$invalidate(0x15, r3) sendfile(r1, r2, &(0x7f0000001000), 0x400000000fee) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYRES32], 0x4) recvmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@nfc, 0x0, &(0x7f0000000940)=[{&(0x7f0000000880)=""/123}], 0x0, &(0x7f0000000680)=""/108}}, {{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000700)=""/164}], 0x3c3}, 0x3}], 0x1b1, 0x0, 0x0) sendfile(r0, r2, &(0x7f0000000040), 0x400000000000000) 09:30:14 executing program 1: pwrite64(0xffffffffffffffff, &(0x7f0000000fc0)="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", 0x31e, 0x0) 09:30:14 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x100000000001, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x400, 0x0, 0x33da, 0x400000000, 0x8000000000, 0x0, 0x2}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffeff}) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000300)=""/208, 0xd0}], 0x1) write(r0, &(0x7f00000000c0)='+', 0x1) dup2(r1, r0) [ 109.694902] ISOFS: Unable to identify CD-ROM format. [ 109.714500] FAT-fs (loop4): bogus number of reserved sectors [ 109.720433] FAT-fs (loop4): Can't find a valid FAT filesystem 09:30:14 executing program 7: syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, &(0x7f00000001c0)={[{@gid={'gid', 0x3d}, 0x2c}]}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, &(0x7f00000001c0)) 09:30:14 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x4) clock_gettime(0x0, &(0x7f0000003100)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000002e80)=[{{&(0x7f0000000000)=@pptp={0x0, 0x0, {0x0, @dev}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000080)=""/127, 0x7f}, {&(0x7f0000000100)=""/201, 0xc9}, {&(0x7f0000000200)=""/16, 0x10}, {&(0x7f00000002c0)=""/51, 0x33}, {&(0x7f0000000300)=""/131, 0x83}, {&(0x7f00000003c0)=""/114, 0x72}, {&(0x7f0000000440)=""/120, 0x78}], 0x7, &(0x7f0000000540)=""/14, 0xe, 0xffff}, 0x100000001}, {{&(0x7f0000000580)=@rc, 0x80, &(0x7f0000000740)=[{&(0x7f0000000600)=""/168, 0xa8}, {&(0x7f00000006c0)=""/78, 0x4e}], 0x2, 0x0, 0x0, 0x8}, 0x5}, {{&(0x7f0000000780)=@nfc, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000800)=""/153, 0x99}, {&(0x7f00000008c0)=""/77, 0x4d}, {&(0x7f0000000940)=""/204, 0xcc}, {&(0x7f0000000a40)=""/20, 0x14}, {&(0x7f0000000a80)=""/205, 0xcd}], 0x5, &(0x7f0000000c00)=""/177, 0xb1, 0x3}, 0x2}, {{&(0x7f0000000cc0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000d40)=""/108, 0x6c}], 0x1, &(0x7f0000000e00)=""/143, 0x8f, 0x3f}, 0x1f}, {{&(0x7f0000000ec0)=@ipx, 0x80, &(0x7f0000002300)=[{&(0x7f0000000f40)=""/128, 0x80}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000001fc0)=""/36, 0x24}, {&(0x7f0000002000)=""/18, 0x12}, {&(0x7f0000002040)=""/216, 0xd8}, {&(0x7f0000002140)=""/134, 0x86}, {&(0x7f0000002200)=""/229, 0xe5}], 0x7, &(0x7f0000002380)=""/107, 0x6b, 0x1}, 0x3ff}, {{&(0x7f0000002400)=@ax25, 0x80, &(0x7f0000002540)=[{&(0x7f0000002480)=""/32, 0x20}, {&(0x7f00000024c0)=""/106, 0x6a}], 0x2, &(0x7f0000002580)=""/101, 0x65, 0x3}, 0x72}, {{&(0x7f0000002600)=@llc, 0x80, &(0x7f0000002c00)=[{&(0x7f0000002680)=""/47, 0x2f}, {&(0x7f00000026c0)=""/132, 0x84}, {&(0x7f0000002780)=""/250, 0xfa}, {&(0x7f0000002880)=""/43, 0x2b}, {&(0x7f00000028c0)=""/67, 0x43}, {&(0x7f0000002940)=""/211, 0xd3}, {&(0x7f0000002a40)=""/187, 0xbb}, {&(0x7f0000002b00)=""/193, 0xc1}], 0x8, &(0x7f0000002c80)=""/6, 0x6, 0x3}, 0x5}, {{0x0, 0x0, &(0x7f0000002d80)=[{&(0x7f0000002cc0)=""/179, 0xb3}], 0x1, &(0x7f0000002dc0)=""/165, 0xa5, 0x100}, 0x7}], 0x8, 0x20, &(0x7f00000030c0)={r1, r2+30000000}) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") clock_gettime(0xfffffffffffffff9, &(0x7f0000000240)) [ 109.823874] FAT-fs (loop4): Unrecognized mount option "/dev/autofs" or missing value [ 109.860619] ISOFS: Unable to identify CD-ROM format. 09:30:15 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x785) setsockopt$inet6_int(r0, 0x29, 0x1a, &(0x7f0000222000)=0x9, 0x4) connect$inet6(r0, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000b7ff8)={0x0, 0x35c}, &(0x7f0000000000)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={r1, @in={{0x2, 0x4e21, @multicast2=0xe0000002}}, 0x0, 0x0, 0x5, 0x5, 0x10}, &(0x7f0000000180)=0x98) 09:30:15 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)=@get={0xe0, 0x13, 0x0, 0x0, 0x0, {{'drbg_nopr_hmac_sha512\x00'}}}, 0xe0}, 0x1}, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x4, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r1, 0x80047437, &(0x7f0000000200)) sendmmsg(r1, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x69, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x2040) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 09:30:15 executing program 7: syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, &(0x7f00000001c0)={[{@gid={'gid', 0x3d}, 0x2c}]}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, &(0x7f00000001c0)) 09:30:15 executing program 5: open(&(0x7f0000000080)='./bus/file0\x00', 0x141042, 0x0) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000000)) 09:30:15 executing program 6: r0 = socket$unix(0x1, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x80000000004) recvmmsg(r0, &(0x7f0000003e00)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000080)=""/121, 0x79}, {&(0x7f00000001c0)=""/80, 0x50}, {&(0x7f0000000240)=""/187, 0xbb}, {&(0x7f0000000300)=""/74, 0x4a}, {&(0x7f0000000380)=""/65, 0x41}, {&(0x7f0000000400)=""/58, 0x3a}, {&(0x7f0000000440)=""/148, 0x94}], 0x7, &(0x7f0000000580)=""/4096, 0x1000, 0x9}, 0x8}, {{&(0x7f0000001580)=@ipx, 0x80, &(0x7f0000001900)=[{&(0x7f0000001600)=""/183, 0xb7}, {&(0x7f00000016c0)=""/218, 0xda}, {&(0x7f00000017c0)=""/195, 0xc3}, {&(0x7f00000018c0)=""/6, 0x6}], 0x4, &(0x7f0000001940)=""/86, 0x56, 0x10001}, 0x6}, {{&(0x7f00000019c0)=@in={0x0, 0x0, @loopback}, 0x80, &(0x7f0000001c40)=[{&(0x7f0000001a40)=""/231, 0xe7}, {&(0x7f0000001b40)=""/244, 0xf4}], 0x2, &(0x7f0000001c80)=""/10, 0xa, 0x1}, 0x4}, {{0x0, 0x0, &(0x7f0000002e00)=[{&(0x7f0000001cc0)=""/4096, 0x1000}, {&(0x7f0000002cc0)=""/35, 0x23}, {&(0x7f0000002d00)=""/24, 0x18}, {&(0x7f0000002d40)=""/141, 0x8d}], 0x4, 0x0, 0x0, 0x444d}, 0x1}, {{&(0x7f0000002e40)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f00000030c0)=[{&(0x7f0000002ec0)=""/225, 0xe1}, {&(0x7f0000002fc0)=""/174, 0xae}, {&(0x7f0000003080)=""/33, 0x21}], 0x3, &(0x7f0000003100)=""/118, 0x76, 0x3f}, 0xfbd8}, {{&(0x7f0000003180)=@ipx, 0x80, &(0x7f00000037c0)=[{&(0x7f0000003200)=""/173, 0xad}, {&(0x7f00000032c0)=""/234, 0xea}, {&(0x7f00000033c0)=""/222, 0xde}, {&(0x7f00000034c0)=""/121, 0x79}, {&(0x7f0000003540)=""/106, 0x6a}, {&(0x7f00000035c0)=""/109, 0x6d}, {&(0x7f0000003640)=""/90, 0x5a}, {&(0x7f00000036c0)=""/239, 0xef}], 0x8, &(0x7f0000003840)=""/201, 0xc9, 0x7}, 0xffff}, {{0x0, 0x0, &(0x7f0000003cc0)=[{&(0x7f0000003940)=""/151, 0x97}, {&(0x7f0000003a00)=""/152, 0x98}, {&(0x7f0000003ac0)=""/215, 0xd7}, {&(0x7f0000003bc0)=""/227, 0xe3}], 0x4, &(0x7f0000003d00)=""/206, 0xce, 0x1}, 0x9}], 0x7, 0x100, &(0x7f0000003fc0)) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000004000)=0x8, 0x4) write(r1, &(0x7f0000000100)="29000000140003b7ff000000040860eb0100100006a40e07fff00fd57f25ffffff0100002a00f3ff09c43a28681ed0482d615a571faada7c3792685780c6debb995393494d6d3bbb2bbc429a4f0953e70162f3d7bf5849c7b67929c2290473bf0dab75395244dd03009da80465eda7a9289e8816cb0a592c0e6c11b2ee6dc1e19119ef21792d56353b6635d213b20ca42a4cba189d0e5e24d221", 0x3a6) socketpair$inet(0x2, 0x7, 0xfbfd, &(0x7f0000004040)) ioctl$EVIOCGSND(r1, 0x8040451a, &(0x7f0000000000)=""/101) 09:30:15 executing program 5: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000100)={0x3, [0x1, 0x1, 0x2]}, 0xa) prctl$intptr(0x18, 0x72b) 09:30:15 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000100)={'rose0\x00', 0x9}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101000, 0x0) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000040)={0x4, 0x6}, 0x2) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r2, 0x107, 0xb, &(0x7f0000000080)=0x1, 0x4) setsockopt$packet_int(r2, 0x107, 0x800000000000000a, &(0x7f00000000c0)=0x8001, 0x4) 09:30:15 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$inet6(0xa, 0xf, 0x8) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000200)={@mcast1={0xff, 0x1, [], 0x1}, 0x0, 0x0, 0xff, 0x6}, 0x20) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000080)={0x3f, 0x1, 0x5, 0x3, 0x1}, 0xc) ioctl(r2, 0x4, &(0x7f0000000240)="025cc83d6d345f8f762070") r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) setsockopt$llc_int(r3, 0x10c, 0x3, &(0x7f0000000040)=0x1ff, 0x4) dup2(r0, r1) 09:30:15 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000400)={0x1, 0x0, 0x345c, 0xfffffffffffffffb, 0x8}) r1 = memfd_create(&(0x7f0000000240)='vfat\x00', 0x3) ioctl$SG_SET_RESERVED_SIZE(r1, 0x2275, &(0x7f00000003c0)=0x1) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x1e}, 0x492f, 0x0, 0x3, 0x9, 0x500, 0x9, 0x1f}, &(0x7f00000001c0)=0x20) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f00000002c0)={{0xa, 0x4e20, 0x90, @mcast1={0xff, 0x1, [], 0x1}, 0x56a}, {0xa, 0x4e23, 0x40, @dev={0xfe, 0x80, [], 0x17}, 0x5}, 0x7, [0x80, 0x2, 0x5, 0x1f, 0x2, 0xff, 0x5, 0x3]}, 0x5c) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, &(0x7f0000000240)=ANY=[]) r2 = creat(&(0x7f0000000a00)='./file0/file0\x00', 0x0) r3 = socket$inet6(0xa, 0x800, 0x2) fallocate(r2, 0x0, 0x0, 0x2000400) r4 = creat(&(0x7f00000000c0)='./file0/file0\x00', 0x0) ftruncate(r4, 0x4008000) ioctl$KVM_SET_DEBUGREGS(r4, 0x4080aea2, &(0x7f0000000340)={[0x5000, 0x0, 0x16001, 0x1000], 0x5, 0x2, 0xffffffff00000000}) ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f0000000140)) open(&(0x7f0000000200)='./file0/file0\x00', 0x41, 0x110) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000440)={@mcast1, 0x0}, &(0x7f0000000480)=0x14) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0}, &(0x7f0000000500)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000540)={{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in=@multicast2=0xe0000002, 0x4e22, 0x27a, 0x4e20, 0x0, 0x0, 0x20, 0x0, 0x3f, r5, r6}, {0x7fffffff, 0xc9, 0x8, 0x2, 0x4, 0x2, 0x5, 0x5}, {0x9, 0x5, 0x1, 0xff}, 0x10000, 0x6e6bbf, 0x3, 0x0, 0x2}, {{@in=@broadcast=0xffffffff, 0x4d5, 0x2b}, 0xa, @in6=@dev={0xfe, 0x80, [], 0x11}, 0x0, 0x0, 0x3, 0x9, 0x6, 0x8, 0x1}}, 0xe8) [ 110.578755] ISOFS: Unable to identify CD-ROM format. 09:30:15 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x6, 0x40000) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000040)={0x56, 0xf562, 0x8, {0x1000, 0x2}, {0x5, 0x2}, @period={0x5f, 0x800, 0x8000, 0x1000, 0x3, {0x8, 0x0, 0x2, 0x1}, 0x2, [0x7, 0x401]}}) r1 = socket$inet(0x10, 0x3, 0x10) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000080)={0x20000, 0x0, [0x7fffffff, 0xfa14, 0x5, 0x8001, 0x100000001, 0x7ff, 0xde7, 0x401]}) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="2f0000001c0003fd6d0000360000000002dd0700064000001f5f32c908000100000073730beeffff005867855e7fa5", 0x2f}], 0x1}, 0x0) [ 110.643153] FAT-fs (loop5): Unrecognized mount option "vfat" or missing value [ 110.689319] netlink: 27 bytes leftover after parsing attributes in process `syz-executor3'. [ 110.715073] netlink: 27 bytes leftover after parsing attributes in process `syz-executor3'. 09:30:15 executing program 0: syz_emit_ethernet(0x10, &(0x7f0000000a80)={@link_local={0x1, 0x80, 0xc2}, @empty=[0x0, 0x0, 0x14], [], {@generic={0x0, "491c"}}}, 0x0) 09:30:15 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x4000, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") dup3(r0, r1, 0x0) 09:30:15 executing program 7: mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, &(0x7f00000001c0)) 09:30:15 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000100)={'rose0\x00', 0x9}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101000, 0x0) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000040)={0x4, 0x6}, 0x2) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r2, 0x107, 0xb, &(0x7f0000000080)=0x1, 0x4) setsockopt$packet_int(r2, 0x107, 0x800000000000000a, &(0x7f00000000c0)=0x8001, 0x4) [ 110.741692] FAT-fs (loop5): Unrecognized mount option "vfat" or missing value 09:30:16 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc8396d345f8f762070") r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$setmm(0x23, 0x3, &(0x7f0000ffb000/0x3000)=nil) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'nat\x00', 0x93, "560bb4722676764b93e2917f879888e0a77ab883886b574632aa0aa2cc20b95ba3b5de540e9fc5538241f20d082f0c569498f75b76cedcea38d6a1db26e7e95d404a406face6f3bab239093ec1db3bfb84a3eda63741a0455f01a2584e3879e9943094e304dee1db66e920340b8ae8dc87a77968dffa7ffe54a3f729b4789fce28a9c0f28e479c2c69fdec0a5d1bbaf320dcd1"}, &(0x7f0000000100)=0xb7) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x3a, 0x1, &(0x7f0000000000)=0x2, 0x4) 09:30:16 executing program 3: r0 = socket$inet(0x2, 0x4000000805, 0x10000) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) 09:30:16 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x2000) ioctl$sock_bt(r1, 0x8907, &(0x7f0000000500)="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") ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x8200) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r3, 0x0) madvise(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2) getresuid(&(0x7f00000004c0), &(0x7f0000003280), &(0x7f00000032c0)) 09:30:16 executing program 7: syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, &(0x7f00000001c0)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, &(0x7f00000001c0)) 09:30:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000002fc8)={&(0x7f0000000000)=@nl=@kern={0x10}, 0x80, &(0x7f0000014000)=[{&(0x7f0000014f79)="5500000018007fb1b72d1cb2a4a280a80a06050000a8430691052369250004000800001c010000001400a3070d000000030000dc1338d54400009b84226eb75afb83de448daa7227c43ab8220000060cec4fab91d4", 0x55}], 0x1, &(0x7f0000000040)}, 0x0) mount$9p_rdma(&(0x7f0000000080)='127.0.0.1\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x80000, &(0x7f0000000200)={'trans=rdma,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x6}, 0x2c}, {@timeout={'timeout', 0x3d, 0x8001}, 0x2c}, {@timeout={'timeout', 0x3d, 0x2f090}, 0x2c}, {@common=@version_9p2000='version=9p2000', 0x2c}, {@sq={'sq', 0x3d, 0x20}, 0x2c}]}}) 09:30:16 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000080)=0x4) r1 = socket(0x1e, 0x2, 0x0) connect$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0x0, @hyper}, 0x10) [ 110.897706] netlink: 'syz-executor2': attribute type 4 has an invalid length. [ 110.905182] netlink: 17 bytes leftover after parsing attributes in process `syz-executor2'. [ 110.911204] ISOFS: Unable to identify CD-ROM format. [ 110.930040] netlink: 'syz-executor2': attribute type 4 has an invalid length. [ 110.937579] netlink: 17 bytes leftover after parsing attributes in process `syz-executor2'. 09:30:16 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f00000002c0)='/dev/dmmidi#\x00', 0x4, 0x1fffff) recvfrom$unix(r1, &(0x7f00000003c0)=""/248, 0xf8, 0x0, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = inotify_init1(0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539esp(ctr(serpent),md5-generic)\x00'}, 0x58) open(&(0x7f0000000240)='./file0\x00', 0x80, 0x80) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000200), &(0x7f0000000300)=0x8) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000001880)="2ef99f8baf76f54e8b1c8677f925731e", 0x10}], 0x1, &(0x7f0000000200)}, 0x0) socket$unix(0x1, 0x5, 0x0) r5 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0xc9, 0x88000) fanotify_mark(r5, 0xd, 0x10, r2, &(0x7f0000000180)='./file0\x00') recvmmsg(r4, &(0x7f00000028c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000018c0)=""/4096, 0x1000}}, {{&(0x7f0000001580)=@sco, 0x80, &(0x7f0000001700)=[{&(0x7f0000001680)=""/91, 0x5b}], 0x1, &(0x7f0000001740)=""/150, 0x96}}], 0x2, 0x0, &(0x7f0000001800)={0x77359400}) inotify_add_watch(r2, &(0x7f0000ac5000)='./file0\x00', 0xa400295e) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='./file0\x00', r6, &(0x7f00000000c0)='./file0\x00') 09:30:16 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000040)=""/196) ioctl$KVM_SET_CPUID(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [{0x40000073, 0x0, 0x80ffff}]}) 09:30:16 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f00000002c0)="bcf6", 0x0) write(r1, &(0x7f0000000300)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) write$cgroup_pid(r1, &(0x7f0000000240)=ANY=[@ANYBLOB='08'], 0x2) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) ioctl$KVM_GET_MSRS(r0, 0xc008ae88, &(0x7f00000000c0)={0x5, 0x0, [{}, {}, {}, {}, {}]}) syz_fuseblk_mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 09:30:16 executing program 4: r0 = socket(0x1, 0x5, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="800000000002000019", 0x9}], 0x0, &(0x7f0000000140)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0x5) setregid(0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") setreuid(0x0, r1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x10000, 0x3, &(0x7f0000000440)=[{&(0x7f00000002c0)="2a9bc2fb04a9c3a2c23a7e39d031a600b3d71bac4c06f9ce9eae61f1be4e90f3342a4e27cba08342d683d99793c41d879f4887a4a41b2704c0aa8908981511f03a12c58fd4f3ab4c6193b71f8cfafe88d2edd27086daf0698e8dece3b08cc6ced0ab5ffee7ed05dfc653a792b15c45", 0x6f, 0xfffffffffffffff8}, {&(0x7f0000000240)="e30710d418ad00aa1b833c521bed7a31322f5456c56351a51002a34ca8380f737f3bc590acece65c26292e5dc2b496e694253565", 0x34, 0x7}, {&(0x7f0000000340)="6f96b616d7e62ab52959b4e64ef457632b1efb56dd16affc6af703ebdccbc6ef24b85e0e1b006f9408abc4ad9eebdcc2ee19af1e32267e8ae728a2be19c04c20572b6af2eecf37802740cac5a6e58565ddb99e699a626499f57c93ec25195528c6be72f4d47a6a6465264f885c72847834c0fe0b91325f2c7df0205eb2d1794f7bca144b1834690c130c7308218340b0e567f088491a79b61e0b514fd5c1eb842ca9ebcba326b39456dc37375aee4c8aa61d7e0f67e568cdeebdc61d2d5212a6493882838b397043952063e1ae90e71473c16c8455ec", 0xd6, 0x5}], 0x40000, &(0x7f00000004c0)={[{@stripe={'stripe', 0x3d, 0xaf80000000000000}, 0x2c}, {@debug='debug', 0x2c}, {@jqfmt_vfsold='jqfmt=vfsold', 0x2c}]}) capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000001fe8)={0xfffffffc, 0xffffffffffffffff}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) 09:30:16 executing program 7: syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, &(0x7f00000001c0)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, &(0x7f00000001c0)) 09:30:16 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r1, 0x0) shutdown(r1, 0x2) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xfffffffffffffffb, 0x31, 0xffffffffffffffff, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000080)={0x8, {{0x2, 0x4e23}}, 0x0, 0x2, [{{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e23, @broadcast=0xffffffff}}]}, 0x190) ioctl$sock_SIOCOUTQNSD(r1, 0x541b, &(0x7f00000002c0)) 09:30:16 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) sendfile(r0, r0, &(0x7f0000000080), 0x400) clone(0x100, &(0x7f0000001ac0)="5197780275af8fe442cbc730489d1bee09c93636a665bfdc7d2e8deb4780fa47a932e71fb6246f4b80aa418efa48cf90bac606623ee5561ca7939dc6d872cf1128c3b49c099206e50c2893714971e7ec0ad6bde44f877c090ccabad26a816e347b97916b8a97f8e2bbd8d58df2f1b9d164845e8469522682d4677a06f64bd46094c7274b0df7eba82c6701020afadb0e763daa628bad5f05d34dadfac651e0", &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000180)="c699578600459c39280bf40b5aa8269764a3ab4441d0409510eec614f3ade8a67392b79361982f80af1176a3ad30530a470bcf6a0956fe3851563da478bed608") fgetxattr(r0, &(0x7f0000000380)=@known='security.capability\x00', &(0x7f00000003c0)=""/239, 0xef) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x140, 0x0) getresuid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)=0x0) r3 = getpid() r4 = getuid() lstat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r0, 0x10, &(0x7f0000001640)={0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001680)={{{@in=@multicast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001780)=0xe8) getgroups(0xc1, &(0x7f0000001b80)=[r5, r5, r5, r5, r5, r5]) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000001800)=0x0) lstat(&(0x7f0000001840)='./file0\x00', &(0x7f0000001880)={0x0, 0x0, 0x0, 0x0, 0x0}) r10 = getegid() sendmsg$netlink(r1, &(0x7f00000019c0)={&(0x7f0000000640)=@proc={0x10, 0x0, 0x25dfdbfe, 0x210080}, 0xc, &(0x7f0000001540)=[{&(0x7f0000000680)={0x178, 0x2a, 0x0, 0x70bd2d, 0x25dfdbfb, "", [@generic="e104c9a0fbe874a87fabd704513a821ae6cd68485a0c3a51b5d0f23b5c57504c14295610f1ffe7a28bbe60fe99f6758d3b54282580db4639d3679bc58624ee378e14f1f746f663c1291607d47ae8db118725cdbd5705a4a863c05cba4072291fba581ddb596970ea7066fb47036898f1c93f5a381ab37ffb83a6d7ff447c62800791651f76c70b8512ae127298f780768249f7f3a1aece3e468996068500cf1dcc3546", @generic="99987e904de21446e3a72736dd488892c5663e5dc0a25731ff0e2e10af209ab9dac59873fd4fccd9a77cee2a5e17578e3c1b0e2eee37cc9fbbd7a6656b33deff7a7ce897de142a5a0851c33d9ab4b30c01c38711ff335ec98a092dcc371fa433931eff2217515ae6708e8f893031a2fdf26f848d2115afb3c62f7aeca0b6f655d28b31c311b9d4b4e15a91b0637e1be50b414bb256c5a2443bb70097ea381347ef3ae6bc0e0e573eb74fcfbe95a109bd991139996fa8a60ff4f767855e1e1395a91d67"]}, 0x178}, {&(0x7f0000000800)={0x94, 0x41, 0x12, 0x6, 0x25dfdbfe, "", [@typed={0x8, 0x65, @u32=0x6}, @generic="a39a6b93836645e32af728a81c4b312720cb41570be0029393d9bc09c78c21d5c26782045de731d9710d6b6e25fe4c87642880e5911247f2182656970126bbe9867393f25a93cc0c321504", @typed={0x8, 0x25, @u32=0x1}, @generic="774386f683c32098c40541ac11f4ae60849e80d17bcec96361cdf588a17e11ba", @typed={0x8, 0x34, @fd=r0}]}, 0x94}, {&(0x7f0000000980)={0xb98, 0x21, 0x8, 0x70bd25, 0x25dfdbfe, "", [@nested={0x2bc, 0x3, [@generic="e28dedb34adcf9b29be6594b841bb8c216d5e772b1bd6fefa971efe29854985e90897e6618bc119ec0e32829dbc5d0ceb82b4de75fed5974254bbec500d0a82f136aec85010eb9f83aa12b9e0e30b19cc4409ce3837d3b402d0f56c36a70e178a2148ee99561ab6fe57c5e78cc09f7b580adc1f494e77c8682ca34ffbcebb0b516723876913bbdaf856df6d8fb19", @generic="22a4f9d02e3c27c462f4924f847e45cc5f0dacce9799e62be9db094e552a09a58c6c3600613e5302b92ea17a4ae7c717061f8e02536e7ad84c2553382b8ca80d304637b92b8a05b8fff497cf8fc0db63e4fcbc9469f0db072e97c2bbdf3e95a4db62673363421b687c3dd58487f916eecd416eb8cdcdc4875940e0427ad22142ee8fb03b5bdb", @typed={0xc, 0x4e, @u64=0x5}, @typed={0x8, 0x91, @ipv4=@local={0xac, 0x14, 0x14, 0xaa}}, @generic="ca018e7cedeba6de264d73a957a3c76587c40efed91823fe1249d92d1856b133264bf8752ed0b3657e9b7fdce39fa61ae9b00b30d6c93f8b4a986cc6a6922806828260aea0232fd05315f57056e0526716c91657de5bcdb070f4fbb6db51dc0d1bb9f8e987cf8bdc67659640d261725c319b30d2ba994bd52790503e5082d0e09b70f5cb", @generic="032d69922fbe33467ed226f0bd9357cca2965ee2bcc2355307f18fa328f5506ad573d8bf7dfec44697fbcd0b7ccd9ce1ab7097ca46e7b0f6e557dd8a9fe54207fce3369bfaa3f4d1e31b329d953a107fe1fb7bec2a5276a4fe3d9de450048e5091d306336b358fa3", @generic="14695d7a9ebda9229906ee75341a7df95e455ef8fd0f29b0905e965ef06fd2ef4eb2b141d042bba84c51cbe686d7334eb6de34c8c880fe4ad9596a51c33f15b439acc00aca650064f4cb61fe576831be977de294392f35bc884f5ffa2b87960c00c7c75d34cd91363e1e4c1bb120204117fdb6cbb442d5bcb2c0b7abfa0c2085a67dea968884170891354f03120f207237135538d58c0336e613a9c1634983b0ff"]}, @typed={0x8, 0x7a, @ipv4=@multicast1=0xe0000001}, @nested={0x178, 0x45, [@generic="6092e279ade6091d64c71aba300d195ae0ce987918908c1e1d72054dfcd80970d28b5d966b", @generic="b7ea366e7ddced28cc11a448f91edb88a89ed3969b4fd2e3b5aa8ea49d5d6c1643bc725358fdca691f2b86a4601b4b0ca0e74b228904a475a91731d57d350f7e62f51ad9c7e9d8175847521a769d8614ad51b6e61583ebab38e622d553df9dc5008f249601958c07578ab99be424e5810443eae81be6f77765d55744b2512ed07b279cefb66afa7ac69e06c1817ef5892489edb26d3b5b1a04e096c2138138e52e3ff016d9cac78cafeacb1768df205719fb", @generic="fb071f96e574d4f51dfcbf2ca30edd95c4202570fd8ca5d1c7e6cbe35e9f02908a4eeede1a1eeb4e2f41c515d8c5401f2b454720176d3455bb02c3164d4fe9450d757ff121a1faeb74c1284ef02c9f98d1ff99c011dbe0664bcaaba8824286d6800956bbfbcfd88f77f1017965322a623ee530c6716cc4f8a54efbb96cb1c2bd2d70a2299d2a4aebf71719171db5e80434743b40effee1cc638dec0902"]}, @nested={0x238, 0x50, [@typed={0xc, 0x36, @u64=0x738}, @generic="a95193b3e79269923ac3bf493ee39587966da16486d89019116bc3cc78cdcf282ec08695ecc694aa0a243564b1f051e5d7d73b2e82aff7036756", @generic="ebb4869b0d73b9de5ac8116508551ddba8f5d590c5bbde1803fc6c146147732c5e4fbb56a985a316c5f9dcadbf5d86d1595df2cbaa26fc375e1b852cfc66399c6f4f83dc128f91f461", @generic="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", @typed={0x4, 0x68}, @generic="695cbbedb0edc5f737f84fb9f5833de2d4e17ae9ba6486fb67c209b9c1d76e3fdb28954a45340c7a8c", @generic="b2d94a8a7587cf9d47cd3cb246c745508b4aaf9ed6da44fc835c31dd3fd5adc4d9ff11bd6cef4656797213bc01b79da06425b8bc0483c0a76558a37eecb5dab3bec719c647d74226a895ef2f2a5b56c95cc68ab03c65fa68a1a57debff7b44e222cca9de611921552525e70b52187ca4075424ca945fdd668f292f"]}, @nested={0xe0, 0x1a, [@generic="903edda32a05baf0b642c353244631d5f3922222a65178215a07a9748b07b8fd9be35c68e31ed747c067badf34b056298bcd05381fc793825d8b68898502a1ba49e4b01832cf56acba5ab6e7df432f96e077113e08656f5cf08b368607c325cd53b842e3d3dfed244aba3f1cfbd7dde6fd1cabf927c511c4106b5d1155a02272f80491934be5c11c475cff47c1d3a355c94333764fb516c82d9dd9419338db46f6642b4a0ca1b1352d6e37f7303613c4679fe4b7cafc4cd100c76b1d312958f727391340c29d83545e46ac1648f641f5446e8d", @typed={0x8, 0x21, @u32=0x4}]}, @typed={0x8, 0x5c, @uid=r2}, @nested={0xcc, 0x46, [@generic="24bfd68ba204252e2daf993414bbd54b95a44fdf4bffe6f3e8d9c108f1e81c483b1cea695c2166e71a99f9188ebad919", @generic="253e0340ba5c4a7ccd6d0d0db6a2f7e5495ffe8f5acd0e473ba713c5a0a626b6084ae08daca6225b1a69d455e3471807994d9e5e8069a3119aef162572b12fabd572244569725c7c25930ae63dc56816e10a513f2869c3a5be81f4dca70304991f65e0e2edab856f9912c8449800b9927f544cc4ba8b03ae31240a958bfac6429e4f268b33bc5c62425b5ba6b96a510bd9ab20ce28"]}, @nested={0x360, 0x24, [@generic="9e2b33b39fa4ec18352da9d0229e179388c28121d44e78075c1362595413f3ed4c9d5d28d06d44c518f7b7b45e7bf58f1ae5daa43de1836a93d6e9e1c3594c496a7dd1ab9c4e0ec87a9c655ceb272271a77ce317041d5fba44e2d3eb585063c5c20b650698745c70dca6c3550daf46932866a268", @typed={0x8, 0x88, @str='(lo\x00'}, @generic="4ca2c8551e71cc8a494d61d55a8b98a69b3c4ecb2391f0a38b4a631310712c1b26bbb38e6fc029c6da3f9bfddbcb4df7a59dc63734dc0c2ea2e26d52045167108c899cc1202ac79ec4b73ef0bf829e4fe899d5aeea2d3cccca0b14a180fb20c280ce05c31c7943769f2f422f7fa561f8874ce3b6911debd4e7c1118b99c67806805ce868396da3bcc7ff85650960922cf091f6426d5dccf6", @generic="654134faeca4ec8cef3ae4b0c8a734721f7af3862eaee4958fb9f7bac9916e392d556a5b410612edb24370a390116e39d26326c0497ca4e16818b6160a6b4bbaee286dff600c9b4918a4f10d9cfd9d99b35416d2994f044650b85a0fa1cc4f67c3fa433a21b1f82f484cf5bb68232630a8a168fe9de72cedc73c1259a64b523e49f1a2c6b49105986f31", @typed={0xc, 0x19, @u64=0x20d}, @generic="ada90b926d45dceefdc5c78eaa1a75de898117a5f78dc695d47d4fcdd0eaf9de211346a3c9b65681e7740c6b96e0dd65fa2ac6f2ad506e56402a0986eba0f3c5c34d16bc6bca0e685735f6ba87ae7aa643056740ca7c9fa0c2c84b2719282c61124daaa2614cbf6fe6420727e9cfa4299594fbcc2ec02f423cb27a6ea00d2be990cdc6335dd8398790b55ee2e555140b42ef3bfed962884cda61516ea4572fb55b520891cf906b1b", @generic="db3837debac4c14b3bd059b5208f3765414e366c6be25ecb4bcd87f8cbf9d66b9e34b4dfaed3d157d02c1be40b4479b2c9c667057235f8233dce5a880f4f5f6fb8f571aa68b1f98dd476b20ce1685e323d70b222100049f994ed3de660928dde35cd8511d7f1c0be6d6ddad22015c45380189c3662aaa6ea103d442f8febf2ef1b5719375bb37b9ede4a65f3a44c0a06fd0e222a40790b9cf30ed30c21e4b0ea324cc5df8ec29e1863b31067d5a08b1202e82a90e8f84857ce5156063c61e2f212c6dde06a51d1cf48f149e5951dd06f43f4b3dab9cb15901b8faf8f3405582bbee53f3c6e190f72272ce5251d3e21d349", @generic="2597dbb6b3045abe70b514cef42b6c57b51b64b29abdbf"]}]}, 0xb98}], 0x3, &(0x7f0000001900)=[@cred={0x20, 0x1, 0x2, r3, r4, r5}, @cred={0x20, 0x1, 0x2, r6, r7}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r8, r9, r10}], 0x88, 0x4}, 0x10) r11 = accept$unix(0xffffffffffffff9c, &(0x7f0000000540), &(0x7f0000000200)=0x6e) ioctl$sock_SIOCGIFBR(r11, 0x8940, &(0x7f00000005c0)=@add_del={0x2, &(0x7f00000004c0)='bpq0\x00', 0x7}) pselect6(0x40, &(0x7f00000000c0)={0x200, 0x4, 0x40, 0x4, 0x80000000, 0x0, 0x1, 0x100}, &(0x7f0000000100)={0x6, 0x1, 0x2d, 0x1, 0x6e4, 0x8, 0x2, 0x2}, &(0x7f0000000140)={0x80000000, 0x6, 0x3, 0x903d, 0x6, 0x7, 0xc190, 0x800}, &(0x7f0000001a00), &(0x7f0000001a80)={&(0x7f0000001a40)={0x80000000}, 0x8}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001bc0)={&(0x7f00000017c0)='/dev/admmidi#\x00', r1}, 0x10) r12 = syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r12, 0x84, 0x73, &(0x7f0000000500)={0x0, 0xd4, 0x0, 0xffffeffffffffffd, 0x2}, &(0x7f0000000240)=0xb6) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r12, 0x84, 0x5, &(0x7f00000002c0)={r13, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, 0x84) 09:30:16 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8913, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f00000000c0)={"6272696467653000e900000400", &(0x7f0000000040)=@ethtool_cmd={0xe, 0x0, 0xf00}}) ioctl$KVM_SET_SREGS(r0, 0x4138ae84, &(0x7f0000000100)={{0x3000, 0x2000, 0x4, 0x6, 0x5, 0x6b, 0x1, 0xfffffffffffffffb, 0x20, 0x8, 0x0, 0x4}, {0x5000, 0x6001, 0xa, 0x3, 0x7, 0x338a, 0x6143e5a7, 0x920, 0x45b, 0xd1fd, 0x9, 0x5}, {0xf000, 0x1000, 0xd, 0x5, 0x5, 0x1000, 0x9, 0x1, 0x7ff, 0x1, 0x2dfb, 0x3}, {0xf002, 0x4, 0x0, 0x8000, 0x9, 0x2, 0xfff, 0x8dec, 0x3, 0x1ff, 0x77a, 0xa2}, {0x5000, 0x5000, 0x1f, 0x3f, 0x41, 0x1, 0x2, 0x400, 0x200, 0x0, 0x5, 0xffff}, {0xf000, 0x116000, 0x0, 0x6, 0x9, 0xfffffffffffffff9, 0x200, 0x3, 0x9000000, 0xbd4, 0x9, 0x401}, {0xd002, 0xd000, 0xb, 0x0, 0x3, 0x80000000, 0x9, 0x4, 0x0, 0x9, 0xeae, 0xfffffffffffffff8}, {0xf004, 0x0, 0x4, 0x3, 0x800, 0xb7d, 0x4, 0x2, 0x4, 0x5, 0x4, 0x4}, {0x5000, 0xf000}, {0x10000, 0x1d000}, 0x10000, 0x0, 0x1d22b9c03a2ec15f, 0x400, 0x3, 0x4000, 0x7000, [0x6, 0x8001, 0x7, 0xffffffff]}) [ 111.615434] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 09:30:16 executing program 2: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c833, 0xffffffffffffffff, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r1, 0x2287, &(0x7f0000000040)=0x7) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000400), 0x4) 09:30:16 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@ethernet, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000006000)={'vcan0\x00', 0x0}) r2 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x2, 0x400) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f0000000180)={r0, 0xfffffffffffff001, 0xfffffffffffffeff, "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"}) sendmsg$can_bcm(r0, &(0x7f0000014fc8)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000014000)={0x1, 0x0, 0x0, {}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "d8451aa777ccf6f9"}}, 0x48}, 0x1}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x1d, r1}, 0x10, &(0x7f00000000c0)={&(0x7f0000000040)={0x1, 0x0, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @can={{}, 0xffffff7f, 0x0, 0x0, 0x0, "7f65db78b282958e"}}, 0x48}, 0x1}, 0x0) [ 111.656447] ISOFS: Unable to identify CD-ROM format. 09:30:16 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$notify(r0, 0x402, 0x4) r1 = memfd_create(&(0x7f0000000440)='bdev}trustedself}.\x00', 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)="2f65786500000000000409004bddd9de91be10eebf000e0e281ab42fb897c0d554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a984237d092ef1c00b517026f8bd7f2b0436a4c40960ab3f6bc482809f6bd82caa34799193b35445293b992ab5e44573eef5fd0f423a5cfb386f9cc996c6effde7e603fdeab448671b63bec6e9395aabab4d045f1ad982a2a897fafa710be9e681f3c6a45db03d9e6cb58fbec3d8397005f17d6f7afa102ded1837bcb805600000000000000000000") pread64(r2, &(0x7f0000000080), 0xff7c, 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000300), &(0x7f0000000500), 0x10000001000) 09:30:17 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x200000, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'erspan0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000080)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000000180)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in6=@mcast2={0xff, 0x2, [], 0x1}, 0x4e22, 0x2, 0x4e24, 0x3, 0x2, 0x80, 0x80, 0x87, r1, r2}, {0x6, 0x1ff, 0x9, 0x8, 0x9, 0x7, 0x1000, 0x8}, {0x3, 0x6, 0x5, 0x8}, 0x3ff, 0x0, 0x2, 0x0, 0x2, 0x3}, {{@in, 0x4d3, 0x33}, 0x2, @in, 0x3505, 0x3, 0x0, 0x8, 0x4, 0x5, 0xfffffffffffffffe}}, 0xe8) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_read_part_table(0x40, 0x0, &(0x7f00000001c0)) ioctl(r3, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mremap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000a94000/0x3000)=nil) mremap(&(0x7f0000a96000/0x3000)=nil, 0x3000, 0x3000, 0x2, &(0x7f0000a94000/0x3000)=nil) 09:30:17 executing program 6: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x10080, 0x0) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req={0x2, 0x1, 0xfffffffffffff001, 0x7}, 0x10) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r2 = fcntl$dupfd(r1, 0x0, r1) bind$nfc_llcp(r2, &(0x7f0000000340)={0x27, 0x0, 0x0, 0x0, 0x2, 0x0, "23c9e03255de5ead90182c5c9895cd444f8c934539cba5c7f85b0263fb4fc98794b508b4f217a567e81d4ebe7bd773f558a6deaaf98bcf415504a12c772817"}, 0x60) 09:30:17 executing program 7: syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, &(0x7f00000001c0)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, &(0x7f00000001c0)) 09:30:17 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x9d, 0x2}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000100)={0x10000, 0x3, 0xf7, 0x0, 0x3, 0x1}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r3 = socket$alg(0x26, 0x5, 0x0) fcntl$addseals(r2, 0x409, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x8001, 0x0) ioctl$KDGKBMODE(r4, 0x4b44, &(0x7f0000000180)) bind$alg(r3, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-generic\x00'}, 0x58) close(r3) 09:30:17 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x34, 0x1) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000040)=0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000080)={0x2, r2}) ioctl$int_out(r1, 0x20000000c0385720, &(0x7f0000000000)) 09:30:17 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$notify(r0, 0x402, 0x4) r1 = memfd_create(&(0x7f0000000440)='bdev}trustedself}.\x00', 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)="2f65786500000000000409004bddd9de91be10eebf000e0e281ab42fb897c0d554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a984237d092ef1c00b517026f8bd7f2b0436a4c40960ab3f6bc482809f6bd82caa34799193b35445293b992ab5e44573eef5fd0f423a5cfb386f9cc996c6effde7e603fdeab448671b63bec6e9395aabab4d045f1ad982a2a897fafa710be9e681f3c6a45db03d9e6cb58fbec3d8397005f17d6f7afa102ded1837bcb805600000000000000000000") pread64(r2, &(0x7f0000000080), 0xff7c, 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000300), &(0x7f0000000500), 0x10000001000) 09:30:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000000)={'irlan0\x00', {0x2, 0x4e1f}}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@local={0xfe, 0x80, [], 0xaa}, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@loopback=0x7f000001}, 0x0, @in=@dev={0xac, 0x14, 0x14}}}, 0xe3) close(r0) 09:30:17 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) recvmsg(r0, &(0x7f0000000740)={&(0x7f0000000200)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/165, 0xa5}, {&(0x7f00000005c0)=""/234, 0xea}, {&(0x7f00000002c0)=""/109, 0x6d}], 0x3, &(0x7f0000000700)=""/39, 0x27, 0x3}, 0x40000000) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000000)='GPL\x00', 0xffffffffffffff9c}, 0x10) statx(r2, &(0x7f00000001c0)='./file0\x00', 0x4500, 0x4, &(0x7f0000000400)) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7b) r3 = accept4(r1, &(0x7f0000000340)=@alg, &(0x7f0000000040)=0x80, 0x0) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) set_mempolicy(0x4003, &(0x7f0000000080)=0x5, 0x7) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x4, 0x44031, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') sendto$inet6(r4, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e21, 0x0, @loopback={0x0, 0x1}, 0x4}, 0x1c) recvfrom(r4, &(0x7f00000000c0), 0x300000000000000, 0x0, &(0x7f0000000140)=@ax25={0x3, {"b626782b9e4e53"}}, 0x70a000) setsockopt$inet_sctp6_SCTP_EVENTS(r4, 0x84, 0xb, &(0x7f00000000c0)={0x6ad3}, 0xb) write$binfmt_misc(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB='s'], 0x1) 09:30:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000003c0)='trusted\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='net/ip6_flowlabel\x00', 0xffffffffffffffff) 09:30:17 executing program 1: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, &(0x7f0000000040)=""/2) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) r1 = socket(0x15, 0x80005, 0x0) getsockopt(r1, 0x200000000114, 0x2714, &(0x7f00000002c0)=""/1, &(0x7f0000000000)=0x1) [ 111.978403] ISOFS: Unable to identify CD-ROM format. 09:30:17 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f000000fff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="056304400000001092456137b7253847c86a297fd7455c837ceab16cd040aac89157e62aea14ca2e8b17cd41b5ba654b9b2a"], 0x17b, 0x0, &(0x7f0000012fc7)}) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x8}, 0x10) 09:30:17 executing program 0: openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x8440, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x50, &(0x7f00000001c0)={0x0, 0x0}}, 0x9) r1 = fcntl$getown(0xffffffffffffffff, 0x9) ptrace$pokeuser(0x6, r1, 0x7fffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000180)=r0, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="7b1af8ff0000000079a2f8ff00000000bf200000000000009500080000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 09:30:17 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) sched_setattr(0x0, &(0x7f0000000080)={0x3, 0x5, 0x0, 0x10000000000000, 0x1, 0x2}, 0x0) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000000000)=""/1, 0x1) read(r1, &(0x7f00000000c0)=""/106, 0x6a) ioctl$TIOCSETD(r1, 0x5437, &(0x7f0000fd0ffc)) 09:30:17 executing program 7 (fault-call:1 fault-nth:0): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, &(0x7f00000001c0)={[{@gid={'gid', 0x3d}, 0x2c}]}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, &(0x7f00000001c0)) [ 112.069390] binder: 7626:7627 Acquire 1 refcount change on invalid ref 268435456 ret -22 09:30:17 executing program 5: socketpair(0x1, 0x80003, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f00000001c0)="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") getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x4}, &(0x7f0000000040)=0xc) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000080)={r1, 0x7f}, &(0x7f00000000c0)=0x8) 09:30:17 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_int(r1, 0x0, 0x18, &(0x7f00006ed000), &(0x7f0000000000)=0x4) 09:30:17 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) open(&(0x7f0000000140)='./file0/file0\x00', 0x108ffd, 0x100082) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000340)={r0, &(0x7f00000001c0), &(0x7f0000000280)}, 0x20) ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0x386d) [ 112.140562] binder: 7626:7639 Acquire 1 refcount change on invalid ref 268435456 ret -22 09:30:17 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) lstat(&(0x7f0000003b80)='./file0\x00', &(0x7f0000003bc0)) geteuid() ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x9}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x80, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000180)=')keyring\x00', r1}, 0x10) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mq_timedsend(r2, &(0x7f0000000380)="d94907b675acbf9a5a1f811d549ff7515e5166914c048611dc4e6eb149bb505cc6c4bc8a696dc53106aacb39b532179f41170b081180863cc2c0191fc58faba1b57a5450", 0x44, 0x8001, 0x0) r3 = inotify_init1(0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x4a400295f) r4 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000340)='./file1\x00', r4, &(0x7f0000000100)='./file0\x00', 0x4) [ 112.194701] ISOFS: Unable to identify CD-ROM format. [ 112.227138] FAULT_INJECTION: forcing a failure. [ 112.227138] name failslab, interval 1, probability 0, space 0, times 1 [ 112.239243] CPU: 0 PID: 7636 Comm: syz-executor7 Not tainted 4.18.0-rc4-next-20180712+ #5 [ 112.247565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 112.256948] Call Trace: [ 112.259730] dump_stack+0x1c9/0x2b4 [ 112.263354] ? dump_stack_print_info.cold.2+0x52/0x52 [ 112.268565] ? lock_acquire+0x1e4/0x540 [ 112.272566] ? get_pid_task+0xd8/0x1a0 [ 112.276478] should_fail.cold.4+0xa/0x11 [ 112.280528] ? lock_release+0xa30/0xa30 [ 112.284506] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 112.289603] ? find_vpid+0xf0/0xf0 [ 112.293137] ? __f_unlock_pos+0x19/0x20 [ 112.297101] ? lock_downgrade+0x8f0/0x8f0 [ 112.301239] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 112.306763] ? proc_fail_nth_write+0x9e/0x210 [ 112.311247] ? proc_cwd_link+0x1d0/0x1d0 [ 112.315299] ? kasan_check_read+0x11/0x20 [ 112.319447] ? do_raw_spin_unlock+0xa7/0x2f0 [ 112.323848] ? lock_acquire+0x1e4/0x540 [ 112.327819] ? fs_reclaim_acquire+0x20/0x20 [ 112.332130] ? lock_downgrade+0x8f0/0x8f0 [ 112.336269] ? check_same_owner+0x340/0x340 [ 112.340676] ? fsnotify_first_mark+0x350/0x350 [ 112.345254] ? __fsnotify_parent+0xcc/0x420 [ 112.349565] ? rcu_note_context_switch+0x730/0x730 [ 112.354497] ? fsnotify+0x14e0/0x14e0 [ 112.358291] __should_failslab+0x124/0x180 [ 112.362527] should_failslab+0x9/0x14 [ 112.366315] __kmalloc_track_caller+0x2c4/0x760 [ 112.370976] ? strncpy_from_user+0x510/0x510 [ 112.375370] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 112.380904] ? strndup_user+0x77/0xd0 [ 112.384694] memdup_user+0x2c/0xa0 [ 112.388223] strndup_user+0x77/0xd0 [ 112.391839] ksys_mount+0x3c/0x140 [ 112.395381] __x64_sys_mount+0xbe/0x150 [ 112.399345] do_syscall_64+0x1b9/0x820 [ 112.403219] ? finish_task_switch+0x1d3/0x870 [ 112.407715] ? syscall_return_slowpath+0x5e0/0x5e0 [ 112.412750] ? syscall_return_slowpath+0x31d/0x5e0 [ 112.417669] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 112.422682] ? prepare_exit_to_usermode+0x291/0x3b0 [ 112.427684] ? perf_trace_sys_enter+0xb10/0xb10 [ 112.432342] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 112.437177] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 112.442360] RIP: 0033:0x455e29 [ 112.445543] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 112.464837] RSP: 002b:00007f94111afc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 09:30:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x20000, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000000c0)={0xcbb7, 0x3f, 0x10000, 0x20}) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'tgr192\x00'}, 0x58) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f00000001c0)="23db22b2e9d3d63ed6f79ec0ec46ac53ebecb1caf1e4c790ad8dc4597699de897d32f3cf8ea800ca44610b5a7e21c543ba6d9a90eabfa97cdf76cbbbfa5dd4cd", 0x40}], 0x1, &(0x7f0000001200)}, 0x0) 09:30:17 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) socketpair(0x2, 0x6, 0x80, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000180)={0x12, 0x10, 0xfa00, {&(0x7f0000000040), r3, r2}}, 0x18) r4 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r5, 0x4008ae89, &(0x7f00000000c0)={0x1229}) 09:30:17 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x2081fc) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) mremap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2000, 0x2000000000000, &(0x7f0000ffd000/0x2000)=nil) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) 09:30:17 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x800, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f0000000080)=r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x6, 0x0, 0x5}) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f00000001c0)) r3 = semget$private(0x0, 0x2, 0x0) semctl$GETPID(r3, 0x4, 0xb, &(0x7f0000000340)=""/221) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x111}}, 0x20) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100), 0x4) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000300)={0x7, &(0x7f0000000240)=[{}, {}, {}, {}, {}, {}, {}]}) r4 = shmget(0x3, 0xd000, 0x78000000, &(0x7f0000ff1000/0xd000)=nil) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x5) shmctl$SHM_UNLOCK(r4, 0xc) [ 112.472545] RAX: ffffffffffffffda RBX: 00007f94111b06d4 RCX: 0000000000455e29 [ 112.479804] RDX: 0000000020000140 RSI: 0000000020000040 RDI: 0000000020000000 [ 112.487072] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 [ 112.494337] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 112.501592] R13: 00000000004c248a R14: 00000000004d0058 R15: 0000000000000000 09:30:17 executing program 7 (fault-call:1 fault-nth:1): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, &(0x7f00000001c0)={[{@gid={'gid', 0x3d}, 0x2c}]}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, &(0x7f00000001c0)) [ 112.655759] ISOFS: Unable to identify CD-ROM format. [ 112.675096] FAULT_INJECTION: forcing a failure. [ 112.675096] name failslab, interval 1, probability 0, space 0, times 0 [ 112.686420] CPU: 1 PID: 7682 Comm: syz-executor7 Not tainted 4.18.0-rc4-next-20180712+ #5 [ 112.694744] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 112.704117] Call Trace: [ 112.706714] dump_stack+0x1c9/0x2b4 [ 112.710357] ? dump_stack_print_info.cold.2+0x52/0x52 [ 112.715574] ? perf_trace_lock+0xde/0x920 [ 112.719741] should_fail.cold.4+0xa/0x11 [ 112.723793] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 112.728888] ? zap_class+0x740/0x740 [ 112.732585] ? perf_trace_lock+0x920/0x920 [ 112.736808] ? save_stack+0x43/0xd0 [ 112.740418] ? kasan_kmalloc+0xc4/0xe0 [ 112.744288] ? __kmalloc_track_caller+0x14a/0x760 [ 112.749132] ? memdup_user+0x2c/0xa0 [ 112.752849] ? strndup_user+0x77/0xd0 [ 112.756634] ? ksys_mount+0x3c/0x140 [ 112.760337] ? do_syscall_64+0x1b9/0x820 [ 112.764389] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 112.769755] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 112.775292] ? proc_fail_nth_write+0x9e/0x210 [ 112.779794] ? kasan_check_read+0x11/0x20 [ 112.783931] ? lock_acquire+0x1e4/0x540 [ 112.787894] ? fs_reclaim_acquire+0x20/0x20 [ 112.792214] ? lock_downgrade+0x8f0/0x8f0 [ 112.796353] ? check_same_owner+0x340/0x340 [ 112.800683] ? lock_release+0xa30/0xa30 [ 112.804662] ? rcu_note_context_switch+0x730/0x730 [ 112.809588] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 112.814598] __should_failslab+0x124/0x180 [ 112.818834] should_failslab+0x9/0x14 [ 112.822633] __kmalloc_track_caller+0x2c4/0x760 [ 112.827295] ? strncpy_from_user+0x510/0x510 [ 112.831793] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 112.837328] ? strndup_user+0x77/0xd0 [ 112.841114] memdup_user+0x2c/0xa0 [ 112.844650] strndup_user+0x77/0xd0 [ 112.848284] ksys_mount+0x73/0x140 [ 112.851814] __x64_sys_mount+0xbe/0x150 [ 112.855786] do_syscall_64+0x1b9/0x820 [ 112.859664] ? finish_task_switch+0x1d3/0x870 [ 112.864157] ? syscall_return_slowpath+0x5e0/0x5e0 [ 112.869074] ? syscall_return_slowpath+0x31d/0x5e0 [ 112.873986] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 112.879000] ? prepare_exit_to_usermode+0x291/0x3b0 [ 112.884029] ? perf_trace_sys_enter+0xb10/0xb10 [ 112.888695] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 112.893545] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 112.898735] RIP: 0033:0x455e29 [ 112.901911] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 112.921137] RSP: 002b:00007f94111afc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 112.928847] RAX: ffffffffffffffda RBX: 00007f94111b06d4 RCX: 0000000000455e29 [ 112.936108] RDX: 0000000020000140 RSI: 0000000020000040 RDI: 0000000020000000 [ 112.943366] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 09:30:18 executing program 5: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="4800000008f363df6f36045f7efbdc6159b9fa5a59db6fbc450ba6613c7111e59700000000000000", @ANYRES16=r0, @ANYBLOB="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"], 0x48}, 0x1, 0x0, 0x0, 0x24004801}, 0x41) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r2 = dup2(r1, r1) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000080)={0x1000, 0xfffffffffffffffb, 0xfffffffeffffffff, 0x401, 0xffffffffffffffff, 0xb3c5, 0x5, 0x1ff, 0x4, 0xbea7}) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1) r3 = socket$packet(0x11, 0x4000000000003, 0x300) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000040)=0x4006, 0x4) sendto$inet6(r3, &(0x7f0000000180)="050100000500520000001e00ffb25bc202938207d903378c398d5375c5f73f2e55067d2780e19e33e3c2e7725f58a55afce0b86f61f7402810c3aae5dafadc5712f29508c008e26575efe5eb8f5972ea77ef35682f2884fa39139350f13c", 0x5e, 0x0, &(0x7f0000000000)={0xa, 0x100200000800, 0x8000000000005, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x2400, 0x0) sendmsg$nl_crypto(r2, &(0x7f0000000480)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)=@get={0x110, 0x13, 0x0, 0x70bd25, 0x25dfdbff, {{'morus1280-avx2\x00'}, [], [], 0x2400, 0x400}, [{0x8, 0x1, 0x4}, {0x8, 0x1, 0xfffffffffffffffd}, {0x8, 0x1, 0x45617ee9}, {0x8, 0x1, 0x3c}, {0x8, 0x1, 0xa1}, {0x8, 0x1, 0x4}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0x4008000) 09:30:18 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x890e, &(0x7f0000000000)="025cc83d6d345f8f76207046846f1279ca67c5e7cf4d20f76177b7e30f687ca7e4116f9761784aae500e991055e1af4528bdb9c4148020176c7e681168033bcb3dc03689e07a62cd1d10e03f7e6552a10d0d3b712408a448e4659375b661507eaa63d7c73c57d692dc58c284dce669d2bafba444be1c9fd91a8ea214a4e42f9d6dc2cd64214ddeac9c301620efa5f07567c876cfd515086801ef0061c2c9cb1560b4077c50af846cbe4546d1985f4d240f7c47c66eb7f6a6cc18865dfa65109f7df1b82f4daacbfa0b57d57725cc4813c92617f8a35721bc743e5a92fd32de15ad") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x3e, &(0x7f0000000140)=0x3, 0x4) getsockopt$inet_tcp_int(r1, 0x6, 0xb, &(0x7f0000bfcffc), &(0x7f0000000100)=0xffffffffffffffd9) 09:30:18 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl(r0, 0x8912, &(0x7f0000000040)="005c8f2380345f8f762070") syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000010c0), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) 09:30:18 executing program 6: add_key(&(0x7f0000000540)='encrypted\x00', &(0x7f0000000580)={0x73, 0x79, 0x7a}, &(0x7f0000000740)="9d3741b442a7b109", 0x8, 0xfffffffffffffffb) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x420006, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r0, 0x50, &(0x7f0000000040)}, 0x10) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000140)='./file0\x00', 0x2e, 0x9, &(0x7f0000001840)=[{&(0x7f0000000180)="bfe2384f6e4623d6c81d3a998f5b76d01686337ff3d607be86b51900bad1cf9c95a230dd0048e5c92e0c6a6b0b7a5f2ade88f0720f1ddfe141bf3b67764076011b81f167048190feaf34889a99af8a4fcd1a4b5f62b2035bd58aa15da5564eb9d3b3e8112de9ea166e2bd7517e2b0d3f8e014805c7f476a75458d02944d1eefe008e7494484bec81a3f2138730f4e23fe3fad0691331f68fe27120247cc14d204aed1aa8e50d38bd82825d66d598dce33a7322a30747133d2a0f72405e6efd", 0xbf, 0x10001}, {&(0x7f0000000240)="ccb225c7273ecb162c56c0f9d0d07c643488229d6384db3447b3183147f88e4113295d2b3f9c0ed24b8b0490499eb14c5a2d5855c43c7bf27b746f3a7b9f1457ba88895b8757fb921a2f10cd601c1a129ff7a0268dc5a320b02098b3ee720ad59b42c019beb02d66d69702b135db88a14cad4902a61060e8bc688ec6c2a4339fe66cacb51b4fd7db861824786d920e67373f7a36", 0x94, 0x9}, {&(0x7f0000000300)="10d12eef484f097d523b44f9fde36dd1ee1d883c65b25d32bbfd4abb6af29b6b46f17bd716a405f3425ec0bb8a3325b525c6bb5cb2746b58e94f96031aa64e1024a499fb6b172179f73b4faf948e8ed50452654310bf66d477542d41e2f725f4bc53c925cb5860370c567676e456b5ab24015c2ad6d56ecaac19d8beb2dd22ec5ed8117132ef195e4c1ebc58c3da74e3393625099268ab74f46cf07b217cb014dcaf61aa838061e26509fbd7dc1beb4ffa7d77a2636daf9242e15cf7e1316df5188a7ab2ed399e29c2ee6933359455160ec3e40f52c97e596682942e69fa28ecff82732945d1dc45ab54185ae20c8b", 0xef, 0xff80000000000000}, {&(0x7f0000000400)="d2c49946969a695074e7b3b5e530557a14c6db3d5cf376228fc404f607d5bf9752f515c899781002cc1dd1222ee1699d2709c41a94d0245bb90199b7f8e6c42fa9d400", 0x43}, {&(0x7f0000000480)="cb3cedb124a0e184e8468d6a73695b83064bffc6ecab1b54e0a6fe4d6142be16804f2d272e92acc8d3594e2286263dc11bbd9b73adb808359b4865e256441fb84aa716577961de3349cda0f1c01cbdc8ec4267c1d28b7f719b7da6e32461fee11c33414feb2dd25b42885805b724367fb6a8bdc0aa7055a5686ad48099f19d2ef57a372f1fd4596a1f280e0e88", 0x8d, 0x46a7}, {&(0x7f00000005c0)="257345687d476d4756bc735165f2db84a51ea200b5862c7c492025759ffe349b6f91934c5e81fb8f8714ebff43ec4f72cb29c02c61c5aa36b19101c554dcd17c07d969fbed7d8c291101cfda924995d95602237c9f317bc137a7a5736edc2b6b43376aadd7fc5eeb1e5d34389d64927a4bf9abdbb8a4741f141fdaa425f09fd7604a75237d59833a89724f9b08443fe7604ede896c1e4f5f4652e5028b59ea90f6833d4bea8dcc18b8993262a166ef16c9f1257b8a987c0adb15fd1c81b062b074376473ef01", 0xc6, 0x1}, {&(0x7f0000000780)="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", 0x1000, 0xfffffffffffffffa}, {&(0x7f00000006c0)="7d7a9162c76c38a6a16b55904a9d05a99897c758f64460c258a5eb3958b35ab914a4ad43726ab6608c761bdb16947437d45c2c3c29b25c119d0f", 0x3a, 0xa9f6}, {&(0x7f0000001780)="adfc6e3efdfb021fc6d38f8eef5ef801fc60bc8023d22a1bc92e0aacd4466594495ab266219f2e17e7e49258136fcbbb096f957cdefa6bf84f241b1d6ece1f59c256d12cb25d284ee231c8c1118efb2a9c2436c8810fcbcc9fac2c8b92bcf096b011fd2178dec9e348d9d09879e5e6d0328427d658f5d1b4f57196f07a8262c05ba415186dcdd1742ce77b18435eebf92a0e", 0x92, 0x10000}], 0x1, &(0x7f0000000700)={[{@nodots='nodots', 0x2c}, {@dots='dots', 0x2c}, {@fat=@discard='discard', 0x2c}]}) 09:30:18 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000500)={0x10000009}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x20000, 0x0) mkdirat$cgroup(r1, &(0x7f0000000080)='syz0\x00', 0x1ff) ioctl$KDENABIO(r1, 0x4b36) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={r1, 0x50, &(0x7f0000000580)={0x0, 0x0}}, 0xfffffe57) syz_mount_image$bfs(&(0x7f0000000280)='bfs\x00', &(0x7f00000002c0)='./file0\x00', 0x7f, 0x2, &(0x7f0000000400)=[{&(0x7f0000000300)="92018e12417602257226a11647a938a8288b9045ce7dfa902cf689fa3111f5c9fe1721a8ff25b67fdb3e6e6b3be799c5fd212ad15751ac244efccc6372dbbcabcaa1f03353f693e2239c7bb4e7607c0400ace9025d6070a5c3fdddeb393f4799ba3a118eef2762d90a95a0e637971655ed14206cd80f32eeb52cd6c97045ec6456f9bb69400c59fbc9b6538a00f04074c8e31a7eaf37920e3f6685da2fc8238e6b5fb1f1f8700e4c9e23930da2432b0381267fc9", 0xb4, 0x4}, {&(0x7f00000003c0)="3801416050f115be408beeb34b724c223866c37be514cd65ef21d6924b88e8eb73", 0x21, 0x3ff}], 0x1008080, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540)=r2, 0xfffffe75) [ 112.950630] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 112.957889] R13: 00000000004c248a R14: 00000000004d0058 R15: 0000000000000001 09:30:18 executing program 2: capset(&(0x7f0000002ffa)={0x20080522}, &(0x7f0000002000)) r0 = socket(0x10, 0x802, 0x0) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, 0x0, r1) fremovexattr(r0, &(0x7f0000000000)=@known='trusted.syz\x00') 09:30:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9ef}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000002180), 0x0, &(0x7f0000002200)={[{@lockproto_nolock='lockproto=lock_nolock', 0x2c}, {@locktable={'locktable', 0x3d, 'vboxnet1'}, 0x2c}]}) 09:30:18 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) lstat(&(0x7f0000003b80)='./file0\x00', &(0x7f0000003bc0)) geteuid() ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x9}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x80, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000180)=')keyring\x00', r1}, 0x10) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mq_timedsend(r2, &(0x7f0000000380)="d94907b675acbf9a5a1f811d549ff7515e5166914c048611dc4e6eb149bb505cc6c4bc8a696dc53106aacb39b532179f41170b081180863cc2c0191fc58faba1b57a5450", 0x44, 0x8001, 0x0) r3 = inotify_init1(0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x4a400295f) r4 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000340)='./file1\x00', r4, &(0x7f0000000100)='./file0\x00', 0x4) [ 112.998188] encrypted_key: master key parameter '' is invalid [ 113.013272] gfs2: invalid mount option: statfs_quantum=0x0000èÐKë³;00 [ 113.019940] gfs2: can't parse mount arguments 09:30:18 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) lstat(&(0x7f0000003b80)='./file0\x00', &(0x7f0000003bc0)) geteuid() ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x9}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x80, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000180)=')keyring\x00', r1}, 0x10) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mq_timedsend(r2, &(0x7f0000000380)="d94907b675acbf9a5a1f811d549ff7515e5166914c048611dc4e6eb149bb505cc6c4bc8a696dc53106aacb39b532179f41170b081180863cc2c0191fc58faba1b57a5450", 0x44, 0x8001, 0x0) r3 = inotify_init1(0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x4a400295f) r4 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000340)='./file1\x00', r4, &(0x7f0000000100)='./file0\x00', 0x4) [ 113.074693] FAT-fs (loop6): invalid media value (0xb5) [ 113.080090] FAT-fs (loop6): Can't find a valid FAT filesystem 09:30:18 executing program 7 (fault-call:1 fault-nth:2): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, &(0x7f00000001c0)={[{@gid={'gid', 0x3d}, 0x2c}]}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, &(0x7f00000001c0)) [ 113.127942] gfs2: fsid=vboxnet1: Trying to join cluster "lock_nolock", "vboxnet1" [ 113.135781] gfs2: fsid=vboxnet1: Now mounting FS... [ 113.157627] encrypted_key: master key parameter '' is invalid [ 113.167923] gfs2: not a GFS2 filesystem [ 113.172089] gfs2: fsid=vboxnet1: can't read superblock 09:30:18 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4188aea7, &(0x7f0000000080)={0xaaaab5a}) 09:30:18 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x103800, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000080)=@assoc_id=0x0, &(0x7f00000000c0)=0x4) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000100)={r2, 0x3, 0x7, [0xffffffffffffffff, 0x6, 0x7fff, 0x3, 0xffff, 0x70000000000000, 0x9]}, &(0x7f0000000180)=0x16) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f000042d000)=@routing={0x0, 0x2, 0x2, 0x80000001, 0x0, [@mcast1={0xff, 0x1, [], 0x1}]}, 0x18) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000000)=@routing, 0x8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r3, 0x8b, "77fa71", "eecc675e3ffad16b54443558ea2278c86f416f9c57ce65dd9ff928356eb38cdaa007555a42ee9461af213edf639a8e75dcd0b51f1c0dccadbcf61e8385beccb32ad73bf89db86ae34c79f894f3220fe67cbd3fbc6f86038efd81156ae2084476f9f9060e0ca698bb4281162fd9fbdacfe7800fbcda784e6a40e4eee59646758b0b7bf50981043ce749f837a26274c01c151cfa86ad7f0584c327c5e0cdabfab66719f18c319aa7573d684550742758b0b79fc9f43ac704f8e011ab8404e0a121aa1895cf6eb9b8c203e69b3f547ba8e44063d69cbd65b62c9cde44d91bca43dcef7e5c2c6f69ff2b3f6f2c9c60441a2b1b1d943c73dc1c7dc3e6350de614e75e"}}, 0x110) 09:30:18 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = dup2(r0, r0) ioctl$KVM_CREATE_IRQCHIP(r2, 0x800448f0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000080)={0x9}) write$P9_RREADDIR(r2, &(0x7f0000000200)={0x103, 0x29, 0x1, {0x9, [{{0x8c, 0x2}, 0x5f8, 0x0, 0x7, './file0'}, {{0x0, 0x3, 0x4}, 0x6, 0x8, 0x7, './file0'}, {{0x10, 0x1, 0x3}, 0x3, 0x36dc, 0x7, './file0'}, {{0x42, 0x2, 0x5}, 0x1, 0x2, 0x7, './file0'}, {{0x6}, 0x3ff, 0x3, 0x7, './file0'}, {{0x4, 0x0, 0x2}, 0x1000, 0xffff, 0x7, './file0'}, {{0x40, 0x0, 0x5}, 0x8000, 0xffffffff, 0x7, './file0'}, {{0x32, 0x4, 0x1}, 0x3, 0x100000000, 0x7, './file0'}]}}, 0x103) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000040)={0x80000001, 0x800, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x80000000, 0x8, 0x2, 0x6, 0x8}, 0xb) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f00000000c0)={0x0, 0x18, "e786e9f2d9deb614fb6f9926cd02bbe3a1bf035cc6d5489e"}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000140)={0x0, 0x20b, 0x80, 0x6, r3}, 0x10) [ 113.177426] gfs2: fsid=vboxnet1: can't read superblock: -22 09:30:18 executing program 6: syz_mount_image$vfat(&(0x7f0000000400)='vfat\x00', &(0x7f0000000440)='./file0/fil..\x00', 0x0, 0x9be, &(0x7f0000000180), 0x211080, &(0x7f0000000500)=ANY=[@ANYBLOB="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"]) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) lstat(&(0x7f0000000340)='./file0/fil..\x00', &(0x7f00000002c0)) r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000200)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}) syz_fuseblk_mount(&(0x7f0000000140)='./file0/fil..\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) link(&(0x7f00000000c0)='./file0/fil..\x00', &(0x7f0000000100)='./file0\x00') 09:30:18 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) lstat(&(0x7f0000003b80)='./file0\x00', &(0x7f0000003bc0)) geteuid() ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x9}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x80, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000180)=')keyring\x00', r1}, 0x10) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mq_timedsend(r2, &(0x7f0000000380)="d94907b675acbf9a5a1f811d549ff7515e5166914c048611dc4e6eb149bb505cc6c4bc8a696dc53106aacb39b532179f41170b081180863cc2c0191fc58faba1b57a5450", 0x44, 0x8001, 0x0) r3 = inotify_init1(0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x4a400295f) r4 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000340)='./file1\x00', r4, &(0x7f0000000100)='./file0\x00', 0x4) 09:30:18 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) bind(r0, &(0x7f000000c000)=@nl=@kern={0x10, 0x0, 0x0, 0x400040}, 0xc) r1 = socket$inet(0x10, 0x3, 0xc) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x501400, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r2, 0x7706, &(0x7f00000000c0)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x4, 0x4) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000002000)="24000000100007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b356da5a80d18bec4c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) 09:30:18 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) lstat(&(0x7f0000003b80)='./file0\x00', &(0x7f0000003bc0)) geteuid() ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x9}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x80, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000180)=')keyring\x00', r1}, 0x10) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mq_timedsend(r2, &(0x7f0000000380)="d94907b675acbf9a5a1f811d549ff7515e5166914c048611dc4e6eb149bb505cc6c4bc8a696dc53106aacb39b532179f41170b081180863cc2c0191fc58faba1b57a5450", 0x44, 0x8001, 0x0) r3 = inotify_init1(0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x4a400295f) r4 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000340)='./file1\x00', r4, &(0x7f0000000100)='./file0\x00', 0x4) 09:30:18 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000200)={@broadcast, @remote, 0x0}, &(0x7f0000000240)=0xc) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f00000002c0)={@local, 0x0}, &(0x7f0000000300)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f0000002840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000002880)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f00000028c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000002900)=0x14) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000002940)={0x0, @multicast2, @local}, &(0x7f0000002980)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000029c0)={{{@in=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000002ac0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000002b00)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000002c00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002c40)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f0000002d40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002d80)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000002e80)=0xe8) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000002ec0)={@mcast1, 0x0}, &(0x7f0000002f00)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002f40)={{{@in6, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000003040)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003080)={{{@in=@rand_addr, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000003180)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000031c0)={{{@in, @in6=@ipv4={[], [], @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f00000032c0)=0xe8) recvmsg(r1, &(0x7f00000045c0)={&(0x7f0000003400)=@xdp={0x0, 0x0, 0x0}, 0x80, &(0x7f00000044c0)=[{&(0x7f0000003480)=""/15, 0xf}, {&(0x7f00000034c0)=""/4096, 0x1000}], 0x2, &(0x7f0000004500)=""/156, 0x9c, 0x7ff}, 0x1) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000004c80)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000004c40)={&(0x7f0000004600)={0x608, r3, 0x33a, 0x70bd2a, 0x25dfdbfb, {0x3}, [{{0x8, 0x1, r4}, {0x13c, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8, 0x3, 0xe}, {0x8, 0x4, 0x200}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x81}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r7}}, {0x8, 0x7}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0xa825}}, {0x8, 0x6, r8}}}]}}, {{0x8, 0x1, r9}, {0xb4, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8, 0x3, 0xe}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r10}}}]}}, {{0x8, 0x1, r11}, {0x270, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x7ff}}, {0x8, 0x6, r12}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8, 0x3, 0x5}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x10000}}, {0x8, 0x7}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8, 0x3, 0x5}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x7f30}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r13}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0xa1}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x7ff}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0xefeb}}, {0x8, 0x6, r14}}}]}}, {{0x8, 0x1, r15}, {0x174, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0xbb}}, {0x8, 0x7}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r16}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x401}}, {0x8, 0x7}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r17}}, {0x8, 0x7}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8, 0x3, 0x5}, {0x10, 0x4, 'broadcast\x00'}}}]}}]}, 0x608}, 0x1, 0x0, 0x0, 0x4040040}, 0x24000000) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x4, 0x3ff, 0x1}) io_setup(0x8, &(0x7f0000000100)=0x0) io_getevents(r18, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000000)={0x77359400}) close(r2) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x1, 0x0) io_submit(r18, 0x2000000000000026, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r2, &(0x7f0000000140), 0x4000}]) 09:30:18 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setitimer(0x1, &(0x7f00000001c0)={{0x0, 0x7530}, {0x77359400}}, &(0x7f0000000200)) listxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/2, 0x2) sendmsg$nl_xfrm(r0, &(0x7f0000000540)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000280)=@getpolicy={0x5c, 0x15, 0xc01, 0x0, 0x0, {{@in=@rand_addr, @in=@rand_addr}}, [@mark={0xc, 0x15}]}, 0x5c}, 0x1}, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x40, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000180)={0x13, 0x10, 0xfa00, {&(0x7f0000000300), r2, 0x1}}, 0x18) 09:30:18 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x102d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x5, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000006110004c0000000000000000000000009500000000000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0x3bc, &(0x7f00001a7f05)=""/251}, 0x2e) 09:30:18 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000f9aff8)='./file0\x00', 0x8000000000141046, 0x0) r2 = msgget(0x1, 0x100) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r0, 0x10, &(0x7f00000004c0)={0x0, 0x0}) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000500)=0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000540)={{0x1, r3, r4, r5, r6, 0x53, 0x7fffffff}, 0x10000, 0xfffffffffffffffd, 0x80000000, 0x3, 0x1, 0x3, r7, r8}) readlinkat(r1, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)=""/163, 0xa3) mount(&(0x7f0000ae2d7d)='./file0/file0\x00', &(0x7f0000851000)='./file0\x00', &(0x7f0000a6f000)='nfs4\x00', 0x0, &(0x7f0000000000)='v3') 09:30:18 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) lstat(&(0x7f0000003b80)='./file0\x00', &(0x7f0000003bc0)) geteuid() ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x9}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x80, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000180)=')keyring\x00', r1}, 0x10) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mq_timedsend(r2, &(0x7f0000000380)="d94907b675acbf9a5a1f811d549ff7515e5166914c048611dc4e6eb149bb505cc6c4bc8a696dc53106aacb39b532179f41170b081180863cc2c0191fc58faba1b57a5450", 0x44, 0x8001, 0x0) r3 = inotify_init1(0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x4a400295f) r4 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000340)='./file1\x00', r4, &(0x7f0000000100)='./file0\x00', 0x4) 09:30:18 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x44002, 0x0) connect$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) 09:30:18 executing program 6: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f00000013c0)={0xb, 0x10, 0xfa00, {&(0x7f0000001280)}}, 0x18) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xa5, 0x1) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000040)={0x0, 0xb4b1}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f00000000c0)={r2, 0xbf, "e5f7fd30456701e4a69dbfb52481fe2f8f32dd6e003e2afea344424d00ac92d4c89a5d5dc626652407070a9960ccd4c4e43595f84a305aa5040619e8f7db7f6c81ed7d7da97eb427614d347a73fab25bd0b371e28da14e2d79ca4ce89685d47dbcf80f0b7c724d1559d14aca63b2f382a7955a29e70f577d0cf451f41c006413de64624283ceef37df6f163d257aedfa4c74558a39ef20d49d660f21498e42e46b800b2e4911557919c2a611745e894d0dadf14689c7938b5c83a577153189"}, &(0x7f00000001c0)=0xc7) 09:30:18 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x1bbf, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) r3 = accept(r1, &(0x7f00000001c0)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000740)=0x80) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000040)) sendmmsg$unix(r3, &(0x7f00000033c0)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000002e80)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1, &(0x7f0000000140)}], 0x1, 0x8040) close(r2) [ 113.545593] ISOFS: Unable to identify CD-ROM format. [ 113.550084] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 113.572235] FAULT_INJECTION: forcing a failure. [ 113.572235] name failslab, interval 1, probability 0, space 0, times 0 [ 113.583551] CPU: 0 PID: 7787 Comm: syz-executor7 Not tainted 4.18.0-rc4-next-20180712+ #5 [ 113.591876] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 113.601236] Call Trace: [ 113.603842] dump_stack+0x1c9/0x2b4 [ 113.607487] ? dump_stack_print_info.cold.2+0x52/0x52 [ 113.612693] ? __kernel_text_address+0xd/0x40 [ 113.617234] ? perf_trace_lock+0xde/0x920 [ 113.621400] should_fail.cold.4+0xa/0x11 [ 113.625478] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 113.630579] ? perf_trace_lock+0x920/0x920 [ 113.634804] ? kasan_kmalloc+0xc4/0xe0 [ 113.638679] ? __kmalloc_track_caller+0x14a/0x760 [ 113.643510] ? memdup_user+0x2c/0xa0 [ 113.647211] ? strndup_user+0x77/0xd0 [ 113.651014] ? ksys_mount+0x73/0x140 [ 113.654721] ? __x64_sys_mount+0xbe/0x150 [ 113.658857] ? do_syscall_64+0x1b9/0x820 [ 113.662913] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 113.668442] ? proc_fail_nth_write+0x9e/0x210 [ 113.672936] ? kasan_check_read+0x11/0x20 [ 113.677080] ? lock_acquire+0x1e4/0x540 [ 113.681043] ? fs_reclaim_acquire+0x20/0x20 [ 113.685368] ? lock_downgrade+0x8f0/0x8f0 [ 113.689521] ? check_same_owner+0x340/0x340 [ 113.693840] ? lock_release+0xa30/0xa30 [ 113.697804] ? rcu_note_context_switch+0x730/0x730 [ 113.702725] ? __check_object_size+0x9d/0x5f2 [ 113.707224] __should_failslab+0x124/0x180 [ 113.711476] should_failslab+0x9/0x14 [ 113.715268] kmem_cache_alloc_trace+0x2cb/0x780 [ 113.719928] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 113.725456] ? _copy_from_user+0xdf/0x150 [ 113.729603] copy_mount_options+0x5f/0x380 [ 113.733830] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 113.739357] ksys_mount+0xd0/0x140 [ 113.742902] __x64_sys_mount+0xbe/0x150 [ 113.746867] do_syscall_64+0x1b9/0x820 [ 113.750741] ? finish_task_switch+0x1d3/0x870 [ 113.755236] ? syscall_return_slowpath+0x5e0/0x5e0 [ 113.760156] ? syscall_return_slowpath+0x31d/0x5e0 [ 113.765076] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 113.770082] ? prepare_exit_to_usermode+0x291/0x3b0 [ 113.775100] ? perf_trace_sys_enter+0xb10/0xb10 [ 113.779758] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 113.784594] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 113.789769] RIP: 0033:0x455e29 [ 113.792948] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 113.812265] RSP: 002b:00007f94111afc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 113.819975] RAX: ffffffffffffffda RBX: 00007f94111b06d4 RCX: 0000000000455e29 [ 113.827231] RDX: 0000000020000140 RSI: 0000000020000040 RDI: 0000000020000000 [ 113.834486] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 09:30:19 executing program 7 (fault-call:1 fault-nth:3): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, &(0x7f00000001c0)={[{@gid={'gid', 0x3d}, 0x2c}]}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, &(0x7f00000001c0)) 09:30:19 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") socket$key(0xf, 0x3, 0x2) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet_mreq(r1, 0x0, 0x24, &(0x7f0000000000)={@dev, @broadcast}, &(0x7f0000000080)=0x8) 09:30:19 executing program 5: mmap(&(0x7f0000000000/0x8b000)=nil, 0x8b000, 0x1000004, 0x10000032, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x4, 0x40000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000080)=0x82c, 0x4) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000100)={&(0x7f000003d000/0x2000)=nil, &(0x7f0000063000/0x1000)=nil, 0x2000, 0x1}) futex(&(0x7f0000001000), 0x8c, 0x1, &(0x7f0000191000), &(0x7f0000000000), 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000000c0)) 09:30:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000440)='bdev}trustedself}.\x00', 0x0) chdir(&(0x7f0000000040)='./file0\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000100)="2f65786500000000000409004bddd9de91be10eebf000e0e281ab42fb897c0d554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a984237d092ef1c00b517026f8bd7f2b0436a4c40960ab3f6bc482809f6bd82caa34799193b35445293b992ab5e44573eef5fd0f423a5cfb386f9cc996c6effde7e603fdeab448671b63bec6e9395aabab4d045f1ad982a2a897fafa710be9e681f3c6a45db03d9e6cb58fbec3d8397005f17d6f7afa102ded1837bcb805600000000000000000000") pread64(r1, &(0x7f0000000080), 0xff7c, 0x0) ioctl$KVM_GET_DEVICE_ATTR(r0, 0x4018aee2, &(0x7f00000000c0)={0x0, 0x2, 0x4, &(0x7f0000000080)}) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f0000000300), &(0x7f0000000500), 0x10000001000) 09:30:19 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000f9aff8)='./file0\x00', 0x8000000000141046, 0x0) r2 = msgget(0x1, 0x100) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r0, 0x10, &(0x7f00000004c0)={0x0, 0x0}) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000500)=0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000540)={{0x1, r3, r4, r5, r6, 0x53, 0x7fffffff}, 0x10000, 0xfffffffffffffffd, 0x80000000, 0x3, 0x1, 0x3, r7, r8}) readlinkat(r1, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)=""/163, 0xa3) mount(&(0x7f0000ae2d7d)='./file0/file0\x00', &(0x7f0000851000)='./file0\x00', &(0x7f0000a6f000)='nfs4\x00', 0x0, &(0x7f0000000000)='v3') 09:30:19 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket(0x2, 0x2, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000140)={0xffffffffffffffff}) epoll_wait(r2, &(0x7f0000000000)=[{}], 0x200, 0xfffffffffffffef7) shutdown(r2, 0x2001) close(r2) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000000c0)='bic\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) shutdown(r1, 0x0) getsockname$inet6(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c) [ 113.841739] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 113.848994] R13: 00000000004c248a R14: 00000000004d0058 R15: 0000000000000002 09:30:19 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="7b1af8ff0000000069a2f8ff00000000bf2000000000000095fbe9610c8422a0c8e694cde2553f0a766813012923a4873fb2349daec0bdf7a3e6ecfa3638401931a3102098a38543a333b052b807314588e33467c6d7234afc53f8b7e27ee7b4a89186b0816a50ca62da511bcd6e6b8d239835aae7deb62232fb7b05b1bc700b0100000000000000f45ef174ff93c4c76d25f9a6c67828def81d423b459c45c8ce5bc76780b1c012d8f63b3b2333a7f4d4"], &(0x7f0000000100)='GPL\x00'}, 0x48) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mknod$loop(&(0x7f0000000240)='./file0\x00', 0x6009, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r0, 0x4) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r3 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000788000)=0x2, 0x4) bind$packet(r3, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) setsockopt(r3, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 09:30:19 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x4) r1 = dup3(r0, r0, 0x80000) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000080)=""/4096) ioctl$VT_RESIZE(r0, 0x400442c9, &(0x7f0000000040)) 09:30:19 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setrlimit(0x7, &(0x7f0000000000)) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe3b, 0x0, 0x3f, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 09:30:19 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) lseek(r0, 0x0, 0x0) fstatfs(r0, &(0x7f00000000c0)=""/164) bind$unix(r0, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r3, 0x54a1) r4 = dup2(r1, r0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000200)={0x0, 0x9}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYRES32=r5, @ANYBLOB="5300030000001f000000"], 0xe) getsockopt$bt_BT_DEFER_SETUP(r4, 0x112, 0x7, &(0x7f0000000040)=0x3, &(0x7f0000000080)=0x4) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) 09:30:19 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)="2e2f7367726f75702e63707500c292c6eefa3d9ada20168b65c6b23704889fb0a8d2ddde770aaeecb89433721dab", 0x200002, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000004740)={'team0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@ipv4, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000400)=0xe8) fstat(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_fuse_mount(&(0x7f00000002c0)='./file0/file0\x00', 0xa000, r3, r4, 0x1, 0x2094000) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000004780)={@mcast2={0xff, 0x2, [], 0x1}, r2}, 0x14) r5 = openat$cgroup_procs(r1, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) readlinkat(r5, &(0x7f0000000140)='./file0\x00', &(0x7f00000005c0)=""/4096, 0x1000) r6 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r6, &(0x7f0000000080)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0x4, 0x1, 0x1, 0xaea, 0x3}, 0xc) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000000)={'icmp6\x00'}, &(0x7f0000000100)=0x1e) recvmsg(r0, &(0x7f0000000580)={&(0x7f0000000180)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000240)}, 0x0) sendfile(r6, r5, &(0x7f0000000200), 0x4) [ 113.982459] ISOFS: Unable to identify CD-ROM format. [ 114.033325] FAULT_INJECTION: forcing a failure. [ 114.033325] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 114.045207] CPU: 0 PID: 7836 Comm: syz-executor7 Not tainted 4.18.0-rc4-next-20180712+ #5 [ 114.053530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 114.062918] Call Trace: [ 114.065518] dump_stack+0x1c9/0x2b4 [ 114.069160] ? dump_stack_print_info.cold.2+0x52/0x52 [ 114.074361] should_fail.cold.4+0xa/0x11 [ 114.078419] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 114.083510] ? lock_acquire+0x1e4/0x540 [ 114.087471] ? is_bpf_text_address+0xae/0x170 [ 114.091973] ? lock_downgrade+0x8f0/0x8f0 [ 114.096108] ? lock_release+0xa30/0xa30 [ 114.100068] ? trace_hardirqs_on+0x10/0x10 [ 114.104300] ? trace_hardirqs_on+0x10/0x10 [ 114.108533] ? is_bpf_text_address+0xd7/0x170 [ 114.113029] ? kernel_text_address+0x79/0xf0 [ 114.117426] ? __kernel_text_address+0xd/0x40 [ 114.121908] ? perf_trace_lock+0xde/0x920 [ 114.126041] ? __save_stack_trace+0x8d/0xf0 [ 114.130351] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 114.135875] ? should_fail+0x246/0xd86 [ 114.139757] ? zap_class+0x740/0x740 [ 114.143457] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 114.148556] ? zap_class+0x740/0x740 [ 114.152258] __alloc_pages_nodemask+0x36e/0xdb0 [ 114.156912] ? __kmalloc_track_caller+0x14a/0x760 [ 114.161748] ? memdup_user+0x2c/0xa0 [ 114.165445] ? strndup_user+0x77/0xd0 [ 114.169245] ? ksys_mount+0x73/0x140 [ 114.172944] ? __alloc_pages_slowpath+0x2d00/0x2d00 [ 114.177945] ? proc_fail_nth_write+0x9e/0x210 [ 114.182428] ? kasan_check_read+0x11/0x20 [ 114.186580] ? lock_acquire+0x1e4/0x540 [ 114.190538] ? fs_reclaim_acquire+0x20/0x20 [ 114.194858] ? lock_downgrade+0x8f0/0x8f0 [ 114.199005] ? lock_release+0xa30/0xa30 [ 114.202968] ? check_same_owner+0x340/0x340 [ 114.207270] ? lock_release+0xa30/0xa30 [ 114.211234] cache_grow_begin+0x91/0x710 [ 114.215297] kmem_cache_alloc_trace+0x6a5/0x780 [ 114.219952] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 114.225478] copy_mount_options+0x5f/0x380 [ 114.229695] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 114.235742] ksys_mount+0xd0/0x140 [ 114.239272] __x64_sys_mount+0xbe/0x150 [ 114.243236] do_syscall_64+0x1b9/0x820 [ 114.247107] ? finish_task_switch+0x1d3/0x870 [ 114.251600] ? syscall_return_slowpath+0x5e0/0x5e0 [ 114.256517] ? syscall_return_slowpath+0x31d/0x5e0 [ 114.261429] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 114.266430] ? prepare_exit_to_usermode+0x291/0x3b0 [ 114.271431] ? perf_trace_sys_enter+0xb10/0xb10 [ 114.276084] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 114.280913] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 114.286085] RIP: 0033:0x455e29 [ 114.289266] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 114.308467] RSP: 002b:00007f94111afc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 114.316174] RAX: ffffffffffffffda RBX: 00007f94111b06d4 RCX: 0000000000455e29 [ 114.323425] RDX: 0000000020000140 RSI: 0000000020000040 RDI: 0000000020000000 09:30:19 executing program 0: setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000003f42)="e9b1102fd162d2883afda6ca384faf121d74cc184624fce45026608dab3c7b831ea74850369babebbb881b4705fb9d5b6904ab9ea2bf03d896bd297cb7b37702c0a3363c7b53618766bfaea1eff261f0b2e23ea64dae4b74e1384260720bb174676f336b965c9cb4b46b75ae551d1a742a5e977acd7cce7ec8f0b0695c6d6012d40ea9373a4dcd9710956cc6e7ed45055df929909a53679bad", 0x99) r0 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x6, 0x4) sendto$inet6(r0, &(0x7f0000003fd9), 0xfdc2, 0x0, &(0x7f0000005fe4)={0xa, 0x0, 0x100000002, @mcast2={0xff, 0x2, [], 0x1}}, 0x16) 09:30:19 executing program 5: capset(&(0x7f00002d0ff8)={0x19980330}, &(0x7f0000cc0000)) r0 = semget$private(0x0, 0x7, 0x0) semctl$SETVAL(r0, 0x4, 0x10, &(0x7f0000000000)=0x6) semtimedop(r0, &(0x7f00000001c0)=[{}], 0x1, &(0x7f0000000200)={0x77359400}) [ 114.330677] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 [ 114.337928] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 114.345189] R13: 00000000004c248a R14: 00000000004d0058 R15: 0000000000000003 09:30:19 executing program 1: r0 = socket(0x10, 0x802, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r1, 0x8008af00, &(0x7f00000000c0)) sendfile(r0, r0, &(0x7f0000000000), 0x8) write(r0, &(0x7f00000013c0)="240000001a0025f0006bb404feff141c020b5aff6e10b500000780cc060004000000d588", 0x24) 09:30:19 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000000)=ANY=[@ANYBLOB="000204010085dbddd7793134450bfe000000fe8000000000000000000100000000aa"], 0x18) 09:30:19 executing program 2: r0 = socket(0xa, 0x80005, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x9, 0x4002) r2 = getpid() getpriority(0x2, r2) ioctl$VHOST_GET_FEATURES(r1, 0x8008af00, &(0x7f00000001c0)) sendmmsg$inet_sctp(r0, &(0x7f0000003fc0)=[{&(0x7f0000000040)=@in6={0xa}, 0x1c, &(0x7f0000001380)=[{&(0x7f00000012c0)="a2", 0x1}], 0x1, &(0x7f00000014c0)=[@sndrcv={0x30, 0x84, 0x1, {0x0, 0x0, 0x209}}], 0x30}], 0x1, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) 09:30:19 executing program 7 (fault-call:1 fault-nth:4): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, &(0x7f00000001c0)={[{@gid={'gid', 0x3d}, 0x2c}]}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, &(0x7f00000001c0)) 09:30:19 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000240)={0x0, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000040)={0x1, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x88) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000300)={0xb, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}}}, 0x108) getsockopt$inet6_dccp_buf(r0, 0x21, 0xcc, &(0x7f0000000100)=""/77, &(0x7f0000000000)=0x4d) 09:30:19 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) 09:30:19 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0xffffc, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x3, 0x0, 0x0, 0x0, "dd619715a46dc083f87c7d64bdfec47f4928daf1070ece9ddddd7691231886f9"}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffff7d, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x0, 0xb}}, 0xfffffffffffffc30) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r2, 0xcf8e}}, 0x10) 09:30:19 executing program 4: r0 = socket$inet6(0xa, 0x1000000000005, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e21, @multicast1=0xe0000001}}, 0x3, 0x7ff}, &(0x7f00000001c0)=0x90) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000200)={r1, 0x6}, &(0x7f0000000240)=0x8) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000080)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000a2af87)=""/121, 0x71) setsockopt$inet_sctp_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f0000000280)={r1, 0x7fffffff, 0x56, "9ebd45a466da4bb07bb32f2d24cac2749dda1688aa7d94825d4408b2b00deb7a46cf3769cfa1da735efe628597cf7446cc3be52f5d067c041d3adec36e64f2adfd3ee34b2ca08a8d6d0bd32705a5a0a3abb3bca3c460"}, 0x5e) [ 114.445067] Unknown ioctl -2146914560 [ 114.461360] netlink: 'syz-executor1': attribute type 4 has an invalid length. [ 114.477741] Unknown ioctl -2146914560 [ 114.492744] capability: warning: `syz-executor0' uses deprecated v2 capabilities in a way that may be insecure [ 114.496530] netlink: 'syz-executor1': attribute type 4 has an invalid length. [ 114.552192] ISOFS: Unable to identify CD-ROM format. [ 114.587762] FAULT_INJECTION: forcing a failure. [ 114.587762] name failslab, interval 1, probability 0, space 0, times 0 [ 114.599156] CPU: 1 PID: 7894 Comm: syz-executor7 Not tainted 4.18.0-rc4-next-20180712+ #5 [ 114.607481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 114.616840] Call Trace: [ 114.619440] dump_stack+0x1c9/0x2b4 [ 114.623081] ? dump_stack_print_info.cold.2+0x52/0x52 [ 114.628279] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 114.633306] ? bpf_prog_kallsyms_find+0xde/0x4c0 [ 114.638095] should_fail.cold.4+0xa/0x11 [ 114.642157] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 114.647246] ? lock_release+0xa30/0xa30 [ 114.651203] ? kasan_check_read+0x11/0x20 [ 114.655336] ? rcu_is_watching+0x8c/0x150 [ 114.659469] ? is_bpf_text_address+0xd7/0x170 [ 114.663948] ? kernel_text_address+0x79/0xf0 [ 114.668340] ? __kernel_text_address+0xd/0x40 [ 114.672818] ? lock_acquire+0x1e4/0x540 [ 114.676776] ? fs_reclaim_acquire+0x20/0x20 [ 114.681085] ? lock_downgrade+0x8f0/0x8f0 [ 114.685220] ? check_same_owner+0x340/0x340 [ 114.689521] ? save_stack+0xa9/0xd0 [ 114.693133] ? rcu_note_context_switch+0x730/0x730 [ 114.698048] ? kmem_cache_alloc_trace+0x152/0x780 [ 114.702870] ? copy_mount_options+0x5f/0x380 [ 114.707260] __should_failslab+0x124/0x180 [ 114.711507] should_failslab+0x9/0x14 [ 114.715314] kmem_cache_alloc+0x2af/0x760 [ 114.719550] ? lock_acquire+0x1e4/0x540 [ 114.723512] getname_flags+0xd0/0x5a0 [ 114.727300] user_path_at_empty+0x2d/0x50 [ 114.731431] do_mount+0x180/0x1fb0 [ 114.734958] ? kasan_check_write+0x14/0x20 [ 114.739186] ? copy_mount_string+0x40/0x40 [ 114.743417] ? kasan_kmalloc+0xc4/0xe0 [ 114.747304] ? kmem_cache_alloc_trace+0x318/0x780 [ 114.752155] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 114.757676] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 114.763206] ? copy_mount_options+0x285/0x380 [ 114.767682] ksys_mount+0x12d/0x140 [ 114.771304] __x64_sys_mount+0xbe/0x150 [ 114.775262] do_syscall_64+0x1b9/0x820 [ 114.779130] ? finish_task_switch+0x1d3/0x870 [ 114.783606] ? syscall_return_slowpath+0x5e0/0x5e0 [ 114.788522] ? syscall_return_slowpath+0x31d/0x5e0 [ 114.793444] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 114.798457] ? prepare_exit_to_usermode+0x291/0x3b0 [ 114.803464] ? perf_trace_sys_enter+0xb10/0xb10 [ 114.808123] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 114.812972] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 114.818144] RIP: 0033:0x455e29 09:30:20 executing program 6: r0 = socket$inet6(0xa, 0x3000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) symlinkat(&(0x7f0000000200)='./file0\x00', r2, &(0x7f0000000240)='./file0\x00') sendto$inet6(r0, &(0x7f0000000040)="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", 0x193, 0x4840, &(0x7f00000002c0)={0xa, 0x4e20, 0x5, @loopback={0x0, 0x1}}, 0x1c) dup2(r1, r2) 09:30:20 executing program 5: syz_emit_ethernet(0x6, &(0x7f00000001c0)=ANY=[@ANYRESDEC, @ANYRES64, @ANYRES64, @ANYRES16, @ANYRESHEX, @ANYRES32], 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) write$P9_RLERROR(r0, &(0x7f0000000000)={0x9, 0x7, 0x2}, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') 09:30:20 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x7, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) ioctl(r0, 0x8, &(0x7f0000000040)) 09:30:20 executing program 4: openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x204000, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000180)="5b306feff783540b06f36db47536c8ee555aa6899742b52d2eb1b40858c6741381b1994865652081c980846fd77d9f6f60627806484533890d6359b33df3ec1912602ce62a0a2bdb263661e2b8800e56d293b01cffec73bfa33b63de19cc08c39cf3b0444d053a30794c6ac91d11b4c45106ec1739a2f267e828cbc88e17dc4c3af7da74e1894513d57620777fa9c2d0200bdc88ace77d45a62c419b985b0a254bedfd486452b8579d403b669a464e99101c26002fc12c06163e89d9e4b989f4ededb2ec0e2e97afdd9fd945bf7685e71c3982f3e0b2baaa1771d3c24fab80143451cb43e819e565693a400921dc5784feb688ee563564b553f334cab8d6857b") r1 = creat(&(0x7f0000001380)='./file0\x00', 0x0) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYRES64=r0], 0xd382bceca5135cfa) ioctl$fiemap(r0, 0x40086602, &(0x7f00000003c0)=ANY=[@ANYRES64=r0]) write$cgroup_type(r1, &(0x7f0000000140)='threaded\x00', 0xfffffffffffffe89) truncate(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000080)=0xdc) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000000)) ioctl$KVM_SET_GUEST_DEBUG(r1, 0x4048ae9b, &(0x7f00000002c0)={0x30000, 0x0, [0xfd38, 0x401, 0xe608, 0x4, 0xd4, 0x9, 0x9, 0x8]}) ioctl$VHOST_GET_VRING_ENDIAN(r1, 0x4008af14, &(0x7f00000000c0)={0x3, 0x2}) 09:30:20 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) [ 114.821312] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 114.840452] RSP: 002b:00007f94111afc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 114.848149] RAX: ffffffffffffffda RBX: 00007f94111b06d4 RCX: 0000000000455e29 [ 114.855405] RDX: 0000000020000140 RSI: 0000000020000040 RDI: 0000000020000000 [ 114.862658] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 [ 114.869914] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 114.877163] R13: 00000000004c248a R14: 00000000004d0058 R15: 0000000000000004 [ 114.911096] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 09:30:20 executing program 5: r0 = socket$inet6(0xa, 0x20002000000805, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x30, &(0x7f0000000880)=ANY=[], 0x0) r3 = shmget(0x2, 0x1000, 0x4, &(0x7f0000013000/0x1000)=nil) shmctl$SHM_LOCK(r3, 0xb) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x89a1, &(0x7f0000000040)={@mcast1={0xff, 0x1, [], 0x1}}) close(r2) close(r1) 09:30:20 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000001c0)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @random="1ec05a3b7661"}, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 'lo\x00'}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x4, 0x0, 0x4, 0x8, 0x100}) 09:30:20 executing program 7 (fault-call:1 fault-nth:5): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, &(0x7f00000001c0)={[{@gid={'gid', 0x3d}, 0x2c}]}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, &(0x7f00000001c0)) 09:30:20 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) 09:30:20 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-twofish-3way\x00'}, 0x3b) r1 = dup(r0) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f0000000240)) 09:30:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(aegis128)\x00'}, 0x58) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000003000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(r1, 0xc08c5102, &(0x7f0000a07fff)) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) 09:30:20 executing program 3: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r2, 0x7, &(0x7f0000002000)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) getresgid(&(0x7f0000000140), &(0x7f0000000180)=0x0, &(0x7f00000001c0)) setgid(r3) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$sock_inet_SIOCGARP(r4, 0x8954, &(0x7f0000000080)={{0x2, 0x4e23, @multicast2=0xe0000002}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14, {0x2, 0x4e22}, 'veth0_to_bond\x00'}) fcntl$getown(r1, 0x9) 09:30:20 executing program 6: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x3}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000013a1f010500e9ffaea36c9c000a000000"], 0x1}, 0x1}, 0x0) fadvise64(r0, 0x28, 0x3, 0x7) r1 = open(&(0x7f0000000000)='./file0\x00', 0x48400, 0x10) accept$inet6(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, @ipv4={[], [], @multicast1}}, &(0x7f0000000180)=0x1c) getresgid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) syz_open_dev$dspn(&(0x7f00000002c0)='/dev/dsp#\x00', 0x5, 0x10000) readv(r0, &(0x7f00000014c0)=[{&(0x7f0000001400)=""/131, 0x83}], 0x1) 09:30:20 executing program 2: recvmsg(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000000)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000001680)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/90, 0x5a}, {&(0x7f0000001100)=""/224, 0xe0}, {&(0x7f0000001200)=""/131, 0x83}, {&(0x7f00000012c0)=""/173, 0xad}, {&(0x7f0000001380)=""/140, 0x8c}, {&(0x7f0000001440)=""/23, 0x17}, {&(0x7f0000001480)=""/184, 0xb8}, {&(0x7f0000001540)=""/232, 0xe8}, {&(0x7f0000001640)=""/9, 0x9}], 0xa, &(0x7f0000001740)=""/49, 0x31}, 0x40000000) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000017c0), &(0x7f0000001800)=0x4) r1 = socket(0x40000000015, 0x5, 0x0) setsockopt(r1, 0x114, 0x6, &(0x7f0000000040), 0x0) 09:30:20 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) syz_mount_image$ceph(&(0x7f00000000c0)='ceph\x00', &(0x7f0000000100)='./file0\x00', 0x100000000, 0x4, &(0x7f0000001300)=[{&(0x7f0000000140)="44b72a621f901f7bf7e0b8bc25415594f39e5d3a4c1c5cc8c6993b2050aea6133e373d", 0x23, 0xf61}, {&(0x7f0000000180)="31b46d1219168162d760a173a8cd6987b4fc81d200f89dde9cba652d221769a5f79f962ade39cc57df053a9b1ecc23bbc85a5f20e6ddd14dbbe7407611960dc67d20b7ace73c9b447659c4fed95fa476ecccc31691730266e2bf0cef46e6ac96c302d7b6e5134e39bb5c957cd086f809b06a2f94bee02893bf0df08b38de5542de42eb116e0f12d4f9d02deff5d2f653e8adec9868dd7590b70f29a7333611bbae253da124d0014cb4a04b23931d049c97cceb0f12", 0xb5, 0x6}, {&(0x7f0000000240)="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", 0x1000, 0x100}, {&(0x7f0000001240)="c7980f3722918a252461c838380fdf3e428fccb8087287c263b6c12e1dc9afd63526c2b7c089cb0e5dbb6eb534eeeacd21cfa529d0823bcbce2818ee597673ffdffdfc9717c3c27cb55e20fd1c847a857f2220be7baf76a3dd78babe3fab08757c9734fa87585bc4d51921a5e34de282cf91fb73cff50be134f95f8c84181b2d4df336ac2e0edda96fad3f5d14e25656cc552d1a96ea3b49070e43e651fd146a4f0dc5293ba5bac32e00f7f5906dfc185016ef8522c7091718705d13f604cd", 0xbf, 0x10000}], 0xc000, &(0x7f0000001380)='/dev/admmidi#\x00') r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x100000001, 0xa00) ioctl$KDGKBMODE(r1, 0x4b44, &(0x7f0000000080)) setsockopt$inet6_int(r1, 0x29, 0xcf, &(0x7f000004c000)=0x27, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}}, 0x1c) 09:30:20 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x200000002, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x26) getsockname$inet(r2, &(0x7f0000000000)={0x0, 0x0, @rand_addr}, &(0x7f0000000100)=0x2a9) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000140)={0x0, 0x78, "122590a8149a4041962f9edc853ee804c053abac821ca89be9942e4be3ac3b76949d8ae842adb7a2e72c117f27721593c88df1b452595349f2f5aeed7239f61cae8ede1a08116a687b0369a60bc3de4b96898f8bc42d48bd4f093e71a85cce58627622a838f00b5d8e1d349ded97e5b9d4e741fc602462e6"}, &(0x7f0000000040)=0x80) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000000c0)={r3, 0x2}, &(0x7f00000001c0)=0x8) 09:30:20 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) 09:30:20 executing program 1: r0 = socket$inet6(0xa, 0x5, 0xffffffffffffffa1) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @loopback={0x100000000000000, 0x1}}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x5c) [ 115.098152] ISOFS: Unable to identify CD-ROM format. [ 115.147162] FAULT_INJECTION: forcing a failure. [ 115.147162] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 115.159021] CPU: 0 PID: 7935 Comm: syz-executor7 Not tainted 4.18.0-rc4-next-20180712+ #5 [ 115.167341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 115.176697] Call Trace: [ 115.179295] dump_stack+0x1c9/0x2b4 [ 115.182942] ? dump_stack_print_info.cold.2+0x52/0x52 [ 115.188142] ? trace_hardirqs_on+0x10/0x10 [ 115.192382] ? lock_acquire+0x1e4/0x540 [ 115.196354] should_fail.cold.4+0xa/0x11 [ 115.200433] ? lock_release+0xa30/0xa30 [ 115.204403] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 115.209498] ? trace_hardirqs_on+0x10/0x10 [ 115.213721] ? trace_hardirqs_on+0x10/0x10 [ 115.217940] ? mnt_get_count+0x150/0x150 [ 115.221983] ? dput.part.26+0x276/0x7a0 [ 115.225946] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 115.230949] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 115.236470] ? should_fail+0x246/0xd86 [ 115.240352] ? is_bpf_text_address+0xae/0x170 [ 115.244833] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 115.249932] __alloc_pages_nodemask+0x36e/0xdb0 [ 115.254585] ? kasan_check_read+0x11/0x20 [ 115.258718] ? rcu_is_watching+0x8c/0x150 [ 115.262850] ? __alloc_pages_slowpath+0x2d00/0x2d00 [ 115.267855] ? is_bpf_text_address+0xd7/0x170 [ 115.272335] ? kernel_text_address+0x79/0xf0 [ 115.276727] ? __kernel_text_address+0xd/0x40 [ 115.281208] ? lock_acquire+0x1e4/0x540 [ 115.285166] ? fs_reclaim_acquire+0x20/0x20 [ 115.289493] ? lock_downgrade+0x8f0/0x8f0 [ 115.293625] ? lock_release+0xa30/0xa30 [ 115.297599] ? check_same_owner+0x340/0x340 [ 115.301906] ? save_stack+0xa9/0xd0 [ 115.305518] cache_grow_begin+0x91/0x710 [ 115.309565] kmem_cache_alloc+0x689/0x760 [ 115.313713] getname_flags+0xd0/0x5a0 [ 115.317510] user_path_at_empty+0x2d/0x50 [ 115.321642] do_mount+0x180/0x1fb0 [ 115.325167] ? kasan_check_write+0x14/0x20 [ 115.329389] ? copy_mount_string+0x40/0x40 [ 115.333610] ? retint_kernel+0x10/0x10 [ 115.337486] ? copy_mount_options+0x213/0x380 [ 115.341968] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 115.347491] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 115.353014] ? copy_mount_options+0x285/0x380 [ 115.357497] ksys_mount+0x12d/0x140 [ 115.361110] __x64_sys_mount+0xbe/0x150 [ 115.365070] do_syscall_64+0x1b9/0x820 [ 115.368938] ? finish_task_switch+0x1d3/0x870 [ 115.373420] ? syscall_return_slowpath+0x5e0/0x5e0 [ 115.378431] ? syscall_return_slowpath+0x31d/0x5e0 [ 115.383344] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 115.388346] ? prepare_exit_to_usermode+0x291/0x3b0 [ 115.393349] ? perf_trace_sys_enter+0xb10/0xb10 [ 115.398002] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 115.402844] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 115.408017] RIP: 0033:0x455e29 [ 115.411187] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 115.430367] RSP: 002b:00007f94111afc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 115.438059] RAX: ffffffffffffffda RBX: 00007f94111b06d4 RCX: 0000000000455e29 09:30:20 executing program 2: r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) setsockopt$sock_cred(r0, 0x1, 0x2d, &(0x7f00000001c0), 0xc) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000040)) 09:30:20 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x5d, &(0x7f0000000580), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[&(0x7f0000000180)='rxrpc\x00'], &(0x7f0000000480)=[&(0x7f0000000240)='md5sum\x00', &(0x7f00000002c0)='team0\x00', &(0x7f0000000300)='/dev/kvm\x00', &(0x7f0000000340)='-*\x00', &(0x7f0000000380)='[eth1em0{{]securityvmnet0\x00', &(0x7f00000003c0)='cgroup/)keyringvmnet1cgroupprocGPL\x00', &(0x7f0000000400)='/dev/kvm\x00', &(0x7f0000000440)='rxrpc\x00']) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000017000/0x18000)=nil, &(0x7f0000000140)=[@text16={0x10, &(0x7f0000000100)="66b8008000000f23d80f21f86635800000400f23f8f0f75b00d14be7679464f080056c0f01cf1af4dea927890f20c06635000001000f22c02e0fc75b0f", 0x3d}], 0x1, 0x0, &(0x7f0000000180), 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000080)='team0\x00', 0xfffffffffffffffd) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 115.445322] RDX: 0000000020000140 RSI: 0000000020000040 RDI: 0000000020000000 [ 115.452584] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 [ 115.459834] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 115.467086] R13: 00000000004c248a R14: 00000000004d0058 R15: 0000000000000005 09:30:20 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c4600020000010000000000000003000300010000001f020000000000004000000000000000000300000000000095000000020038000100ffff04000800020000000500000064b000000000000002000000000000000200000000000000f5d000000000000004000000000000000800000000000000d041f52b8d1752275bc35414d75cde65ff49179375a0e45ad489b895ed32a8429a2a981d1540689f41a37d0000918125355e4a94800ac83b00ea9398716001360e2835c6eb2149539fbd1671ba5c3f22ce060f8241427048a3b2f1faafdfb9e2fd77c5323ff586314fad76072baff2b5a25d82d4ff86174f9edd0eb9b42c98732c46b1d6eaa2bd6d392d3066a9a06cd63b7ee9f89aa3fd822b52b3d8d0d157e31f8bc045e6cfc0ef551eb75cb65417c31944020100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000c80)) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000380)=""/147) r3 = syz_open_pts(0xffffffffffffffff, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f00000001c0), &(0x7f0000000d00)=0x6) ioctl$TCSETS(r3, 0x5402, &(0x7f00000000c0)) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f0000000200)=""/248, 0xf8) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) [ 115.495853] ceph: device name is missing path (no : separator in /dev/loop4) 09:30:21 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="668378"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x0, &(0x7f0000000000), 0x1000000000000040) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:30:21 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) setns(0xffffffffffffffff, 0x0) 09:30:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) utime(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0xffff}) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(rmd320-generic)\x00'}, 0x58) accept(r0, &(0x7f0000000200)=@ethernet={0x0, @remote}, &(0x7f00000002c0)=0x80) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000380)="000000000000000000200017d4edb818d1326c3b28ec092dddcabde168e80db8ed46ffff104cab9267f2e3d0df7a479e869afa6158c1c340000000000000000016c7feefa16a307b7e9b82e9aa64571c5c3f32d506b7ccc15457406cd623e89165e7f5efbdfb5dc303a3c908b960aac347b9dd47b9ca90a1c323a582ad9a9cc8413301", 0xfffffebe) getsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) utime(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x5, 0x6}) 09:30:21 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x3) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f0000000080)) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) sendfile(r1, r0, &(0x7f0000000000), 0x80000000000004) 09:30:21 executing program 7 (fault-call:1 fault-nth:6): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, &(0x7f00000001c0)={[{@gid={'gid', 0x3d}, 0x2c}]}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, &(0x7f00000001c0)) 09:30:21 executing program 3: r0 = socket$inet6(0xa, 0x1001000000000001, 0x2) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x402, 0x0) write$sndseq(r1, &(0x7f0000000340)=[{0x8, 0x0, 0x0, 0x0, @time, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {0x81, 0x4}, {}, @raw32}, {0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @time=@time}], 0x90) 09:30:21 executing program 6: bpf$MAP_CREATE(0x12, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x13) r0 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) 09:30:21 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) setns(0xffffffffffffffff, 0x0) [ 115.962778] ISOFS: Unable to identify CD-ROM format. [ 115.999541] FAULT_INJECTION: forcing a failure. [ 115.999541] name failslab, interval 1, probability 0, space 0, times 0 [ 116.010845] CPU: 1 PID: 8018 Comm: syz-executor7 Not tainted 4.18.0-rc4-next-20180712+ #5 [ 116.019169] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 116.028526] Call Trace: [ 116.031122] dump_stack+0x1c9/0x2b4 [ 116.034761] ? dump_stack_print_info.cold.2+0x52/0x52 [ 116.039965] ? kernel_text_address+0x79/0xf0 [ 116.044389] should_fail.cold.4+0xa/0x11 09:30:21 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x10001, 0x1100082) rt_sigsuspend(&(0x7f00000000c0), 0x8) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x2) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x3, 0x182c0) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000080)=0x4802, 0x4) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000140)={0x14, 0x2, 0x7}) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000000)=0xffffffff80000001) sendfile(r0, r0, &(0x7f0000000240), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) 09:30:21 executing program 4: r0 = socket$inet(0x2, 0x4000000000000003, 0x7) sendto$inet(r0, &(0x7f000061af66), 0x121, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000080)={r1, 0x525ec5a3}, &(0x7f00000000c0)=0x8) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x10c00, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000180)="42a4f1b994b9c8034a1286f0a4d1411d", 0x10) openat$cgroup_ro(r2, &(0x7f0000000140)='cpu.stat\x00', 0x0, 0x0) [ 116.048463] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 116.053578] ? save_stack+0xa9/0xd0 [ 116.057212] ? save_stack+0x43/0xd0 [ 116.060846] ? kmem_cache_alloc_trace+0x152/0x780 [ 116.066123] ? vfs_new_fs_context+0x5a/0x700 [ 116.070534] ? do_mount+0x5cf/0x1fb0 [ 116.074257] ? ksys_mount+0x12d/0x140 [ 116.078071] ? __x64_sys_mount+0xbe/0x150 [ 116.082225] ? do_syscall_64+0x1b9/0x820 [ 116.086292] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 116.091662] ? trace_hardirqs_off+0xd/0x10 [ 116.095898] ? quarantine_put+0x10d/0x1b0 09:30:21 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) setns(0xffffffffffffffff, 0x0) 09:30:21 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f0000fc4ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) ioctl(r0, 0x7f, &(0x7f0000000080)="71b06b65f2440d5f78eab3ab2dd094183a2d45e4c63e357ebfabdb477152a501c179479be39cfa08b892b484f2b4b797caf2ab2e58d49e1614c9b44ded8072e5867775f2b260fb0bfa570c1a33324215126497523d6918dbbdab2cf59eb29b0d3f1554529f6c96f67689a193d7f7cbbc4216e184ce303a27223579057aa8d143465128464270c1344c0a8b6b67de598792d8debc0d0c9c1ab85e52fc192bbe7bd23d788e6e9320571f899e911abf8289c079e3e6cda04c1edd2a7f95d1fb056ac4") perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x2b, &(0x7f0000000040)="40dc64894576ad687ac1aee00017fdd2c637cf22c78b11a1eff8f9", 0x1b) connect$inet(r0, &(0x7f0000000300)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendmsg$alg(r0, &(0x7f0000159fc8)={0x0, 0x0, &(0x7f0000fc8000), 0x0, &(0x7f0000000e8e)}, 0x0) 09:30:21 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket(0x10, 0x3, 0x0) readv(r0, &(0x7f0000000540)=[{&(0x7f0000000180)=""/128, 0x80}, {&(0x7f0000000340)=""/214, 0xd6}, {&(0x7f0000000080)=""/9, 0x9}, {&(0x7f0000000440)=""/253, 0xfd}, {&(0x7f0000000640)=""/220, 0xdc}], 0x5) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_getroute={0x1c, 0x1a, 0x201, 0x0, 0x0, {0xa}}, 0x1c}, 0x1}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b}]}, 0x28}, 0x1}, 0x0) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000002c0)=@nl=@proc, 0x80, &(0x7f0000000580), 0x0, &(0x7f00000005c0)=""/47, 0x2f}, 0x0) [ 116.100053] ? lock_acquire+0x1e4/0x540 [ 116.104033] ? fs_reclaim_acquire+0x20/0x20 [ 116.108362] ? lock_downgrade+0x8f0/0x8f0 [ 116.112519] ? check_same_owner+0x340/0x340 [ 116.116845] ? debug_mutex_init+0x2d/0x60 [ 116.120995] ? rcu_note_context_switch+0x730/0x730 [ 116.125927] __should_failslab+0x124/0x180 [ 116.130170] should_failslab+0x9/0x14 [ 116.133974] kmem_cache_alloc_trace+0x2cb/0x780 [ 116.138656] proc_init_fs_context+0x49/0x130 [ 116.143070] ? proc_fill_super+0x630/0x630 [ 116.147314] vfs_new_fs_context+0x2ba/0x700 [ 116.151642] do_mount+0x5cf/0x1fb0 [ 116.155184] ? check_same_owner+0x340/0x340 [ 116.159528] ? lock_release+0xa30/0xa30 [ 116.163525] ? copy_mount_string+0x40/0x40 [ 116.167763] ? kasan_kmalloc+0xc4/0xe0 [ 116.171647] ? kmem_cache_alloc_trace+0x318/0x780 [ 116.176512] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 116.182040] ? _copy_from_user+0xdf/0x150 [ 116.186183] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 116.191711] ? copy_mount_options+0x285/0x380 [ 116.196197] ksys_mount+0x12d/0x140 [ 116.199814] __x64_sys_mount+0xbe/0x150 [ 116.203776] do_syscall_64+0x1b9/0x820 [ 116.207649] ? finish_task_switch+0x1d3/0x870 [ 116.212132] ? syscall_return_slowpath+0x5e0/0x5e0 [ 116.217049] ? syscall_return_slowpath+0x31d/0x5e0 [ 116.221967] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 116.226982] ? prepare_exit_to_usermode+0x291/0x3b0 [ 116.231995] ? perf_trace_sys_enter+0xb10/0xb10 [ 116.236654] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 116.241495] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 116.246680] RIP: 0033:0x455e29 [ 116.249858] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 116.269145] RSP: 002b:00007f94111afc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 116.276840] RAX: ffffffffffffffda RBX: 00007f94111b06d4 RCX: 0000000000455e29 [ 116.284097] RDX: 0000000020000140 RSI: 0000000020000040 RDI: 0000000020000000 [ 116.291352] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 09:30:21 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) [ 116.298692] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 116.305956] R13: 00000000004c248a R14: 00000000004d0058 R15: 0000000000000006 09:30:21 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x6, 0x80400) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f00000000c0)={0x81, 0x0, [0x100000001, 0x0, 0x200]}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setopts(0x4201, r1, 0x0, 0x709000) 09:30:21 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f00000005c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000002, 0x82812, 0xffffffffffffff9c, 0x100020000) write$binfmt_elf32(r0, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 09:30:21 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) 09:30:21 executing program 7 (fault-call:1 fault-nth:7): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, &(0x7f00000001c0)={[{@gid={'gid', 0x3d}, 0x2c}]}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, &(0x7f00000001c0)) 09:30:21 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000c80)) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000380)=""/147) r3 = syz_open_pts(0xffffffffffffffff, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f00000001c0), &(0x7f0000000d00)=0x6) ioctl$TCSETS(r3, 0x5402, &(0x7f00000000c0)) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f0000000200)=""/248, 0xf8) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) 09:30:21 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, &(0x7f0000000000)) r1 = getpid() ioprio_get$pid(0x3, r1) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)=""/193, &(0x7f0000000280)=""/97, &(0x7f0000000300)=""/127}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000700)=ANY=[]) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000780)={0x1, 0x0, &(0x7f0000000380)=""/115, &(0x7f00000007c0)=""/156, &(0x7f0000000940)=""/185}) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) write$tun(r2, &(0x7f0000000400)={@void, @val={0x3, 0x3, 0x7, 0x3, 0x3, 0x1}, @ipx={0xffff, 0x10d, 0x47, 0x15, {@broadcast=0xffffffff, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0xffff}, {@current, @random="c7ee590cb577", 0x2}, "ab32e080d77f6064f567b2bc0f2d2544c82d8fc4aa6ccd89c6092010dbc2ee484dc99913fd159b8869db87bb156dfdfd77ce22b69fd9bf94f6ee1cbf7065342020b2ff004f3fd5acbbea102fedaac6f125c6f589116a24adc1b08fd9115be85cd1e192f697f0795f7dfeb7d6dd30f7212bb3c5603f273e4ebd5efc3e1f6742b7a13109cb87062a52c38bf342c9f7061ddd65e35e77c133e81e18b72cf7e9bef7fc35ed42e724212bf61419526fc5ef7ea68dd1f9d9ecb9f9b095dd882f834d9eff6e5d255243255d3695fa9ff9e1e77b646a829e1fa37d20273584902bca91c1378e14483bf655a667ba4c041b781e"}}, 0x117) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000006c0)=0x1) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af13, &(0x7f0000000080)) 09:30:21 executing program 1: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp\x00', 0x0, 0x0) ioctl$TUNSETLINK(r2, 0x400454cd, 0x324) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r1) r4 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x4000) setsockopt$inet_sctp6_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f0000000040)=0x5, 0x4) socket$l2tp(0x18, 0x1, 0x1) memfd_create(&(0x7f0000000080)='[%,keyring\x00', 0x1) 09:30:21 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) 09:30:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'lo\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="b7a0feb934cecac35a5383ff56246c4e435880308149acb145c30c3f61511788c26601d5c04328ec38a0b9bbf12d3e7dc5ad6f87387208d43a9442d34b0a"]}) modify_ldt$read_default(0x2, &(0x7f0000000040)=""/148, 0x94) [ 116.541792] FAULT_INJECTION: forcing a failure. [ 116.541792] name failslab, interval 1, probability 0, space 0, times 0 [ 116.553087] CPU: 0 PID: 8087 Comm: syz-executor7 Not tainted 4.18.0-rc4-next-20180712+ #5 [ 116.561404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 116.570755] Call Trace: [ 116.573342] dump_stack+0x1c9/0x2b4 [ 116.576955] ? dump_stack_print_info.cold.2+0x52/0x52 [ 116.582133] should_fail.cold.4+0xa/0x11 [ 116.586197] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 116.591286] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 116.596285] ? bpf_prog_kallsyms_find+0xde/0x4c0 [ 116.601034] ? lock_acquire+0x1e4/0x540 [ 116.604991] ? is_bpf_text_address+0xae/0x170 [ 116.609469] ? lock_downgrade+0x8f0/0x8f0 [ 116.613614] ? lock_release+0xa30/0xa30 [ 116.617573] ? lock_acquire+0x1e4/0x540 [ 116.621531] ? fs_reclaim_acquire+0x20/0x20 [ 116.625837] ? lock_downgrade+0x8f0/0x8f0 [ 116.629970] ? check_same_owner+0x340/0x340 [ 116.634278] ? rcu_note_context_switch+0x730/0x730 [ 116.639207] __should_failslab+0x124/0x180 [ 116.643429] should_failslab+0x9/0x14 [ 116.647215] __kmalloc+0x2c8/0x760 [ 116.650760] ? match_number.isra.0+0xbf/0x280 [ 116.655241] match_number.isra.0+0xbf/0x280 [ 116.659651] ? match_strdup+0xa0/0xa0 [ 116.663448] ? match_wildcard+0x3c0/0x3c0 [ 116.667582] ? trace_hardirqs_off+0xd/0x10 [ 116.671932] match_int+0x23/0x30 [ 116.675284] proc_parse_option+0x11e/0x280 [ 116.679516] ? proc_get_tree+0xb0/0xb0 [ 116.683515] ? match_wildcard+0x3c0/0x3c0 [ 116.687663] ? lock_release+0xa30/0xa30 [ 116.691622] ? proc_get_tree+0xb0/0xb0 [ 116.695506] vfs_parse_fs_option+0x2a1/0x320 [ 116.699909] ? logfc+0x810/0x810 [ 116.703260] ? kasan_kmalloc+0xc4/0xe0 [ 116.707135] ? __kmalloc_track_caller+0x311/0x760 [ 116.711977] generic_parse_monolithic+0x14e/0x180 [ 116.716814] ? vfs_parse_fs_option+0x320/0x320 [ 116.721382] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 116.726902] ? vfs_parse_fs_option+0x320/0x320 [ 116.731477] do_mount+0x69e/0x1fb0 [ 116.735001] ? check_same_owner+0x340/0x340 [ 116.739308] ? lock_release+0xa30/0xa30 [ 116.743267] ? copy_mount_string+0x40/0x40 [ 116.747487] ? kasan_kmalloc+0xc4/0xe0 [ 116.751358] ? kmem_cache_alloc_trace+0x318/0x780 [ 116.756187] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 116.761715] ? _copy_from_user+0xdf/0x150 [ 116.765849] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 116.771368] ? copy_mount_options+0x285/0x380 [ 116.775847] ksys_mount+0x12d/0x140 [ 116.779456] __x64_sys_mount+0xbe/0x150 [ 116.783414] do_syscall_64+0x1b9/0x820 [ 116.787285] ? syscall_return_slowpath+0x5e0/0x5e0 [ 116.792196] ? syscall_return_slowpath+0x31d/0x5e0 [ 116.797109] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 116.802111] ? prepare_exit_to_usermode+0x291/0x3b0 [ 116.807110] ? perf_trace_sys_enter+0xb10/0xb10 [ 116.811762] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 116.816590] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 116.821758] RIP: 0033:0x455e29 09:30:21 executing program 0: capset(&(0x7f0000000280), &(0x7f0000000040)) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) [ 116.824926] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 116.844095] RSP: 002b:00007f94111afc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 116.851796] RAX: ffffffffffffffda RBX: 00007f94111b06d4 RCX: 0000000000455e29 [ 116.859060] RDX: 0000000020000140 RSI: 0000000020000040 RDI: 0000000020000000 [ 116.866324] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 [ 116.873576] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 116.880840] R13: 00000000004c248a R14: 00000000004d0058 R15: 0000000000000007 [ 117.154872] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 117.274793] print_req_error: I/O error, dev loop7, sector 40 [ 117.292487] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:30:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000100)=0xb0712f51, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d564c90c6000000000000000000000000", 0x18) sendmsg$nl_route_sched(r1, &(0x7f0000000680)={&(0x7f0000000380)={0x10}, 0xc, &(0x7f0000000640)={&(0x7f0000000400)=ANY=[@ANYBLOB='$\x00\x00\x00(\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="000000000000000004000000"], 0x24}, 0x1}, 0x0) recvmmsg(r1, &(0x7f00000061c0)=[{{&(0x7f0000004b00)=@rc, 0x80, &(0x7f00000060c0)=[{&(0x7f0000005fc0)=""/202, 0xca}], 0x1, &(0x7f0000006100)=""/138, 0x8a}}], 0x1, 0x0, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x4000) getdents64(r2, &(0x7f0000000040)=""/61, 0x3d) 09:30:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x1, 0x8}, 0x8) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(arc4-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001640)='9', 0x1) r1 = accept$alg(r0, 0x0, 0x0) readv(r1, &(0x7f00000003c0)=[{&(0x7f00000002c0)=""/250, 0xfa}], 0x1) 09:30:22 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000100)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000040)=0xd3) vmsplice(r1, &(0x7f00004e8000)=[{&(0x7f0000004980)=';', 0x1}], 0x1, 0x0) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000080)=0x7fffffff, &(0x7f00000000c0)=0x4) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, &(0x7f00000001c0), 0x20, 0x2) 09:30:22 executing program 0: capset(&(0x7f0000000280), &(0x7f0000000040)) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) 09:30:22 executing program 7 (fault-call:1 fault-nth:8): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, &(0x7f00000001c0)={[{@gid={'gid', 0x3d}, 0x2c}]}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, &(0x7f00000001c0)) 09:30:22 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000c80)) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000380)=""/147) r3 = syz_open_pts(0xffffffffffffffff, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f00000001c0), &(0x7f0000000d00)=0x6) ioctl$TCSETS(r3, 0x5402, &(0x7f00000000c0)) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f0000000200)=""/248, 0xf8) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) 09:30:22 executing program 6: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) write(r1, &(0x7f0000000340)="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", 0x1000) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) write$sndseq(r2, &(0x7f0000011fd2), 0xffffffee) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000100)={0x2, 0x294, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xfffffffffffffffe}}}, 0x30) write$binfmt_misc(r2, &(0x7f0000000300)=ANY=[@ANYBLOB='<'], 0x1) dup2(r0, r1) 09:30:22 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x6, &(0x7f0000000180)="024b0d0a40d24a228f762070585004d25c0e2604929981917e2f27ac5023d7e4a3796bcc7cf97c9492b3b630b29bcdfd81cb64cd1860c0512bdf6fb4db1b7deb0bb84590") ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x40096101, &(0x7f0000000040)) r1 = geteuid() setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f00000003c0)={0x5}, 0x4) socketpair(0x1, 0x805, 0x6, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000400)={'bri\b\x00', 0x0}) sendmsg$can_bcm(r2, &(0x7f0000000380)={&(0x7f0000000280)={0x1d, r4}, 0x10, &(0x7f0000000340)={&(0x7f00000002c0)={0x7, 0x80, 0x4, {0x77359400}, {}, {0x2, 0x1000, 0x6, 0x1}, 0x1, @canfd={{0x2, 0x1, 0x400, 0x9}, 0x1a, 0x1, 0x0, 0x0, "3a85c2d0f4c8f54f2bd244301bb2e5c69a27cabe7f310d3de1116b17326c786c74af99db1dd81d8b067e7ede4d5d0a9071399fee474f6806bb39d7e412a8b9d8"}}, 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x4000080) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@local={0xfe, 0x80, [], 0xaa}, @in6=@loopback={0x0, 0x1}, 0x4e20, 0x0, 0x4e20, 0x1, 0xa, 0x20, 0xa0, 0x33, 0x0, r1}, {0x6, 0x2, 0x7, 0x80000000, 0x1, 0x0, 0x1, 0x3}, {0x9, 0x80, 0x2, 0x5}, 0x5857, 0x6e6bbb, 0x0, 0x0, 0x2, 0x3}, {{@in=@rand_addr=0x9, 0x4d4, 0x3b}, 0xa, @in=@multicast1=0xe0000001, 0x34ff, 0x0, 0x3, 0x7, 0x401, 0x401}}, 0xe8) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000200)) [ 117.425553] ISOFS: Unable to identify CD-ROM format. 09:30:22 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = memfd_create(&(0x7f0000000240)='+trustedtrusted\x00', 0x3) setsockopt$inet_udp_int(r1, 0x11, 0x6f, &(0x7f0000000280)=0x10000, 0x4) ioctl(r0, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bind$alg(r2, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'tgr160\x00'}, 0x58) socket$kcm(0xa, 0x1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x12, 0xc, 0x4, 0x962}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r3, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r3, &(0x7f00000001c0)="ed", &(0x7f0000000080)=""/164}, 0x18) 09:30:22 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1000, 0x0) r1 = semget(0x2, 0x3, 0x101) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000040)=""/23) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000000), 0xc) 09:30:22 executing program 0: capset(&(0x7f0000000280), &(0x7f0000000040)) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) [ 117.466639] FAULT_INJECTION: forcing a failure. [ 117.466639] name failslab, interval 1, probability 0, space 0, times 0 [ 117.478099] CPU: 1 PID: 8126 Comm: syz-executor7 Not tainted 4.18.0-rc4-next-20180712+ #5 [ 117.486423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 117.495788] Call Trace: [ 117.498389] dump_stack+0x1c9/0x2b4 [ 117.502026] ? dump_stack_print_info.cold.2+0x52/0x52 [ 117.507230] ? __kernel_text_address+0xd/0x40 [ 117.511750] should_fail.cold.4+0xa/0x11 09:30:22 executing program 5: r0 = socket$inet6(0xa, 0x1000000000003, 0x7) ioctl(r0, 0x8912, &(0x7f0000000080)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = creat(&(0x7f00000000c0)='./file0/file0\x00', 0x0) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000100)=""/161) fallocate(r1, 0x1, 0x800000, 0x8) creat(&(0x7f0000000340)='./file0/file0\x00', 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0/file0\x00', r1}, 0x10) 09:30:22 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x373, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffffffffffe, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xe, 0xffffffffffffffff, 0xfffffffffffffffc) r0 = syz_open_procfs(0x0, &(0x7f0000000240)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$FS_IOC_FSGETXATTR(r0, 0x6609, &(0x7f0000000040)={0x3, 0x0, 0x80000000, 0x2}) ioctl$TCSBRK(r0, 0x5409, 0x4) [ 117.515841] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 117.520959] ? save_stack+0xa9/0xd0 [ 117.524604] ? save_stack+0x43/0xd0 [ 117.528241] ? kasan_kmalloc+0xc4/0xe0 [ 117.532134] ? kmem_cache_alloc_trace+0x152/0x780 [ 117.537000] ? proc_init_fs_context+0x49/0x130 [ 117.541592] ? vfs_new_fs_context+0x2ba/0x700 [ 117.546094] ? do_mount+0x5cf/0x1fb0 [ 117.549812] ? ksys_mount+0x12d/0x140 [ 117.553619] ? do_syscall_64+0x1b9/0x820 [ 117.557692] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 117.563065] ? __x64_sys_mount+0xbe/0x150 09:30:22 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(0xffffffffffffffff, 0x0) 09:30:22 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") rseq(&(0x7f0000000000), 0x20, 0x0, 0x0) r1 = accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000040)) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0x7f, 0x8000, 0x6, 0xc8, 0xfffffffffffffff2}, 0x14) rseq(&(0x7f0000000000), 0x20, 0x1, 0x0) [ 117.567233] ? do_syscall_64+0x1b9/0x820 [ 117.571306] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 117.576684] ? trace_hardirqs_off+0xd/0x10 [ 117.580924] ? quarantine_put+0x10d/0x1b0 [ 117.585085] ? lock_acquire+0x1e4/0x540 [ 117.589066] ? fs_reclaim_acquire+0x20/0x20 [ 117.593398] ? lock_downgrade+0x8f0/0x8f0 [ 117.597582] ? check_same_owner+0x340/0x340 [ 117.601909] ? rcu_note_context_switch+0x730/0x730 [ 117.606852] __should_failslab+0x124/0x180 [ 117.611105] should_failslab+0x9/0x14 09:30:22 executing program 6: r0 = socket$inet6(0xa, 0x1000000000000, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x0, 0x0) mremap(&(0x7f0000a94000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000000000/0x2000)=nil) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000000)={0x2, r1}) ioctl$VHOST_GET_FEATURES(r1, 0x805c4d65, &(0x7f0000000100)) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000140)={&(0x7f0000000040)=""/126, 0x210000, 0x1000, 0x6}, 0x18) ioctl$KVM_CHECK_EXTENSION_VM(r1, 0xae03, 0x5) [ 117.614919] __kmalloc_track_caller+0x2c4/0x760 [ 117.619603] ? vfs_set_fs_source+0x67/0x180 [ 117.623935] kmemdup_nul+0x31/0xa0 [ 117.627483] vfs_set_fs_source+0x67/0x180 [ 117.631641] do_mount+0x61b/0x1fb0 [ 117.635189] ? kasan_check_write+0x14/0x20 [ 117.639434] ? copy_mount_string+0x40/0x40 [ 117.643671] ? retint_kernel+0x10/0x10 [ 117.647565] ? copy_mount_options+0x1a1/0x380 [ 117.652076] ? copy_mount_options+0x1d4/0x380 [ 117.656577] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 117.662115] ? copy_mount_options+0x285/0x380 [ 117.666616] ksys_mount+0x12d/0x140 [ 117.670249] __x64_sys_mount+0xbe/0x150 [ 117.674230] do_syscall_64+0x1b9/0x820 [ 117.678117] ? finish_task_switch+0x1d3/0x870 [ 117.682617] ? syscall_return_slowpath+0x5e0/0x5e0 [ 117.687554] ? syscall_return_slowpath+0x31d/0x5e0 [ 117.692496] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 117.697517] ? prepare_exit_to_usermode+0x291/0x3b0 [ 117.702540] ? perf_trace_sys_enter+0xb10/0xb10 [ 117.707224] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 117.712074] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 117.717261] RIP: 0033:0x455e29 [ 117.720445] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 117.739709] RSP: 002b:00007f94111afc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 117.747514] RAX: ffffffffffffffda RBX: 00007f94111b06d4 RCX: 0000000000455e29 [ 117.754785] RDX: 0000000020000140 RSI: 0000000020000040 RDI: 0000000020000000 [ 117.762057] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 [ 117.769327] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 117.776599] R13: 00000000004c248a R14: 00000000004d0058 R15: 0000000000000008 09:30:23 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x10, 0x3, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='auxv\x00') sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000250007031dfffd946fa2830020200a0009000000069effffffffffffff00ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47a6268e3406cf055d90f15a3", 0x4c}], 0x1}, 0x0) socket$inet6(0xa, 0x0, 0xffff) 09:30:23 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(0xffffffffffffffff, 0x0) 09:30:23 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$KDSKBLED(r1, 0x4b65, 0xffffffffffffffca) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000017000)=0xfffff7fffffffffd, 0x4) listen(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f00000a2000)={0x1, &(0x7f0000f07000)=[{0x6}]}, 0x10) r2 = getpgrp(0xffffffffffffffff) ptrace$pokeuser(0x6, r2, 0x9d8f08a, 0xa5) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000000)=ANY=[@ANYBLOB="543000010400020001ff0c764bc3d6a60a25cb000000000000000000"]) 09:30:23 executing program 6: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@ethernet, 0x80) sendmsg$can_bcm(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x1d}, 0x10, &(0x7f0000000180)={&(0x7f0000000100)={0x5, 0x0, 0x0, {}, {0x0, 0x2710}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "5101c81e5370ca0a"}}, 0x48}, 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={r0}) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000200)={0x7, 0x0, 0x2, 0x10001, 0x8, 0x100000001, 0x8000, 0x578, 0x0}, &(0x7f0000000240)=0x20) bind$unix(r1, &(0x7f0000000380)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000280)={r2, @in6={{0xa, 0x4e20, 0x5, @empty, 0x391}}, 0x3ff, 0x3, 0x4, 0x2, 0x8}, &(0x7f0000000340)=0x98) sendmsg$can_bcm(r0, &(0x7f00005e4000)={&(0x7f0000000040)={0x1d}, 0x10, &(0x7f0000728000)={&(0x7f00000aef80)={0x5, 0x900, 0x0, {0x77359400}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}, 0x1}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000540)={&(0x7f0000000080)={0x1d}, 0x10, &(0x7f0000000500)={&(0x7f0000000480)={0x6, 0x0, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a1947cab94fc62fd"}}, 0x48}, 0x1}, 0x0) 09:30:23 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0xfffffffffffffffd) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) setitimer(0x2, &(0x7f0000000040)={{}, {0x77359400}}, &(0x7f0000000080)) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000002000)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r3, 0x0, 0x4, &(0x7f0000013ff4)={@local={0xac, 0x14, 0x14, 0xaa}, @rand_addr, @multicast2=0xe0000002}, 0xc) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x12, &(0x7f0000000000)=0xffffffe0, 0x4) r4 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x36, 0x10100) ioctl$KVM_HAS_DEVICE_ATTR(r4, 0x4018aee3, &(0x7f0000000140)={0x0, 0x401, 0x8000, &(0x7f0000000100)=0x9}) close(r3) dup3(r1, r2, 0x0) [ 117.887807] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. [ 117.933576] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. 09:30:23 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x2000) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in6=@local, @in6=@loopback}}, {{@in6=@loopback}}}, &(0x7f0000000740)=0xe8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000040)=ANY=[@ANYBLOB="0036ed8306000000"], 0x8) syz_mount_image$ceph(&(0x7f0000000080)='ceph\x00', &(0x7f00000000c0)='./file0\x00', 0x689, 0x6, &(0x7f0000000540)=[{&(0x7f0000000100)="53417aa2b40f57c9e2f1c227f0bf902738f620cbb540e0cba97629ea97bfaeb71f2721a621812e9eb970ec38e92d0c508e6522e8f266235c89b6759628a374d8733eb115353f120f7fe8cc9ab22689d84151e7f6e0b66925dc5065ee28b2a938d6cb2d909166da62aa2d2d9e4ad22097fc8c6b5c5e8ca5a09bf16885310c82b1bd96a08a62bf5ed632c9f357894947c63cecf713beac50048505f33942d369a91f09c1465a2cc4fed6b99e1ce26385508c0187642a218ab5e4fbfc21147be74cdcdfff4cca960121dfc73f9946b1a4f0ae2f360fd165", 0xd6, 0x101}, {&(0x7f0000000200)="af34299ae704016ddb", 0x9, 0x7}, {&(0x7f0000000240)="7f42c55fd45566f104b95a112f27f7164d8634271111aa3c7ce891c6fbc380d52d5100516a423c701df36d01f5322f1a574e7f6fc12afa6fe5b9a3a8a0a1810c8f8ee0479692e318f1a5dc45ab06f6c5d4452d61f61c23f214926a977a97d2ab2503f6c5ad42122508af77ea51fd7ff8fc6931de5e6592da9081d9688281bcdc3f2e9d87e9be4ba22e430a5a2f2612206a778ab897e9b71a3c5860470469ca185e63b6d323335280d3d70c1f9e2d071e3ab6d53df4304a393238448b666266084bf3127d05432c968c1391c0128924b30d", 0xd1, 0x1}, {&(0x7f0000000340)="8646e68de1fb607aa8dde3c078b26174b55fd0eec2d357df81b1fdfb6dd2a11a220f94fe72699ed1f3ca3069584193d0240d8b00b4d2b038549b1b9f7c82e0ad849195125560d95b0453d85f458a698e7e371796d5544ee2", 0x58, 0x2}, {&(0x7f00000003c0)="96ae4d4c4c01beddc236ca0db7d2ff244775252a06b88a4ca0e4f39fe5710addda3cf1a6c20879a0310802fd7c5519058c2b77d537765912aad34235fc56374050f7227dd19168ad79ed3e8923a128ff2a1ad2ba5c2b4f926c197b8af74ec5a98fdfccd0cdfc7a4668103f2dba05f0da7fdb1e3e99e117bc9b916e8c37d6f58538689292e256f5ec39e02ea812f82625eb1000a3571594f0558a19b183c9ddab96d59371efbdbeeeb0d4f7d4a4c3139c4e77e52be6817f4a8192872b8fa157183dc333133503b7b62ae0", 0xca, 0x1e}, {&(0x7f00000004c0)="c77313190365a3e1a55d7350721a87eefde80b62b953ef929cdaeca7a004e60bcf0e47790d5281edd6eba0b53f45d633257f59f75e15ee9494317b114700d96814d830eda96e5b823f7942e06ce62949e300f9848aa82e7163366445455f43cb", 0x60, 0xb2af}], 0x8, &(0x7f0000000600)='\x00') setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000000)={0x3ff, 0x1, 0x407ff, 0x800, 0x3f}, 0xc) setsockopt$inet6_buf(r0, 0x29, 0x36, &(0x7f0000e86000), 0x0) 09:30:23 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000c80)) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000380)=""/147) r3 = syz_open_pts(0xffffffffffffffff, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f00000001c0), &(0x7f0000000d00)=0x6) ioctl$TCSETS(r3, 0x5402, &(0x7f00000000c0)) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f0000000200)=""/248, 0xf8) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) 09:30:23 executing program 7 (fault-call:1 fault-nth:9): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, &(0x7f00000001c0)={[{@gid={'gid', 0x3d}, 0x2c}]}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, &(0x7f00000001c0)) 09:30:23 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xa, 0x4, 0x6, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000400), &(0x7f00000002c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)="6efb99", &(0x7f0000000200)}, 0x20) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x1, 0x0) ioctl$TCXONC(r1, 0x540a, 0x7) 09:30:23 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") futex(&(0x7f000000cffc), 0x80000000000b, 0x0, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000000), &(0x7f0000000100)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x4000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in=@multicast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000140)=0xe8) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000200)={0x3, 0x40, 0x1, {r4, r5/1000+10000}, {0x0, 0x7530}, {0x0, 0x6, 0x6, 0x6d5d4939}, 0x1, @can={{0x0, 0x100000000, 0x7, 0x200}, 0x1, 0x1, 0x0, 0x0, "cbe21afe43c88a5a"}}, 0x48}, 0x1, 0x0, 0x0, 0xd0}, 0x5) tkill(r1, 0x1004000000016) futex(&(0x7f000000cffc)=0x4, 0xc, 0x1, &(0x7f0000fd7ff0)={0x77359400}, &(0x7f0000048000), 0x4) 09:30:23 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(0xffffffffffffffff, 0x0) 09:30:23 executing program 3: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca, 0x4d}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c}) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(r1, &(0x7f00000003c0)={0xa6, 0x29, 0x1, {0x0, [{{}, 0x0, 0x0, 0x7, './file0'}, {{}, 0x0, 0x0, 0x7, './file0'}, {{}, 0x0, 0x0, 0x7, './file0'}, {{}, 0x0, 0x0, 0x7, './file0'}, {{}, 0x0, 0x0, 0x7, './file0'}]}}, 0xa6) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x1, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c}) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) 09:30:23 executing program 0 (fault-call:2 fault-nth:0): capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) 09:30:23 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x800003f) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000200)={0xffffffffffffffff}, 0x111, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x1f, 0x1000, {"57db8007f490aa14450ef9bee52be69d"}, 0x8000, 0x8, 0x200}}}, 0x90) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000000)={0x2000}) mprotect(&(0x7f0000032000/0x1000)=nil, 0x1000, 0x5) fcntl$addseals(r0, 0x409, 0x0) setitimer(0x1, &(0x7f0000032fe0)={{}, {0x0, 0x2710}}, 0x0) getitimer(0x1, &(0x7f0000000040)) 09:30:23 executing program 6: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4000000000, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f0000000040)="c9e534140e2e7387eae42634b28f60af7506bf99dc124d72ef71b564309386ab30fb1f4070d018a35c1c40ccb8eb0b1a1c1c", 0x32, 0x800, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000000)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) io_setup(0x100000000, &(0x7f0000000080)=0x0) r2 = dup3(r0, r0, 0x80000) io_cancel(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7, 0x7, r0, &(0x7f0000000280)="e7ad772eb189471a8cc9c1eec86f8d78252bab4b5f17eff7be45d5c9f07213b145b1f8fbfe4898efc902273e47e09f112390f15c656ec2642b645124c6aa484d36225a1c54012379d575959feb65e7865d38caf97296a8599f6dadbe53ac52bffe482771c8605f87429ed1162e580c0f24fdf890bba1a9dd17006f1cf19fbc140e7af96c19b57ec95ea83992a51c7a44df359625fec61d6652005b5e62e3a6e2ae3539ba7fa03160aad3bc9b404ff63f80950f7d85da48b526df813d2f32c45f17e65fb6d7943fda22a8d8e4b7ddff9d3a067be9b79b7d8c10f9bd69e5334c39cfca22e7b7e910b1eed53dffecb8283321e7d67cf842ae3dfc4d9b82b396dbcd69263c51f6f07c4dd86240b5201835dd7adc1ba2cfae7bbe70316dae1b55589c574610ca4ad7e36ec2db050a64a897dcc6aceaa89d7c7a0f61437b9db9dd0bd5e5b74ba19372ad6bd342ca85cd54ba0e0c02bcd6bfc31043c95e618c583170318d89747e2b94fc4ada623d045c3ab63e259755d4dd304d4a30abddd02fa03b5e66f47a7d3fec71f99b73a865fa5a2458ccbaa7416b5b615244981f3f01e93d073e3334717f09e3f6346fcc6b0d552e3f672c66569441f39c5f5316f4ab882ebfa6069b79f3fa7cbd2ea5561634440803840de686c06bcdd1239aedeb44a015d0a8647e072ed13f9e8c8a7537cc3906963f7c08269834f5dac3d753930d3ca35bfd071cea8a27b53527e074cf3542f78a426fe6d62e093def3c4a17a5e5b39fe10d75fb5b12a0c71e1b8c713a66066073b87349075560821d67fa6c75d9d97e94c3671ba2d71d480991632e2cb223bb8573c007412aae9295cd1a9f50d87022a1bb83306d5f06dd9c0c8b4d29fce6a9955c38d5d4951b8cbb90af2b2d766febfcef1d92531d7520174c58e924b1cfb25fee5751dfec02509d5eec976f0f42a85a7b27d6fb428ed537c8da380ba4e86f9b40082ca70727628363e12d201760152c888f9e2fb6f3c8353b3069454db79852bc9f97561b9dd794bd9dc148b6f059177e7e79ff3b3e352c7a5c2c9208bee4f5053e8a7ccd4c37929fe7e9d71a721bb5cb783787c6c994a0ad7f7393e3037b23f10d85a1c5d2dcdc15a91da402f9a20e71a225bd6a6de45f98142ecf82e451d9e7895fb3f7902cd718d8f5566db340303eda5b00f1661270f2a5fa582e020da07c99e313e4865a44572ce6e2c28ef125acb012fd31a7fb6bf70ecfbf690d4d9c7dd625001cdbc54dcd7a39687e558300dc6d031fac79894e9696ba90d60e4cb2a9dac62fcf9785815bc7f5a302bda597163af9e452996e24e0287265c3c951b45c38fd95bf52d29f952966913c1519fc25b486583c04713de5a0e5895ace9e3ac4dd647b60043df9e0190199e58915fe46371dd6438c9673086502bba2da4926d125bfe45a9d9179c49a9b2e7b45c623283ab00986b1426b016b53f72d49b283e232cfcbc8ba66f3f3c3741e1b11c3222a8c86789c428f0a816bbf52e90afd261b5728e528383f07fa85ff736f98b4f93e65908e84362eb9628d10c290744980ad4600f335e640d54745380895d15d0ba898846e3b9abc8225cbfc1b25ba193394928640076e9737b50fb4b47308ef5b12793238a0e3f9e0da3fb4a06edfc83b73257559802e96f149020b946954a31019c47c9e4c18a016e589f4a8c7be4319581d7b2393e52f3c3e7f794ad5e56b0c378da55d9c9cefde2ae2536377e5ab7635fa891b73c8bf02ed11ce5cf946cb8e57563181f0811c8951ca3db36997e80455971609d9932af460a0d411fe4a34c54da721027330d45953fca54016eae1062b55e2b830e834a54d2f8c6b5842763a13806286be91efa2245c09c2d6b36380c2c1e3a11673d64ca742b4764242217ba5955664245d64ba6327170731548dba38c8e25edabcc9cda04c652a35ac2a15f8e4cdc7bcc987ed55bbd81b0c11f44e182d3a49411777d12b4270ff14c7c88ad5ba4ff1aeebce2f4ce4de3699c4e2d6e4712d29c8ccbb12b9cf952253ae100616cf2667bf929f8996445b3a9677f520aafdd86124a75cf743cb6cb737b8e3efca6a1badcb8e50264b0d3fe2582282e9e35d8dc23862eabc59644ad1b8fbe587e4391a3695fd175698a7a1a46a46f874681e86011875037751476d40700f2ffe3f4f7c69a347b70a1dd20598db4fff91fd4b3de15545cf6a83ba8de15530e706bbb2ad1ebca226194632b9e639f67c3a1877fbc38bfc8ad0bb25f6ee4bebb2a9b7df98262eace6deb2aafe56518b68f3a16479b102b5d72954ff55934df877b6f4e8d2680f1c27ca39f4449274e72f0c47c8af968223bd7ab1c9d9f42ccf331eda9fa6d68bd022f83deb95590a11eee4e1fe9f772aeef2c8b44b574dcf4ebe203c74ffb160f7861e9fca9226979d2ebd4d17c25b4dff68e7cfce4cf00bf3829db82e6c13fbe12981c340e6917150eb778151ab231b62c60635ffc2b3eb477d946315962ea63243c4fc0d04b9b0803659ad5a929b642bee6058a43b0bf90e561239e5bcd319b88ce80146f034feb328871cba720f4ed284f68a961ddb7e465b371fa2a8d97d4424fa4cd61d05c700a61c0145cd21e77ca4132a148fb22c0584d49149f8ec44a786dc9af9d95f8633f00741cee871b958a1467f87bcfca18651b69ac366ede1d70f2b26fa3f6c7e2efea30bd6a0025144c274fac55f9cd5ea21438caa4f6e2871c5e2d7ba8bafa88f50f6e0be41bc4a621dca3bf162d79b2c8d93793763c4d58fa856efcc5389a25d08f6e91fd2da6e2ac4276a05f5c7d2c1b227a11ade7f25d5edbda2a8ea580100429bcaf378ad2b72b355c4333ffb593adac131d0425a0ee99112ea13365c78cd1e6205903f5efa6145fd9491305868c1874c28d3c1522d04b584a4b3ded182ee2e00101146e17a75afd0b36efd27ede1a2f3f238683e9e9ef8cf04c97975fd002f3e94ad64e13c68017d5e97a8d500ad888b561b7b631efed23dbaccb9faf82579edf2174b1062481fd7230839496fb6322f56bd378cb97162bf19841f974ba0184e01d8a4bb33b14192e6b3db959c6535ba55b8f45da5775d08a7b3ac9992512439ba886dda6ab3428007cda9d69b5a3907d578e46f683141d0743948b363031f2ef8f3e96679adb8fd55455fa1811913fcdfbb88e2f796f4fd1bae9869ae01cdf9f051b160a2e24f9e867b9c1628351f1d3a70ca047d4d6bf040598c4a0d481ebcc0d1486c4801b2455e426105aa36ed5bd60542a056817fe4c726b8c7f5977ed463eb2e0f5195eb8453f1a3eac5058ce72f7c2542c2a4f773109aff6f78d85924449d5c83a064a52ecec67d64bd7b9492542bdb0a147f2dfd8b63515956370635e5e8b6e08e0c5f2be1f6d7b3084f37b2d3afea64c9ee31211d133d37fd973e4feac9cd855f3d68ed55365f9ddea6d737f0aab1210057ab8e6904b9a395438236ff23d9dbda498a881d3765d99e1725b683b375b282f08fdd79e02d300a8b627bd6bee99ec80a78c0573035e939b4babaf15fe1cb3d88d9def795b1ddd080bd1ed280beda26b90befc37a4a6d53d0455aa43fc0d9d268c52759122a44a6782bffdb7b2d15679b17a6e2a23128769adc98f324951efcf158a212b2cb0362b32dd77aa9e0b0ca1aa8e9eabcee8a88a7be20ef426b54e43e528d2d3d49a5ea07a156daa82a50b576f9bca6509559a9529a8bf486f76b6d317790410523f631dbde9a23948ad66c597cc18fbbbbb91add842f09a73ae4e4449104debfc85aa2375048c41a9065da79bee48f1b3b2a19a08a308852076b24570c6cb6cfac5d9d0de56ce5558bed8a01d5092611daba501eced8527a86f8daad864554d6315efe180518cdcec4d7faa1c8b3e5b32a9ce63dbbb9390e4ba2102bc9914577c780895102bb92951a147c7f1bbf92d32a4e43053a12d7c7dd635184c2b2a27014ddbe780a00e311192a8c15e8cdf403e8c69fe0800177bfeb9546a86b8bdf2a55952c95c8d48cdd8a0fcbb4eeaee771534d1d76b00c92038cd746bf18c39882259d8c56a1af72a0a30e3734ddd908c95471db0a24dbc7a5ada89d20663a15339aa2a1c70e5b5d3cf3406d1f77d5d2a20bce2d1f37b5a06534e058eb3e43e84783b05098b2e81b38b68c7acfc9e5f582a98d602e1e7fc5e95c5309d1eccf7f8e8ab30372c4cfcee4d5a8d0ca85db33343369d932a03a97c1609f6db7ff606c776a30f15754b4c1085b150539d8683c2c893aae36cbd8c7b8338dc52cc2e6c622ea2834248ca5820694aae078181fc8a414a5276189f36543b71b6b270d85c34c76c091c53b3a35b1a3b8acdc0ce0ea0849b2f4e42f8db358c49b1b1cf262ae2233f351015b56c0615eb3a0bf69c2bc15138f49e64fb9336da8c898a493e643994e23ceda94828c50ddb29151aedc3ee2ef796dd1b045ee327a7676fc5b37eb330efaea06090057f4ba1443b5c749dd475b113c7d60027ff35aef31c5c289889ea66e815af6b25e8015fefa00d528ffd7d10c580fb9a12a868c9bcbcd5df6223e2794950185f928ef3912c9038e922014e833069dfeb855c54f43d9475ac7e1562a6445b7ccc4ce2198ccf9e9798e1c2830850e75865d5cfced3f59963db62704862c71fe7e8ff2581e0d0684105101024d04c8bf5414f78a72b801ede4cfee7402b2b30dcd6e49f131411c413133979d06c7de609e8db5bba97d65332261b61c6748cbfafdfc5c782fbf3de4cfd715d8bf1a300dba94650b046edf6a51ae3a84969de04ca1e14e4e812447b46426b96de7922809ec6c4a6ab32f365304504c53bfaef278d19457075d078b5fc9503bd4faaddb6a0881bf428a01bdae41a77333dc87a60452ecdf0a0226a42073aafbdbebc3e4316689b5ea575cbe13c46eaa25745e62f9be2b42ce94c3cfa9a665c076b0029ebadc4d9ed597d733303da3c5bab789fb14f95bf54906bd63511d2c6aec2457847c6c6c290202f0b8372c62d6a0d9801dc05da2951288670f237b3239d192e65a8f7d43794fac27dff25490e08cb550768c8e23f9cd32428287c8170321dddce554476530a9919ff91ca19eab02cef71e32155f9610d0aeb63d9b5e8d4056157e96d2c5b58f05f5eb00cb96fa0000f33fbcb23d9bf9b5e4e6f78a19534f2abdff694006250669ed4c54392872302e79576443211eed22600c4333ee599506b493210685ec1ba379247ec177726fc84cae36c1c8e21df62bc02771fdbc87c2266df6be865988d29acb3706b74349ffb99d79b4f3d9939de8ad6cef03509a9ee22f133fac5dbc450bc02be09299ce719a09a8ba334259eada8cfa791aeb21cbf4075b17794e5039388225daa5ca105aa6b27a2fcbed3f01fcf18e602c39a8ac318fd661882922ae54356c199e71606627e7e089a633b361752b6d8574a4c8bfbcee7545e4e849110c8adc4fa96e2e862393b2181687c9768a8872aabec7db87dc6da590715c84502a45f4f4c362146cc813fd25c51dd39d0b7afc52cd984804c9b294d1a9c70db1b7d1cbc7788e5601decbcdd889f75748862e7e88d0c578f70cd9f6f2f8ddc76b88942ea4ea0ac0ddd1ae911d62fd1bdae15df356d7503189f85969cb26d3e78bd59512d5ab825225a2720ed80dd4dbad194e305dc0252bdc28c28ae6fe5e8dc3d43cb1bd3b561049915a01a796b4bbc4d16a897b1c67937c4c0412297a75cc5ba889cea2ed4dc7a872f95a48f7835077de58f6d0d581b6d33ed71903e4b6449bc010b6fc0b51ae060e2b4d02a357bee57efddbd2d915226304e2c42d28", 0x1000, 0xf2, 0x0, 0x1, r2}, &(0x7f0000000140)) shutdown(r0, 0x1) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYBLOB="f5ff0000"], 0x8) [ 118.258920] ceph: device name is missing path (no : separator in /dev/loop4) [ 118.267605] Unknown ioctl 21514 [ 118.284521] Unknown ioctl 21514 09:30:23 executing program 4: r0 = socket$inet(0x15, 0x5, 0x0) bind$inet(r0, &(0x7f000001bff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14}}, 0x10) sendmsg(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[{0x58, 0x100000000000114, 0x8, "4d037f67d8b7b40800000000000000f7b4559556d9101709322be4c68537e918d56fc5fa0d02739b2ab80ec25d434d3e8a83e36011c57e8769315dd29005dba330"}], 0x58}, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000080)=""/48) [ 118.334696] FAULT_INJECTION: forcing a failure. [ 118.334696] name failslab, interval 1, probability 0, space 0, times 0 [ 118.346050] CPU: 1 PID: 8244 Comm: syz-executor0 Not tainted 4.18.0-rc4-next-20180712+ #5 [ 118.354372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 118.363742] Call Trace: [ 118.366338] dump_stack+0x1c9/0x2b4 [ 118.369978] ? dump_stack_print_info.cold.2+0x52/0x52 [ 118.375182] should_fail.cold.4+0xa/0x11 [ 118.379256] ? lock_downgrade+0x8f0/0x8f0 09:30:23 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000080)='hfsplus\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73657373696f6e3d3078303030303030303130303030303030310ea8dd52d7aa2b32ab58ddd69c52e9bf311dfbf29f0ddead19ccc6558905a7253c988b15ac6c1703b736c88498edecfd06f854e5f9c9d108bf6cf5fce8cb781eafad92d3c55dad4882771bfef628b08068d5db3cfbaf85ea40b6d7da59c525d8d3daf358319bcdcf7128af0000000051b8ded2858cb930508641b3daec18366cab4c667a5e63753ce84f59555297c66138b3803462ab9304ed23679033549e814ec3f10d6fef83497b9cecd6196a9f00000000000000000000000000000000"]) clock_adjtime(0x7, &(0x7f0000000100)={0x6, 0xffffffffffffffff, 0x101, 0x4, 0x7, 0x3, 0x8001, 0xffffffffffffff0e, 0x4, 0x2, 0x7, 0x1, 0x8, 0x0, 0x80, 0x7, 0x10000, 0x5, 0x3, 0x9, 0x1, 0x1, 0x8, 0x1, 0x7, 0x3}) 09:30:23 executing program 4: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x200000, 0x0) getsockname$netlink(r0, &(0x7f00000000c0), &(0x7f0000000100)=0xc) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3, &(0x7f0000001700)=[{&(0x7f0000000140)="aab8f21e67c25edead685be972f53b5cf6bb23776048424565e444771af55ef42ce569212fcc5fe9b02d0f8fe169893ebf472e2bdd9a04a37f86a68c4b671bc761987b735a0022fcb8d8e2025ad8d3f1f6f240523b2b8a2a6bc301db98cd4b50ea631d6bf720aeb7ace2a81ca53b03dcd1f5bf226c3a2de83a9b3462aad8f4894a075adc37c40f25026fa67f902fd5b41c07aa58d22aed50f9acaf4f54da6466fea1b0a908327ca0ed3dfda49ba29fabd23f5ff0f9a005445451cb9ce0f095779f57cee6805528", 0xc7, 0x2}, {&(0x7f0000000300)="ff9bd7c13dfda08b263def4ff4799f5bb8e18442146d3629d1bb2abba1eda17705a0a830269eacdf870134439ba4963564b3664e4905d6ee1416f1576f354fe37942df49dea6241b40e14e28dfcf2dc4ac1b9874315d7dd3e30b8779b901f6d4aa5eaab2f75274d4427144fb806399acfe3676f096ede50165bc879ce203e0606407a76499ad7c8b962b0083c566590cbb92fbcd594b0e4bb5fb82dfe7852cc45af27d3c43962244aa01f62bef25f6acbe6ef6e70bcb3158886869bdb9e827ef87076b40701e5cb428ba9cb5ec9b4858", 0xd0, 0x72}, {&(0x7f0000000500)="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", 0x1000, 0x4}], 0x800000, &(0x7f00000017c0)={[{@sbsector={'sbsector', 0x3d, 0x8}, 0x2c}, {@map_off='map=off', 0x2c}, {@gid={'gid', 0x3d}, 0x2c}, {@uid={'uid', 0x3d}, 0x2c}, {@check_relaxed='check=relaxed', 0x2c}]}) [ 118.383421] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 118.388536] ? lock_release+0xa30/0xa30 [ 118.392523] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 118.398070] ? pid_task+0x115/0x200 [ 118.401705] ? __f_unlock_pos+0x19/0x20 [ 118.405688] ? lock_downgrade+0x8f0/0x8f0 [ 118.409846] ? lock_acquire+0x1e4/0x540 [ 118.413823] ? __fget+0x4ac/0x740 [ 118.417283] ? lock_acquire+0x1e4/0x540 [ 118.421263] ? fs_reclaim_acquire+0x20/0x20 [ 118.425590] ? lock_downgrade+0x8f0/0x8f0 [ 118.429751] ? check_same_owner+0x340/0x340 [ 118.434081] ? rcu_note_context_switch+0x730/0x730 [ 118.439016] ? __fget+0x4d5/0x740 [ 118.442477] __should_failslab+0x124/0x180 [ 118.446727] should_failslab+0x9/0x14 [ 118.450538] kmem_cache_alloc+0x2af/0x760 [ 118.452775] ISOFS: Unable to identify CD-ROM format. [ 118.454692] ? __sb_end_write+0xac/0xe0 [ 118.454713] create_new_namespaces+0x9a/0x900 [ 118.454727] ? fput+0x130/0x1a0 [ 118.454744] ? sys_ni_syscall+0x20/0x20 [ 118.454761] __x64_sys_setns+0x200/0x360 [ 118.479541] do_syscall_64+0x1b9/0x820 [ 118.483421] ? finish_task_switch+0x1d3/0x870 [ 118.487907] ? syscall_return_slowpath+0x5e0/0x5e0 [ 118.492846] ? syscall_return_slowpath+0x31d/0x5e0 [ 118.497770] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 118.502770] ? prepare_exit_to_usermode+0x291/0x3b0 [ 118.507770] ? perf_trace_sys_enter+0xb10/0xb10 [ 118.512424] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 118.517254] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 118.522430] RIP: 0033:0x455e29 [ 118.525605] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 118.544780] RSP: 002b:00007f4203b43c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000134 [ 118.552487] RAX: ffffffffffffffda RBX: 00007f4203b446d4 RCX: 0000000000455e29 [ 118.559760] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000013 [ 118.567195] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 118.574448] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 118.581708] R13: 00000000004c159c R14: 00000000004d1b70 R15: 0000000000000000 [ 118.592483] isofs_fill_super: bread failed, dev=loop4, iso_blknum=24, block=48 [ 118.604467] hfsplus: unable to parse mount options [ 118.623285] FAULT_INJECTION: forcing a failure. [ 118.623285] name failslab, interval 1, probability 0, space 0, times 0 09:30:23 executing program 0 (fault-call:2 fault-nth:1): capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) 09:30:23 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) [ 118.626881] isofs_fill_super: bread failed, dev=loop4, iso_blknum=24, block=48 [ 118.634688] CPU: 1 PID: 8234 Comm: syz-executor7 Not tainted 4.18.0-rc4-next-20180712+ #5 [ 118.650258] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 118.659611] Call Trace: [ 118.662206] dump_stack+0x1c9/0x2b4 [ 118.665846] ? dump_stack_print_info.cold.2+0x52/0x52 [ 118.671048] should_fail.cold.4+0xa/0x11 [ 118.675125] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 118.680240] ? __sanitizer_cov_trace_cmp4+0x16/0x20 09:30:23 executing program 1: mkdir(&(0x7f0000000000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x80000800) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000040)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000f86000)='./control/file0\x00') rmdir(&(0x7f00000000c0)='./control\x00') syz_fuse_mount(&(0x7f0000000240)='./control\x00', 0x6000, 0x0, 0x0, 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000140)='./control\x00', &(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 09:30:23 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3, 0x4}) r0 = getpgrp(0xffffffffffffffff) r1 = syz_open_procfs$namespace(r0, &(0x7f00000000c0)='ns/pid\x00') setns(r1, 0x0) [ 118.685263] ? bpf_prog_kallsyms_find+0xde/0x4c0 [ 118.690032] ? lock_acquire+0x1e4/0x540 [ 118.694015] ? is_bpf_text_address+0xae/0x170 [ 118.698519] ? lock_downgrade+0x8f0/0x8f0 [ 118.702668] ? lock_release+0xa30/0xa30 [ 118.706647] ? lock_acquire+0x1e4/0x540 [ 118.710605] ? fs_reclaim_acquire+0x20/0x20 [ 118.714924] ? lock_downgrade+0x8f0/0x8f0 [ 118.719075] ? check_same_owner+0x340/0x340 [ 118.723398] ? rcu_note_context_switch+0x730/0x730 [ 118.728337] __should_failslab+0x124/0x180 [ 118.732574] should_failslab+0x9/0x14 [ 118.736374] __kmalloc+0x2c8/0x760 [ 118.739921] ? match_number.isra.0+0xbf/0x280 [ 118.744420] match_number.isra.0+0xbf/0x280 [ 118.748748] ? match_strdup+0xa0/0xa0 [ 118.752549] ? match_wildcard+0x3c0/0x3c0 [ 118.756705] ? trace_hardirqs_off+0xd/0x10 [ 118.760954] match_int+0x23/0x30 [ 118.764331] proc_parse_option+0x11e/0x280 [ 118.768563] ? proc_get_tree+0xb0/0xb0 [ 118.772445] ? match_wildcard+0x3c0/0x3c0 [ 118.776601] ? lock_release+0xa30/0xa30 [ 118.780577] ? proc_get_tree+0xb0/0xb0 [ 118.784472] vfs_parse_fs_option+0x2a1/0x320 [ 118.788882] ? logfc+0x810/0x810 [ 118.792253] ? kasan_kmalloc+0xc4/0xe0 [ 118.796145] ? __kmalloc_track_caller+0x311/0x760 [ 118.800995] generic_parse_monolithic+0x14e/0x180 [ 118.805838] ? vfs_parse_fs_option+0x320/0x320 [ 118.810425] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 118.815962] ? vfs_parse_fs_option+0x320/0x320 [ 118.820527] do_mount+0x69e/0x1fb0 [ 118.824062] ? kasan_check_write+0x14/0x20 [ 118.828452] ? copy_mount_string+0x40/0x40 [ 118.832672] ? kasan_kmalloc+0xc4/0xe0 [ 118.836556] ? kmem_cache_alloc_trace+0x318/0x780 [ 118.841383] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 118.846904] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 118.852422] ? copy_mount_options+0x285/0x380 [ 118.856899] ksys_mount+0x12d/0x140 [ 118.860510] __x64_sys_mount+0xbe/0x150 [ 118.864485] do_syscall_64+0x1b9/0x820 [ 118.868363] ? finish_task_switch+0x1d3/0x870 [ 118.872850] ? syscall_return_slowpath+0x5e0/0x5e0 [ 118.877765] ? syscall_return_slowpath+0x31d/0x5e0 [ 118.883048] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 118.888055] ? prepare_exit_to_usermode+0x291/0x3b0 [ 118.893054] ? perf_trace_sys_enter+0xb10/0xb10 [ 118.897723] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 118.902566] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 118.907737] RIP: 0033:0x455e29 [ 118.910907] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 118.930075] RSP: 002b:00007f94111afc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 118.937764] RAX: ffffffffffffffda RBX: 00007f94111b06d4 RCX: 0000000000455e29 [ 118.945037] RDX: 0000000020000140 RSI: 0000000020000040 RDI: 0000000020000000 [ 118.952287] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 [ 118.959538] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 118.966788] R13: 00000000004c248a R14: 00000000004d0058 R15: 0000000000000009 [ 118.988307] hfsplus: unable to parse mount options 09:30:24 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000c80)) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000380)=""/147) r3 = syz_open_pts(0xffffffffffffffff, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f00000001c0), &(0x7f0000000d00)=0x6) ioctl$TCSETS(r3, 0x5402, &(0x7f00000000c0)) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f0000000200)=""/248, 0xf8) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) 09:30:24 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x80000, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000080)={0xffffffff, 0x2, 0x8}) r1 = getpgid(0x0) r2 = syz_open_procfs$namespace(r1, &(0x7f0000000100)='ns/mnt\x00') setns(r2, 0x0) 09:30:24 executing program 5: r0 = socket(0x100000018, 0x0, 0x2) getsockopt$sock_buf(r0, 0x1, 0x1c, &(0x7f0000000180)=""/222, &(0x7f0000000280)=0xfe8f) 09:30:24 executing program 1: prctl$intptr(0xf, 0x8) 09:30:24 executing program 4: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca, 0x4d}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r2, 0xc4c85512, &(0x7f00000005c0)={{0x0, 0x1, 0x4c9, 0x1dd, 'syz0\x00', 0x59c}, 0x0, [0x4, 0x8001, 0x7, 0x80000000, 0x80, 0x5, 0x0, 0x8, 0x81, 0x1, 0x8000, 0x227, 0x1, 0x4, 0x800, 0x8, 0x7, 0x200, 0x4, 0x8000800000000, 0x8001, 0x8, 0xff, 0x40, 0x1, 0x5, 0x7f, 0x9, 0x4, 0x1, 0xffffffffffffff04, 0x4, 0x9, 0x1, 0x1ff, 0x1, 0xffff, 0x72, 0x9, 0x7f, 0x9, 0x6, 0x100000001, 0x3a1, 0x0, 0x7f, 0x3ff, 0x0, 0x100, 0xfffffffffffffe01, 0x800, 0x5, 0x33, 0x0, 0x80000000, 0x3, 0x7f, 0x1, 0x699, 0x7, 0x6, 0x9, 0xfffffffffffffffc, 0xfffffffffffffff7, 0x8, 0x2, 0xffffffff, 0x6, 0x80000001, 0x0, 0x20, 0x8, 0x2, 0x3, 0x8001, 0x20c, 0x3f, 0x200, 0xffffffff7fffffff, 0x100, 0xfff, 0x20, 0x9, 0x10001, 0x7fffffff, 0x5, 0x302c, 0x7a, 0xffffffffffffff80, 0x1, 0xff, 0x9, 0xd9, 0x1f, 0x9, 0xd942, 0x7, 0x6b64, 0x1, 0x6, 0xffff, 0x6, 0xf2d, 0x6, 0x3, 0x5, 0x9, 0x1, 0x20, 0x9, 0x9, 0x786, 0x1, 0x5, 0x8, 0x0, 0x3, 0x401, 0x616c, 0x0, 0xed, 0x64, 0x6, 0x4, 0xe3, 0x0, 0x20, 0x1b9], {0x77359400}}) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c}) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="a6000000290100000000000000000000000040000000000000000000000000000007002e2f66696c6530000000000000000000000000000000000000000000407d002e2f66696c65300000000000000000000000000000000000000000000007002e5f5d5afc5469b33e8b2e86e81499f12f66696c653000000000000000000000000007002e2f66696c6530000000e4000000000000000000f6a20000000000000007002e2f66696c653000000000000000000000"], 0xa6) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000480)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_9p2000='version=9p2000', 0x2c}, {@aname={'aname', 0x3d, 'wfdno'}, 0x2c}, {@cachetag={'cachetag', 0x3d, '9p\x00'}, 0x2c}]}}) 09:30:24 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000686fcc)={{0x100000001}}) close(r0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_tcp_int(r1, 0x6, 0x5, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 09:30:24 executing program 7 (fault-call:1 fault-nth:10): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, &(0x7f00000001c0)={[{@gid={'gid', 0x3d}, 0x2c}]}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, &(0x7f00000001c0)) 09:30:24 executing program 0: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='ns/mnt\x00', 0xffffffffffffff9c}, 0x10) ioctl$KVM_NMI(r0, 0xae9a) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000100)=""/36) capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r1 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r1, 0x0) sendto(r0, &(0x7f0000000140)="ac0a25e6278b4ae99a4aa467c8376bee7c5516e1bf1d6b3d3555f6f0b7ba7a078566d0f808c09118e2b707fce6931bb96fa0885c16319531bc8dda3537f031d4b872235b240e57d63e880c3fac2f4bbaff8771a62cad6f26547162dd3af29dbffb4e127717ff02cbd7a7fff14116fc0c35d0f9d858e6507675ea4e4477e497c4da042642943d7d4aca30812c92142e2d7adf639ab7445463821defa450ba039101fbe78fa266ad0d50ce1c", 0xab, 0x4000, &(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x3, 0x3, 0x1, 0x4, {0xa, 0x4e21, 0x7fff, @empty, 0x3}}}, 0x80) [ 119.175798] ISOFS: Unable to identify CD-ROM format. [ 119.193964] FAULT_INJECTION: forcing a failure. [ 119.193964] name failslab, interval 1, probability 0, space 0, times 0 [ 119.205367] CPU: 0 PID: 8313 Comm: syz-executor7 Not tainted 4.18.0-rc4-next-20180712+ #5 [ 119.213696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 119.223057] Call Trace: [ 119.225654] dump_stack+0x1c9/0x2b4 [ 119.229292] ? dump_stack_print_info.cold.2+0x52/0x52 [ 119.234500] should_fail.cold.4+0xa/0x11 [ 119.238578] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 119.243693] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 119.249244] ? do_raw_spin_unlock+0xa7/0x2f0 [ 119.253652] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 119.258236] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 119.263260] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 119.268279] ? find_next_bit+0x104/0x130 [ 119.272345] ? cpumask_next+0x24/0x30 [ 119.276151] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 119.281693] ? pcpu_alloc+0x190/0x13a0 [ 119.285588] ? kmem_cache_alloc_trace+0x152/0x780 [ 119.290440] ? lock_acquire+0x1e4/0x540 [ 119.294422] ? fs_reclaim_acquire+0x20/0x20 [ 119.298750] ? lock_downgrade+0x8f0/0x8f0 [ 119.302908] ? pcpu_balance_workfn+0x1700/0x1700 [ 119.307678] ? generic_parse_monolithic+0x14e/0x180 [ 119.312701] ? check_same_owner+0x340/0x340 [ 119.317033] ? rcu_note_context_switch+0x730/0x730 [ 119.322001] ? lock_acquire+0x1e4/0x540 09:30:24 executing program 6: setitimer(0x1, &(0x7f0000000040)={{}, {0x77359400}}, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000180)=0x2, 0x4) r1 = accept$inet6(r0, 0x0, &(0x7f00000001c0)) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000002c0)=0x3, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000280)={r1}) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000140)={0x47f1}, 0x4) setitimer(0x2, &(0x7f0000000000)={{0x77359400}}, &(0x7f0000000080)) 09:30:24 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x400080, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000180)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r1, 0xc0045520, &(0x7f0000000200)=0x3) r2 = semget(0x0, 0x7, 0x2) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x5385, &(0x7f0000000240)=ANY=[@ANYBLOB="210030abd54ba6f4a296000000000000000000002a7ec656a611804e000000000000000000aed8818e5c84bca9f204b8f600a5accac0a156cf8d3d52a8ccf2e548f1b34ccaacbcf90090ed33a886588ca104bb2c556a8f8b810677a773fd3e0120e60000c095de366dfb67b2c6cf7fdc5a00f5ee3466b0d0c44ececb6cb8d843057b48219ec231cf94a2cc77845d6b5f520e64319eba0ea783347e9befb1711c022d84420d0acbefea994943efc02c78857ae9cc34f19c4e5193a25667f0be99b72d4c3902dc0c3ed15e5dcb4b90ea5da00c0cd2ea72d0076734d1000000000000000000000000000000"]) semctl$IPC_INFO(r2, 0x7, 0x3, &(0x7f0000000080)=""/69) 09:30:24 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0xbbbd, 0x101000) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r1, 0x800455d1, &(0x7f0000000100)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x27, &(0x7f0000000040)={@multicast2=0xe0000002, @loopback=0x7f000001, @loopback=0x7f000001}, 0xc) setsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x4200, 0x0) ioctl$BLKIOOPT(r3, 0x1279, &(0x7f0000000180)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) close(r2) 09:30:24 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') inotify_init1(0x800) r1 = socket$bt_rfcomm(0x1f, 0x4, 0x3) getsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000000), &(0x7f0000000080)=0x4) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000001, 0x10010, r0, 0x0) setns(r0, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x20c000, 0x0) ioctl$IOC_PR_RESERVE(r2, 0x401070c9, &(0x7f00000002c0)={0x1, 0x8, 0x3}) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f0000000180)={{0xffffffffffffffff, 0x2, 0x8001, 0x2, 0x7f}, 0x1ff, 0x8001, 'id0\x00', 'timer1\x00', 0x0, 0xffffffff, 0xff, 0x19a, 0x6}) 09:30:24 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x10100) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f0000000080)={{0x9, 0x7, 0x4, 0x7, 0xb0}, 0x9, 0x1, 0x4, 0x5, 0x331, "0ac66d82094eab865ece0590336ba2a8206b5558a50b9df86b8f0a22bdd33797a5ac88c84d3a266887dcb8215fa40b9a0183c70f889533358c76404672ebbe40a5114ac98df57ec3ec56c6946dc635421188b78a2c454bce133611b39b5bbdf0578d8bf379cda8a0b66a68dc6169aafaa2212bfc2e53796e85271253239d9a02"}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') sync_file_range(r1, 0x8001, 0xfff, 0x5) lseek(r1, 0x0, 0x1) 09:30:24 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000ab2000)=0x1002, 0x4) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f0000000040)=0xf4, 0x3) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000080)={0x2, 0x4e22}, 0x10) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2000, 0x0) ioctl$BLKSECDISCARD(r1, 0x127d, &(0x7f0000000140)=0x1) recvmsg(r0, &(0x7f0000000740)={&(0x7f00000000c0)=@nl=@unspec, 0x80, &(0x7f0000000640), 0x0, &(0x7f00000006c0)=""/110, 0x6e}, 0x40012021) 09:30:24 executing program 3: r0 = socket$bt_bnep(0x1f, 0x3, 0x4) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x0, 0x4}, 0x2824e6d82b97b424) r1 = socket(0x10, 0x800000000000002, 0xfffffffffffffffe) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) getsockopt$bt_sco_SCO_OPTIONS(r1, 0x11, 0x1, &(0x7f00000001c0)=""/138, &(0x7f0000000280)=0x8a) setreuid(r2, r2) r3 = creat(&(0x7f00000002c0)='./file0\x00', 0x20) ioctl$TIOCGLCKTRMIOS(r3, 0x5456, &(0x7f0000000300)={0xffff, 0x4801, 0x400, 0x2, 0xfffffffffffffff7, 0x8, 0x401, 0x7fff, 0xfffffffffffff800, 0x7, 0x9, 0x7fffffff}) r4 = inotify_init1(0x0) r5 = dup3(r1, r4, 0x0) ioctl$BLKZEROOUT(r5, 0x127f, &(0x7f0000000180)={0x0, 0x400}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000040), &(0x7f0000000080)=0x4) socket$nl_netfilter(0x10, 0x3, 0xc) mq_unlink(&(0x7f0000000140)='\x00') bind(r5, &(0x7f00000000c0)=@generic={0x10, "e4a78707aee5ad63b84e795af5a89b0a340a717ceeae16cd2ffc9c92fdc5f8e3cb9167c6623dcd2f18c903c678f92e5fe991458e2a5eda4be0842c3c82e5e38541857153a416faa555fa65f0407cd7b4b90bf246f98e336e0338687d5fa361074bae5b26e766c13dd38f03e4c029ce24c6fcc2b2813983cdcc78c3363bf5"}, 0x80) [ 119.325985] __should_failslab+0x124/0x180 [ 119.330231] should_failslab+0x9/0x14 [ 119.334044] __kmalloc+0x2c8/0x760 [ 119.337591] ? kasan_check_write+0x14/0x20 [ 119.341831] ? __init_rwsem+0x1cc/0x2a0 [ 119.345810] ? do_raw_write_unlock.cold.8+0x49/0x49 [ 119.350835] ? prealloc_shrinker+0x124/0x480 [ 119.355250] ? __lockdep_init_map+0x105/0x590 [ 119.359752] prealloc_shrinker+0x124/0x480 [ 119.363995] ? __init_waitqueue_head+0x9e/0x150 [ 119.368675] ? inactive_list_is_low+0x850/0x850 [ 119.373361] ? __lockdep_init_map+0x105/0x590 [ 119.377866] alloc_super+0x8dd/0xb10 [ 119.381588] ? destroy_unused_super.part.11+0x110/0x110 [ 119.386948] ? lock_downgrade+0x8f0/0x8f0 [ 119.391092] ? kasan_check_read+0x11/0x20 [ 119.395230] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 119.399801] ? kasan_check_write+0x14/0x20 [ 119.404025] ? do_raw_spin_lock+0xc1/0x200 [ 119.408249] ? ns_test_super+0x50/0x50 [ 119.412122] sget_fc+0x269/0x950 [ 119.415474] ? compare_single+0x10/0x10 [ 119.419436] ? alloc_super+0xb10/0xb10 [ 119.423309] ? logfc+0x810/0x810 [ 119.426659] ? kasan_kmalloc+0xc4/0xe0 [ 119.430538] ? __kmalloc_track_caller+0x311/0x760 [ 119.435368] ? proc_root_lookup+0x60/0x60 [ 119.439501] vfs_get_super+0x6e/0x270 [ 119.443288] proc_get_tree+0x88/0xb0 [ 119.446990] vfs_get_tree+0x1cb/0x5c0 [ 119.450784] do_mount+0x6c1/0x1fb0 [ 119.454310] ? check_same_owner+0x340/0x340 [ 119.458618] ? lock_release+0xa30/0xa30 [ 119.462580] ? copy_mount_string+0x40/0x40 [ 119.466799] ? kasan_kmalloc+0xc4/0xe0 [ 119.470677] ? kmem_cache_alloc_trace+0x318/0x780 [ 119.475511] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 119.481036] ? _copy_from_user+0xdf/0x150 [ 119.485174] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 119.490697] ? copy_mount_options+0x285/0x380 [ 119.495181] ksys_mount+0x12d/0x140 [ 119.498795] __x64_sys_mount+0xbe/0x150 [ 119.502759] do_syscall_64+0x1b9/0x820 [ 119.506631] ? finish_task_switch+0x1d3/0x870 [ 119.511111] ? syscall_return_slowpath+0x5e0/0x5e0 [ 119.516030] ? syscall_return_slowpath+0x31d/0x5e0 [ 119.520948] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 119.525952] ? prepare_exit_to_usermode+0x291/0x3b0 [ 119.530967] ? perf_trace_sys_enter+0xb10/0xb10 [ 119.535622] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 119.540459] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 119.545646] RIP: 0033:0x455e29 [ 119.548815] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 119.568102] RSP: 002b:00007f94111afc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 119.575798] RAX: ffffffffffffffda RBX: 00007f94111b06d4 RCX: 0000000000455e29 [ 119.583052] RDX: 0000000020000140 RSI: 0000000020000040 RDI: 0000000020000000 [ 119.590318] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 [ 119.597572] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 119.604839] R13: 00000000004c248a R14: 00000000004d0058 R15: 000000000000000a [ 119.613588] device lo entered promiscuous mode 09:30:24 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x800, 0x0) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000000280)=""/203) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x41, 0x0) renameat2(r1, &(0x7f0000000100)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00', 0x2) write$binfmt_elf32(r1, &(0x7f0000000600)=ANY=[@ANYRESOCT=0x0, @ANYRESHEX=r1, @ANYRES32=r2, @ANYRES32=r1], 0xfffffe35) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000180)=""/244) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) write$binfmt_aout(r2, &(0x7f0000000380)=ANY=[@ANYPTR], 0x3f3) write(r1, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) fsync(r3) [ 119.627375] device lo left promiscuous mode [ 119.808143] device lo entered promiscuous mode [ 119.817553] device lo left promiscuous mode 09:30:25 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c4600020000010000000000000003000300010000001f020000000000004000000000000000000300000000000095000000020038000100ffff04000800020000000500000064b000000000000002000000000000000200000000000000f5d000000000000004000000000000000800000000000000d041f52b8d1752275bc35414d75cde65ff49179375a0e45ad489b895ed32a8429a2a981d1540689f41a37d0000918125355e4a94800ac83b00ea9398716001360e2835c6eb2149539fbd1671ba5c3f22ce060f8241427048a3b2f1faafdfb9e2fd77c5323ff586314fad76072baff2b5a25d82d4ff86174f9edd0eb9b42c98732c46b1d6eaa2bd6d392d3066a9a06cd63b7ee9f89aa3fd822b52b3d8d0d157e31f8bc045e6cfc0ef551eb75cb65417c31944020100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000c80)) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000380)=""/147) r3 = syz_open_pts(0xffffffffffffffff, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f00000001c0), &(0x7f0000000d00)=0x6) ioctl$TCSETS(r3, 0x5402, &(0x7f00000000c0)) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) 09:30:25 executing program 5: write$eventfd(0xffffffffffffffff, &(0x7f0000000900), 0x8) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)={0xaa}) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='md5sum\x00', 0xffffffffffffff9c}, 0x10) setsockopt$sock_void(r1, 0x1, 0x24, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000140)='./control/file0\x00') r3 = open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) getdents64(r3, &(0x7f0000000000)=""/188, 0xffffffff00000018) mkdirat(r3, &(0x7f0000fc3ff6)='./control\x00', 0x0) getdents64(r3, &(0x7f0000fc4fbe)=""/80, 0x50) close(r0) 09:30:25 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000f86000)='./control/file0\x00') syz_fuseblk_mount(&(0x7f0000000140)='./control\x00', &(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0) close(r0) capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r2 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r2, 0x0) 09:30:25 executing program 7 (fault-call:1 fault-nth:11): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, &(0x7f00000001c0)={[{@gid={'gid', 0x3d}, 0x2c}]}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, &(0x7f00000001c0)) [ 119.969571] ISOFS: Unable to identify CD-ROM format. [ 120.002951] FAULT_INJECTION: forcing a failure. [ 120.002951] name failslab, interval 1, probability 0, space 0, times 0 [ 120.014312] CPU: 0 PID: 8360 Comm: syz-executor7 Not tainted 4.18.0-rc4-next-20180712+ #5 [ 120.022634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 120.031990] Call Trace: [ 120.034683] dump_stack+0x1c9/0x2b4 [ 120.038297] ? dump_stack_print_info.cold.2+0x52/0x52 [ 120.043476] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 120.049004] should_fail.cold.4+0xa/0x11 09:30:25 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8915, &(0x7f00000003c0)="1c3901c03adfafdb9854020bb03b9fcd38f894ac92f14b52c183d34be3e6bb63641b3f3a36a612ccc22be856c7a2bfcd0fb1f81c62c9de0dfcaf9262c67ec4c2725964552d618203421312faf54f5225da594981f932a1c651df7e0ab61a0110a51d809bb2745ad65d74d07c30dfd59f4e1556acaec5f574b81a33ba0405e16a4e0397d558d294e8e96a14e861b30533cfa96084b2bbc98d40bc38e93887f22b64315ecd414776a165ea5af191bc2524fb5fc3a854e8a0303e07d8425833a9b95c64aeeadb6f28d7ef61e3dd89434a19befd8cfeaf4e54c498") ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000000c0)=@add_del={0x2, &(0x7f0000000000)='ifb0\x00', 0xbbd}) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000080)='\x00', 0x0) 09:30:25 executing program 6: r0 = inotify_init1(0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000200)) ptrace$setopts(0x4206, r2, 0x0, 0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)) ptrace(0x4207, r2) waitid(0x0, 0x0, &(0x7f0000000080), 0x2, &(0x7f0000000140)) waitid(0x0, 0x0, &(0x7f0000001ff0), 0xa0000003, 0x0) capget(&(0x7f0000000000)={0x0, r2}, &(0x7f0000000040)={0xfffffffffffffff7, 0x3, 0x5, 0x1, 0x8, 0x8001}) sysfs$1(0x1, &(0x7f0000000100)='*') 09:30:25 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000c80)) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000380)=""/147) r3 = syz_open_pts(0xffffffffffffffff, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f00000001c0), &(0x7f0000000d00)=0x6) ioctl$TCSETS(r3, 0x5402, &(0x7f00000000c0)) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f0000000200)=""/248, 0xf8) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) 09:30:25 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c4600020000010000000000000003000300010000001f020000000000004000000000000000000300000000000095000000020038000100ffff04000800020000000500000064b000000000000002000000000000000200000000000000f5d000000000000004000000000000000800000000000000d041f52b8d1752275bc35414d75cde65ff49179375a0e45ad489b895ed32a8429a2a981d1540689f41a37d0000918125355e4a94800ac83b00ea9398716001360e2835c6eb2149539fbd1671ba5c3f22ce060f8241427048a3b2f1faafdfb9e2fd77c5323ff586314fad76072baff2b5a25d82d4ff86174f9edd0eb9b42c98732c46b1d6eaa2bd6d392d3066a9a06cd63b7ee9f89aa3fd822b52b3d8d0d157e31f8bc045e6cfc0ef551eb75cb65417c31944020100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000c80)) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000380)=""/147) r3 = syz_open_pts(0xffffffffffffffff, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f00000001c0), &(0x7f0000000d00)=0x6) ioctl$TCSETS(r3, 0x5402, &(0x7f00000000c0)) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) [ 120.053071] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 120.058169] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 120.063717] ? replace_slot+0xc9/0x4c0 [ 120.067613] ? __save_stack_trace+0x8d/0xf0 [ 120.071943] ? plist_requeue+0x650/0x650 [ 120.076016] ? save_stack+0xa9/0xd0 [ 120.079659] ? lock_acquire+0x1e4/0x540 [ 120.083633] ? lock_acquire+0x1e4/0x540 [ 120.087605] ? fs_reclaim_acquire+0x20/0x20 [ 120.091935] ? lock_downgrade+0x8f0/0x8f0 [ 120.096088] ? check_same_owner+0x340/0x340 09:30:25 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2=0xe0000002}, 0x4}}, 0x2e) close(r1) connect$l2tp(r0, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x0, 0x0, 0x3, 0x3, {0xa, 0x4e23, 0x12, @dev={0xfe, 0x80, [], 0x17}, 0x3}}}, 0x3a) [ 120.100419] ? check_same_owner+0x340/0x340 [ 120.104752] ? rcu_note_context_switch+0x730/0x730 [ 120.109691] __should_failslab+0x124/0x180 [ 120.113929] should_failslab+0x9/0x14 [ 120.117732] __kmalloc+0x2c8/0x760 [ 120.121278] ? rcu_note_context_switch+0x730/0x730 [ 120.126214] ? __list_lru_init+0x151/0x840 [ 120.130457] __list_lru_init+0x151/0x840 [ 120.134527] ? list_lru_destroy+0x500/0x500 [ 120.138862] ? prealloc_shrinker+0x124/0x480 [ 120.143279] ? prealloc_shrinker+0x213/0x480 [ 120.147694] ? __init_waitqueue_head+0x9e/0x150 09:30:25 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x5382, &(0x7f0000000040)={0x0, 0xfffffffffffffffd, 0x0, 0x0, @scatter={0x0, 0x0, &(0x7f0000000180)}, &(0x7f00000002c0), &(0x7f0000000340)=""/179, 0x0, 0x20, 0x100000, &(0x7f00000000c0)}) [ 120.152370] ? inactive_list_is_low+0x850/0x850 [ 120.157081] ? __lockdep_init_map+0x105/0x590 [ 120.161593] alloc_super+0x976/0xb10 [ 120.165321] ? destroy_unused_super.part.11+0x110/0x110 [ 120.170691] ? lock_downgrade+0x8f0/0x8f0 [ 120.174864] ? kasan_check_read+0x11/0x20 [ 120.179030] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 120.183621] ? kasan_check_write+0x14/0x20 [ 120.187864] ? do_raw_spin_lock+0xc1/0x200 [ 120.192107] ? ns_test_super+0x50/0x50 [ 120.196005] sget_fc+0x269/0x950 [ 120.199370] ? compare_single+0x10/0x10 09:30:25 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x20000000021) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x1000000000, 0x1004, @mcast1={0xff, 0x1, [], 0x1}, 0xc}, 0x29c) r2 = socket$inet6(0xa, 0x6, 0x3f) ioctl(r2, 0x4000008912, &(0x7f0000000100)="292cf82b8e16f477671070") setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000000080)={0x3c, @rand_addr=0x791, 0x4e21, 0x1, 'lblc\x00', 0x0, 0x20, 0x42}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f00000002c0)={@empty, 0x6e, r3}) r4 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0xf54d, 0x800) sendto$inet6(r0, &(0x7f0000000000), 0xfedf, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1a) syz_extract_tcp_res(&(0x7f0000000340), 0x4, 0x1000) ioctl$KVM_S390_VCPU_FAULT(r4, 0x4008ae52, &(0x7f0000000300)=0xfffffffffffffffc) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x8) [ 120.203339] ? alloc_super+0xb10/0xb10 [ 120.207230] ? logfc+0x810/0x810 [ 120.210595] ? kasan_kmalloc+0xc4/0xe0 [ 120.214483] ? __kmalloc_track_caller+0x311/0x760 [ 120.219331] ? proc_root_lookup+0x60/0x60 [ 120.223483] vfs_get_super+0x6e/0x270 [ 120.227315] proc_get_tree+0x88/0xb0 [ 120.231764] vfs_get_tree+0x1cb/0x5c0 [ 120.235571] do_mount+0x6c1/0x1fb0 [ 120.239120] ? check_same_owner+0x340/0x340 [ 120.243445] ? lock_release+0xa30/0xa30 [ 120.247427] ? copy_mount_string+0x40/0x40 [ 120.251669] ? retint_kernel+0x10/0x10 [ 120.255568] ? copy_mount_options+0x1f0/0x380 [ 120.260067] ? copy_mount_options+0x202/0x380 [ 120.264569] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 120.270112] ? copy_mount_options+0x285/0x380 [ 120.274614] ksys_mount+0x12d/0x140 [ 120.278255] __x64_sys_mount+0xbe/0x150 [ 120.282236] do_syscall_64+0x1b9/0x820 [ 120.286126] ? finish_task_switch+0x1d3/0x870 [ 120.290628] ? syscall_return_slowpath+0x5e0/0x5e0 [ 120.295559] ? syscall_return_slowpath+0x31d/0x5e0 09:30:25 executing program 4: mkdir(&(0x7f0000000180)='.\x00', 0xffffffffffffffff) r0 = open(&(0x7f000080dff6)='./control\x00', 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f000078dff8)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) link(&(0x7f0000f3bff8)='./file0\x00', &(0x7f00009db000)='./file1\x00') rename(&(0x7f0000000040)='./control/file0\x00', &(0x7f0000000000)='./control\x00') syz_mount_image$ceph(&(0x7f00000000c0)='ceph\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000300)='\x00') creat(&(0x7f0000000100)='./control/file0\x00', 0x0) dup2(r0, r1) 09:30:25 executing program 6: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000000)) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000400)=""/250, 0xffffffffffffff1a) mbind(&(0x7f0000289000/0x400000)=nil, 0x400000, 0x1, &(0x7f0000000540), 0x1, 0x2) write$P9_RMKDIR(r0, &(0x7f0000000040)={0x14, 0x49, 0x1, {0x1, 0x4, 0x7}}, 0x14) [ 120.300494] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 120.305519] ? prepare_exit_to_usermode+0x291/0x3b0 [ 120.310547] ? perf_trace_sys_enter+0xb10/0xb10 [ 120.315224] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 120.320082] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 120.325270] RIP: 0033:0x455e29 [ 120.328450] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 09:30:25 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000c80)) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000380)=""/147) r3 = syz_open_pts(0xffffffffffffffff, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f00000001c0), &(0x7f0000000d00)=0x6) ioctl$TCSETS(r3, 0x5402, &(0x7f00000000c0)) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) 09:30:25 executing program 7 (fault-call:1 fault-nth:12): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, &(0x7f00000001c0)={[{@gid={'gid', 0x3d}, 0x2c}]}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, &(0x7f00000001c0)) [ 120.347714] RSP: 002b:00007f94111afc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 120.355432] RAX: ffffffffffffffda RBX: 00007f94111b06d4 RCX: 0000000000455e29 [ 120.362709] RDX: 0000000020000140 RSI: 0000000020000040 RDI: 0000000020000000 [ 120.369985] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 [ 120.377260] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 120.384525] R13: 00000000004c248a R14: 00000000004d0058 R15: 000000000000000b [ 120.464362] ISOFS: Unable to identify CD-ROM format. [ 120.484774] FAULT_INJECTION: forcing a failure. [ 120.484774] name failslab, interval 1, probability 0, space 0, times 0 [ 120.496216] CPU: 1 PID: 8418 Comm: syz-executor7 Not tainted 4.18.0-rc4-next-20180712+ #5 [ 120.504541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 120.513896] Call Trace: [ 120.516491] dump_stack+0x1c9/0x2b4 [ 120.520128] ? dump_stack_print_info.cold.2+0x52/0x52 [ 120.525336] should_fail.cold.4+0xa/0x11 [ 120.529408] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 120.534521] ? save_stack+0xa9/0xd0 [ 120.538154] ? save_stack+0x43/0xd0 [ 120.541786] ? kasan_kmalloc+0xc4/0xe0 [ 120.545675] ? __kmalloc+0x14e/0x760 [ 120.549392] ? __list_lru_init+0x151/0x840 [ 120.553637] ? alloc_super+0x976/0xb10 [ 120.557523] ? sget_fc+0x269/0x950 [ 120.561055] ? vfs_get_super+0x6e/0x270 [ 120.565026] ? proc_get_tree+0x88/0xb0 [ 120.568909] ? vfs_get_tree+0x1cb/0x5c0 [ 120.572868] ? do_mount+0x6c1/0x1fb0 [ 120.576588] ? ksys_mount+0x12d/0x140 [ 120.580398] ? __x64_sys_mount+0xbe/0x150 [ 120.584556] ? do_syscall_64+0x1b9/0x820 [ 120.588635] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 120.594005] ? lock_acquire+0x1e4/0x540 [ 120.597977] ? fs_reclaim_acquire+0x20/0x20 [ 120.602307] ? lock_downgrade+0x8f0/0x8f0 [ 120.606449] ? check_same_owner+0x340/0x340 [ 120.610772] ? rcu_note_context_switch+0x730/0x730 [ 120.615703] __should_failslab+0x124/0x180 [ 120.619937] should_failslab+0x9/0x14 [ 120.623736] kmem_cache_alloc_node_trace+0x26f/0x770 [ 120.628838] ? kasan_kmalloc+0xc4/0xe0 [ 120.632715] __kmalloc_node+0x33/0x70 [ 120.636509] kvmalloc_node+0x65/0xf0 [ 120.640222] __list_lru_init+0x5d9/0x840 [ 120.644279] ? list_lru_destroy+0x500/0x500 [ 120.648592] ? prealloc_shrinker+0x213/0x480 [ 120.652987] ? __init_waitqueue_head+0x9e/0x150 [ 120.657652] ? inactive_list_is_low+0x850/0x850 [ 120.662329] ? __lockdep_init_map+0x105/0x590 [ 120.666811] alloc_super+0x976/0xb10 [ 120.670538] ? destroy_unused_super.part.11+0x110/0x110 [ 120.675902] ? lock_downgrade+0x8f0/0x8f0 [ 120.680051] ? kasan_check_read+0x11/0x20 [ 120.684198] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 120.688789] ? kasan_check_write+0x14/0x20 [ 120.693027] ? do_raw_spin_lock+0xc1/0x200 [ 120.694054] syz-executor3 (8351) used greatest stack depth: 15520 bytes left [ 120.697263] ? ns_test_super+0x50/0x50 [ 120.697277] sget_fc+0x269/0x950 [ 120.697297] ? compare_single+0x10/0x10 [ 120.697312] ? alloc_super+0xb10/0xb10 [ 120.697324] ? logfc+0x810/0x810 [ 120.697342] ? kasan_kmalloc+0xc4/0xe0 [ 120.726825] ? __kmalloc_track_caller+0x311/0x760 [ 120.731680] ? proc_root_lookup+0x60/0x60 [ 120.735839] vfs_get_super+0x6e/0x270 [ 120.739642] proc_get_tree+0x88/0xb0 [ 120.743345] vfs_get_tree+0x1cb/0x5c0 [ 120.747129] do_mount+0x6c1/0x1fb0 [ 120.750652] ? check_same_owner+0x340/0x340 [ 120.754960] ? lock_release+0xa30/0xa30 [ 120.758958] ? copy_mount_string+0x40/0x40 [ 120.763179] ? retint_kernel+0x10/0x10 [ 120.767056] ? copy_mount_options+0x1f0/0x380 [ 120.771532] ? __sanitizer_cov_trace_pc+0x3b/0x50 [ 120.776357] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 120.781877] ? copy_mount_options+0x285/0x380 [ 120.786356] ksys_mount+0x12d/0x140 [ 120.789967] __x64_sys_mount+0xbe/0x150 [ 120.793928] do_syscall_64+0x1b9/0x820 [ 120.797799] ? syscall_return_slowpath+0x5e0/0x5e0 [ 120.802713] ? syscall_return_slowpath+0x31d/0x5e0 [ 120.807626] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 120.812624] ? prepare_exit_to_usermode+0x291/0x3b0 [ 120.817624] ? perf_trace_sys_enter+0xb10/0xb10 [ 120.822278] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 120.827108] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 120.832282] RIP: 0033:0x455e29 [ 120.835450] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 120.854605] RSP: 002b:00007f94111afc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 120.862296] RAX: ffffffffffffffda RBX: 00007f94111b06d4 RCX: 0000000000455e29 [ 120.869558] RDX: 0000000020000140 RSI: 0000000020000040 RDI: 0000000020000000 [ 120.876808] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 09:30:25 executing program 3: r0 = memfd_create(&(0x7f00000000c0)="00000ae5fe0000084000", 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="b92129"], 0x3) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x40, 0x0) execveat(r0, &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0), &(0x7f00000002c0), 0x1000) 09:30:25 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c4600020000010000000000000003000300010000001f020000000000004000000000000000000300000000000095000000020038000100ffff04000800020000000500000064b000000000000002000000000000000200000000000000f5d000000000000004000000000000000800000000000000d041f52b8d1752275bc35414d75cde65ff49179375a0e45ad489b895ed32a8429a2a981d1540689f41a37d0000918125355e4a94800ac83b00ea9398716001360e2835c6eb2149539fbd1671ba5c3f22ce060f8241427048a3b2f1faafdfb9e2fd77c5323ff586314fad76072baff2b5a25d82d4ff86174f9edd0eb9b42c98732c46b1d6eaa2bd6d392d3066a9a06cd63b7ee9f89aa3fd822b52b3d8d0d157e31f8bc045e6cfc0ef551eb75cb65417c31944020100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000c80)) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000380)=""/147) r3 = syz_open_pts(0xffffffffffffffff, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f00000001c0), &(0x7f0000000d00)=0x6) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f0000000200)=""/248, 0xf8) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) [ 120.884059] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 120.891310] R13: 00000000004c248a R14: 00000000004d0058 R15: 000000000000000c 09:30:26 executing program 5: write$eventfd(0xffffffffffffffff, &(0x7f0000000900), 0x8) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)={0xaa}) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='md5sum\x00', 0xffffffffffffff9c}, 0x10) setsockopt$sock_void(r1, 0x1, 0x24, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000140)='./control/file0\x00') r3 = open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) getdents64(r3, &(0x7f0000000000)=""/188, 0xffffffff00000018) mkdirat(r3, &(0x7f0000fc3ff6)='./control\x00', 0x0) getdents64(r3, &(0x7f0000fc4fbe)=""/80, 0x50) close(r0) 09:30:26 executing program 3: r0 = socket(0x10, 0x802, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) write(r0, &(0x7f0000000080)="240000002a0025f000154302000000000000000004000000000000000000000009000000", 0x24) 09:30:26 executing program 7 (fault-call:1 fault-nth:13): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, &(0x7f00000001c0)={[{@gid={'gid', 0x3d}, 0x2c}]}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, &(0x7f00000001c0)) 09:30:26 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000c80)) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000380)=""/147) r3 = syz_open_pts(0xffffffffffffffff, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f00000001c0), &(0x7f0000000d00)=0x6) ioctl$TCSETS(r3, 0x5402, &(0x7f00000000c0)) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f0000000200)=""/248, 0xf8) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) 09:30:26 executing program 0: lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000340)) capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000000)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000080)='ns/net\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)={0xffffffffffffffff}) recvfrom$inet(r2, &(0x7f0000000140)=""/126, 0x7e, 0x1, &(0x7f00000001c0)={0x2, 0x4e24, @multicast2=0xe0000002}, 0x10) accept4$inet(r2, &(0x7f0000000200)={0x0, 0x0, @loopback}, &(0x7f0000000240)=0x10, 0x800) setns(r0, 0x0) 09:30:26 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) r1 = syz_open_procfs$namespace(r0, &(0x7f00000000c0)='ns/mnt\x00') setns(r1, 0x0) 09:30:26 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) chmod(&(0x7f0000000200)='./file0\x00', 0x0) rt_sigprocmask(0x1, &(0x7f00000000c0)={0x98}, &(0x7f0000000180), 0x8) r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x8000, 0x101082) ioctl$KVM_GET_VCPU_EVENTS(r0, 0x8040ae9f, &(0x7f0000000100)) [ 121.152322] ISOFS: Unable to identify CD-ROM format. [ 121.164187] FAT-fs (loop3): bogus number of reserved sectors [ 121.170151] FAT-fs (loop3): Can't find a valid FAT filesystem [ 121.184807] FAULT_INJECTION: forcing a failure. [ 121.184807] name failslab, interval 1, probability 0, space 0, times 0 09:30:26 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0xffffffff}) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x9, 0x2000) ioctl$TIOCGPTPEER(r0, 0x5441, 0x80000000) r1 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r1, 0x0) [ 121.196116] CPU: 0 PID: 8453 Comm: syz-executor7 Not tainted 4.18.0-rc4-next-20180712+ #5 [ 121.204436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 121.213785] Call Trace: [ 121.216372] dump_stack+0x1c9/0x2b4 [ 121.220005] ? dump_stack_print_info.cold.2+0x52/0x52 [ 121.225200] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 121.230758] should_fail.cold.4+0xa/0x11 [ 121.234834] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 121.239951] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 121.245500] ? replace_slot+0xc9/0x4c0 09:30:26 executing program 0: capset(&(0x7f0000000080)={0x20071023}, &(0x7f0000000040)) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x10a00, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000100)=0x7, 0x4) r1 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r1, 0x0) [ 121.249394] ? __save_stack_trace+0x8d/0xf0 [ 121.253726] ? plist_requeue+0x650/0x650 [ 121.257806] ? save_stack+0xa9/0xd0 [ 121.261443] ? lock_acquire+0x1e4/0x540 [ 121.265427] ? lock_acquire+0x1e4/0x540 [ 121.269408] ? fs_reclaim_acquire+0x20/0x20 [ 121.273769] ? lock_downgrade+0x8f0/0x8f0 [ 121.277925] ? check_same_owner+0x340/0x340 [ 121.282257] ? check_same_owner+0x340/0x340 [ 121.286593] ? rcu_note_context_switch+0x730/0x730 [ 121.291548] __should_failslab+0x124/0x180 [ 121.295796] should_failslab+0x9/0x14 09:30:26 executing program 0: capset(&(0x7f0000000280)={0x200f1526}, &(0x7f0000000040)={0x0, 0x100, 0x0, 0x0, 0x40000009}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)={0x0, 0x0}) r1 = syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/ipc\x00') r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x5, 0x4000) ioctl$TIOCMGET(r2, 0x5415, &(0x7f0000000080)) setns(r1, 0x0) [ 121.298587] FAT-fs (loop3): bogus number of reserved sectors [ 121.299600] __kmalloc+0x2c8/0x760 [ 121.299616] ? rcu_note_context_switch+0x730/0x730 [ 121.299634] ? __list_lru_init+0x151/0x840 [ 121.299651] __list_lru_init+0x151/0x840 [ 121.299664] ? list_lru_destroy+0x500/0x500 [ 121.299681] ? prealloc_shrinker+0x124/0x480 [ 121.305501] FAT-fs (loop3): Can't find a valid FAT filesystem [ 121.309001] ? prealloc_shrinker+0x213/0x480 [ 121.309015] ? __init_waitqueue_head+0x9e/0x150 [ 121.309033] ? inactive_list_is_low+0x850/0x850 [ 121.350484] ? __lockdep_init_map+0x105/0x590 [ 121.354997] alloc_super+0x976/0xb10 [ 121.358731] ? destroy_unused_super.part.11+0x110/0x110 [ 121.364102] ? lock_downgrade+0x8f0/0x8f0 [ 121.368262] ? kasan_check_read+0x11/0x20 [ 121.372406] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 121.376992] ? kasan_check_write+0x14/0x20 [ 121.381232] ? do_raw_spin_lock+0xc1/0x200 [ 121.385479] ? ns_test_super+0x50/0x50 [ 121.389372] sget_fc+0x269/0x950 [ 121.392750] ? compare_single+0x10/0x10 [ 121.396727] ? alloc_super+0xb10/0xb10 [ 121.400629] ? logfc+0x810/0x810 [ 121.403991] ? kasan_kmalloc+0xc4/0xe0 [ 121.407888] ? __kmalloc_track_caller+0x311/0x760 [ 121.412738] ? proc_root_lookup+0x60/0x60 [ 121.416884] vfs_get_super+0x6e/0x270 [ 121.420682] proc_get_tree+0x88/0xb0 [ 121.424409] vfs_get_tree+0x1cb/0x5c0 [ 121.428214] do_mount+0x6c1/0x1fb0 [ 121.431763] ? kasan_check_write+0x14/0x20 [ 121.436007] ? copy_mount_string+0x40/0x40 [ 121.440246] ? kasan_kmalloc+0xc4/0xe0 [ 121.444140] ? kmem_cache_alloc_trace+0x318/0x780 [ 121.448993] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 121.454540] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 121.460081] ? copy_mount_options+0x285/0x380 [ 121.464560] ksys_mount+0x12d/0x140 [ 121.468169] __x64_sys_mount+0xbe/0x150 [ 121.472130] do_syscall_64+0x1b9/0x820 [ 121.475999] ? finish_task_switch+0x1d3/0x870 [ 121.480497] ? syscall_return_slowpath+0x5e0/0x5e0 [ 121.485431] ? syscall_return_slowpath+0x31d/0x5e0 [ 121.490354] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 121.495356] ? prepare_exit_to_usermode+0x291/0x3b0 [ 121.500370] ? perf_trace_sys_enter+0xb10/0xb10 [ 121.505051] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 121.509881] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 121.515060] RIP: 0033:0x455e29 [ 121.518238] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 121.520505] ceph: device name is missing path (no : separator in /dev/loop4) [ 121.537496] RSP: 002b:00007f94111afc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 121.537509] RAX: ffffffffffffffda RBX: 00007f94111b06d4 RCX: 0000000000455e29 [ 121.537515] RDX: 0000000020000140 RSI: 0000000020000040 RDI: 0000000020000000 [ 121.537521] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 [ 121.537527] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 121.537533] R13: 00000000004c248a R14: 00000000004d0058 R15: 000000000000000d 09:30:26 executing program 4: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x40) getpeername$inet(r0, &(0x7f0000000100)={0x0, 0x0, @local}, &(0x7f0000000140)=0x10) r1 = socket$inet6(0xa, 0x1000000000003, 0x100000003) ioctl(r1, 0x8912, &(0x7f0000000000)="025cc83d6d345f8f762070") getsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 09:30:26 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) 09:30:26 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x4, 0xc2600) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4068aea3, &(0x7f0000000240)={0x7b, 0x0, [0x10000, 0x401]}) ioctl(r0, 0x1000000000008912, &(0x7f00000003c0)="025cc83d6d345f8f762070") ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r1, 0x40045730, &(0x7f0000000400)=0x8) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000540)=@req={0x9fe, 0x20, 0x7, 0x100000001}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r2, 0x2000000000005452, &(0x7f0000fc3000)=0x1) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x4000000000001c4, 0x0) dup2(r2, r3) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000440)=ANY=[@ANYBLOB="66696c746572000000000000000000000031576f1914522d68c4057e38205f3326b1e4bdee24ec70964c9d68c795292cb2b8fea06d7f080937427ad0b18bef850dab0b95f5c4a3b688c0521bbb66f6dca245dddd443ab50b36bf960ead5acea2fac2bfbd133a3fd9f34627dcc2cb441027e42f3639a8a277eb580a3fd89b010b6d22cb000000000000000000"], &(0x7f0000000500)=0x96) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r4, &(0x7f00000002c0)="0c811a86abbe22e10e290bd1ec7bfe537147323921cc665f988efb1ce2a7e1377452774026e9844331fb190a87f09a25a0158807da118e4451f9218fc6994b28bad2aa137fb44d8fe40f5a70ddbbcf60b20d5ad8bc16bbf3f0479829e85a8d4774a68f0f8bc134f62399dc19d85c87b56e74d13f9d3d9498ba7ffc8adbf1e33c0d565bc5f778f6591e48e8607e297fff89cb580981febc5aabd6ae2e736dd0c485af8c3992dca5045120142739944fecadf323418d2ea5a74db19ab2602441c5b57d2d6e3972741fd33ffba9"}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000600)={0x0, 0x54, &(0x7f0000000580)=[@in6={0xa, 0x4e21, 0x7, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, @in6={0xa, 0x4e21, 0xaa7, @mcast1={0xff, 0x1, [], 0x1}, 0x1}, @in6={0xa, 0x4e21, 0x80, @dev={0xfe, 0x80, [], 0x12}, 0x6}]}, &(0x7f0000000640)=0x10) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000680)={r5, 0x9}, 0x8) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x0, 0x0) ioctl$KVM_X86_SET_MCE(r4, 0x4040ae9e, &(0x7f0000000140)={0x800000000000000, 0xd000, 0x983, 0x9, 0x1b}) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x60}}) 09:30:26 executing program 7 (fault-call:1 fault-nth:14): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, &(0x7f00000001c0)={[{@gid={'gid', 0x3d}, 0x2c}]}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, &(0x7f00000001c0)) 09:30:26 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c4600020000010000000000000003000300010000001f020000000000004000000000000000000300000000000095000000020038000100ffff04000800020000000500000064b000000000000002000000000000000200000000000000f5d000000000000004000000000000000800000000000000d041f52b8d1752275bc35414d75cde65ff49179375a0e45ad489b895ed32a8429a2a981d1540689f41a37d0000918125355e4a94800ac83b00ea9398716001360e2835c6eb2149539fbd1671ba5c3f22ce060f8241427048a3b2f1faafdfb9e2fd77c5323ff586314fad76072baff2b5a25d82d4ff86174f9edd0eb9b42c98732c46b1d6eaa2bd6d392d3066a9a06cd63b7ee9f89aa3fd822b52b3d8d0d157e31f8bc045e6cfc0ef551eb75cb65417c31944020100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000c80)) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000380)=""/147) syz_open_pts(0xffffffffffffffff, 0x0) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f0000000200)=""/248, 0xf8) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) 09:30:26 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000c80)) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000380)=""/147) r3 = syz_open_pts(0xffffffffffffffff, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f00000001c0), &(0x7f0000000d00)=0x6) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f0000000200)=""/248, 0xf8) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) [ 121.670903] Unknown ioctl 1077980830 [ 121.690387] ISOFS: Unable to identify CD-ROM format. [ 121.720569] Unknown ioctl 1077980830 [ 121.730555] FAULT_INJECTION: forcing a failure. [ 121.730555] name failslab, interval 1, probability 0, space 0, times 0 [ 121.741823] CPU: 0 PID: 8521 Comm: syz-executor7 Not tainted 4.18.0-rc4-next-20180712+ #5 [ 121.750145] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 121.759503] Call Trace: [ 121.762104] dump_stack+0x1c9/0x2b4 [ 121.765744] ? dump_stack_print_info.cold.2+0x52/0x52 [ 121.770926] ? perf_trace_lock+0xde/0x920 [ 121.775065] should_fail.cold.4+0xa/0x11 [ 121.779112] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 121.784237] ? save_stack+0xa9/0xd0 [ 121.787852] ? save_stack+0x43/0xd0 [ 121.791481] ? kasan_kmalloc+0xc4/0xe0 [ 121.795353] ? __list_lru_init+0x151/0x840 [ 121.799570] ? alloc_super+0x976/0xb10 [ 121.803443] ? vfs_get_super+0x6e/0x270 [ 121.807400] ? proc_get_tree+0x88/0xb0 [ 121.811289] ? vfs_get_tree+0x1cb/0x5c0 [ 121.815247] ? do_mount+0x6c1/0x1fb0 [ 121.818946] ? __x64_sys_mount+0xbe/0x150 [ 121.823083] ? lock_acquire+0x1e4/0x540 [ 121.827047] ? fs_reclaim_acquire+0x20/0x20 [ 121.831357] ? lock_downgrade+0x8f0/0x8f0 [ 121.835495] ? check_same_owner+0x340/0x340 [ 121.839816] ? rcu_note_context_switch+0x730/0x730 [ 121.844740] __should_failslab+0x124/0x180 [ 121.848963] should_failslab+0x9/0x14 [ 121.852749] kmem_cache_alloc_node_trace+0x26f/0x770 [ 121.857838] ? kasan_kmalloc+0xc4/0xe0 [ 121.861718] __kmalloc_node+0x33/0x70 [ 121.865504] kvmalloc_node+0x65/0xf0 [ 121.869202] __list_lru_init+0x5d9/0x840 [ 121.873254] ? list_lru_destroy+0x500/0x500 [ 121.877562] ? prealloc_shrinker+0x213/0x480 [ 121.881952] ? __init_waitqueue_head+0x9e/0x150 [ 121.886606] ? inactive_list_is_low+0x850/0x850 [ 121.891261] ? __lockdep_init_map+0x105/0x590 [ 121.895745] alloc_super+0x976/0xb10 [ 121.899447] ? destroy_unused_super.part.11+0x110/0x110 [ 121.904798] ? lock_downgrade+0x8f0/0x8f0 [ 121.908938] ? kasan_check_read+0x11/0x20 [ 121.913070] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 121.917635] ? kasan_check_write+0x14/0x20 [ 121.921868] ? do_raw_spin_lock+0xc1/0x200 [ 121.926089] ? ns_test_super+0x50/0x50 [ 121.929962] sget_fc+0x269/0x950 [ 121.933311] ? compare_single+0x10/0x10 [ 121.937281] ? alloc_super+0xb10/0xb10 [ 121.941154] ? logfc+0x810/0x810 [ 121.944505] ? kasan_kmalloc+0xc4/0xe0 [ 121.948379] ? __kmalloc_track_caller+0x311/0x760 [ 121.953209] ? proc_root_lookup+0x60/0x60 [ 121.957345] vfs_get_super+0x6e/0x270 [ 121.961131] proc_get_tree+0x88/0xb0 [ 121.964829] vfs_get_tree+0x1cb/0x5c0 [ 121.968617] do_mount+0x6c1/0x1fb0 [ 121.972146] ? kasan_check_write+0x14/0x20 [ 121.976370] ? copy_mount_string+0x40/0x40 [ 121.980591] ? kasan_kmalloc+0xc4/0xe0 [ 121.984465] ? kmem_cache_alloc_trace+0x318/0x780 [ 121.989298] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 121.994835] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 122.000357] ? copy_mount_options+0x285/0x380 [ 122.004842] ksys_mount+0x12d/0x140 [ 122.008454] __x64_sys_mount+0xbe/0x150 [ 122.012415] do_syscall_64+0x1b9/0x820 [ 122.016287] ? syscall_slow_exit_work+0x500/0x500 [ 122.021117] ? syscall_return_slowpath+0x5e0/0x5e0 [ 122.026045] ? syscall_return_slowpath+0x31d/0x5e0 [ 122.030961] ? prepare_exit_to_usermode+0x291/0x3b0 [ 122.035962] ? perf_trace_sys_enter+0xb10/0xb10 [ 122.040615] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 122.045450] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 122.050652] RIP: 0033:0x455e29 [ 122.053840] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 122.073075] RSP: 002b:00007f94111afc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 122.080769] RAX: ffffffffffffffda RBX: 00007f94111b06d4 RCX: 0000000000455e29 [ 122.088034] RDX: 0000000020000140 RSI: 0000000020000040 RDI: 0000000020000000 [ 122.095288] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 [ 122.102538] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 122.109803] R13: 00000000004c248a R14: 00000000004d0058 R15: 000000000000000e 09:30:27 executing program 5: write$eventfd(0xffffffffffffffff, &(0x7f0000000900), 0x8) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)={0xaa}) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='md5sum\x00', 0xffffffffffffff9c}, 0x10) setsockopt$sock_void(r1, 0x1, 0x24, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000140)='./control/file0\x00') r3 = open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) getdents64(r3, &(0x7f0000000000)=""/188, 0xffffffff00000018) mkdirat(r3, &(0x7f0000fc3ff6)='./control\x00', 0x0) getdents64(r3, &(0x7f0000fc4fbe)=""/80, 0x50) close(r0) 09:30:27 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x440000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000080)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) 09:30:27 executing program 4: r0 = socket$inet6(0xa, 0x5, 0xffffffff) ioctl(r0, 0x8912, &(0x7f00000002c0)="025cc83d6d345f8f762070") r1 = dup3(r0, r0, 0x80000) mq_timedreceive(r1, &(0x7f0000000540)=""/4096, 0x1000, 0x5, &(0x7f0000000000)) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vcs\x00', 0x0, 0x0) lseek(r2, 0x0, 0x0) 09:30:27 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000c80)) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000380)=""/147) r3 = syz_open_pts(0xffffffffffffffff, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f00000001c0), &(0x7f0000000d00)=0x6) ioctl$TCSETS(r3, 0x5402, &(0x7f00000000c0)) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f0000000200)=""/248, 0xf8) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) 09:30:27 executing program 7 (fault-call:1 fault-nth:15): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, &(0x7f00000001c0)={[{@gid={'gid', 0x3d}, 0x2c}]}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, &(0x7f00000001c0)) 09:30:27 executing program 6: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x40080, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000080)={0x0, 0xaa6}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000140)={r1, 0x3}, &(0x7f0000000180)=0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f000007d000)={0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000100)='\x00\x00\x00\x00', 0x0) ftruncate(r3, 0x40001) sendfile(r2, r3, &(0x7f000000a000), 0x2) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") sendfile(r2, r3, &(0x7f0000000040)=0x2, 0x20005) 09:30:27 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x644000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000240)=0x0) r3 = getuid() getgroups(0x2, &(0x7f0000000440)=[0xee00, 0xee01]) sendmsg$unix(r1, &(0x7f0000000500)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000180)="89b0f2373384eeedbd8b3415394feab15f559b1326ee5db724a73fcdaba08afabd305f2b2b04ef520182ac44af76d8ca9dc2b6bd05660066772a82852d44ad98ec8a61dba0c5ae47bf6b9d42389e7aaea3526dbf69d5fcf891bf484fbb976324de06778aeacf7a6d5e58e2bf47bf0d0e534178aeb30f4e4b58c77be56cfc940c49371b2c357c4b158e1a56778ec0ffc170", 0x91}, {&(0x7f00000002c0)="89f6b82159c72bffc7bc4c38b378fb65bc41806632e2794063c28fc21e76f7e2dccb8178e8839fb7e949b07a9658f97b9040794cc02078670f88d67418068981362d194309903d1f", 0x48}, {&(0x7f0000000340)="3ab127008541c88e2f0a39c00400ddadfc3f6eef3442e206a53dbc6793b6d5ea03736a84ebf199434dfaec2ab1c6120f2518475ecac9f1d7b90831a1270910491c35f9cd9db2dedfe9ffe59d8ca3083ab2dab5cbab8b88ef69688c2e134d6f9025b3a55f6faa4c3ceaa54a2d8f05e5d2f077415eb6c21d7b575b81078b5e7c96237d06ef83913898b0ed120341106a822b47186849e29406607c7813bcbd2582531124633468e573001f1dd1ab991d444740e628d9a28d424b0662b28c7d13c304eb98af8cfd4693ab29c66607580b12015c7ffb80472a019e5d047ee9d99382074bc7c4aa024924c8f35d3e5e4650", 0xef}], 0x3, &(0x7f0000000480)=[@rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x18, 0x1, 0x1, [r0]}], 0x60, 0x4010}, 0x8000) setns(r0, 0x0) 09:30:27 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000180)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}], 0x10) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x800, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000040)) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000662000), 0x4) getsockname(r0, &(0x7f00000009c0)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000a40)=0x80) 09:30:27 executing program 6: syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") [ 122.318341] ISOFS: Unable to identify CD-ROM format. [ 122.356295] FAULT_INJECTION: forcing a failure. [ 122.356295] name failslab, interval 1, probability 0, space 0, times 0 [ 122.367659] CPU: 1 PID: 8550 Comm: syz-executor7 Not tainted 4.18.0-rc4-next-20180712+ #5 [ 122.375981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 122.385336] Call Trace: [ 122.387925] dump_stack+0x1c9/0x2b4 [ 122.391545] ? dump_stack_print_info.cold.2+0x52/0x52 [ 122.396724] ? __kernel_text_address+0xd/0x40 [ 122.401227] ? unwind_get_return_address+0x61/0xa0 09:30:27 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000080)=0x0) r1 = syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/mnt\x00') setns(r1, 0x0) 09:30:27 executing program 6: r0 = socket(0x1e, 0x5, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x2000, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000040)="0411440c3f41e1ea646581339a2c19e3a67407d7d21bc22682d2ff421d94114f19c6497f8da895b8d0fe01be29f82d0b8627c8d167fde660f2", &(0x7f0000000080)=""/43}, 0x18) connect$llc(r0, &(0x7f00000000c0)={0x1e, 0x302}, 0x10) 09:30:27 executing program 4: syz_mount_image$msdos(&(0x7f0000000300)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200020000f801", 0x17}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='fmask=00000000008000000000000,\x00']) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x428802, 0x0) ioctl$ASHMEM_GET_SIZE(r0, 0x7704, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f00000000c0)={'nr0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}) socket$nl_route(0x10, 0x3, 0x0) [ 122.406170] should_fail.cold.4+0xa/0x11 [ 122.410240] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 122.415358] ? save_stack+0xa9/0xd0 [ 122.418996] ? save_stack+0x43/0xd0 [ 122.422632] ? kasan_kmalloc+0xc4/0xe0 [ 122.426525] ? kmem_cache_alloc_trace+0x152/0x780 [ 122.431375] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 122.436569] ? __list_lru_init+0x4d6/0x840 [ 122.440813] ? alloc_super+0x976/0xb10 [ 122.444710] ? vfs_get_super+0x6e/0x270 [ 122.448692] ? proc_get_tree+0x88/0xb0 [ 122.452581] ? vfs_get_tree+0x1cb/0x5c0 09:30:27 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0x3, 0x8, 0x2, 0x6, 0xb9c1}, 0x14) chroot(&(0x7f0000000100)='./file0\x00') setns(r0, 0x0) 09:30:27 executing program 6: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000040)={0x7, 0x9, 0x81, 0x8001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = getpgrp(0x0) r3 = fcntl$getown(r0, 0x9) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x80, 0x0) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000080)={r4, r1, 0x80000001}) setsockopt$inet6_tcp_buf(r1, 0x6, 0x1f, &(0x7f0000000200)="b3", 0x1) [ 122.456561] ? do_mount+0x6c1/0x1fb0 [ 122.460278] ? ksys_mount+0x12d/0x140 [ 122.464086] ? __x64_sys_mount+0xbe/0x150 [ 122.468246] ? do_syscall_64+0x1b9/0x820 [ 122.472316] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 122.477690] ? __sched_text_start+0x8/0x8 [ 122.477825] FAT-fs (loop4): Unrecognized mount option "fmask=00000000008000000000000" or missing value [ 122.481841] ? lock_acquire+0x1e4/0x540 [ 122.481856] ? fs_reclaim_acquire+0x20/0x20 [ 122.481874] ? lock_downgrade+0x8f0/0x8f0 [ 122.503719] ? __x64_sys_mount+0xbe/0x150 [ 122.507894] ? check_same_owner+0x340/0x340 [ 122.512218] ? rcu_note_context_switch+0x730/0x730 [ 122.517157] __should_failslab+0x124/0x180 [ 122.521399] should_failslab+0x9/0x14 [ 122.525190] kmem_cache_alloc_trace+0x2cb/0x780 [ 122.529847] ? kasan_kmalloc+0xc4/0xe0 [ 122.533731] __memcg_init_list_lru_node+0x185/0x2d0 [ 122.538740] ? kvfree_rcu+0x20/0x20 [ 122.542354] ? __kmalloc_node+0x47/0x70 [ 122.546316] __list_lru_init+0x4d6/0x840 [ 122.550365] ? list_lru_destroy+0x500/0x500 [ 122.554699] ? prealloc_shrinker+0x213/0x480 [ 122.559094] ? __init_waitqueue_head+0x9e/0x150 [ 122.563753] ? inactive_list_is_low+0x850/0x850 [ 122.568410] ? __lockdep_init_map+0x105/0x590 [ 122.572896] alloc_super+0x976/0xb10 [ 122.576601] ? destroy_unused_super.part.11+0x110/0x110 [ 122.581953] ? lock_downgrade+0x8f0/0x8f0 [ 122.586095] ? kasan_check_read+0x11/0x20 [ 122.590246] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 122.594817] ? kasan_check_write+0x14/0x20 [ 122.599036] ? do_raw_spin_lock+0xc1/0x200 [ 122.603258] ? ns_test_super+0x50/0x50 [ 122.607130] sget_fc+0x269/0x950 [ 122.610484] ? compare_single+0x10/0x10 [ 122.614445] ? alloc_super+0xb10/0xb10 [ 122.618317] ? logfc+0x810/0x810 [ 122.621671] ? kasan_kmalloc+0xc4/0xe0 [ 122.625547] ? __kmalloc_track_caller+0x311/0x760 [ 122.630378] ? proc_root_lookup+0x60/0x60 [ 122.634512] vfs_get_super+0x6e/0x270 [ 122.638300] proc_get_tree+0x88/0xb0 [ 122.642002] vfs_get_tree+0x1cb/0x5c0 [ 122.645798] do_mount+0x6c1/0x1fb0 [ 122.649324] ? kasan_check_read+0x11/0x20 [ 122.653455] ? do_raw_spin_unlock+0xa7/0x2f0 [ 122.657855] ? copy_mount_string+0x40/0x40 [ 122.662080] ? retint_kernel+0x10/0x10 [ 122.665966] ? copy_mount_options+0x1f0/0x380 [ 122.670446] ? copy_mount_options+0x1f6/0x380 [ 122.674929] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 122.680450] ? copy_mount_options+0x285/0x380 [ 122.684932] ksys_mount+0x12d/0x140 [ 122.688547] __x64_sys_mount+0xbe/0x150 [ 122.692509] do_syscall_64+0x1b9/0x820 [ 122.696380] ? finish_task_switch+0x1d3/0x870 [ 122.700877] ? syscall_return_slowpath+0x5e0/0x5e0 [ 122.705807] ? syscall_return_slowpath+0x31d/0x5e0 [ 122.710725] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 122.715728] ? prepare_exit_to_usermode+0x291/0x3b0 [ 122.720743] ? perf_trace_sys_enter+0xb10/0xb10 [ 122.725402] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 122.730236] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 122.735411] RIP: 0033:0x455e29 [ 122.738580] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 122.757845] RSP: 002b:00007f94111afc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 122.765540] RAX: ffffffffffffffda RBX: 00007f94111b06d4 RCX: 0000000000455e29 [ 122.772794] RDX: 0000000020000140 RSI: 0000000020000040 RDI: 0000000020000000 [ 122.780046] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 [ 122.787297] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 122.794569] R13: 00000000004c248a R14: 00000000004d0058 R15: 000000000000000f 09:30:28 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000c80)) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000380)=""/147) syz_open_pts(0xffffffffffffffff, 0x0) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f0000000200)=""/248, 0xf8) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) 09:30:28 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) r1 = msgget(0x2, 0x200) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000100)=""/71) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000001c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000300)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000000400)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000500)={0x0, @empty, @remote}, &(0x7f0000000540)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000580)={'bridge0\x00', 0x0}) getpeername$packet(0xffffffffffffff9c, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000600)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000900)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000640)={0x258, r2, 0x0, 0x70bd2b, 0x25dfdbfd, {0x2}, [{{0x8, 0x1, r3}, {0xb4, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0xaa5}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8, 0x3, 0x5}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r5}, {0x180, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x100}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0xffffffffffff78d7}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8, 0x3, 0xb}, {0x24, 0x4, [{0x5, 0x9, 0x7, 0x2}, {0xffffffffffffc410, 0x5, 0xd3, 0x7}, {0xfffffffffffff801, 0x7fffffff, 0x8, 0xcbf3}, {0x858, 0x7, 0xfffffffffffffeff, 0x97}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r7}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r8}}}]}}]}, 0x258}, 0x1, 0x0, 0x0, 0x20000000}, 0x20004851) [ 122.820222] FAT-fs (loop4): Unrecognized mount option "fmask=00000000008000000000000" or missing value 09:30:28 executing program 5: munmap(&(0x7f000053c000/0x3000)=nil, 0x3000) r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f000053e000/0x1000)=nil) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x40000, 0x0) ioctl$KVM_GET_FPU(r1, 0x81a0ae8c, &(0x7f0000000040)) shmat(r0, &(0x7f000053c000/0x4000)=nil, 0x0) 09:30:28 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000c80)) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000380)=""/147) r3 = syz_open_pts(0xffffffffffffffff, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f00000001c0), &(0x7f0000000d00)=0x6) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f0000000200)=""/248, 0xf8) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) 09:30:28 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000575ff0)={&(0x7f0000333f88)={0x2, 0x3, 0x0, 0x2, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x40000000000006, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback=0x7f000001}}, @sadb_sa={0x2, 0x1}, @sadb_address={0x3, 0x20000000000005, 0x0, 0x0, 0x0, @in={0x2, 0x0, @broadcast=0xffffffff}}]}, 0x50}, 0x1}, 0x0) socket$key(0xf, 0x3, 0x2) 09:30:28 executing program 7 (fault-call:1 fault-nth:16): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, &(0x7f00000001c0)={[{@gid={'gid', 0x3d}, 0x2c}]}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, &(0x7f00000001c0)) 09:30:28 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r1, 0x40405514, &(0x7f0000000000)={0x5, 0x0, 0x400, 0x4, '\x00', 0xfffffffffffffffd}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080), &(0x7f0000000100)=0x14) 09:30:28 executing program 6: chmod(&(0x7f0000000080)='./file0\x00', 0x5398fffb08fec7ed) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x8000, 0x2000) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, &(0x7f00000000c0)=""/28, &(0x7f0000000100)=0x1c) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) 09:30:28 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000c80)) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000380)=""/147) r3 = syz_open_pts(0xffffffffffffffff, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f00000001c0), &(0x7f0000000d00)=0x6) ioctl$TCSETS(r3, 0x5402, &(0x7f00000000c0)) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) [ 123.238290] ISOFS: Unable to identify CD-ROM format. [ 123.264412] FAULT_INJECTION: forcing a failure. [ 123.264412] name failslab, interval 1, probability 0, space 0, times 0 [ 123.275782] CPU: 0 PID: 8624 Comm: syz-executor7 Not tainted 4.18.0-rc4-next-20180712+ #5 [ 123.284102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 123.293456] Call Trace: [ 123.296062] dump_stack+0x1c9/0x2b4 [ 123.299702] ? dump_stack_print_info.cold.2+0x52/0x52 [ 123.304906] ? __kernel_text_address+0xd/0x40 [ 123.309434] ? unwind_get_return_address+0x61/0xa0 [ 123.314372] should_fail.cold.4+0xa/0x11 [ 123.318446] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 123.323563] ? save_stack+0xa9/0xd0 [ 123.327206] ? save_stack+0x43/0xd0 [ 123.330830] ? kasan_kmalloc+0xc4/0xe0 [ 123.334708] ? kmem_cache_alloc_trace+0x152/0x780 [ 123.339546] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 123.344727] ? __list_lru_init+0x4d6/0x840 [ 123.348950] ? alloc_super+0x976/0xb10 [ 123.352825] ? vfs_get_super+0x6e/0x270 [ 123.356784] ? proc_get_tree+0x88/0xb0 [ 123.360665] ? vfs_get_tree+0x1cb/0x5c0 [ 123.364653] ? do_mount+0x6c1/0x1fb0 [ 123.368354] ? ksys_mount+0x12d/0x140 [ 123.372140] ? __x64_sys_mount+0xbe/0x150 [ 123.376289] ? do_syscall_64+0x1b9/0x820 [ 123.380337] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 123.385704] ? save_stack+0xa9/0xd0 [ 123.389321] ? lock_acquire+0x1e4/0x540 [ 123.393281] ? fs_reclaim_acquire+0x20/0x20 [ 123.397590] ? lock_downgrade+0x8f0/0x8f0 [ 123.401726] ? __x64_sys_mount+0xbe/0x150 [ 123.405880] ? check_same_owner+0x340/0x340 [ 123.410200] ? rcu_note_context_switch+0x730/0x730 [ 123.415124] __should_failslab+0x124/0x180 [ 123.419348] should_failslab+0x9/0x14 [ 123.423135] kmem_cache_alloc_trace+0x2cb/0x780 [ 123.427793] ? kasan_kmalloc+0xc4/0xe0 [ 123.431676] __memcg_init_list_lru_node+0x185/0x2d0 [ 123.436681] ? kvfree_rcu+0x20/0x20 [ 123.440294] ? __kmalloc_node+0x47/0x70 [ 123.444275] __list_lru_init+0x4d6/0x840 [ 123.448323] ? list_lru_destroy+0x500/0x500 [ 123.452636] ? prealloc_shrinker+0x213/0x480 [ 123.457042] ? __init_waitqueue_head+0x9e/0x150 [ 123.461696] ? inactive_list_is_low+0x850/0x850 [ 123.466351] ? __lockdep_init_map+0x105/0x590 [ 123.470835] alloc_super+0x976/0xb10 [ 123.474554] ? destroy_unused_super.part.11+0x110/0x110 [ 123.479904] ? lock_downgrade+0x8f0/0x8f0 [ 123.484045] ? kasan_check_read+0x11/0x20 [ 123.488191] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 123.492764] ? kasan_check_write+0x14/0x20 [ 123.496985] ? do_raw_spin_lock+0xc1/0x200 [ 123.501211] ? ns_test_super+0x50/0x50 [ 123.505087] sget_fc+0x269/0x950 [ 123.508439] ? compare_single+0x10/0x10 [ 123.512402] ? alloc_super+0xb10/0xb10 [ 123.516285] ? logfc+0x810/0x810 [ 123.519637] ? kasan_kmalloc+0xc4/0xe0 [ 123.523513] ? __kmalloc_track_caller+0x311/0x760 [ 123.528348] ? proc_root_lookup+0x60/0x60 [ 123.532483] vfs_get_super+0x6e/0x270 [ 123.536274] proc_get_tree+0x88/0xb0 [ 123.539973] vfs_get_tree+0x1cb/0x5c0 [ 123.543761] do_mount+0x6c1/0x1fb0 [ 123.547292] ? kasan_check_write+0x14/0x20 [ 123.551521] ? copy_mount_string+0x40/0x40 [ 123.555745] ? kasan_kmalloc+0xc4/0xe0 [ 123.559621] ? kmem_cache_alloc_trace+0x318/0x780 [ 123.564455] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 123.569983] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 123.575506] ? copy_mount_options+0x285/0x380 [ 123.579994] ksys_mount+0x12d/0x140 [ 123.583612] __x64_sys_mount+0xbe/0x150 [ 123.587576] do_syscall_64+0x1b9/0x820 [ 123.591447] ? finish_task_switch+0x1d3/0x870 [ 123.595930] ? syscall_return_slowpath+0x5e0/0x5e0 [ 123.600846] ? syscall_return_slowpath+0x31d/0x5e0 [ 123.605764] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 123.610770] ? prepare_exit_to_usermode+0x291/0x3b0 [ 123.615788] ? perf_trace_sys_enter+0xb10/0xb10 [ 123.620445] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 123.625292] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 123.630467] RIP: 0033:0x455e29 [ 123.633639] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 123.652908] RSP: 002b:00007f94111afc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 09:30:28 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00005cfff6)='/dev/cuse\x00', 0x8010000080802, 0x0) pread64(r0, &(0x7f0000a4c000)=""/56, 0x38, 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000000)={0xffffffff, 0x7f93, 0x101, 0x1f, 0x9, 0x80, 0x5, 0x3, 0xffffffffffffffff, 0x0, 0x20, 0x2}) 09:30:28 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xfffffffffffffffc}) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') r1 = getpgid(0x0) syz_open_procfs$namespace(r1, &(0x7f0000000240)='ns/cgroup\x00') r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) getdents(r2, &(0x7f0000000140)=""/240, 0xf0) setns(r0, 0x0) r3 = socket$nl_xfrm(0x2, 0x6, 0x21) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10d, 0x11, &(0x7f0000000ffc), 0x4) ioctl$VHOST_GET_VRING_BASE(r0, 0xc008af12, &(0x7f0000000080)) sendmsg$nl_xfrm(r3, &(0x7f0000003000)={&(0x7f0000001000)={0x10}, 0xc, &(0x7f0000003ff0)={&(0x7f0000000000)=@delpolicy={0x50, 0x14, 0x0, 0x0, 0x0, {{@in=@local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @in=@rand_addr}}}, 0x50}, 0x1}, 0x1fff) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x4801, 0x0) sync_file_range(r0, 0x5, 0x6, 0x3) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) 09:30:28 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000c80)) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000380)=""/147) r3 = syz_open_pts(0xffffffffffffffff, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f00000001c0), &(0x7f0000000d00)=0x6) ioctl$TCSETS(r3, 0x5402, &(0x7f00000000c0)) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) 09:30:28 executing program 5: mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x107a, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000000004d688cf3656c000d0400008035020000ebb9337fb9f7c7861b734a4c77f074ba99fefb44a11981f281c4d99b5d79f54fb13a2837861f5d8af8cb4afa08e9299ad95f9ab021d5b579dfdb4ba019bf65e4"], &(0x7f0000000080)={0x1, 0x1, [0x5cc, 0x451, 0x857, 0x10c]}) [ 123.660603] RAX: ffffffffffffffda RBX: 00007f94111b06d4 RCX: 0000000000455e29 [ 123.667858] RDX: 0000000020000140 RSI: 0000000020000040 RDI: 0000000020000000 [ 123.675110] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 [ 123.682378] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 123.689631] R13: 00000000004c248a R14: 00000000004d0058 R15: 0000000000000010 09:30:28 executing program 4: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000000)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) 09:30:28 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000c80)) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000380)=""/147) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f0000000200)=""/248, 0xf8) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) 09:30:28 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c4600020000010000000000000003000300010000001f020000000000004000000000000000000300000000000095000000020038000100ffff04000800020000000500000064b000000000000002000000000000000200000000000000f5d000000000000004000000000000000800000000000000d041f52b8d1752275bc35414d75cde65ff49179375a0e45ad489b895ed32a8429a2a981d1540689f41a37d0000918125355e4a94800ac83b00ea9398716001360e2835c6eb2149539fbd1671ba5c3f22ce060f8241427048a3b2f1faafdfb9e2fd77c5323ff586314fad76072baff2b5a25d82d4ff86174f9edd0eb9b42c98732c46b1d6eaa2bd6d392d3066a9a06cd63b7ee9f89aa3fd822b52b3d8d0d157e31f8bc045e6cfc0ef551eb75cb65417c31944020100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000c80)) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000380)=""/147) r3 = syz_open_pts(0xffffffffffffffff, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f00000001c0), &(0x7f0000000d00)=0x6) ioctl$TCSETS(r3, 0x5402, &(0x7f00000000c0)) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) 09:30:28 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x1c9, 0x20000) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000140)) capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r1 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r1, 0x0) 09:30:29 executing program 5: clone(0x4, &(0x7f0000000540)="0052207a739d90b3531a805f7e02f937aa7b5c311a2d3b45dd0400d9d0820cfdcee4475e25d680627e57c34e4c78a8a325ad9880f9dce09d68cb67ef1a686f1cc8f8909a5cb5f464ff6dcbef5dd842f71f10fe66d978d783247b90ba11695a3cbe966e204a6216ece25f33bb815c222b393e32054a547897a16437d023d7376b78abf4630935dae95848425351e75e051f8ba6208f02c0be594a30dcc37d8f3b8fe80396fe1d09a3a5de87aa41b52cce758f4d3e68e6b7337681241c2dfb511fe09c9f420d790cd4ed6936dc660a2f", &(0x7f0000000100), &(0x7f0000000640), &(0x7f0000000480)="4bd0abeaf3cb46460aae674cd7d741525feae0a4e33d2d2ec6235132cd1bfd0883d428f36bef4b629fab323265d1633423c625d3b3879aeb037be877a8b0348a36c09efc1030d22f04bb226bafa465e82edb9fa1b6e5df9287b42d60f44e25f84ed05050a13a69d3ac4bc4fd766a8fec7f50432409f689687dd55601df716afb8a796e") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') pread64(r0, &(0x7f0000000140)=""/114, 0x72, 0x5) 09:30:29 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0)={0x400000000, 0x2, 0x1000}, 0x4) socket$packet(0x11, 0x3, 0x300) 09:30:29 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c4600020000010000000000000003000300010000001f020000000000004000000000000000000300000000000095000000020038000100ffff04000800020000000500000064b000000000000002000000000000000200000000000000f5d000000000000004000000000000000800000000000000d041f52b8d1752275bc35414d75cde65ff49179375a0e45ad489b895ed32a8429a2a981d1540689f41a37d0000918125355e4a94800ac83b00ea9398716001360e2835c6eb2149539fbd1671ba5c3f22ce060f8241427048a3b2f1faafdfb9e2fd77c5323ff586314fad76072baff2b5a25d82d4ff86174f9edd0eb9b42c98732c46b1d6eaa2bd6d392d3066a9a06cd63b7ee9f89aa3fd822b52b3d8d0d157e31f8bc045e6cfc0ef551eb75cb65417c31944020100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000c80)) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000380)=""/147) r3 = syz_open_pts(0xffffffffffffffff, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f00000001c0), &(0x7f0000000d00)=0x6) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f0000000200)=""/248, 0xf8) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) 09:30:29 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000c80)) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000380)=""/147) r3 = syz_open_pts(0xffffffffffffffff, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f00000001c0), &(0x7f0000000d00)=0x6) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f0000000200)=""/248, 0xf8) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) 09:30:29 executing program 0: r0 = getpgid(0xffffffffffffffff) capset(&(0x7f0000000280)={0x20071026, r0}, &(0x7f0000000040)) r1 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) getsockopt$inet6_int(r2, 0x29, 0xa, &(0x7f0000000080), &(0x7f0000000100)=0x4) setns(r1, 0x0) 09:30:29 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000cb9ffc)=0x1, 0x4) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x101000) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000040)) bind$inet(r1, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) sendto$inet(r1, &(0x7f0000fa0fff), 0xffffff8d, 0x20020053, &(0x7f0000e97fcf)={0x2, 0x1, @loopback=0x7f000001}, 0x10) 09:30:29 executing program 4: r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000005c0)=@broute={'broute\x00', 0x20, 0x2, 0x400, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, &(0x7f0000000080), &(0x7f0000000640)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff030000001100000000000000000076657468305f746f5f7465616d000000697064647030000000000000000000006272692467655f736c617601000100007465616d5f73ff5e6365ea3000400000aaaaaaaaaaaa000000000000ffffffffffff00000000000000007000000070000000a000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0600000000000000000000000000626f6e645f736c6176655f300000000076657468315f746f5f6272696467650073797a5f74756e00000000000000000065716c00000000000000000000000000aaaaaaaaaaaa000000000000ffffffffffff000000000000000070000000a0010000d00200005345434d41524b000000004000000000000000000000000000000000000000000801000000000000000000000000000073797374656d5f753a6f626a6563745f723a7661725f73706f6f6c5f743a733000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005345434d41524b000000000000000000000000000000000000000000000000000801000000000000000000000000000073797374656d5f753a6f626a6563745f723a6273647074795f6465766963655f743a73300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000fcffffff000000005998ac4e5af8a7425e0fef7beeccee864058410421511a74b712fbf003a4e487168f658266db59ec0bdf1d1a09e2d116fdfe6653508b5989fe01388a0d660f91476641707b27e37c22f78477b909826b459ff7b63c1b993659a3c6119c1276f6b64bd7800b19592e2eb079056fea745f99ed32caaaac3b42ec0359bbe88e2d38bfc4ca90fc50713bdd354db1a2a290"]}, 0x507) 09:30:29 executing program 7 (fault-call:1 fault-nth:17): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, &(0x7f00000001c0)={[{@gid={'gid', 0x3d}, 0x2c}]}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, &(0x7f00000001c0)) 09:30:29 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x80, 0x0) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000100)={0x18, 0x0, {0x2, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1b}, 'veth0_to_bridge\x00'}}) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x14, &(0x7f0000000000)) 09:30:29 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) 09:30:29 executing program 4: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800003, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r1, 0x8200) r2 = open(&(0x7f0000000180)='./bus\x00', 0x141046, 0x0) sendfile(r1, r2, 0x0, 0x5a92) prlimit64(0x0, 0xb, &(0x7f0000000000), 0x0) timer_create(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, @thr={&(0x7f0000000080), &(0x7f0000000180)}}, &(0x7f0000000340)) sendfile(r2, r0, &(0x7f00000001c0), 0x1795a715) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000000)=0x54) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) [ 124.071395] kernel msg: ebtables bug: please report to author: Wrong len argument [ 124.097249] ISOFS: Unable to identify CD-ROM format. 09:30:29 executing program 6: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) futex(&(0x7f0000000000), 0x7, 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x101000, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000000100)) 09:30:29 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x8, 0x40000) [ 124.145180] FAULT_INJECTION: forcing a failure. [ 124.145180] name failslab, interval 1, probability 0, space 0, times 0 [ 124.146947] XFS (loop5): Invalid superblock magic number [ 124.156555] CPU: 0 PID: 8698 Comm: syz-executor7 Not tainted 4.18.0-rc4-next-20180712+ #5 [ 124.170227] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 124.179578] Call Trace: [ 124.182172] dump_stack+0x1c9/0x2b4 [ 124.185811] ? dump_stack_print_info.cold.2+0x52/0x52 [ 124.191010] ? __kernel_text_address+0xd/0x40 [ 124.195516] ? unwind_get_return_address+0x61/0xa0 [ 124.200461] should_fail.cold.4+0xa/0x11 [ 124.204533] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 124.209645] ? save_stack+0xa9/0xd0 [ 124.213279] ? save_stack+0x43/0xd0 [ 124.216915] ? kasan_kmalloc+0xc4/0xe0 [ 124.220808] ? kmem_cache_alloc_trace+0x152/0x780 [ 124.225657] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 124.231499] ? __list_lru_init+0x4d6/0x840 [ 124.235740] ? alloc_super+0x976/0xb10 [ 124.239639] ? vfs_get_super+0x6e/0x270 [ 124.243622] ? proc_get_tree+0x88/0xb0 [ 124.247517] ? vfs_get_tree+0x1cb/0x5c0 [ 124.251497] ? do_mount+0x6c1/0x1fb0 [ 124.255213] ? ksys_mount+0x12d/0x140 [ 124.259014] ? __x64_sys_mount+0xbe/0x150 [ 124.263166] ? do_syscall_64+0x1b9/0x820 [ 124.267233] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 124.272604] ? save_stack+0xa9/0xd0 [ 124.276241] ? lock_acquire+0x1e4/0x540 [ 124.280217] ? fs_reclaim_acquire+0x20/0x20 [ 124.284538] ? lock_downgrade+0x8f0/0x8f0 [ 124.288673] ? __x64_sys_mount+0xbe/0x150 [ 124.292826] ? check_same_owner+0x340/0x340 [ 124.297143] ? rcu_note_context_switch+0x730/0x730 [ 124.302062] __should_failslab+0x124/0x180 [ 124.306289] should_failslab+0x9/0x14 [ 124.310079] kmem_cache_alloc_trace+0x2cb/0x780 [ 124.314737] ? kasan_kmalloc+0xc4/0xe0 [ 124.318614] __memcg_init_list_lru_node+0x185/0x2d0 [ 124.323621] ? kvfree_rcu+0x20/0x20 [ 124.327249] ? __kmalloc_node+0x47/0x70 [ 124.331204] __list_lru_init+0x4d6/0x840 [ 124.335247] ? list_lru_destroy+0x500/0x500 [ 124.339574] ? prealloc_shrinker+0x213/0x480 [ 124.343966] ? __init_waitqueue_head+0x9e/0x150 [ 124.348625] ? inactive_list_is_low+0x850/0x850 [ 124.353287] ? __lockdep_init_map+0x105/0x590 [ 124.357770] alloc_super+0x976/0xb10 [ 124.361467] ? destroy_unused_super.part.11+0x110/0x110 [ 124.366831] ? lock_downgrade+0x8f0/0x8f0 [ 124.370963] ? kasan_check_read+0x11/0x20 [ 124.375104] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 124.379677] ? kasan_check_write+0x14/0x20 [ 124.383898] ? do_raw_spin_lock+0xc1/0x200 [ 124.388137] ? ns_test_super+0x50/0x50 [ 124.392020] sget_fc+0x269/0x950 [ 124.395375] ? compare_single+0x10/0x10 [ 124.399338] ? alloc_super+0xb10/0xb10 [ 124.403209] ? logfc+0x810/0x810 [ 124.406559] ? kasan_kmalloc+0xc4/0xe0 [ 124.410442] ? __kmalloc_track_caller+0x311/0x760 [ 124.415279] ? proc_root_lookup+0x60/0x60 [ 124.419407] vfs_get_super+0x6e/0x270 [ 124.423197] proc_get_tree+0x88/0xb0 [ 124.426907] vfs_get_tree+0x1cb/0x5c0 [ 124.430691] do_mount+0x6c1/0x1fb0 [ 124.434214] ? kasan_check_write+0x14/0x20 [ 124.438440] ? copy_mount_string+0x40/0x40 [ 124.442664] ? retint_kernel+0x10/0x10 [ 124.446547] ? __sanitizer_cov_trace_const_cmp8+0xc/0x20 [ 124.451993] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 124.457520] ? copy_mount_options+0x285/0x380 [ 124.461996] ksys_mount+0x12d/0x140 [ 124.465618] __x64_sys_mount+0xbe/0x150 [ 124.469576] do_syscall_64+0x1b9/0x820 [ 124.473451] ? finish_task_switch+0x1d3/0x870 [ 124.477938] ? syscall_return_slowpath+0x5e0/0x5e0 [ 124.482858] ? syscall_return_slowpath+0x31d/0x5e0 [ 124.487776] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 124.492782] ? prepare_exit_to_usermode+0x291/0x3b0 [ 124.497800] ? perf_trace_sys_enter+0xb10/0xb10 [ 124.502467] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 124.507314] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 124.512499] RIP: 0033:0x455e29 [ 124.515671] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 124.534855] RSP: 002b:00007f94111afc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 124.542554] RAX: ffffffffffffffda RBX: 00007f94111b06d4 RCX: 0000000000455e29 [ 124.549813] RDX: 0000000020000140 RSI: 0000000020000040 RDI: 0000000020000000 [ 124.557062] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 [ 124.564321] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 124.571578] R13: 00000000004c248a R14: 00000000004d0058 R15: 0000000000000011 09:30:29 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000c80)) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f0000000200)=""/248, 0xf8) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) 09:30:29 executing program 6: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x8000, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x8500, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000100)={0x3, r1}) modify_ldt$write2(0x11, &(0x7f00000004c0), 0x10) clone(0x0, &(0x7f0000000000), &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) 09:30:29 executing program 0: r0 = syz_open_dev$admmidi(&(0x7f0000001600)='/dev/admmidi#\x00', 0x1, 0x18000) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000001640), &(0x7f0000001680)=0x4) capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r1 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') ioctl$SNDRV_SEQ_IOCTL_PVERSION(r0, 0x80045300, &(0x7f0000000000)) setns(r1, 0x0) 09:30:29 executing program 7 (fault-call:1 fault-nth:18): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, &(0x7f00000001c0)={[{@gid={'gid', 0x3d}, 0x2c}]}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, &(0x7f00000001c0)) 09:30:29 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ftruncate(r0, 0x8) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0xffff, 0x20000) openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) r3 = dup3(0xffffffffffffffff, r1, 0x0) openat(r2, &(0x7f0000000040)='./file0\x00', 0x88000, 0x8a) ppoll(&(0x7f00000001c0)=[{r3, 0x200}, {r3, 0x4001}, {0xffffffffffffffff, 0x80}, {r3, 0x408}, {r3, 0x80}, {r1, 0x1100}, {r3, 0x500}, {r1, 0x8002}, {r1, 0x4000}], 0x2, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x8) [ 124.610604] XFS (loop5): Invalid superblock magic number [ 124.676362] Unknown ioctl 1074310944 [ 124.719408] ISOFS: Unable to identify CD-ROM format. [ 124.726220] Unknown ioctl 1074310944 [ 124.744686] FAULT_INJECTION: forcing a failure. [ 124.744686] name failslab, interval 1, probability 0, space 0, times 0 [ 124.755953] CPU: 1 PID: 8752 Comm: syz-executor7 Not tainted 4.18.0-rc4-next-20180712+ #5 [ 124.764268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 124.773615] Call Trace: [ 124.776203] dump_stack+0x1c9/0x2b4 [ 124.779865] ? dump_stack_print_info.cold.2+0x52/0x52 [ 124.785079] ? __kernel_text_address+0xd/0x40 [ 124.789583] ? unwind_get_return_address+0x61/0xa0 [ 124.794528] should_fail.cold.4+0xa/0x11 [ 124.798601] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 124.803713] ? save_stack+0xa9/0xd0 [ 124.807348] ? save_stack+0x43/0xd0 [ 124.810974] ? kasan_kmalloc+0xc4/0xe0 [ 124.814858] ? kmem_cache_alloc_trace+0x152/0x780 [ 124.819706] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 124.824899] ? __list_lru_init+0x4d6/0x840 [ 124.829142] ? alloc_super+0x976/0xb10 [ 124.833039] ? vfs_get_super+0x6e/0x270 [ 124.837025] ? proc_get_tree+0x88/0xb0 [ 124.840914] ? vfs_get_tree+0x1cb/0x5c0 [ 124.844881] ? do_mount+0x6c1/0x1fb0 [ 124.848608] ? ksys_mount+0x12d/0x140 [ 124.852404] ? __x64_sys_mount+0xbe/0x150 [ 124.856542] ? do_syscall_64+0x1b9/0x820 [ 124.860635] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 124.866012] ? save_stack+0xa9/0xd0 [ 124.869638] ? lock_acquire+0x1e4/0x540 [ 124.873613] ? fs_reclaim_acquire+0x20/0x20 [ 124.877945] ? lock_downgrade+0x8f0/0x8f0 [ 124.882104] ? __x64_sys_mount+0xbe/0x150 [ 124.886271] ? check_same_owner+0x340/0x340 [ 124.890602] ? rcu_note_context_switch+0x730/0x730 [ 124.895539] __should_failslab+0x124/0x180 [ 124.899772] should_failslab+0x9/0x14 [ 124.903570] kmem_cache_alloc_trace+0x2cb/0x780 [ 124.908241] ? kasan_kmalloc+0xc4/0xe0 [ 124.912143] __memcg_init_list_lru_node+0x185/0x2d0 [ 124.917159] ? kvfree_rcu+0x20/0x20 [ 124.920790] ? __kmalloc_node+0x47/0x70 [ 124.924769] __list_lru_init+0x4d6/0x840 [ 124.928837] ? list_lru_destroy+0x500/0x500 [ 124.933156] ? prealloc_shrinker+0x213/0x480 [ 124.937559] ? __init_waitqueue_head+0x9e/0x150 [ 124.942246] ? inactive_list_is_low+0x850/0x850 [ 124.946924] ? __lockdep_init_map+0x105/0x590 [ 124.951422] alloc_super+0x976/0xb10 [ 124.955143] ? destroy_unused_super.part.11+0x110/0x110 [ 124.960503] ? lock_downgrade+0x8f0/0x8f0 [ 124.964658] ? kasan_check_read+0x11/0x20 [ 124.968802] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 124.973384] ? kasan_check_write+0x14/0x20 [ 124.977620] ? do_raw_spin_lock+0xc1/0x200 [ 124.981873] ? ns_test_super+0x50/0x50 [ 124.985769] sget_fc+0x269/0x950 [ 124.989139] ? compare_single+0x10/0x10 [ 124.993110] ? alloc_super+0xb10/0xb10 [ 124.996991] ? logfc+0x810/0x810 [ 125.000362] ? kasan_kmalloc+0xc4/0xe0 [ 125.004251] ? __kmalloc_track_caller+0x311/0x760 [ 125.009083] ? proc_root_lookup+0x60/0x60 [ 125.013228] vfs_get_super+0x6e/0x270 [ 125.017021] proc_get_tree+0x88/0xb0 [ 125.020738] vfs_get_tree+0x1cb/0x5c0 [ 125.024541] do_mount+0x6c1/0x1fb0 [ 125.028085] ? kasan_check_read+0x11/0x20 [ 125.032238] ? do_raw_spin_unlock+0xa7/0x2f0 [ 125.036654] ? copy_mount_string+0x40/0x40 [ 125.040904] ? kasan_kmalloc+0xc4/0xe0 [ 125.044778] ? kmem_cache_alloc_trace+0x318/0x780 [ 125.049610] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 125.055137] ? copy_mount_options+0x285/0x380 [ 125.059619] ksys_mount+0x12d/0x140 [ 125.063232] __x64_sys_mount+0xbe/0x150 [ 125.067194] do_syscall_64+0x1b9/0x820 [ 125.071075] ? finish_task_switch+0x1d3/0x870 [ 125.075579] ? syscall_return_slowpath+0x5e0/0x5e0 [ 125.080520] ? syscall_return_slowpath+0x31d/0x5e0 [ 125.085453] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 125.090467] ? prepare_exit_to_usermode+0x291/0x3b0 [ 125.095468] ? perf_trace_sys_enter+0xb10/0xb10 [ 125.100123] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 125.104971] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 125.110162] RIP: 0033:0x455e29 [ 125.113345] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 125.132481] RSP: 002b:00007f94111afc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 125.140186] RAX: ffffffffffffffda RBX: 00007f94111b06d4 RCX: 0000000000455e29 [ 125.147445] RDX: 0000000020000140 RSI: 0000000020000040 RDI: 0000000020000000 [ 125.154713] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 [ 125.161977] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 09:30:30 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000c80)) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000380)=""/147) r3 = syz_open_pts(0xffffffffffffffff, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f00000001c0), &(0x7f0000000d00)=0x6) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) 09:30:30 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = dup(0xffffffffffffffff) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, 0x8) r1 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r1, 0x0) 09:30:30 executing program 6: r0 = perf_event_open(&(0x7f0000b5a000)={0x8, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_fuse_mount(&(0x7f00000000c0)='./file0\x00', 0x7001, r1, r2, 0x2, 0x100000) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2, 0x0) accept4$bt_l2cap(r3, &(0x7f0000000040), &(0x7f0000000080)=0xe, 0x800) 09:30:30 executing program 7 (fault-call:1 fault-nth:19): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, &(0x7f00000001c0)={[{@gid={'gid', 0x3d}, 0x2c}]}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, &(0x7f00000001c0)) 09:30:30 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000c80)) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000380)=""/147) r3 = syz_open_pts(0xffffffffffffffff, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f00000001c0), &(0x7f0000000d00)=0x6) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f0000000200)=""/248, 0xf8) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) [ 125.169235] R13: 00000000004c248a R14: 00000000004d0058 R15: 0000000000000012 09:30:30 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)={0x0, 0x0, 0x4}) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) 09:30:30 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0xfffffffffffffffd, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc1205531, &(0x7f00000000c0)={0x2, 0xfffffffffffffff6, 0x0, 0x0, 0x0, [], [], [], 0x0, 0x400000}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000540)='/dev/snapshot\x00', 0x80000, 0x0) accept4$unix(r1, &(0x7f0000000580), &(0x7f0000000600)=0x6e, 0x800) 09:30:30 executing program 6: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r0 = syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0x4, 0x8000) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000240)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0xc800, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000180), r3, r2}}, 0x18) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000100)={0xa, 0x4, 0xfa00, {r3}}, 0xc) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r4 = syz_open_pts(r1, 0x0) read(r4, &(0x7f0000000280)=""/1, 0x1) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000fd0ffc)) r5 = gettid() ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000140)) ioctl$TIOCGPTPEER(r1, 0x5441, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r5, 0x1000000000016) [ 125.273671] ISOFS: Unable to identify CD-ROM format. 09:30:30 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x3f, 0x40000) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000240)=ANY=[@ANYBLOB="000000b5fa81b98d42cd4b582be41f99d58b7ff3c8e377fafde2a26d18432e7bed34944678c52aefd51674704214d0ee13"]) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) lseek(r0, 0xfffffffffe, 0x10000000) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x80400, 0x0) ioctl$VHOST_SET_VRING_BASE(r3, 0x4008af12, &(0x7f0000000080)={0x1}) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) get_thread_area(&(0x7f0000000200)={0x7f, 0x100000, 0xffffffffffffffff, 0x7, 0x3, 0xff, 0x4, 0x9368, 0x6, 0x8}) syz_kvm_setup_cpu$x86(r2, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x5d, &(0x7f0000000580), 0x0) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f0000000140)=ANY=[@ANYBLOB="00e3e6ee7739"]) r5 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$assume_authority(0x10, r5) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 125.316124] FAULT_INJECTION: forcing a failure. [ 125.316124] name failslab, interval 1, probability 0, space 0, times 0 [ 125.327450] CPU: 1 PID: 8779 Comm: syz-executor7 Not tainted 4.18.0-rc4-next-20180712+ #5 [ 125.335767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 125.345123] Call Trace: [ 125.347717] dump_stack+0x1c9/0x2b4 [ 125.351356] ? dump_stack_print_info.cold.2+0x52/0x52 [ 125.356559] ? __kernel_text_address+0xd/0x40 [ 125.361060] ? unwind_get_return_address+0x61/0xa0 [ 125.366004] should_fail.cold.4+0xa/0x11 [ 125.370070] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 125.375171] ? save_stack+0xa9/0xd0 [ 125.378785] ? save_stack+0x43/0xd0 [ 125.382398] ? kasan_kmalloc+0xc4/0xe0 [ 125.386270] ? kmem_cache_alloc_trace+0x152/0x780 [ 125.391100] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 125.396288] ? __list_lru_init+0x4d6/0x840 [ 125.400506] ? alloc_super+0x976/0xb10 [ 125.404378] ? vfs_get_super+0x6e/0x270 [ 125.408342] ? proc_get_tree+0x88/0xb0 [ 125.412213] ? vfs_get_tree+0x1cb/0x5c0 [ 125.416179] ? do_mount+0x6c1/0x1fb0 [ 125.419878] ? ksys_mount+0x12d/0x140 [ 125.423663] ? __x64_sys_mount+0xbe/0x150 [ 125.427793] ? do_syscall_64+0x1b9/0x820 [ 125.431860] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 125.437209] ? save_stack+0xa9/0xd0 [ 125.440820] ? lock_acquire+0x1e4/0x540 [ 125.444779] ? fs_reclaim_acquire+0x20/0x20 [ 125.449083] ? lock_downgrade+0x8f0/0x8f0 [ 125.453213] ? __x64_sys_mount+0xbe/0x150 [ 125.457348] ? check_same_owner+0x340/0x340 [ 125.461658] ? rcu_note_context_switch+0x730/0x730 [ 125.466588] __should_failslab+0x124/0x180 [ 125.470823] should_failslab+0x9/0x14 [ 125.474614] kmem_cache_alloc_trace+0x2cb/0x780 [ 125.479265] ? kasan_kmalloc+0xc4/0xe0 [ 125.483139] __memcg_init_list_lru_node+0x185/0x2d0 [ 125.488149] ? kvfree_rcu+0x20/0x20 [ 125.491758] ? __kmalloc_node+0x47/0x70 [ 125.495715] __list_lru_init+0x4d6/0x840 [ 125.499761] ? list_lru_destroy+0x500/0x500 [ 125.504066] ? prealloc_shrinker+0x213/0x480 [ 125.508455] ? __init_waitqueue_head+0x9e/0x150 [ 125.513105] ? inactive_list_is_low+0x850/0x850 [ 125.517761] ? __lockdep_init_map+0x105/0x590 [ 125.522239] alloc_super+0x976/0xb10 [ 125.525939] ? destroy_unused_super.part.11+0x110/0x110 [ 125.531285] ? lock_downgrade+0x8f0/0x8f0 [ 125.535431] ? kasan_check_read+0x11/0x20 [ 125.539565] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 125.544129] ? kasan_check_write+0x14/0x20 [ 125.548348] ? do_raw_spin_lock+0xc1/0x200 [ 125.552567] ? ns_test_super+0x50/0x50 [ 125.556448] sget_fc+0x269/0x950 [ 125.559797] ? compare_single+0x10/0x10 [ 125.563754] ? alloc_super+0xb10/0xb10 [ 125.567624] ? logfc+0x810/0x810 [ 125.570972] ? kasan_kmalloc+0xc4/0xe0 [ 125.574847] ? __kmalloc_track_caller+0x311/0x760 [ 125.579677] ? proc_root_lookup+0x60/0x60 [ 125.583819] vfs_get_super+0x6e/0x270 [ 125.587605] proc_get_tree+0x88/0xb0 [ 125.591306] vfs_get_tree+0x1cb/0x5c0 [ 125.595090] do_mount+0x6c1/0x1fb0 [ 125.598615] ? kasan_check_write+0x14/0x20 [ 125.602835] ? copy_mount_string+0x40/0x40 [ 125.607053] ? kasan_kmalloc+0xc4/0xe0 [ 125.610925] ? kmem_cache_alloc_trace+0x318/0x780 [ 125.615754] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 125.621287] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 125.626809] ? copy_mount_options+0x285/0x380 [ 125.631304] ksys_mount+0x12d/0x140 [ 125.634929] __x64_sys_mount+0xbe/0x150 [ 125.638888] do_syscall_64+0x1b9/0x820 [ 125.642756] ? syscall_slow_exit_work+0x500/0x500 [ 125.647584] ? syscall_return_slowpath+0x5e0/0x5e0 [ 125.652507] ? syscall_return_slowpath+0x31d/0x5e0 [ 125.657508] ? prepare_exit_to_usermode+0x291/0x3b0 [ 125.662509] ? perf_trace_sys_enter+0xb10/0xb10 [ 125.667163] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 125.671990] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 125.677162] RIP: 0033:0x455e29 [ 125.680330] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 125.699506] RSP: 002b:00007f94111afc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 125.707196] RAX: ffffffffffffffda RBX: 00007f94111b06d4 RCX: 0000000000455e29 09:30:30 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000c80)) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000380)=""/147) r3 = syz_open_pts(0xffffffffffffffff, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f00000001c0), &(0x7f0000000d00)=0x6) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) 09:30:30 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r1) r2 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x80) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f0000000180)={0x0, 0x800000000000, 0x10}, &(0x7f00000001c0)=0xc) setsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000200)={r3, 0xffff, 0x9, 0x69}, 0x10) setns(r0, 0x0) [ 125.714447] RDX: 0000000020000140 RSI: 0000000020000040 RDI: 0000000020000000 [ 125.721698] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 [ 125.728948] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 125.736208] R13: 00000000004c248a R14: 00000000004d0058 R15: 0000000000000013 09:30:31 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f0000000200)=""/248, 0xf8) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) 09:30:31 executing program 7 (fault-call:1 fault-nth:20): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, &(0x7f00000001c0)={[{@gid={'gid', 0x3d}, 0x2c}]}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, &(0x7f00000001c0)) 09:30:31 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000140)={0x2, 0x0, [0x2ff, 0x80]}) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) bind$bt_hci(r3, &(0x7f00000000c0)={0x1f, r4}, 0xc) 09:30:31 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000c80)) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000380)=""/147) r3 = syz_open_pts(0xffffffffffffffff, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f00000001c0), &(0x7f0000000d00)=0x6) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) 09:30:31 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)={0x0, 0x0, 0x1, 0x0, 0x0, 0xf3}) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)={r0, 0x0, 0xd18, 0x70, 0xfffffffffffffffc}) 09:30:31 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$pppoe(0x18, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$TUNSETLINK(r2, 0x400454cd, 0x110) r3 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r3, &(0x7f0000000040)={0x18, 0x0, {0x3, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'syz_tun\x00'}}, 0x1e) sendmsg$can_raw(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x1d}, 0x10, &(0x7f0000000140)={&(0x7f0000000080)=@canfd={{0x3, 0x10000, 0xffffffff, 0x7}, 0x39, 0x1, 0x0, 0x0, "7583fdccf1302db8ed1d42e1fe78a10517d511a9e056d7f5210aba3fe07ddb0f769a0a89493604c22eb5a6f2220e826aa5a6057bb383d85c74c5e3c73f10d340"}, 0x48}, 0x1, 0x0, 0x0, 0x24000000}, 0x4000000) connect$pppoe(r1, &(0x7f0000000100)={0x18, 0x0, {0x3, @empty, 'bridge_slave_0\x00'}}, 0x1e) dup2(r1, r3) 09:30:31 executing program 4: r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000012000/0x4000)=nil, 0x4000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000080)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"410f44be5f55ea719cbb6635"}}], 0x30) ioctl$sock_SIOCDELDLCI(r3, 0x8981, &(0x7f0000000140)={'gre0\x00', 0x3}) link(&(0x7f0000f3bff8)='./file0\x00', &(0x7f00006b3ff0)='./file2\x00') rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file1\x00') lstat(&(0x7f0000003180)='./file2\x00', &(0x7f00000031c0)) lsetxattr(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)=@random={'system.', '}cpuset}[bdev\x00'}, &(0x7f0000000300)='lo\x00', 0x3, 0x0) dup2(r1, r2) [ 125.882966] ISOFS: Unable to identify CD-ROM format. [ 125.920833] FAULT_INJECTION: forcing a failure. [ 125.920833] name failslab, interval 1, probability 0, space 0, times 0 [ 125.932126] CPU: 1 PID: 8824 Comm: syz-executor7 Not tainted 4.18.0-rc4-next-20180712+ #5 [ 125.940441] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 125.949798] Call Trace: [ 125.952394] dump_stack+0x1c9/0x2b4 [ 125.956031] ? dump_stack_print_info.cold.2+0x52/0x52 [ 125.961237] ? __kernel_text_address+0xd/0x40 [ 125.965743] ? unwind_get_return_address+0x61/0xa0 09:30:31 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000100)=0x100, 0x4) r1 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r1, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1, 0x0) ioctl$KVM_GET_CPUID2(r2, 0xc008ae91, &(0x7f00000001c0)=ANY=[@ANYBLOB="03000000000000000000000000000000000000000048427effea94fa8dbd5d0000000000000000000000000000000000000000040000000000000000000000000000000000000000d57b000000000000000000000000000000b42d9b10b6f6a893000000000000000000000000000000000000000000000000000000000000000020000000000000000000b33626702b3b11ad1a9e"]) 09:30:31 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000c80)) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000380)=""/147) syz_open_pts(0xffffffffffffffff, 0x0) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f0000000200)=""/248, 0xf8) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) [ 125.970684] should_fail.cold.4+0xa/0x11 [ 125.974757] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 125.979879] ? save_stack+0xa9/0xd0 [ 125.983534] ? save_stack+0x43/0xd0 [ 125.987164] ? kasan_kmalloc+0xc4/0xe0 [ 125.991056] ? kmem_cache_alloc_trace+0x152/0x780 [ 125.995907] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 126.001104] ? __list_lru_init+0x4d6/0x840 [ 126.005345] ? alloc_super+0x976/0xb10 [ 126.009240] ? vfs_get_super+0x6e/0x270 [ 126.013217] ? proc_get_tree+0x88/0xb0 [ 126.017105] ? vfs_get_tree+0x1cb/0x5c0 [ 126.021091] ? do_mount+0x6c1/0x1fb0 [ 126.024817] ? ksys_mount+0x12d/0x140 [ 126.028632] ? __x64_sys_mount+0xbe/0x150 [ 126.032794] ? do_syscall_64+0x1b9/0x820 [ 126.036864] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 126.042238] ? save_stack+0xa9/0xd0 [ 126.045875] ? lock_acquire+0x1e4/0x540 [ 126.049850] ? fs_reclaim_acquire+0x20/0x20 [ 126.054169] ? lock_downgrade+0x8f0/0x8f0 [ 126.058324] ? __x64_sys_mount+0xbe/0x150 [ 126.062481] ? check_same_owner+0x340/0x340 [ 126.067448] ? rcu_note_context_switch+0x730/0x730 [ 126.072381] __should_failslab+0x124/0x180 [ 126.076627] should_failslab+0x9/0x14 [ 126.080435] kmem_cache_alloc_trace+0x2cb/0x780 [ 126.085109] ? kasan_kmalloc+0xc4/0xe0 [ 126.089006] __memcg_init_list_lru_node+0x185/0x2d0 [ 126.094028] ? kvfree_rcu+0x20/0x20 [ 126.097661] ? __kmalloc_node+0x47/0x70 [ 126.101649] __list_lru_init+0x4d6/0x840 [ 126.105710] ? list_lru_destroy+0x500/0x500 [ 126.110036] ? prealloc_shrinker+0x213/0x480 [ 126.114440] ? __init_waitqueue_head+0x9e/0x150 [ 126.119092] ? inactive_list_is_low+0x850/0x850 [ 126.123748] ? __lockdep_init_map+0x105/0x590 [ 126.128238] alloc_super+0x976/0xb10 [ 126.131949] ? destroy_unused_super.part.11+0x110/0x110 [ 126.137296] ? lock_downgrade+0x8f0/0x8f0 [ 126.141437] ? __sched_text_start+0x8/0x8 [ 126.145584] ? kasan_check_read+0x11/0x20 [ 126.149714] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 126.154289] ? kasan_check_write+0x14/0x20 [ 126.158517] ? do_raw_spin_lock+0xc1/0x200 [ 126.162739] ? ns_test_super+0x50/0x50 [ 126.166613] sget_fc+0x269/0x950 [ 126.169964] ? compare_single+0x10/0x10 [ 126.173940] ? alloc_super+0xb10/0xb10 [ 126.177817] ? logfc+0x810/0x810 [ 126.181182] ? kasan_kmalloc+0xc4/0xe0 [ 126.185072] ? __kmalloc_track_caller+0x311/0x760 [ 126.189903] ? proc_root_lookup+0x60/0x60 [ 126.194046] vfs_get_super+0x6e/0x270 [ 126.197841] proc_get_tree+0x88/0xb0 [ 126.201539] vfs_get_tree+0x1cb/0x5c0 [ 126.205323] do_mount+0x6c1/0x1fb0 [ 126.208847] ? check_same_owner+0x340/0x340 [ 126.213156] ? lock_release+0xa30/0xa30 [ 126.217114] ? copy_mount_string+0x40/0x40 [ 126.221339] ? kasan_kmalloc+0xc4/0xe0 [ 126.225219] ? kmem_cache_alloc_trace+0x318/0x780 [ 126.230058] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 126.235588] ? _copy_from_user+0xdf/0x150 [ 126.239739] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 126.245286] ? copy_mount_options+0x285/0x380 [ 126.249787] ksys_mount+0x12d/0x140 [ 126.253398] __x64_sys_mount+0xbe/0x150 [ 126.257368] do_syscall_64+0x1b9/0x820 [ 126.261247] ? syscall_slow_exit_work+0x500/0x500 [ 126.266076] ? syscall_return_slowpath+0x5e0/0x5e0 [ 126.271001] ? syscall_return_slowpath+0x31d/0x5e0 [ 126.275923] ? prepare_exit_to_usermode+0x291/0x3b0 [ 126.280922] ? perf_trace_sys_enter+0xb10/0xb10 [ 126.285579] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 126.290412] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 126.295591] RIP: 0033:0x455e29 [ 126.298767] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 09:30:31 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x100000001, 0x30000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x64, r2, 0x300, 0x70bd2c, 0x25dfdbfb, {0x1}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}]}, @IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3f}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfffffffffffffffd}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) r3 = openat$cgroup_int(r0, &(0x7f0000000200)='cgroup.max.descendants\x00', 0x2, 0x0) sendfile(r3, r3, &(0x7f0000000080), 0x8) 09:30:31 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={r1}, &(0x7f0000000180)=0x8) r2 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r2, 0x0) 09:30:31 executing program 6: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r0 = syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0x4, 0x8000) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000240)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0xc800, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000180), r3, r2}}, 0x18) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000100)={0xa, 0x4, 0xfa00, {r3}}, 0xc) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r4 = syz_open_pts(r1, 0x0) read(r4, &(0x7f0000000280)=""/1, 0x1) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000fd0ffc)) r5 = gettid() ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000140)) ioctl$TIOCGPTPEER(r1, 0x5441, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r5, 0x1000000000016) 09:30:31 executing program 7 (fault-call:1 fault-nth:21): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, &(0x7f00000001c0)={[{@gid={'gid', 0x3d}, 0x2c}]}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, &(0x7f00000001c0)) 09:30:31 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000c80)) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000380)=""/147) r3 = syz_open_pts(0xffffffffffffffff, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f00000001c0), &(0x7f0000000d00)=0x6) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f0000000200)=""/248, 0xf8) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) [ 126.317922] RSP: 002b:00007f94111afc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 126.325623] RAX: ffffffffffffffda RBX: 00007f94111b06d4 RCX: 0000000000455e29 [ 126.332891] RDX: 0000000020000140 RSI: 0000000020000040 RDI: 0000000020000000 [ 126.340160] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 [ 126.347423] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 126.354688] R13: 00000000004c248a R14: 00000000004d0058 R15: 0000000000000014 09:30:31 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/mnt\x00') setns(r0, 0x0) 09:30:31 executing program 5: r0 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10}, 0x80, &(0x7f0000002000), 0x0, &(0x7f00000000c0)}, 0xfffffffffffffffc) getsockname$inet6(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, @mcast2}, &(0x7f00000000c0)=0x1c) [ 126.452062] ISOFS: Unable to identify CD-ROM format. [ 126.480795] FAULT_INJECTION: forcing a failure. [ 126.480795] name failslab, interval 1, probability 0, space 0, times 0 [ 126.492110] CPU: 1 PID: 8871 Comm: syz-executor7 Not tainted 4.18.0-rc4-next-20180712+ #5 [ 126.500429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 126.509784] Call Trace: [ 126.512388] dump_stack+0x1c9/0x2b4 [ 126.516023] ? dump_stack_print_info.cold.2+0x52/0x52 [ 126.521224] ? __kernel_text_address+0xd/0x40 [ 126.525710] ? unwind_get_return_address+0x61/0xa0 [ 126.530636] should_fail.cold.4+0xa/0x11 [ 126.534687] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 126.539779] ? save_stack+0xa9/0xd0 [ 126.543410] ? save_stack+0x43/0xd0 [ 126.547031] ? kasan_kmalloc+0xc4/0xe0 [ 126.550920] ? kmem_cache_alloc_trace+0x152/0x780 [ 126.555756] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 126.560933] ? __list_lru_init+0x4d6/0x840 [ 126.565161] ? alloc_super+0x976/0xb10 [ 126.569046] ? vfs_get_super+0x6e/0x270 [ 126.573021] ? proc_get_tree+0x88/0xb0 [ 126.576904] ? vfs_get_tree+0x1cb/0x5c0 [ 126.580867] ? do_mount+0x6c1/0x1fb0 [ 126.584563] ? ksys_mount+0x12d/0x140 [ 126.588344] ? __x64_sys_mount+0xbe/0x150 [ 126.592488] ? do_syscall_64+0x1b9/0x820 [ 126.596545] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 126.601920] ? save_stack+0xa9/0xd0 [ 126.605537] ? lock_acquire+0x1e4/0x540 [ 126.609502] ? fs_reclaim_acquire+0x20/0x20 [ 126.613829] ? lock_downgrade+0x8f0/0x8f0 [ 126.617975] ? __x64_sys_mount+0xbe/0x150 [ 126.622125] ? check_same_owner+0x340/0x340 [ 126.626447] ? rcu_note_context_switch+0x730/0x730 [ 126.631371] __should_failslab+0x124/0x180 [ 126.635607] should_failslab+0x9/0x14 [ 126.639406] kmem_cache_alloc_trace+0x2cb/0x780 [ 126.644068] ? kasan_kmalloc+0xc4/0xe0 [ 126.647946] __memcg_init_list_lru_node+0x185/0x2d0 [ 126.652966] ? kvfree_rcu+0x20/0x20 [ 126.656589] ? __kmalloc_node+0x47/0x70 [ 126.660560] __list_lru_init+0x4d6/0x840 [ 126.664613] ? list_lru_destroy+0x500/0x500 [ 126.668919] ? prealloc_shrinker+0x213/0x480 [ 126.673310] ? __init_waitqueue_head+0x9e/0x150 [ 126.677988] ? inactive_list_is_low+0x850/0x850 [ 126.682756] ? __lockdep_init_map+0x105/0x590 [ 126.687242] alloc_super+0x976/0xb10 [ 126.690956] ? destroy_unused_super.part.11+0x110/0x110 [ 126.696305] ? lock_downgrade+0x8f0/0x8f0 [ 126.700452] ? kasan_check_read+0x11/0x20 [ 126.704685] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 126.709263] ? kasan_check_write+0x14/0x20 [ 126.713501] ? do_raw_spin_lock+0xc1/0x200 [ 126.717740] ? ns_test_super+0x50/0x50 [ 126.721618] sget_fc+0x269/0x950 [ 126.724975] ? compare_single+0x10/0x10 [ 126.728935] ? alloc_super+0xb10/0xb10 [ 126.732808] ? logfc+0x810/0x810 [ 126.736161] ? kasan_kmalloc+0xc4/0xe0 [ 126.740083] ? __kmalloc_track_caller+0x311/0x760 [ 126.744931] ? proc_root_lookup+0x60/0x60 [ 126.749076] vfs_get_super+0x6e/0x270 [ 126.752879] proc_get_tree+0x88/0xb0 [ 126.756588] vfs_get_tree+0x1cb/0x5c0 [ 126.760393] do_mount+0x6c1/0x1fb0 [ 126.763919] ? check_same_owner+0x340/0x340 [ 126.768229] ? lock_release+0xa30/0xa30 [ 126.772199] ? copy_mount_string+0x40/0x40 [ 126.776429] ? kasan_kmalloc+0xc4/0xe0 [ 126.780302] ? kmem_cache_alloc_trace+0x318/0x780 [ 126.785140] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 126.790674] ? _copy_from_user+0xdf/0x150 [ 126.794820] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 126.800343] ? copy_mount_options+0x285/0x380 [ 126.804827] ksys_mount+0x12d/0x140 [ 126.808451] __x64_sys_mount+0xbe/0x150 [ 126.812415] do_syscall_64+0x1b9/0x820 [ 126.816289] ? syscall_slow_exit_work+0x500/0x500 [ 126.821120] ? syscall_return_slowpath+0x5e0/0x5e0 [ 126.826050] ? syscall_return_slowpath+0x31d/0x5e0 [ 126.830963] ? prepare_exit_to_usermode+0x291/0x3b0 [ 126.835971] ? perf_trace_sys_enter+0xb10/0xb10 [ 126.840623] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 126.845463] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 126.850644] RIP: 0033:0x455e29 [ 126.853824] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 126.872955] RSP: 002b:00007f94111afc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 09:30:32 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c4600020000010000000000000003000300010000001f020000000000004000000000000000000300000000000095000000020038000100ffff04000800020000000500000064b000000000000002000000000000000200000000000000f5d000000000000004000000000000000800000000000000d041f52b8d1752275bc35414d75cde65ff49179375a0e45ad489b895ed32a8429a2a981d1540689f41a37d0000918125355e4a94800ac83b00ea9398716001360e2835c6eb2149539fbd1671ba5c3f22ce060f8241427048a3b2f1faafdfb9e2fd77c5323ff586314fad76072baff2b5a25d82d4ff86174f9edd0eb9b42c98732c46b1d6eaa2bd6d392d3066a9a06cd63b7ee9f89aa3fd822b52b3d8d0d157e31f8bc045e6cfc0ef551eb75cb65417c31944020100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f0000000200)=""/248, 0xf8) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) 09:30:32 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x400, 0x0) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f00000002c0)=""/4096) setns(r0, 0x0) 09:30:32 executing program 5: socket$inet6(0xa, 0x80f, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xffffffff, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x9, 0xa02, 0x4, 0x3, 0x3f}, &(0x7f0000000100)=0x14) r2 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)='\x00') setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000280)={r1, 0x4, 0x80000000}, 0x8) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_DEL_MFC(r3, 0x29, 0xcb, &(0x7f0000000000)={{0xa, 0x0, 0x80000000, @loopback={0x0, 0x1}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, 0x5c) 09:30:32 executing program 7 (fault-call:1 fault-nth:22): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, &(0x7f00000001c0)={[{@gid={'gid', 0x3d}, 0x2c}]}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, &(0x7f00000001c0)) 09:30:32 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000c80)) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000380)=""/147) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f0000000200)=""/248, 0xf8) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) [ 126.880656] RAX: ffffffffffffffda RBX: 00007f94111b06d4 RCX: 0000000000455e29 [ 126.887931] RDX: 0000000020000140 RSI: 0000000020000040 RDI: 0000000020000000 [ 126.895197] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 [ 126.902462] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 126.909723] R13: 00000000004c248a R14: 00000000004d0058 R15: 0000000000000015 09:30:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x3, 0x2) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x44) getsockopt$inet6_buf(r1, 0x29, 0xd3, &(0x7f0000000340)=""/231, &(0x7f0000000280)=0xe7) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=0x0, &(0x7f0000000200)=0x4) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000240)=@assoc_value={r2, 0x3f}, 0x8) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x8002, 0x0) ioctl$KVM_TRANSLATE(r3, 0xc018ae85, &(0x7f00000000c0)={0xf000, 0x6000, 0x2, 0x6, 0x2}) semop(r0, &(0x7f0000000040)=[{0x3, 0x0, 0x1800}], 0x1) umount2(&(0x7f0000000300)='./file0\x00', 0xe) 09:30:32 executing program 4: r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000012000/0x4000)=nil, 0x4000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000080)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"410f44be5f55ea719cbb6635"}}], 0x30) ioctl$sock_SIOCDELDLCI(r3, 0x8981, &(0x7f0000000140)={'gre0\x00', 0x3}) link(&(0x7f0000f3bff8)='./file0\x00', &(0x7f00006b3ff0)='./file2\x00') rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file1\x00') lstat(&(0x7f0000003180)='./file2\x00', &(0x7f00000031c0)) lsetxattr(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)=@random={'system.', '}cpuset}[bdev\x00'}, &(0x7f0000000300)='lo\x00', 0x3, 0x0) dup2(r1, r2) 09:30:32 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') r1 = gettid() getpgrp(r1) setns(r0, 0x0) 09:30:32 executing program 5: r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x1, 0x20000) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x84, &(0x7f0000000080)=[@in={0x2, 0x4e24, @broadcast=0xffffffff}, @in6={0xa, 0x4e24, 0x1, @mcast2={0xff, 0x2, [], 0x1}, 0xfffffffffffffff8}, @in={0x2, 0x4e23, @multicast1=0xe0000001}, @in6={0xa, 0x4e24, 0xa8, @loopback={0x0, 0x1}, 0x401}, @in6={0xa, 0x4e22, 0x4, @ipv4={[], [0xff, 0xff], @rand_addr=0xffffffffffffffe1}, 0x5}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000240)={r1, 0xce, "26efd3540b3f02b02049e4284f99b3dbd6bd991e41a5c8bd21ecba2730a67f5eefa904bd156b6af7c222e9d1b4efca23297073b96727f0ae4994b6b4aa8bf9ea0f7da0a3b377ab30042a9da12d1b789e427f2478e5a975b5c6e9336eb1ab139f6091f9a67066e204dbfa036bd42bf6004c4fd64e4a9b0aa04856a098915777c35a7c5d086402124ae404cbff095f959e494ca7adc38332512dbfc1559349666f8d72af05bce3e571989cdc3a78b8d44e8d3100cb3e5b3334b6f3fcdc99b9c098dc71a8c28806e3925aa2e8cc025e"}, &(0x7f0000000340)=0xd6) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r2, 0x29, 0x16, &(0x7f0000fcb000), 0xffffffffffffffc3) close(r2) 09:30:32 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x40000, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000080)={0x10001, 0x8, 0x9c, &(0x7f0000000100)="7debf9c9d03c4ac359bbc814d061d633b4daf7ad9dcbdf7cd8a75f45bbeb398901a7f87df241b47aad144b4833d487cfd5f3b0f0bf9fbdc4a6c49310b175a7d96fee01ed2428306399c8316be0e6c2ea9c63f52196531311cdf0925056df5d2ea731b9336a1afa5e3d9a74ead2aa703408751be71697ebe9f5b9e0350d75ecb27ac41314eba868f0b7a437f5620818b4575ce47a262ca5311d62747c"}) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x400010020001) unshare(0x10000) [ 127.033748] ISOFS: Unable to identify CD-ROM format. [ 127.074279] FAULT_INJECTION: forcing a failure. [ 127.074279] name failslab, interval 1, probability 0, space 0, times 0 [ 127.085657] CPU: 1 PID: 8906 Comm: syz-executor7 Not tainted 4.18.0-rc4-next-20180712+ #5 [ 127.093985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 127.103338] Call Trace: [ 127.105923] dump_stack+0x1c9/0x2b4 [ 127.109544] ? dump_stack_print_info.cold.2+0x52/0x52 [ 127.114725] ? __kernel_text_address+0xd/0x40 [ 127.119209] ? unwind_get_return_address+0x61/0xa0 [ 127.124132] should_fail.cold.4+0xa/0x11 [ 127.128192] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 127.133288] ? save_stack+0xa9/0xd0 [ 127.136907] ? save_stack+0x43/0xd0 [ 127.140522] ? kasan_kmalloc+0xc4/0xe0 [ 127.144421] ? kmem_cache_alloc_trace+0x152/0x780 [ 127.149252] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 127.154430] ? __list_lru_init+0x4d6/0x840 [ 127.158651] ? alloc_super+0x976/0xb10 [ 127.162529] ? vfs_get_super+0x6e/0x270 [ 127.166490] ? proc_get_tree+0x88/0xb0 [ 127.170365] ? vfs_get_tree+0x1cb/0x5c0 [ 127.174327] ? do_mount+0x6c1/0x1fb0 [ 127.178028] ? ksys_mount+0x12d/0x140 [ 127.181838] ? __x64_sys_mount+0xbe/0x150 [ 127.185985] ? do_syscall_64+0x1b9/0x820 [ 127.190035] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 127.195393] ? save_stack+0xa9/0xd0 [ 127.199020] ? lock_acquire+0x1e4/0x540 [ 127.202982] ? fs_reclaim_acquire+0x20/0x20 [ 127.207297] ? lock_downgrade+0x8f0/0x8f0 [ 127.211431] ? __x64_sys_mount+0xbe/0x150 [ 127.215571] ? check_same_owner+0x340/0x340 [ 127.219883] ? rcu_note_context_switch+0x730/0x730 [ 127.224805] __should_failslab+0x124/0x180 [ 127.229037] should_failslab+0x9/0x14 [ 127.232826] kmem_cache_alloc_trace+0x2cb/0x780 [ 127.237481] ? kasan_kmalloc+0xc4/0xe0 [ 127.241364] __memcg_init_list_lru_node+0x185/0x2d0 [ 127.246369] ? kvfree_rcu+0x20/0x20 [ 127.249984] ? __kmalloc_node+0x47/0x70 [ 127.253951] __list_lru_init+0x4d6/0x840 [ 127.257999] ? list_lru_destroy+0x500/0x500 [ 127.262314] ? prealloc_shrinker+0x213/0x480 [ 127.266706] ? __init_waitqueue_head+0x9e/0x150 [ 127.271544] ? inactive_list_is_low+0x850/0x850 [ 127.276203] ? __lockdep_init_map+0x105/0x590 [ 127.280694] alloc_super+0x976/0xb10 [ 127.284398] ? destroy_unused_super.part.11+0x110/0x110 [ 127.289751] ? lock_downgrade+0x8f0/0x8f0 [ 127.293894] ? kasan_check_read+0x11/0x20 [ 127.298032] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 127.302606] ? kasan_check_write+0x14/0x20 [ 127.306829] ? do_raw_spin_lock+0xc1/0x200 [ 127.311140] ? ns_test_super+0x50/0x50 [ 127.315021] sget_fc+0x269/0x950 [ 127.318390] ? compare_single+0x10/0x10 [ 127.322353] ? alloc_super+0xb10/0xb10 [ 127.326667] ? logfc+0x810/0x810 [ 127.330027] ? kasan_kmalloc+0xc4/0xe0 [ 127.333915] ? __kmalloc_track_caller+0x311/0x760 [ 127.338749] ? proc_root_lookup+0x60/0x60 [ 127.342887] vfs_get_super+0x6e/0x270 [ 127.346682] proc_get_tree+0x88/0xb0 [ 127.350384] vfs_get_tree+0x1cb/0x5c0 [ 127.354176] do_mount+0x6c1/0x1fb0 [ 127.357702] ? check_same_owner+0x340/0x340 [ 127.362012] ? lock_release+0xa30/0xa30 [ 127.365981] ? copy_mount_string+0x40/0x40 [ 127.370208] ? retint_kernel+0x10/0x10 [ 127.374090] ? copy_mount_options+0x1f0/0x380 [ 127.378576] ? __sanitizer_cov_trace_pc+0x3b/0x50 [ 127.383407] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 127.388928] ? copy_mount_options+0x285/0x380 [ 127.393414] ksys_mount+0x12d/0x140 [ 127.397034] __x64_sys_mount+0xbe/0x150 [ 127.400998] do_syscall_64+0x1b9/0x820 [ 127.404889] ? finish_task_switch+0x1d3/0x870 [ 127.409375] ? syscall_return_slowpath+0x5e0/0x5e0 [ 127.414296] ? syscall_return_slowpath+0x31d/0x5e0 [ 127.419227] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 127.424232] ? prepare_exit_to_usermode+0x291/0x3b0 [ 127.429235] ? perf_trace_sys_enter+0xb10/0xb10 [ 127.433890] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 127.438725] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 127.443900] RIP: 0033:0x455e29 [ 127.447073] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 127.466355] RSP: 002b:00007f94111afc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 09:30:32 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c4600020000010000000000000003000300010000001f020000000000004000000000000000000300000000000095000000020038000100ffff04000800020000000500000064b000000000000002000000000000000200000000000000f5d000000000000004000000000000000800000000000000d041f52b8d1752275bc35414d75cde65ff49179375a0e45ad489b895ed32a8429a2a981d1540689f41a37d0000918125355e4a94800ac83b00ea9398716001360e2835c6eb2149539fbd1671ba5c3f22ce060f8241427048a3b2f1faafdfb9e2fd77c5323ff586314fad76072baff2b5a25d82d4ff86174f9edd0eb9b42c98732c46b1d6eaa2bd6d392d3066a9a06cd63b7ee9f89aa3fd822b52b3d8d0d157e31f8bc045e6cfc0ef551eb75cb65417c31944020100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000c80)) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000380)=""/147) syz_open_pts(0xffffffffffffffff, 0x0) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f0000000200)=""/248, 0xf8) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) [ 127.474052] RAX: ffffffffffffffda RBX: 00007f94111b06d4 RCX: 0000000000455e29 [ 127.481308] RDX: 0000000020000140 RSI: 0000000020000040 RDI: 0000000020000000 [ 127.488656] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 [ 127.495911] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 127.503166] R13: 00000000004c248a R14: 00000000004d0058 R15: 0000000000000016 09:30:32 executing program 6: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r0 = syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0x4, 0x8000) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000240)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0xc800, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000180), r3, r2}}, 0x18) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000100)={0xa, 0x4, 0xfa00, {r3}}, 0xc) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r4 = syz_open_pts(r1, 0x0) read(r4, &(0x7f0000000280)=""/1, 0x1) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000fd0ffc)) r5 = gettid() ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000140)) ioctl$TIOCGPTPEER(r1, 0x5441, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r5, 0x1000000000016) 09:30:32 executing program 7 (fault-call:1 fault-nth:23): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, &(0x7f00000001c0)={[{@gid={'gid', 0x3d}, 0x2c}]}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, &(0x7f00000001c0)) 09:30:32 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x400, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000080)={0x1, 0x7, [@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x14}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}]}) 09:30:32 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)="2e2f6367726f75702e63707500eac5bea7af575a45fddd5af3a7709295a69e7bc5fd0592bf2a4dc8ace908be8842141ca2a714ed0163d4afd8ac48123d4869e05556a93347d6a7430e03a5f2beb186f16bacf2e4dcdcf3b9ff1d99165ce38d996e7798fe471d9a0d81acd08788fcc9892a2487efcde7a649614b14ba1c18", 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000002c0)='cpuset.mem_exclusive\x00', 0x2, 0x0) sendfile(r2, r2, &(0x7f00000000c0)=0x51, 0x3) 09:30:32 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) [ 127.732431] ISOFS: Unable to identify CD-ROM format. [ 127.752388] FAULT_INJECTION: forcing a failure. [ 127.752388] name failslab, interval 1, probability 0, space 0, times 0 [ 127.763753] CPU: 1 PID: 8940 Comm: syz-executor7 Not tainted 4.18.0-rc4-next-20180712+ #5 [ 127.772084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 127.781438] Call Trace: [ 127.784037] dump_stack+0x1c9/0x2b4 [ 127.787668] ? dump_stack_print_info.cold.2+0x52/0x52 [ 127.792870] ? kasan_check_write+0x14/0x20 [ 127.797128] should_fail.cold.4+0xa/0x11 [ 127.801203] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 127.806317] ? ksys_mount+0x12d/0x140 [ 127.810129] ? __x64_sys_mount+0xbe/0x150 [ 127.814278] ? do_syscall_64+0x1b9/0x820 [ 127.818327] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 127.823686] ? __list_lru_init+0x409/0x840 [ 127.827918] ? lock_downgrade+0x8f0/0x8f0 [ 127.832063] ? lock_acquire+0x1e4/0x540 [ 127.836045] ? fs_reclaim_acquire+0x20/0x20 [ 127.840353] ? lock_downgrade+0x8f0/0x8f0 [ 127.844500] ? __x64_sys_mount+0xbe/0x150 [ 127.848658] ? lock_acquire+0x1e4/0x540 [ 127.852633] ? lock_acquire+0x1e4/0x540 [ 127.856601] ? fs_reclaim_acquire+0x20/0x20 [ 127.860921] ? lock_downgrade+0x8f0/0x8f0 [ 127.865061] ? check_same_owner+0x340/0x340 [ 127.869376] ? check_same_owner+0x340/0x340 [ 127.873696] ? rcu_note_context_switch+0x730/0x730 [ 127.878618] __should_failslab+0x124/0x180 [ 127.882842] should_failslab+0x9/0x14 [ 127.886639] __kmalloc+0x2c8/0x760 [ 127.890176] ? kvfree_rcu+0x20/0x20 [ 127.893804] ? __list_lru_init+0x151/0x840 [ 127.898032] __list_lru_init+0x151/0x840 [ 127.902098] ? list_lru_destroy+0x500/0x500 [ 127.906428] ? prealloc_shrinker+0x213/0x480 [ 127.910830] ? __init_waitqueue_head+0x9e/0x150 [ 127.915515] ? inactive_list_is_low+0x850/0x850 [ 127.920180] ? __lockdep_init_map+0x105/0x590 [ 127.924673] alloc_super+0x9a6/0xb10 [ 127.928392] ? destroy_unused_super.part.11+0x110/0x110 [ 127.933744] ? lock_downgrade+0x8f0/0x8f0 [ 127.937896] ? kasan_check_read+0x11/0x20 [ 127.942044] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 127.946631] ? kasan_check_write+0x14/0x20 [ 127.950869] ? do_raw_spin_lock+0xc1/0x200 [ 127.955088] ? ns_test_super+0x50/0x50 [ 127.958970] sget_fc+0x269/0x950 [ 127.962332] ? compare_single+0x10/0x10 [ 127.966305] ? alloc_super+0xb10/0xb10 [ 127.970189] ? logfc+0x810/0x810 [ 127.973545] ? kasan_kmalloc+0xc4/0xe0 [ 127.977426] ? __kmalloc_track_caller+0x311/0x760 [ 127.982258] ? proc_root_lookup+0x60/0x60 [ 127.986388] vfs_get_super+0x6e/0x270 [ 127.990180] proc_get_tree+0x88/0xb0 [ 127.993892] vfs_get_tree+0x1cb/0x5c0 [ 127.997691] do_mount+0x6c1/0x1fb0 [ 128.001215] ? check_same_owner+0x340/0x340 [ 128.005537] ? lock_release+0xa30/0xa30 [ 128.009496] ? copy_mount_string+0x40/0x40 [ 128.013721] ? kasan_kmalloc+0xc4/0xe0 [ 128.017605] ? kmem_cache_alloc_trace+0x318/0x780 [ 128.022434] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 128.027957] ? _copy_from_user+0xdf/0x150 [ 128.032097] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 128.037628] ? copy_mount_options+0x285/0x380 [ 128.042110] ksys_mount+0x12d/0x140 [ 128.045726] __x64_sys_mount+0xbe/0x150 [ 128.049706] do_syscall_64+0x1b9/0x820 [ 128.053577] ? finish_task_switch+0x1d3/0x870 [ 128.058063] ? syscall_return_slowpath+0x5e0/0x5e0 [ 128.063430] ? syscall_return_slowpath+0x31d/0x5e0 [ 128.068535] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 128.073565] ? prepare_exit_to_usermode+0x291/0x3b0 [ 128.078581] ? perf_trace_sys_enter+0xb10/0xb10 [ 128.083259] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 128.088087] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 128.093261] RIP: 0033:0x455e29 [ 128.096428] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 128.115561] RSP: 002b:00007f94111afc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 128.123270] RAX: ffffffffffffffda RBX: 00007f94111b06d4 RCX: 0000000000455e29 09:30:33 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c4600020000010000000000000003000300010000001f020000000000004000000000000000000300000000000095000000020038000100ffff04000800020000000500000064b000000000000002000000000000000200000000000000f5d000000000000004000000000000000800000000000000d041f52b8d1752275bc35414d75cde65ff49179375a0e45ad489b895ed32a8429a2a981d1540689f41a37d0000918125355e4a94800ac83b00ea9398716001360e2835c6eb2149539fbd1671ba5c3f22ce060f8241427048a3b2f1faafdfb9e2fd77c5323ff586314fad76072baff2b5a25d82d4ff86174f9edd0eb9b42c98732c46b1d6eaa2bd6d392d3066a9a06cd63b7ee9f89aa3fd822b52b3d8d0d157e31f8bc045e6cfc0ef551eb75cb65417c31944020100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f0000000200)=""/248, 0xf8) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) 09:30:33 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = gettid() r1 = syz_open_procfs$namespace(r0, &(0x7f0000000080)='ns/mnt\x00') setns(r1, 0x0) setpgid(r0, r0) socket$pptp(0x18, 0x1, 0x2) 09:30:33 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) fadvise64(r0, 0x0, 0x8000000000000, 0x1) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x4000, 0x0) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f00000000c0)=0x8) r2 = dup3(r0, r0, 0x80000) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f00000001c0)={0x3, r1}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f0000000000)={0x7b, 0x0, [0xa83, 0x7, 0x2, 0x8]}) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x4, &(0x7f0000000180)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0xfffffffffffffe28) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000200)=0x9) shutdown(r0, 0x1) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000100), &(0x7f0000000140)=0xc) 09:30:33 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000c80)) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000380)=""/147) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f0000000200)=""/248, 0xf8) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) 09:30:33 executing program 7 (fault-call:1 fault-nth:24): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, &(0x7f00000001c0)={[{@gid={'gid', 0x3d}, 0x2c}]}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, &(0x7f00000001c0)) [ 128.130524] RDX: 0000000020000140 RSI: 0000000020000040 RDI: 0000000020000000 [ 128.137775] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 [ 128.145031] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 128.152298] R13: 00000000004c248a R14: 00000000004d0058 R15: 0000000000000017 09:30:33 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/mnt\x00') r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x20200) recvmmsg(r1, &(0x7f00000000c0), 0x0, 0x102, 0x0) r2 = dup(r0) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xcd, &(0x7f0000000100)={{0xa, 0x4e22, 0x176d, @mcast2={0xff, 0x2, [], 0x1}, 0x100000001}, {0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x3}, 0x8, [0x400, 0x94f, 0x8001, 0x3, 0xb61, 0x1, 0x9, 0x7]}, 0x5c) setns(r0, 0x0) [ 128.244671] ISOFS: Unable to identify CD-ROM format. [ 128.270220] FAULT_INJECTION: forcing a failure. [ 128.270220] name failslab, interval 1, probability 0, space 0, times 0 [ 128.281607] CPU: 0 PID: 8974 Comm: syz-executor7 Not tainted 4.18.0-rc4-next-20180712+ #5 [ 128.289923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 128.299275] Call Trace: [ 128.301863] dump_stack+0x1c9/0x2b4 [ 128.305484] ? dump_stack_print_info.cold.2+0x52/0x52 [ 128.310673] should_fail.cold.4+0xa/0x11 [ 128.314730] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 128.319821] ? save_stack+0xa9/0xd0 [ 128.323434] ? save_stack+0x43/0xd0 [ 128.327076] ? kasan_kmalloc+0xc4/0xe0 [ 128.330959] ? __kmalloc+0x14e/0x760 [ 128.334672] ? __list_lru_init+0x151/0x840 [ 128.338907] ? alloc_super+0x9a6/0xb10 [ 128.342796] ? sget_fc+0x269/0x950 [ 128.346330] ? vfs_get_super+0x6e/0x270 [ 128.350287] ? proc_get_tree+0x88/0xb0 [ 128.354169] ? vfs_get_tree+0x1cb/0x5c0 [ 128.358136] ? do_mount+0x6c1/0x1fb0 [ 128.361845] ? ksys_mount+0x12d/0x140 [ 128.365659] ? __x64_sys_mount+0xbe/0x150 [ 128.369804] ? do_syscall_64+0x1b9/0x820 [ 128.373856] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 128.379211] ? lock_acquire+0x1e4/0x540 [ 128.383171] ? fs_reclaim_acquire+0x20/0x20 [ 128.387478] ? lock_downgrade+0x8f0/0x8f0 [ 128.391611] ? check_same_owner+0x340/0x340 [ 128.395925] ? rcu_note_context_switch+0x730/0x730 [ 128.400847] __should_failslab+0x124/0x180 [ 128.405083] should_failslab+0x9/0x14 [ 128.408879] kmem_cache_alloc_node_trace+0x26f/0x770 [ 128.413978] ? kasan_kmalloc+0xc4/0xe0 [ 128.417864] __kmalloc_node+0x33/0x70 [ 128.421664] kvmalloc_node+0x65/0xf0 [ 128.425375] __list_lru_init+0x5d9/0x840 [ 128.429442] ? list_lru_destroy+0x500/0x500 [ 128.433762] ? prealloc_shrinker+0x213/0x480 [ 128.438248] ? __init_waitqueue_head+0x9e/0x150 [ 128.442908] ? inactive_list_is_low+0x850/0x850 [ 128.447593] ? __lockdep_init_map+0x105/0x590 [ 128.452090] alloc_super+0x9a6/0xb10 [ 128.455805] ? destroy_unused_super.part.11+0x110/0x110 [ 128.461170] ? lock_downgrade+0x8f0/0x8f0 [ 128.465309] ? kasan_check_read+0x11/0x20 [ 128.469447] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 128.474021] ? kasan_check_write+0x14/0x20 [ 128.478250] ? do_raw_spin_lock+0xc1/0x200 [ 128.482486] ? ns_test_super+0x50/0x50 [ 128.486365] sget_fc+0x269/0x950 [ 128.489720] ? compare_single+0x10/0x10 [ 128.493684] ? alloc_super+0xb10/0xb10 [ 128.497583] ? logfc+0x810/0x810 [ 128.501132] ? kasan_kmalloc+0xc4/0xe0 [ 128.505021] ? __kmalloc_track_caller+0x311/0x760 [ 128.509867] ? proc_root_lookup+0x60/0x60 [ 128.514030] vfs_get_super+0x6e/0x270 [ 128.517831] proc_get_tree+0x88/0xb0 [ 128.521526] vfs_get_tree+0x1cb/0x5c0 [ 128.525315] do_mount+0x6c1/0x1fb0 [ 128.528848] ? check_same_owner+0x340/0x340 [ 128.533178] ? lock_release+0xa30/0xa30 [ 128.537149] ? copy_mount_string+0x40/0x40 [ 128.541465] ? kasan_kmalloc+0xc4/0xe0 [ 128.545360] ? kmem_cache_alloc_trace+0x318/0x780 [ 128.550208] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 128.555742] ? _copy_from_user+0xdf/0x150 [ 128.559896] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 128.565425] ? copy_mount_options+0x285/0x380 [ 128.569903] ksys_mount+0x12d/0x140 [ 128.573526] __x64_sys_mount+0xbe/0x150 [ 128.577486] do_syscall_64+0x1b9/0x820 [ 128.581362] ? finish_task_switch+0x1d3/0x870 [ 128.585845] ? syscall_return_slowpath+0x5e0/0x5e0 [ 128.590772] ? syscall_return_slowpath+0x31d/0x5e0 [ 128.595697] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 128.600705] ? prepare_exit_to_usermode+0x291/0x3b0 [ 128.605709] ? perf_trace_sys_enter+0xb10/0xb10 [ 128.610362] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 128.615193] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 128.620370] RIP: 0033:0x455e29 [ 128.623548] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 128.642724] RSP: 002b:00007f94111afc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 128.650417] RAX: ffffffffffffffda RBX: 00007f94111b06d4 RCX: 0000000000455e29 [ 128.657675] RDX: 0000000020000140 RSI: 0000000020000040 RDI: 0000000020000000 [ 128.664925] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 09:30:33 executing program 4: r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000012000/0x4000)=nil, 0x4000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000080)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"410f44be5f55ea719cbb6635"}}], 0x30) ioctl$sock_SIOCDELDLCI(r3, 0x8981, &(0x7f0000000140)={'gre0\x00', 0x3}) link(&(0x7f0000f3bff8)='./file0\x00', &(0x7f00006b3ff0)='./file2\x00') rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file1\x00') lstat(&(0x7f0000003180)='./file2\x00', &(0x7f00000031c0)) lsetxattr(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)=@random={'system.', '}cpuset}[bdev\x00'}, &(0x7f0000000300)='lo\x00', 0x3, 0x0) dup2(r1, r2) 09:30:33 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x18000, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000080)=0x6) r1 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r1, 0x0) ioctl$int_in(r1, 0x5473, &(0x7f0000000100)=0x89) 09:30:33 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c4600020000010000000000000003000300010000001f020000000000004000000000000000000300000000000095000000020038000100ffff04000800020000000500000064b000000000000002000000000000000200000000000000f5d000000000000004000000000000000800000000000000d041f52b8d1752275bc35414d75cde65ff49179375a0e45ad489b895ed32a8429a2a981d1540689f41a37d0000918125355e4a94800ac83b00ea9398716001360e2835c6eb2149539fbd1671ba5c3f22ce060f8241427048a3b2f1faafdfb9e2fd77c5323ff586314fad76072baff2b5a25d82d4ff86174f9edd0eb9b42c98732c46b1d6eaa2bd6d392d3066a9a06cd63b7ee9f89aa3fd822b52b3d8d0d157e31f8bc045e6cfc0ef551eb75cb65417c31944020100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000c80)) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000380)=""/147) syz_open_pts(0xffffffffffffffff, 0x0) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f0000000200)=""/248, 0xf8) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) 09:30:33 executing program 7 (fault-call:1 fault-nth:25): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, &(0x7f00000001c0)={[{@gid={'gid', 0x3d}, 0x2c}]}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, &(0x7f00000001c0)) [ 128.672182] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 128.679444] R13: 00000000004c248a R14: 00000000004d0058 R15: 0000000000000018 09:30:33 executing program 6: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r0 = syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0x4, 0x8000) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000240)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0xc800, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000180), r3, r2}}, 0x18) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000100)={0xa, 0x4, 0xfa00, {r3}}, 0xc) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r4 = syz_open_pts(r1, 0x0) read(r4, &(0x7f0000000280)=""/1, 0x1) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000fd0ffc)) r5 = gettid() ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000140)) ioctl$TIOCGPTPEER(r1, 0x5441, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r5, 0x1000000000016) 09:30:33 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x9, 0x0) openat(r0, &(0x7f0000000140)='./file0\x00', 0x1, 0x8) socket$inet_sctp(0x2, 0x5, 0x84) capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r1 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x40080, 0x0) write$P9_RLOPEN(r2, &(0x7f0000000080)={0x18, 0xd, 0x1, {{0x0, 0x2}}}, 0x18) setns(r1, 0x0) [ 128.778383] ISOFS: Unable to identify CD-ROM format. [ 128.793000] FAULT_INJECTION: forcing a failure. [ 128.793000] name failslab, interval 1, probability 0, space 0, times 0 [ 128.804452] CPU: 0 PID: 8999 Comm: syz-executor7 Not tainted 4.18.0-rc4-next-20180712+ #5 [ 128.812764] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 128.822124] Call Trace: [ 128.824722] dump_stack+0x1c9/0x2b4 [ 128.828351] ? dump_stack_print_info.cold.2+0x52/0x52 [ 128.833545] should_fail.cold.4+0xa/0x11 [ 128.837608] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 128.842694] ? is_bpf_text_address+0xd7/0x170 [ 128.847179] ? kernel_text_address+0x79/0xf0 [ 128.851597] ? __kernel_text_address+0xd/0x40 [ 128.856083] ? unwind_get_return_address+0x61/0xa0 [ 128.860999] ? __save_stack_trace+0x8d/0xf0 [ 128.865319] ? save_stack+0xa9/0xd0 [ 128.868932] ? lock_acquire+0x1e4/0x540 [ 128.872897] ? fs_reclaim_acquire+0x20/0x20 [ 128.877205] ? lock_downgrade+0x8f0/0x8f0 [ 128.881349] ? __x64_sys_mount+0xbe/0x150 [ 128.885494] ? check_same_owner+0x340/0x340 [ 128.889802] ? rcu_note_context_switch+0x730/0x730 [ 128.894730] __should_failslab+0x124/0x180 [ 128.898959] should_failslab+0x9/0x14 [ 128.902763] kmem_cache_alloc_trace+0x2cb/0x780 [ 128.907431] ? kasan_kmalloc+0xc4/0xe0 [ 128.911319] __memcg_init_list_lru_node+0x185/0x2d0 [ 128.916340] ? kvfree_rcu+0x20/0x20 [ 128.919951] ? __kmalloc_node+0x47/0x70 [ 128.923909] __list_lru_init+0x4d6/0x840 [ 128.927966] ? list_lru_destroy+0x500/0x500 [ 128.932365] ? prealloc_shrinker+0x213/0x480 [ 128.936757] ? __init_waitqueue_head+0x9e/0x150 [ 128.941429] ? inactive_list_is_low+0x850/0x850 [ 128.946093] ? __lockdep_init_map+0x105/0x590 [ 128.950587] alloc_super+0x9a6/0xb10 [ 128.954291] ? destroy_unused_super.part.11+0x110/0x110 [ 128.959638] ? lock_downgrade+0x8f0/0x8f0 [ 128.963780] ? kasan_check_read+0x11/0x20 [ 128.967922] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 128.972499] ? kasan_check_write+0x14/0x20 [ 128.976718] ? do_raw_spin_lock+0xc1/0x200 [ 128.980949] ? ns_test_super+0x50/0x50 [ 128.984827] sget_fc+0x269/0x950 [ 128.988180] ? compare_single+0x10/0x10 [ 128.992143] ? alloc_super+0xb10/0xb10 [ 128.996024] ? logfc+0x810/0x810 [ 128.999392] ? kasan_kmalloc+0xc4/0xe0 [ 129.003280] ? __kmalloc_track_caller+0x311/0x760 [ 129.008134] ? proc_root_lookup+0x60/0x60 [ 129.012287] vfs_get_super+0x6e/0x270 [ 129.016090] proc_get_tree+0x88/0xb0 [ 129.019790] vfs_get_tree+0x1cb/0x5c0 [ 129.023573] do_mount+0x6c1/0x1fb0 [ 129.027100] ? check_same_owner+0x340/0x340 [ 129.031420] ? lock_release+0xa30/0xa30 [ 129.035409] ? copy_mount_string+0x40/0x40 [ 129.039645] ? kasan_kmalloc+0xc4/0xe0 [ 129.043516] ? kmem_cache_alloc_trace+0x318/0x780 [ 129.048351] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 129.053883] ? _copy_from_user+0xdf/0x150 [ 129.058030] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 129.063559] ? copy_mount_options+0x285/0x380 [ 129.068046] ksys_mount+0x12d/0x140 [ 129.071660] __x64_sys_mount+0xbe/0x150 [ 129.075629] do_syscall_64+0x1b9/0x820 [ 129.079498] ? syscall_slow_exit_work+0x500/0x500 [ 129.084338] ? syscall_return_slowpath+0x5e0/0x5e0 [ 129.089258] ? syscall_return_slowpath+0x31d/0x5e0 [ 129.094182] ? prepare_exit_to_usermode+0x291/0x3b0 [ 129.099202] ? perf_trace_sys_enter+0xb10/0xb10 [ 129.103864] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 129.108691] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 129.113860] RIP: 0033:0x455e29 09:30:34 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) epoll_create1(0x80000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000080)={0x3, &(0x7f00000002c0)=[{}, {}, {}]}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) [ 129.117033] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 129.136244] RSP: 002b:00007f94111afc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 129.143960] RAX: ffffffffffffffda RBX: 00007f94111b06d4 RCX: 0000000000455e29 [ 129.151237] RDX: 0000000020000140 RSI: 0000000020000040 RDI: 0000000020000000 [ 129.158511] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 [ 129.165788] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 129.173063] R13: 00000000004c248a R14: 00000000004d0058 R15: 0000000000000019 09:30:34 executing program 5: socket$inet(0x2, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x8000, 0x0) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000080)=0x414) perf_event_open(&(0x7f000001d000)={0x5, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) 09:30:34 executing program 7 (fault-call:1 fault-nth:26): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, &(0x7f00000001c0)={[{@gid={'gid', 0x3d}, 0x2c}]}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, &(0x7f00000001c0)) 09:30:34 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000c80)) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f0000000200)=""/248, 0xf8) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) 09:30:34 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f0000000200)=""/248, 0xf8) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) 09:30:34 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x40081, 0x0) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000300)) r1 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0xa00, 0x0) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000080)) msgget(0x1, 0x1a7) syz_open_dev$rtc(&(0x7f0000000100)='/dev/rtc#\x00', 0x4, 0x119080) setns(r1, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000140)={{0x2, 0x2}, 'port0\x00', 0x6, 0x21000, 0xd138, 0x9, 0xfffffffffffffffa, 0xffffffffffff6a88, 0x7, 0x0, 0x4e4c03ff0412db2a, 0x4}) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x891b, &(0x7f0000000340)={'ip6_vti0\x00', {0x2, 0x4e22, @loopback=0x7f000001}}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000200)={0x8212, 0xfffffffffffffff7, 0x7, {0x77359400}, 0x40, 0x9}) 09:30:34 executing program 4: r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000012000/0x4000)=nil, 0x4000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000080)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"410f44be5f55ea719cbb6635"}}], 0x30) ioctl$sock_SIOCDELDLCI(r3, 0x8981, &(0x7f0000000140)={'gre0\x00', 0x3}) link(&(0x7f0000f3bff8)='./file0\x00', &(0x7f00006b3ff0)='./file2\x00') rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file1\x00') lstat(&(0x7f0000003180)='./file2\x00', &(0x7f00000031c0)) lsetxattr(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)=@random={'system.', '}cpuset}[bdev\x00'}, &(0x7f0000000300)='lo\x00', 0x3, 0x0) dup2(r1, r2) [ 129.297615] ISOFS: Unable to identify CD-ROM format. [ 129.322947] FAULT_INJECTION: forcing a failure. [ 129.322947] name failslab, interval 1, probability 0, space 0, times 0 [ 129.334293] CPU: 1 PID: 9031 Comm: syz-executor7 Not tainted 4.18.0-rc4-next-20180712+ #5 [ 129.342625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 129.351987] Call Trace: [ 129.354588] dump_stack+0x1c9/0x2b4 [ 129.358232] ? dump_stack_print_info.cold.2+0x52/0x52 [ 129.363438] ? __kernel_text_address+0xd/0x40 [ 129.367953] ? unwind_get_return_address+0x61/0xa0 09:30:34 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f0000000200)=""/248, 0xf8) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) 09:30:34 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000003c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000240)=""/64, 0x40}], 0x1, &(0x7f0000000480)=""/111, 0x6f, 0x9}, 0x2000) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e23, @loopback=0x7f000001}}) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuset.effective_mems\x00', 0x0, 0x0) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f00000005c0)={r2, r3}) 09:30:34 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) [ 129.372911] should_fail.cold.4+0xa/0x11 [ 129.376988] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 129.382103] ? save_stack+0xa9/0xd0 [ 129.385746] ? save_stack+0x43/0xd0 [ 129.389395] ? kasan_kmalloc+0xc4/0xe0 [ 129.393306] ? kmem_cache_alloc_trace+0x152/0x780 [ 129.398249] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 129.403455] ? __list_lru_init+0x4d6/0x840 [ 129.407706] ? alloc_super+0x9a6/0xb10 [ 129.411604] ? vfs_get_super+0x6e/0x270 [ 129.415586] ? proc_get_tree+0x88/0xb0 [ 129.419489] ? vfs_get_tree+0x1cb/0x5c0 09:30:34 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/ipc\x00') setns(r0, 0x0) [ 129.423481] ? do_mount+0x6c1/0x1fb0 [ 129.427204] ? ksys_mount+0x12d/0x140 [ 129.431026] ? __x64_sys_mount+0xbe/0x150 [ 129.435180] ? do_syscall_64+0x1b9/0x820 [ 129.439246] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 129.444620] ? save_stack+0xa9/0xd0 [ 129.448261] ? lock_acquire+0x1e4/0x540 [ 129.452241] ? fs_reclaim_acquire+0x20/0x20 [ 129.456573] ? lock_downgrade+0x8f0/0x8f0 [ 129.460731] ? __x64_sys_mount+0xbe/0x150 [ 129.464888] ? check_same_owner+0x340/0x340 [ 129.469219] ? rcu_note_context_switch+0x730/0x730 [ 129.474158] __should_failslab+0x124/0x180 [ 129.478401] should_failslab+0x9/0x14 [ 129.482212] kmem_cache_alloc_trace+0x2cb/0x780 [ 129.486889] ? kasan_kmalloc+0xc4/0xe0 [ 129.490779] __memcg_init_list_lru_node+0x185/0x2d0 [ 129.495781] ? kvfree_rcu+0x20/0x20 [ 129.499494] ? __kmalloc_node+0x47/0x70 [ 129.503477] __list_lru_init+0x4d6/0x840 [ 129.507532] ? list_lru_destroy+0x500/0x500 [ 129.511844] ? prealloc_shrinker+0x213/0x480 [ 129.516242] ? __init_waitqueue_head+0x9e/0x150 [ 129.520904] ? inactive_list_is_low+0x850/0x850 [ 129.525572] ? __lockdep_init_map+0x105/0x590 [ 129.530065] alloc_super+0x9a6/0xb10 [ 129.533778] ? destroy_unused_super.part.11+0x110/0x110 [ 129.539145] ? lock_downgrade+0x8f0/0x8f0 [ 129.543286] ? kasan_check_read+0x11/0x20 [ 129.547422] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 129.551998] ? kasan_check_write+0x14/0x20 [ 129.556236] ? do_raw_spin_lock+0xc1/0x200 [ 129.560461] ? ns_test_super+0x50/0x50 [ 129.564344] sget_fc+0x269/0x950 [ 129.567712] ? compare_single+0x10/0x10 [ 129.571693] ? alloc_super+0xb10/0xb10 [ 129.575566] ? logfc+0x810/0x810 [ 129.578933] ? kasan_kmalloc+0xc4/0xe0 [ 129.582806] ? __kmalloc_track_caller+0x311/0x760 [ 129.587633] ? proc_root_lookup+0x60/0x60 [ 129.591769] vfs_get_super+0x6e/0x270 [ 129.595560] proc_get_tree+0x88/0xb0 [ 129.599262] vfs_get_tree+0x1cb/0x5c0 [ 129.603056] do_mount+0x6c1/0x1fb0 [ 129.606591] ? check_same_owner+0x340/0x340 [ 129.610913] ? lock_release+0xa30/0xa30 [ 129.614885] ? copy_mount_string+0x40/0x40 [ 129.619117] ? kasan_kmalloc+0xc4/0xe0 [ 129.623003] ? kmem_cache_alloc_trace+0x318/0x780 [ 129.627842] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 129.633374] ? _copy_from_user+0xdf/0x150 [ 129.637537] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 129.643079] ? copy_mount_options+0x285/0x380 [ 129.647577] ksys_mount+0x12d/0x140 [ 129.651200] __x64_sys_mount+0xbe/0x150 [ 129.655178] do_syscall_64+0x1b9/0x820 [ 129.659068] ? finish_task_switch+0x1d3/0x870 [ 129.663571] ? syscall_return_slowpath+0x5e0/0x5e0 [ 129.668496] ? syscall_return_slowpath+0x31d/0x5e0 [ 129.673432] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 129.678449] ? prepare_exit_to_usermode+0x291/0x3b0 [ 129.683462] ? perf_trace_sys_enter+0xb10/0xb10 [ 129.688133] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 129.692988] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 129.698184] RIP: 0033:0x455e29 [ 129.701367] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 09:30:34 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') r1 = dup3(r0, r0, 0x80000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) setns(r0, 0x0) 09:30:34 executing program 6: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r0 = syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0x4, 0x8000) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000240)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0xc800, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000180), r3, r2}}, 0x18) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000100)={0xa, 0x4, 0xfa00, {r3}}, 0xc) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r4 = syz_open_pts(r1, 0x0) read(r4, &(0x7f0000000280)=""/1, 0x1) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000fd0ffc)) gettid() ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000140)) ioctl$TIOCGPTPEER(r1, 0x5441, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) 09:30:34 executing program 7 (fault-call:1 fault-nth:27): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, &(0x7f00000001c0)={[{@gid={'gid', 0x3d}, 0x2c}]}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, &(0x7f00000001c0)) 09:30:34 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000c80)) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000380)=""/147) syz_open_pts(0xffffffffffffffff, 0x0) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f0000000200)=""/248, 0xf8) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) [ 129.720617] RSP: 002b:00007f94111afc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 129.728327] RAX: ffffffffffffffda RBX: 00007f94111b06d4 RCX: 0000000000455e29 [ 129.735604] RDX: 0000000020000140 RSI: 0000000020000040 RDI: 0000000020000000 [ 129.742859] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 [ 129.750121] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 129.757395] R13: 00000000004c248a R14: 00000000004d0058 R15: 000000000000001a 09:30:35 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000140)={0x80000001, 0x2, 0xfc0000000000000, 0x3, 0x6, 0x7}) r1 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') fsetxattr(r1, &(0x7f0000000000)=@known='system.posix_acl_default\x00', &(0x7f0000000080)='ns/mnt\x00', 0x7, 0x2) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) setns(r1, 0x0) [ 129.842305] ISOFS: Unable to identify CD-ROM format. [ 129.858794] FAULT_INJECTION: forcing a failure. [ 129.858794] name failslab, interval 1, probability 0, space 0, times 0 [ 129.870148] CPU: 0 PID: 9080 Comm: syz-executor7 Not tainted 4.18.0-rc4-next-20180712+ #5 [ 129.878460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 129.887805] Call Trace: [ 129.890393] dump_stack+0x1c9/0x2b4 [ 129.894008] ? dump_stack_print_info.cold.2+0x52/0x52 [ 129.899205] should_fail.cold.4+0xa/0x11 [ 129.903258] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 129.908354] ? is_bpf_text_address+0xd7/0x170 [ 129.912855] ? kernel_text_address+0x79/0xf0 [ 129.917247] ? __kernel_text_address+0xd/0x40 [ 129.921726] ? unwind_get_return_address+0x61/0xa0 [ 129.926657] ? __save_stack_trace+0x8d/0xf0 [ 129.930992] ? save_stack+0xa9/0xd0 [ 129.934627] ? lock_acquire+0x1e4/0x540 [ 129.938584] ? fs_reclaim_acquire+0x20/0x20 [ 129.942888] ? lock_downgrade+0x8f0/0x8f0 [ 129.947035] ? __x64_sys_mount+0xbe/0x150 [ 129.951184] ? check_same_owner+0x340/0x340 [ 129.955494] ? rcu_note_context_switch+0x730/0x730 [ 129.960410] __should_failslab+0x124/0x180 [ 129.964640] should_failslab+0x9/0x14 [ 129.968442] kmem_cache_alloc_trace+0x2cb/0x780 [ 129.973110] ? kasan_kmalloc+0xc4/0xe0 [ 129.977007] __memcg_init_list_lru_node+0x185/0x2d0 [ 129.982026] ? kvfree_rcu+0x20/0x20 [ 129.985653] ? __kmalloc_node+0x47/0x70 [ 129.989623] __list_lru_init+0x4d6/0x840 [ 129.993673] ? list_lru_destroy+0x500/0x500 [ 129.997997] ? prealloc_shrinker+0x213/0x480 [ 130.002395] ? __init_waitqueue_head+0x9e/0x150 [ 130.007055] ? inactive_list_is_low+0x850/0x850 [ 130.011709] ? __lockdep_init_map+0x105/0x590 [ 130.016238] alloc_super+0x9a6/0xb10 [ 130.019938] ? destroy_unused_super.part.11+0x110/0x110 [ 130.025292] ? lock_downgrade+0x8f0/0x8f0 [ 130.029433] ? kasan_check_read+0x11/0x20 [ 130.033577] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 130.038154] ? kasan_check_write+0x14/0x20 [ 130.042394] ? do_raw_spin_lock+0xc1/0x200 [ 130.046617] ? ns_test_super+0x50/0x50 [ 130.050502] sget_fc+0x269/0x950 [ 130.053851] ? compare_single+0x10/0x10 [ 130.057808] ? alloc_super+0xb10/0xb10 [ 130.061681] ? logfc+0x810/0x810 [ 130.065040] ? kasan_kmalloc+0xc4/0xe0 [ 130.068926] ? __kmalloc_track_caller+0x311/0x760 [ 130.073767] ? proc_root_lookup+0x60/0x60 [ 130.077905] vfs_get_super+0x6e/0x270 [ 130.081692] proc_get_tree+0x88/0xb0 [ 130.085397] vfs_get_tree+0x1cb/0x5c0 [ 130.089184] do_mount+0x6c1/0x1fb0 [ 130.092721] ? kasan_check_write+0x14/0x20 [ 130.096949] ? copy_mount_string+0x40/0x40 [ 130.101176] ? kasan_kmalloc+0xc4/0xe0 [ 130.105058] ? kmem_cache_alloc_trace+0x318/0x780 [ 130.109893] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 130.115434] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 130.120987] ? copy_mount_options+0x285/0x380 [ 130.125477] ksys_mount+0x12d/0x140 [ 130.129110] __x64_sys_mount+0xbe/0x150 [ 130.133074] do_syscall_64+0x1b9/0x820 [ 130.136950] ? finish_task_switch+0x1d3/0x870 [ 130.141452] ? syscall_return_slowpath+0x5e0/0x5e0 [ 130.146368] ? syscall_return_slowpath+0x31d/0x5e0 [ 130.151308] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 130.156330] ? prepare_exit_to_usermode+0x291/0x3b0 [ 130.161341] ? perf_trace_sys_enter+0xb10/0xb10 [ 130.166025] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 130.170864] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 130.176046] RIP: 0033:0x455e29 09:30:35 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cfb(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000000c0)="9134abc0", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_elf32(r2, &(0x7f0000000180)=ANY=[], 0xffbd) socket$packet(0x11, 0x3, 0x300) recvmsg(r2, &(0x7f0000000080)={&(0x7f0000000280)=@sco, 0x11c, &(0x7f00000013c0)=[{&(0x7f00000014c0)=""/4096, 0x791fdd3}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 09:30:35 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) r0 = gettid() r1 = syz_open_procfs$namespace(r0, &(0x7f00000000c0)='ns/pid\x00') r2 = fcntl$dupfd(r1, 0x406, r1) ioctl$VT_SETMODE(r2, 0x5602, &(0x7f0000000000)={0xffff, 0x2, 0x47, 0x901, 0x400000000000d}) setns(r1, 0x0) fcntl$setsig(r1, 0xa, 0x3b) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) [ 130.179219] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 130.198355] RSP: 002b:00007f94111afc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 130.206049] RAX: ffffffffffffffda RBX: 00007f94111b06d4 RCX: 0000000000455e29 [ 130.213302] RDX: 0000000020000140 RSI: 0000000020000040 RDI: 0000000020000000 [ 130.220558] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 [ 130.227819] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 130.235531] R13: 00000000004c248a R14: 00000000004d0058 R15: 000000000000001b 09:30:35 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c4600020000010000000000000003000300010000001f020000000000004000000000000000000300000000000095000000020038000100ffff04000800020000000500000064b000000000000002000000000000000200000000000000f5d000000000000004000000000000000800000000000000d041f52b8d1752275bc35414d75cde65ff49179375a0e45ad489b895ed32a8429a2a981d1540689f41a37d0000918125355e4a94800ac83b00ea9398716001360e2835c6eb2149539fbd1671ba5c3f22ce060f8241427048a3b2f1faafdfb9e2fd77c5323ff586314fad76072baff2b5a25d82d4ff86174f9edd0eb9b42c98732c46b1d6eaa2bd6d392d3066a9a06cd63b7ee9f89aa3fd822b52b3d8d0d157e31f8bc045e6cfc0ef551eb75cb65417c31944020100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000c80)) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f0000000200)=""/248, 0xf8) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) 09:30:35 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f0000000200)=""/248, 0xf8) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) 09:30:35 executing program 7 (fault-call:1 fault-nth:28): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, &(0x7f00000001c0)={[{@gid={'gid', 0x3d}, 0x2c}]}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, &(0x7f00000001c0)) 09:30:35 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)=0x0) r1 = syz_open_procfs$namespace(r0, &(0x7f0000000100)='ns/mnt\x00') setns(r1, 0x0) 09:30:35 executing program 4: r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) pipe2(&(0x7f0000000100), 0x0) mmap(&(0x7f0000012000/0x4000)=nil, 0x4000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000080)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"410f44be5f55ea719cbb6635"}}], 0x30) ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000140)={'gre0\x00', 0x3}) link(&(0x7f0000f3bff8)='./file0\x00', &(0x7f00006b3ff0)='./file2\x00') rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file1\x00') lstat(&(0x7f0000003180)='./file2\x00', &(0x7f00000031c0)) lsetxattr(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)=@random={'system.', '}cpuset}[bdev\x00'}, &(0x7f0000000300)='lo\x00', 0x3, 0x0) 09:30:35 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') r1 = dup2(r0, r0) ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f00000002c0)={{0xf002, 0x10000, 0xf, 0x25, 0x1, 0xffff, 0xa3, 0x8001, 0xfffffffffffffffd, 0x64, 0x5, 0xffff}, {0xf000, 0x13000, 0x1e, 0x5, 0x0, 0x9, 0x200000000000, 0xfd, 0x9, 0x0, 0x7, 0x1ff}, {0x1, 0xd000, 0xf, 0x200, 0xffffffff, 0x4, 0x7, 0xe11d, 0x90a6, 0x7, 0x6}, {0x7c526bbff79ee252, 0x1f001, 0x0, 0x20, 0x498, 0xfffffffffffffffd, 0x10001, 0x81, 0x9, 0xc4, 0x8, 0x2}, {0x1000, 0xd000, 0x8, 0x8, 0x30b4, 0xfff, 0x3, 0x1, 0x8000, 0x9, 0x2, 0x1}, {0x10f000, 0x4, 0xd, 0x1, 0x7ff, 0x2, 0x9, 0x1f, 0xfff, 0x8, 0x6, 0x2}, {0x5000, 0x1d000, 0x10, 0x2, 0xffff, 0xffff, 0x8, 0x800, 0x6, 0xc477, 0x7f, 0x1000}, {0x10f005, 0x2000, 0xf, 0x0, 0x7fffffff, 0x7fffffff, 0x43, 0x3, 0x0, 0x2, 0x3, 0x1}, {0x10002, 0x100000}, {0x0, 0xd000}, 0x40000, 0x0, 0x3000, 0x10000, 0xf, 0x0, 0x6, [0x40, 0x1e, 0x5, 0xb4bd63d]}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x10100, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="d860cf3f0645abc98bb7ef4e19d662a66a39b5af877c3b133c235521c35e9cf46fe49b43f7f60122031f70700c545ea64a6b2f0409b450ce3a33247f7e3c38b8cf5a8b8be5d4aaa98564f0c1053fd95f4e6cd35e", 0x54) setns(r0, 0x0) 09:30:35 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") listen(r0, 0x5eb857) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r3 = accept4(r0, &(0x7f0000975000)=@can, &(0x7f0000000040)=0x80, 0x0) recvmsg$kcm(r3, &(0x7f0000002700)={&(0x7f00000001c0)=@sco, 0x80, &(0x7f0000001500), 0x0, &(0x7f0000001580)=""/185, 0xb9}, 0x0) write(r2, &(0x7f0000000840), 0xff98) r4 = geteuid() sendmsg$nl_xfrm(r3, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x32000001}, 0xc, &(0x7f0000000300)={&(0x7f00000000c0)=@getpolicy={0xcc, 0x15, 0x100, 0x70bd26, 0x25dfdbff, {{@in6=@ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @in=@loopback=0x7f000001, 0x4e22, 0x0, 0x4e21, 0x9, 0x2, 0xa0, 0x20, 0x73, 0x0, r4}, 0x6e6bb3, 0x3}, [@coaddr={0x14, 0xe, @in6}, @lastused={0xc, 0xf, 0x8001}, @migrate={0x5c, 0x11, [{@in6=@ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0x33, 0x7, 0x0, 0x3507, 0x2, 0xa}, {@in=@loopback=0x7f000001, @in=@local={0xac, 0x14, 0x14, 0xaa}, 0x32, 0x7, 0x0, 0x0, 0x2, 0x2}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) [ 130.390861] ISOFS: Unable to identify CD-ROM format. 09:30:35 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') [ 130.440473] FAULT_INJECTION: forcing a failure. [ 130.440473] name failslab, interval 1, probability 0, space 0, times 0 [ 130.451789] CPU: 1 PID: 9115 Comm: syz-executor7 Not tainted 4.18.0-rc4-next-20180712+ #5 [ 130.460108] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 130.469467] Call Trace: [ 130.472071] dump_stack+0x1c9/0x2b4 [ 130.475709] ? dump_stack_print_info.cold.2+0x52/0x52 [ 130.480905] ? __kernel_text_address+0xd/0x40 [ 130.485415] ? unwind_get_return_address+0x61/0xa0 09:30:35 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000080)=0x0) r1 = syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/mnt\x00') move_pages(r0, 0x5, &(0x7f00000000c0)=[&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ff4000/0xc000)=nil, &(0x7f0000ffd000/0x2000)=nil], &(0x7f0000000100)=[0x2], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x2) setns(r1, 0x0) [ 130.490354] should_fail.cold.4+0xa/0x11 [ 130.494444] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 130.499564] ? save_stack+0xa9/0xd0 [ 130.503197] ? save_stack+0x43/0xd0 [ 130.506836] ? kasan_kmalloc+0xc4/0xe0 [ 130.510730] ? kmem_cache_alloc_trace+0x152/0x780 [ 130.515577] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 130.520773] ? __list_lru_init+0x4d6/0x840 [ 130.525011] ? alloc_super+0x9a6/0xb10 [ 130.528904] ? vfs_get_super+0x6e/0x270 [ 130.532887] ? proc_get_tree+0x88/0xb0 [ 130.536785] ? vfs_get_tree+0x1cb/0x5c0 [ 130.540767] ? do_mount+0x6c1/0x1fb0 [ 130.544481] ? ksys_mount+0x12d/0x140 [ 130.548269] ? __x64_sys_mount+0xbe/0x150 [ 130.552403] ? do_syscall_64+0x1b9/0x820 [ 130.556456] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 130.561820] ? save_stack+0xa9/0xd0 [ 130.565441] ? lock_acquire+0x1e4/0x540 [ 130.569414] ? fs_reclaim_acquire+0x20/0x20 [ 130.573744] ? lock_downgrade+0x8f0/0x8f0 [ 130.577911] ? __x64_sys_mount+0xbe/0x150 [ 130.582059] ? check_same_owner+0x340/0x340 [ 130.586376] ? rcu_note_context_switch+0x730/0x730 [ 130.591319] __should_failslab+0x124/0x180 [ 130.595575] should_failslab+0x9/0x14 [ 130.599378] kmem_cache_alloc_trace+0x2cb/0x780 [ 130.604045] ? kasan_kmalloc+0xc4/0xe0 [ 130.607951] __memcg_init_list_lru_node+0x185/0x2d0 [ 130.612960] ? kvfree_rcu+0x20/0x20 [ 130.616588] ? __kmalloc_node+0x47/0x70 [ 130.620551] __list_lru_init+0x4d6/0x840 [ 130.624598] ? list_lru_destroy+0x500/0x500 [ 130.628917] ? prealloc_shrinker+0x213/0x480 [ 130.633327] ? __init_waitqueue_head+0x9e/0x150 [ 130.638004] ? inactive_list_is_low+0x850/0x850 [ 130.642667] ? __lockdep_init_map+0x105/0x590 [ 130.647150] alloc_super+0x9a6/0xb10 [ 130.650862] ? destroy_unused_super.part.11+0x110/0x110 [ 130.656318] ? lock_downgrade+0x8f0/0x8f0 [ 130.660473] ? kasan_check_read+0x11/0x20 [ 130.664622] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 130.669203] ? kasan_check_write+0x14/0x20 [ 130.673428] ? do_raw_spin_lock+0xc1/0x200 [ 130.677660] ? ns_test_super+0x50/0x50 [ 130.681531] sget_fc+0x269/0x950 [ 130.684891] ? compare_single+0x10/0x10 [ 130.688859] ? alloc_super+0xb10/0xb10 [ 130.692738] ? logfc+0x810/0x810 [ 130.696095] ? kasan_kmalloc+0xc4/0xe0 [ 130.699978] ? __kmalloc_track_caller+0x311/0x760 [ 130.704806] ? proc_root_lookup+0x60/0x60 [ 130.708946] vfs_get_super+0x6e/0x270 [ 130.712737] proc_get_tree+0x88/0xb0 [ 130.716436] vfs_get_tree+0x1cb/0x5c0 [ 130.720230] do_mount+0x6c1/0x1fb0 [ 130.723767] ? kasan_check_write+0x14/0x20 [ 130.727991] ? copy_mount_string+0x40/0x40 [ 130.732214] ? kasan_kmalloc+0xc4/0xe0 [ 130.736098] ? kmem_cache_alloc_trace+0x318/0x780 [ 130.740935] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 130.746470] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 130.751998] ? copy_mount_options+0x285/0x380 [ 130.756488] ksys_mount+0x12d/0x140 [ 130.760104] __x64_sys_mount+0xbe/0x150 [ 130.764071] do_syscall_64+0x1b9/0x820 [ 130.767950] ? finish_task_switch+0x1d3/0x870 [ 130.772434] ? syscall_return_slowpath+0x5e0/0x5e0 [ 130.777355] ? syscall_return_slowpath+0x31d/0x5e0 [ 130.782271] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 130.787275] ? prepare_exit_to_usermode+0x291/0x3b0 [ 130.792297] ? perf_trace_sys_enter+0xb10/0xb10 [ 130.796970] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 130.801815] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 130.807001] RIP: 0033:0x455e29 [ 130.810179] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 130.829447] RSP: 002b:00007f94111afc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 09:30:36 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/net\x00') setns(r0, 0x24000000) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='ns/net\x00'}, 0x10) accept4$bt_l2cap(r1, &(0x7f0000000100), &(0x7f0000000140)=0xe, 0x80800) 09:30:36 executing program 6: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r0 = syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0x4, 0x8000) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000240)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0xc800, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000180), r3, r2}}, 0x18) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000100)={0xa, 0x4, 0xfa00, {r3}}, 0xc) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r4 = syz_open_pts(r1, 0x0) read(r4, &(0x7f0000000280)=""/1, 0x1) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000fd0ffc)) gettid() ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000140)) ioctl$TIOCGPTPEER(r1, 0x5441, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) 09:30:36 executing program 7 (fault-call:1 fault-nth:29): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, &(0x7f00000001c0)={[{@gid={'gid', 0x3d}, 0x2c}]}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, &(0x7f00000001c0)) 09:30:36 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c4600020000010000000000000003000300010000001f020000000000004000000000000000000300000000000095000000020038000100ffff04000800020000000500000064b000000000000002000000000000000200000000000000f5d000000000000004000000000000000800000000000000d041f52b8d1752275bc35414d75cde65ff49179375a0e45ad489b895ed32a8429a2a981d1540689f41a37d0000918125355e4a94800ac83b00ea9398716001360e2835c6eb2149539fbd1671ba5c3f22ce060f8241427048a3b2f1faafdfb9e2fd77c5323ff586314fad76072baff2b5a25d82d4ff86174f9edd0eb9b42c98732c46b1d6eaa2bd6d392d3066a9a06cd63b7ee9f89aa3fd822b52b3d8d0d157e31f8bc045e6cfc0ef551eb75cb65417c31944020100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000c80)) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000380)=""/147) getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000001c0), &(0x7f0000000d00)=0x6) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f0000000200)=""/248, 0xf8) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) [ 130.837142] RAX: ffffffffffffffda RBX: 00007f94111b06d4 RCX: 0000000000455e29 [ 130.844402] RDX: 0000000020000140 RSI: 0000000020000040 RDI: 0000000020000000 [ 130.851668] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 [ 130.858923] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 130.866188] R13: 00000000004c248a R14: 00000000004d0058 R15: 000000000000001c 09:30:36 executing program 0: capset(&(0x7f0000000180)={0x20071026}, &(0x7f0000000080)={0xc, 0x0, 0x4}) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x101402, 0x0) ioctl$KVM_GET_PIT2(r0, 0x8070ae9f, &(0x7f00000001c0)) r1 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') restart_syscall() setns(r1, 0x0) 09:30:36 executing program 0: capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x5, 0x0, 0xfffffffffffffffd, 0x547, 0x7, 0x2}) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) [ 130.933984] ISOFS: Unable to identify CD-ROM format. [ 130.952915] FAULT_INJECTION: forcing a failure. [ 130.952915] name failslab, interval 1, probability 0, space 0, times 0 [ 130.964200] CPU: 0 PID: 9160 Comm: syz-executor7 Not tainted 4.18.0-rc4-next-20180712+ #5 [ 130.972518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 130.981875] Call Trace: 09:30:36 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000100)={0x0, 0x101, 0x2, 0x4, 0x1000}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000480)=0x0) r1 = syz_open_procfs$namespace(r0, &(0x7f0000000380)="ad6a1c26b6400f2ff9043e7b79abbf881ced1119be5c703df3c9a4633bae807eb792077901c531f630a20f8bde36f79f72f8b3e24d69bd388e8a93f0a05c92b9e3dff707f20715813883008478ea347ec22f7bc2e7366b75") r2 = accept4(0xffffffffffffff9c, &(0x7f00000002c0)=@l2, &(0x7f0000000040)=0x80, 0x80000) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000240), &(0x7f0000000340)=0xb) setns(r1, 0x8000000) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000080)=0x5, 0x4) sysinfo(&(0x7f0000000940)=""/234) getsockopt$bt_l2cap_L2CAP_CONNINFO(r2, 0x6, 0x2, &(0x7f00000000c0), &(0x7f00000004c0)=0x6) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f0000000000), &(0x7f0000000500)=0xfffffffffffffd5d) [ 130.984470] dump_stack+0x1c9/0x2b4 [ 130.988204] ? dump_stack_print_info.cold.2+0x52/0x52 [ 130.993403] ? __kernel_text_address+0xd/0x40 [ 130.997903] ? unwind_get_return_address+0x61/0xa0 [ 131.002847] should_fail.cold.4+0xa/0x11 [ 131.006917] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 131.012033] ? save_stack+0xa9/0xd0 [ 131.015673] ? save_stack+0x43/0xd0 [ 131.019292] ? kasan_kmalloc+0xc4/0xe0 [ 131.023180] ? kmem_cache_alloc_trace+0x152/0x780 [ 131.028028] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 131.033226] ? __list_lru_init+0x4d6/0x840 [ 131.037461] ? alloc_super+0x9a6/0xb10 [ 131.041334] ? vfs_get_super+0x6e/0x270 [ 131.045300] ? proc_get_tree+0x88/0xb0 [ 131.049175] ? vfs_get_tree+0x1cb/0x5c0 [ 131.053135] ? do_mount+0x6c1/0x1fb0 [ 131.056841] ? ksys_mount+0x12d/0x140 [ 131.060636] ? __x64_sys_mount+0xbe/0x150 [ 131.064770] ? do_syscall_64+0x1b9/0x820 [ 131.068823] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 131.074179] ? save_stack+0xa9/0xd0 [ 131.077798] ? lock_acquire+0x1e4/0x540 [ 131.081759] ? fs_reclaim_acquire+0x20/0x20 [ 131.086071] ? lock_downgrade+0x8f0/0x8f0 [ 131.090206] ? __x64_sys_mount+0xbe/0x150 [ 131.094356] ? check_same_owner+0x340/0x340 [ 131.098686] ? rcu_note_context_switch+0x730/0x730 [ 131.103611] __should_failslab+0x124/0x180 [ 131.107921] should_failslab+0x9/0x14 [ 131.111717] kmem_cache_alloc_trace+0x2cb/0x780 [ 131.116386] ? kasan_kmalloc+0xc4/0xe0 [ 131.120270] __memcg_init_list_lru_node+0x185/0x2d0 [ 131.125266] ? kvfree_rcu+0x20/0x20 [ 131.128881] ? __kmalloc_node+0x47/0x70 [ 131.132853] __list_lru_init+0x4d6/0x840 [ 131.136918] ? list_lru_destroy+0x500/0x500 [ 131.141234] ? prealloc_shrinker+0x213/0x480 [ 131.145633] ? __init_waitqueue_head+0x9e/0x150 [ 131.150304] ? inactive_list_is_low+0x850/0x850 [ 131.154966] ? __lockdep_init_map+0x105/0x590 [ 131.159448] alloc_super+0x9a6/0xb10 [ 131.163157] ? destroy_unused_super.part.11+0x110/0x110 [ 131.168518] ? lock_downgrade+0x8f0/0x8f0 [ 131.172661] ? kasan_check_read+0x11/0x20 [ 131.176813] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 131.181386] ? kasan_check_write+0x14/0x20 [ 131.185603] ? do_raw_spin_lock+0xc1/0x200 [ 131.189845] ? ns_test_super+0x50/0x50 [ 131.193724] sget_fc+0x269/0x950 [ 131.197094] ? compare_single+0x10/0x10 [ 131.201057] ? alloc_super+0xb10/0xb10 [ 131.204924] ? logfc+0x810/0x810 [ 131.208273] ? kasan_kmalloc+0xc4/0xe0 [ 131.212149] ? __kmalloc_track_caller+0x311/0x760 [ 131.216979] ? proc_root_lookup+0x60/0x60 [ 131.221130] vfs_get_super+0x6e/0x270 [ 131.224917] proc_get_tree+0x88/0xb0 [ 131.228626] vfs_get_tree+0x1cb/0x5c0 [ 131.232408] do_mount+0x6c1/0x1fb0 [ 131.235933] ? check_same_owner+0x340/0x340 [ 131.240255] ? lock_release+0xa30/0xa30 [ 131.244226] ? copy_mount_string+0x40/0x40 [ 131.248452] ? kasan_kmalloc+0xc4/0xe0 [ 131.252334] ? kmem_cache_alloc_trace+0x318/0x780 [ 131.257162] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 131.262686] ? _copy_from_user+0xdf/0x150 [ 131.266828] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 131.272347] ? copy_mount_options+0x285/0x380 [ 131.276842] ksys_mount+0x12d/0x140 [ 131.280474] __x64_sys_mount+0xbe/0x150 [ 131.283236] dccp_xmit_packet: Payload too large (65432) for featneg. [ 131.284451] do_syscall_64+0x1b9/0x820 [ 131.284464] ? finish_task_switch+0x1d3/0x870 [ 131.284481] ? syscall_return_slowpath+0x5e0/0x5e0 [ 131.304240] ? syscall_return_slowpath+0x31d/0x5e0 [ 131.309177] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 131.314280] ? prepare_exit_to_usermode+0x291/0x3b0 [ 131.319282] ? perf_trace_sys_enter+0xb10/0xb10 [ 131.323933] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 131.328768] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 131.333945] RIP: 0033:0x455e29 [ 131.337199] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 131.343226] dccp_close: ABORT with 204 bytes unread [ 131.356335] RSP: 002b:00007f94111afc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 131.356349] RAX: ffffffffffffffda RBX: 00007f94111b06d4 RCX: 0000000000455e29 [ 131.356358] RDX: 0000000020000140 RSI: 0000000020000040 RDI: 0000000020000000 [ 131.356366] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 [ 131.356373] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 131.356381] R13: 00000000004c248a R14: 00000000004d0058 R15: 000000000000001d 09:30:36 executing program 7 (fault-call:1 fault-nth:30): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, &(0x7f00000001c0)={[{@gid={'gid', 0x3d}, 0x2c}]}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, &(0x7f00000001c0)) 09:30:36 executing program 4: r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) pipe2(&(0x7f0000000100), 0x0) mmap(&(0x7f0000012000/0x4000)=nil, 0x4000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000080)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"410f44be5f55ea719cbb6635"}}], 0x30) ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000140)={'gre0\x00', 0x3}) link(&(0x7f0000f3bff8)='./file0\x00', &(0x7f00006b3ff0)='./file2\x00') rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file1\x00') lstat(&(0x7f0000003180)='./file2\x00', &(0x7f00000031c0)) lsetxattr(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)=@random={'system.', '}cpuset}[bdev\x00'}, &(0x7f0000000300)='lo\x00', 0x3, 0x0) 09:30:36 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) setns(0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000100)=0x0) r1 = getpgrp(r0) capget(&(0x7f0000000000)={0x20080522, r1}, &(0x7f0000000080)={0x0, 0x0, 0x5, 0xff, 0x2, 0x8}) 09:30:36 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000c80)) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f0000000200)=""/248, 0xf8) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) 09:30:36 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c4600020000010000000000000003000300010000001f020000000000004000000000000000000300000000000095000000020038000100ffff04000800020000000500000064b000000000000002000000000000000200000000000000f5d000000000000004000000000000000800000000000000d041f52b8d1752275bc35414d75cde65ff49179375a0e45ad489b895ed32a8429a2a981d1540689f41a37d0000918125355e4a94800ac83b00ea9398716001360e2835c6eb2149539fbd1671ba5c3f22ce060f8241427048a3b2f1faafdfb9e2fd77c5323ff586314fad76072baff2b5a25d82d4ff86174f9edd0eb9b42c98732c46b1d6eaa2bd6d392d3066a9a06cd63b7ee9f89aa3fd822b52b3d8d0d157e31f8bc045e6cfc0ef551eb75cb65417c31944020100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f0000000200)=""/248, 0xf8) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) 09:30:36 executing program 5: r0 = socket$inet6(0xa, 0x2000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83df84c4945762070") fcntl$getflags(r0, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x3, 0x80000) ioctl$SG_GET_VERSION_NUM(r1, 0x2282, &(0x7f0000000140)) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@newqdisc={0x24, 0x5e, 0x7, 0x0, 0x0, {0x0, r3, {0xf}}}, 0x24}, 0x1}, 0x0) 09:30:36 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) getpid() r0 = fcntl$getown(0xffffffffffffffff, 0x9) r1 = syz_open_procfs$namespace(r0, &(0x7f00000001c0)="6e732f6f651bca") setns(r1, 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x40, 0x40) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x8000, 0x10) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) [ 131.489964] ISOFS: Unable to identify CD-ROM format. 09:30:36 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000000c0)={0x0, 0x4, 0x10, 0x4, 0x4}, &(0x7f0000000140)=0x18) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000180)={r2, 0x4}, 0x8) accept4$packet(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000300)=0x14, 0x80800) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000340)={'vcan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000380)={'veth1\x00', r3}) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f00000001c0)={r2, 0x7, 0x74ee0503}, 0x8) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)=@ipv6_newaddr={0x34, 0x14, 0x1, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x100}, @IFA_LOCAL={0x14, 0x2}]}, 0xc0}, 0x1}, 0x0) [ 131.521137] FAULT_INJECTION: forcing a failure. [ 131.521137] name failslab, interval 1, probability 0, space 0, times 0 [ 131.532547] CPU: 0 PID: 9187 Comm: syz-executor7 Not tainted 4.18.0-rc4-next-20180712+ #5 [ 131.540868] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 131.550219] Call Trace: [ 131.552814] dump_stack+0x1c9/0x2b4 [ 131.556428] ? dump_stack_print_info.cold.2+0x52/0x52 [ 131.561608] ? __kernel_text_address+0xd/0x40 [ 131.566096] ? unwind_get_return_address+0x61/0xa0 [ 131.571054] should_fail.cold.4+0xa/0x11 [ 131.575111] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 131.580205] ? save_stack+0xa9/0xd0 [ 131.583816] ? save_stack+0x43/0xd0 [ 131.587470] ? kasan_kmalloc+0xc4/0xe0 [ 131.591340] ? kmem_cache_alloc_trace+0x152/0x780 [ 131.596165] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 131.601343] ? __list_lru_init+0x4d6/0x840 [ 131.605569] ? alloc_super+0x9a6/0xb10 [ 131.609438] ? vfs_get_super+0x6e/0x270 [ 131.613396] ? proc_get_tree+0x88/0xb0 [ 131.617274] ? vfs_get_tree+0x1cb/0x5c0 [ 131.621233] ? do_mount+0x6c1/0x1fb0 [ 131.624926] ? ksys_mount+0x12d/0x140 [ 131.628709] ? __x64_sys_mount+0xbe/0x150 [ 131.632855] ? do_syscall_64+0x1b9/0x820 [ 131.636917] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 131.642279] ? save_stack+0xa9/0xd0 [ 131.645904] ? lock_acquire+0x1e4/0x540 [ 131.649864] ? fs_reclaim_acquire+0x20/0x20 [ 131.654169] ? lock_downgrade+0x8f0/0x8f0 [ 131.658298] ? __x64_sys_mount+0xbe/0x150 [ 131.662429] ? check_same_owner+0x340/0x340 [ 131.666738] ? rcu_note_context_switch+0x730/0x730 [ 131.671675] __should_failslab+0x124/0x180 [ 131.675907] should_failslab+0x9/0x14 [ 131.679693] kmem_cache_alloc_trace+0x2cb/0x780 [ 131.684351] ? kasan_kmalloc+0xc4/0xe0 [ 131.688236] __memcg_init_list_lru_node+0x185/0x2d0 [ 131.693241] ? kvfree_rcu+0x20/0x20 [ 131.696849] ? __kmalloc_node+0x47/0x70 [ 131.700814] __list_lru_init+0x4d6/0x840 [ 131.704867] ? list_lru_destroy+0x500/0x500 [ 131.709199] ? prealloc_shrinker+0x213/0x480 [ 131.713589] ? __init_waitqueue_head+0x9e/0x150 [ 131.718244] ? inactive_list_is_low+0x850/0x850 [ 131.722905] ? __lockdep_init_map+0x105/0x590 [ 131.727383] alloc_super+0x9a6/0xb10 [ 131.731094] ? destroy_unused_super.part.11+0x110/0x110 [ 131.736438] ? lock_downgrade+0x8f0/0x8f0 [ 131.740572] ? kasan_check_read+0x11/0x20 [ 131.744701] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 131.749266] ? kasan_check_write+0x14/0x20 [ 131.753496] ? do_raw_spin_lock+0xc1/0x200 [ 131.757728] ? ns_test_super+0x50/0x50 [ 131.761615] sget_fc+0x269/0x950 [ 131.764968] ? compare_single+0x10/0x10 [ 131.768937] ? alloc_super+0xb10/0xb10 [ 131.772836] ? logfc+0x810/0x810 [ 131.776206] ? kasan_kmalloc+0xc4/0xe0 [ 131.780092] ? __kmalloc_track_caller+0x311/0x760 [ 131.784941] ? proc_root_lookup+0x60/0x60 [ 131.789077] vfs_get_super+0x6e/0x270 [ 131.792860] proc_get_tree+0x88/0xb0 [ 131.796570] vfs_get_tree+0x1cb/0x5c0 [ 131.800365] do_mount+0x6c1/0x1fb0 [ 131.803894] ? kasan_check_write+0x14/0x20 [ 131.808114] ? copy_mount_string+0x40/0x40 [ 131.812334] ? kasan_kmalloc+0xc4/0xe0 [ 131.816204] ? kmem_cache_alloc_trace+0x318/0x780 [ 131.821036] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 131.826564] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 131.832102] ? copy_mount_options+0x285/0x380 [ 131.836600] ksys_mount+0x12d/0x140 [ 131.840218] __x64_sys_mount+0xbe/0x150 [ 131.844179] do_syscall_64+0x1b9/0x820 [ 131.848058] ? finish_task_switch+0x1d3/0x870 [ 131.852540] ? syscall_return_slowpath+0x5e0/0x5e0 [ 131.857453] ? syscall_return_slowpath+0x31d/0x5e0 [ 131.862366] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 131.867369] ? prepare_exit_to_usermode+0x291/0x3b0 09:30:37 executing program 6: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r0 = syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0x4, 0x8000) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000240)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0xc800, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000180), r3, r2}}, 0x18) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000100)={0xa, 0x4, 0xfa00, {r3}}, 0xc) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r4 = syz_open_pts(r1, 0x0) read(r4, &(0x7f0000000280)=""/1, 0x1) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000fd0ffc)) gettid() ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000140)) ioctl$TIOCGPTPEER(r1, 0x5441, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) [ 131.872373] ? perf_trace_sys_enter+0xb10/0xb10 [ 131.877036] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 131.881882] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 131.887092] RIP: 0033:0x455e29 [ 131.890281] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 131.909871] RSP: 002b:00007f94111afc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 09:30:37 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000c80)) getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000001c0), &(0x7f0000000d00)=0x6) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f0000000200)=""/248, 0xf8) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) 09:30:37 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x101}) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d09}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x400000, 0x0) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000200)={0x1, 0x8, 0x1, 0x8, 0x2}) setns(r0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, &(0x7f00000002c0)={0x401, 0x2, {0x0, 0x1, 0x3, 0x3, 0xe65a}}) 09:30:37 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18c775c92912c5a9618a90046f3e00028000000000000000000000"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) r1 = socket$bt_bnep(0x1f, 0x3, 0x4) sendmsg(r1, &(0x7f0000003100)={&(0x7f00000008c0)=@in={0x2, 0x4e20, @rand_addr=0x2}, 0x80, &(0x7f0000001bc0)=[{&(0x7f0000000940)="4258949515fd0bebbf287c4ff16d60907efcfdec42d5ddede096e33bcc85378f3cd3a10471c8207bb35929cd828f1443d194e6a0a0a49236c425d9716aa9375a98d9512dd28f11a42d2a0a2ddcb0fddb7e4413ea5c92269bb383bf378cfb001a621f983d3f134d0016ff1e464f7f88331c5b32aa75db68d549a21fe028d421cd45dfced08aac0f7efe0882aedb54d35d4ece9ca33a3813cd55dcd011a885b888f9fa7316113e6ca1e774dc3db2fe9dc15b138b7f11", 0xb5}, {&(0x7f0000000a00)="e55dc20c93a193ccc08762e4246b0c732196896a9642e6617aa5e68ede97e2b3987fcedb77773ecc6dccf6f7372fcd1a75f7f799758a13419f6cec1b69a4732b8560e0c5228ef02bb0d8d5ed4de5b5108c75a5e97fa90843b1d985e14651898d2877b297190ef5c38777d4e7b6f78be9f3213ca04479dc4634b11194db843c43b329fc0a7977fc18850d7f1629baf7153eb507fad770a457c9c0a5cc", 0x9c}, {&(0x7f0000000ac0)="f2b15fcd2387aed935ddcc0346af6d4ef2512cd7869012a3fa2e51de1afa9cbf085a8e93f9a0ff5b726623dd8637be331429bd0f4e81d0477d8db584bc3d72d5d4998c58eb41fd53407f7e150770f367f0134cbbcbe02e71ad5c672187438c06abc8ca3ff052fe18d4db8e0cd3384907e2530bed936272d1b752b03819c1578b21ab3064be92de64db195607fc25e96fbab37f9ac48eca010d55cfec539babf91dc6bca2caff5dcabc4a795de51beacb035b41cd71334ab31fe458aa1e0ad325b311b0886e571fa666fd1e0686b7bc1586e9054ba4dd9e1edb61", 0xda}, {&(0x7f0000000bc0)="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", 0x1000}], 0x4, &(0x7f0000001c00)=[{0x50, 0x13f, 0xa77, "ef4578a54a6c684d86e84f22e7cdbb2d05d45aa57b87999ddae4dc6252b68e356c9ace1e05baeddc4f72fddcfe3607b82f9d0af2c3cc22aa5b434d0f6e22"}, {0x98, 0x3a, 0x6, "eacf5e04220a35aa651eea7b1344b060da2946780e39cdcc6ca8f7bd2adf823953e7033a16acb37b4a8cbb7a2c8f364e9015f330ec91072004ce3fd0494c6940d94b67e11ffdfbb0e3e1d2aac02182af7cf3d9f8966c5ad24ba30ace12f4e4f3832e99cd8662320f8ac5e7e196cf7bab6f561c8e0d1c1366ba5fcb911b9b2c1b030e13acb66c7a"}, {0x80, 0x10d, 0x40, "0d36875db229664f6b3db69fbce660f7905135e1e887a90c0e323a41aa97228438d0055c65855c897f0e2519113b96095073bd71abdebe8c78df7f57cf9a128afa40edc0dc9c8127bcfb4e3e85dc8c5e160e72976e2e3af8be0a2da569aa7f234cb0ea63267dde69956be4292f5255"}, {0x40, 0x10e, 0x4, "53d4e6060c7540b54ce9f3d7e63ae063505c15f215f5131c66a91105132f00adbee47d7bf9cd5e8fb32f8ce7ae"}, {0x98, 0x117, 0x7ff, "9f7ef3f89f6fefb7ff9d6f3b0da5a89408a8ba9ee5e8a55f6b6597b088faeea120b93d7fa11ef341273adf75f775232e16a700fa01d9110f1e7262aee2f61505e472f107dfb9034665788a8bbe74af246fd5f3218ae583b895f62798ec0c0cbe288073934fab5b64e9b22acc830ba5ac62f5285f930cf52fd08add69823344b27b6cb6"}, {0xe8, 0x109, 0x81, "509e001422231890f64512d7ef560670dc8fb71d04ec9f72d3572113a04a123c416d85375527820a23c655d40b737868ffd6469827cfaa4a677c3f5380b1b4db252ea5e778bf3d338cf4c4629c1aa520dcbb9486dfd7f6b2ccfad2756e1d384772aefe1fb378d25aca6cca3b8de93644164c6ee6d6d199b3bd1c4ec955ded329ae99857bf779f6d9865da1924543500db2f223cde395498088b2dea5e956c65a4a1777685e245747282a75f521abf06dbbd1222c893728a12511a34e40ea1719d324423a5448fadd92cd5aa988ba2492064180b3420d95"}, {0x68, 0x10f, 0x5, "61324f8688349ede928380b02fb61a2f7249d6bf2f0eb86585ed18ea85959afe1246fed1ff46fcce940d3d5edc61461337b1100f98fab54100047b9a34a27f6dc048cc6ebdc0d3ff6a63a957f488d1bb48509fbf79ffbf"}, {0x1010, 0x114, 0xfffffffeffffffff, "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"}, {0x110, 0x10e, 0xfffffffffffffffb, "bac79fc978b130cfe4b7568670451e566e18de9616e8a82c2f31bee5a20436011746db53f4c01ac02e1db0c3478c89e251206f50fdc0baaca4859c7706231acd2d34cce3be76d663fe3a8af9b770875844c99b6ae69d77b41db4b98af6c7c4d806d7914485e86e0d0f51a76082999b2168fcaef88333d08f53d26bb71014d8919b88086c934ca432b6d33a373e3a2f1f684622c78d41246b739686910ef27a541de190a13a1ed5fd5c4588f16aad1da6d0bd3d62c9fe6e7eb5581da54a91a03293641f1efea459872806ad3abf7de91fd55e3b60be1d39dda5e4ca51371d64a17a3cf8d6b3de51d04b5564dd7f62a06f47587c78b74d966c0b8669"}, {0x18, 0x0, 0x9e0d, "0a5112d8b9"}], 0x14c8, 0x81}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x40000, 0x1fffffffffffff1c, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000003140)="73797a6b616cb2848531ca49116743caeb9433da00", 0x0, 0xce, &(0x7f0000000480)=""/206, 0x0, 0x1}, 0x48) r2 = dup3(r0, r0, 0x80000) ioctl$TIOCGWINSZ(r2, 0x5413, &(0x7f0000000880)) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x2, 0x0) ioctl$KVM_SET_FPU(r3, 0x41a0ae8d, &(0x7f0000000600)={[], 0x81, 0x3ff, 0x0, 0x0, 0x0, 0x7000, 0x6, [], 0x7ff}) sync() getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000240)={0x0, 0x1000, 0xfff, 0x6f}, &(0x7f00000002c0)=0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000007c0)={r4}, &(0x7f0000000800)=0x8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f00000000c0)={@mcast2, 0x0}, &(0x7f0000000180)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0xd, 0x0, &(0x7f0000000040)=ANY=[], &(0x7f0000000200)='syzkaller\x00', 0xb, 0xbb, &(0x7f0000000300)=""/187, 0x0, 0x0, [], r5}, 0x36) openat$random(0xffffffffffffff9c, &(0x7f0000000840)='/dev/urandom\x00', 0x14002, 0x0) [ 131.917563] RAX: ffffffffffffffda RBX: 00007f94111b06d4 RCX: 0000000000455e29 [ 131.924824] RDX: 0000000020000140 RSI: 0000000020000040 RDI: 0000000020000000 [ 131.932092] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 [ 131.939361] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 131.946632] R13: 00000000004c248a R14: 00000000004d0058 R15: 000000000000001e 09:30:37 executing program 7 (fault-call:1 fault-nth:31): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, &(0x7f00000001c0)={[{@gid={'gid', 0x3d}, 0x2c}]}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, &(0x7f00000001c0)) 09:30:37 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x100000000, 0x0) open_by_handle_at(r0, &(0x7f0000000100)={0xdd, 0x9, "11e21b80ea446f2402874c9ba0481a0d8750bea3b7168a0f70a5ab77ad88a72ab31ff3a4237f1e34647aa3361cfac70a8539b47f6e476e44af25d3b31fcc49e09469d0c773d4da067930411e275c87fd52623fce5ba849dd77e2b41b8e7f0e968966fd5d020aaa6c24e2ed4b013a6ac7d0fc1ca4e7398b47354b0b73efd6c61b4d648f04a9bd0ccd468b9deb37880265ea993e70ce6b90b45bc0a0fb796a19f29887ccf1598e6f68ad689992080b6a902ca8b0be90ed227705294c9a8c649420367b9af985988a7c0a5d955dd228fd1b9da8d19457"}, 0x404502) r1 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f00000002c0)) setns(r1, 0x0) [ 132.058384] ISOFS: Unable to identify CD-ROM format. 09:30:37 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = accept$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs, &(0x7f0000000000)=0x6e) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000080)={'lo\x00', {0x2, 0x4e23, @rand_addr=0xffff}}) r1 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) r2 = semget$private(0x0, 0x2, 0x20) semctl$SEM_STAT(r2, 0x2, 0x12, &(0x7f0000000200)=""/107) setns(r1, 0x0) munlockall() 09:30:37 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@rand_addr, @in=@multicast2}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)=0x0) ptrace$setregset(0x4205, r1, 0x207, &(0x7f0000000180)={&(0x7f0000000140)="aff1d726c7ec590e2a0303fd425c5a784e49ad4456b8e1e6c23da24ef94d93a65340fe993fc4037974bf5a9a850413cd1a17d31c45394974b19a7f", 0x3b}) r2 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') r3 = memfd_create(&(0x7f0000000000)='eth0lo\x00', 0x1) setsockopt$nfc_llcp_NFC_LLCP_RW(r3, 0x118, 0x0, &(0x7f0000000080)=0xe75, 0x4) setns(r2, 0x0) getsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000001c0), 0x10) [ 132.081662] FAULT_INJECTION: forcing a failure. [ 132.081662] name failslab, interval 1, probability 0, space 0, times 0 [ 132.092956] CPU: 0 PID: 9234 Comm: syz-executor7 Not tainted 4.18.0-rc4-next-20180712+ #5 [ 132.101264] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 132.110613] Call Trace: [ 132.113210] dump_stack+0x1c9/0x2b4 [ 132.116842] ? dump_stack_print_info.cold.2+0x52/0x52 [ 132.122056] ? __kernel_text_address+0xd/0x40 [ 132.126555] ? unwind_get_return_address+0x61/0xa0 [ 132.131505] should_fail.cold.4+0xa/0x11 [ 132.131524] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 132.140673] ? save_stack+0xa9/0xd0 [ 132.144288] ? save_stack+0x43/0xd0 [ 132.147912] ? kasan_kmalloc+0xc4/0xe0 [ 132.151786] ? kmem_cache_alloc_trace+0x152/0x780 [ 132.156611] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 132.161782] ? __list_lru_init+0x4d6/0x840 [ 132.166005] ? alloc_super+0x9a6/0xb10 [ 132.169883] ? vfs_get_super+0x6e/0x270 [ 132.173850] ? proc_get_tree+0x88/0xb0 [ 132.177725] ? vfs_get_tree+0x1cb/0x5c0 [ 132.181685] ? do_mount+0x6c1/0x1fb0 [ 132.185387] ? ksys_mount+0x12d/0x140 [ 132.189171] ? __x64_sys_mount+0xbe/0x150 [ 132.193316] ? do_syscall_64+0x1b9/0x820 [ 132.197360] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 132.202714] ? save_stack+0xa9/0xd0 [ 132.206341] ? lock_acquire+0x1e4/0x540 [ 132.210298] ? fs_reclaim_acquire+0x20/0x20 [ 132.214605] ? lock_downgrade+0x8f0/0x8f0 [ 132.218736] ? __x64_sys_mount+0xbe/0x150 [ 132.222881] ? check_same_owner+0x340/0x340 [ 132.227186] ? rcu_note_context_switch+0x730/0x730 [ 132.232771] __should_failslab+0x124/0x180 [ 132.236991] should_failslab+0x9/0x14 [ 132.240796] kmem_cache_alloc_trace+0x2cb/0x780 [ 132.245447] ? kasan_kmalloc+0xc4/0xe0 [ 132.249319] __memcg_init_list_lru_node+0x185/0x2d0 [ 132.254316] ? kvfree_rcu+0x20/0x20 [ 132.257923] ? __kmalloc_node+0x47/0x70 [ 132.261892] __list_lru_init+0x4d6/0x840 [ 132.265937] ? list_lru_destroy+0x500/0x500 [ 132.270244] ? prealloc_shrinker+0x213/0x480 [ 132.274634] ? __init_waitqueue_head+0x9e/0x150 [ 132.279284] ? inactive_list_is_low+0x850/0x850 [ 132.283941] ? __lockdep_init_map+0x105/0x590 [ 132.288421] alloc_super+0x9a6/0xb10 [ 132.292121] ? destroy_unused_super.part.11+0x110/0x110 [ 132.297467] ? lock_downgrade+0x8f0/0x8f0 [ 132.301599] ? kasan_check_read+0x11/0x20 [ 132.305729] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 132.310309] ? kasan_check_write+0x14/0x20 [ 132.314525] ? do_raw_spin_lock+0xc1/0x200 [ 132.318743] ? ns_test_super+0x50/0x50 [ 132.322611] sget_fc+0x269/0x950 [ 132.325960] ? compare_single+0x10/0x10 [ 132.329920] ? alloc_super+0xb10/0xb10 [ 132.333791] ? logfc+0x810/0x810 [ 132.337139] ? kasan_kmalloc+0xc4/0xe0 [ 132.341015] ? __kmalloc_track_caller+0x311/0x760 [ 132.345844] ? proc_root_lookup+0x60/0x60 [ 132.349974] vfs_get_super+0x6e/0x270 [ 132.353759] proc_get_tree+0x88/0xb0 [ 132.357454] vfs_get_tree+0x1cb/0x5c0 [ 132.361240] do_mount+0x6c1/0x1fb0 [ 132.364766] ? kasan_check_write+0x14/0x20 [ 132.368986] ? copy_mount_string+0x40/0x40 [ 132.373219] ? retint_kernel+0x10/0x10 [ 132.377109] ? copy_mount_options+0x1f0/0x380 [ 132.381585] ? copy_mount_options+0x1f6/0x380 [ 132.386064] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 132.391582] ? copy_mount_options+0x285/0x380 [ 132.396072] ksys_mount+0x12d/0x140 [ 132.399688] __x64_sys_mount+0xbe/0x150 [ 132.403647] do_syscall_64+0x1b9/0x820 [ 132.407515] ? finish_task_switch+0x1d3/0x870 [ 132.411991] ? syscall_return_slowpath+0x5e0/0x5e0 [ 132.416908] ? syscall_return_slowpath+0x31d/0x5e0 [ 132.421819] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 132.426821] ? prepare_exit_to_usermode+0x291/0x3b0 [ 132.431823] ? perf_trace_sys_enter+0xb10/0xb10 [ 132.436473] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 132.441313] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 132.446494] RIP: 0033:0x455e29 [ 132.449665] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 132.468839] RSP: 002b:00007f94111afc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 09:30:37 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x7, 0x80000) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000080)={0xfffffffffffffc00, 0x7, 0x100000001, 0x2, 0x52823709, 0xc01}) capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r1 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r1, 0x0) [ 132.476543] RAX: ffffffffffffffda RBX: 00007f94111b06d4 RCX: 0000000000455e29 [ 132.483806] RDX: 0000000020000140 RSI: 0000000020000040 RDI: 0000000020000000 [ 132.491056] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 [ 132.498307] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 132.505578] R13: 00000000004c248a R14: 00000000004d0058 R15: 000000000000001f 09:30:37 executing program 4: r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) pipe2(&(0x7f0000000100), 0x0) mmap(&(0x7f0000012000/0x4000)=nil, 0x4000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000080)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"410f44be5f55ea719cbb6635"}}], 0x30) ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000140)={'gre0\x00', 0x3}) link(&(0x7f0000f3bff8)='./file0\x00', &(0x7f00006b3ff0)='./file2\x00') rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file1\x00') lstat(&(0x7f0000003180)='./file2\x00', &(0x7f00000031c0)) lsetxattr(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)=@random={'system.', '}cpuset}[bdev\x00'}, &(0x7f0000000300)='lo\x00', 0x3, 0x0) 09:30:37 executing program 5: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x101}) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d09}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x400000, 0x0) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000200)={0x1, 0x8, 0x1, 0x8, 0x2}) setns(r0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, &(0x7f00000002c0)={0x401, 0x2, {0x0, 0x1, 0x3, 0x3, 0xe65a}}) 09:30:37 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f0000000200)=""/248, 0xf8) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) 09:30:37 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x82c) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f0000000200)=""/248, 0xf8) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) 09:30:37 executing program 7 (fault-call:1 fault-nth:32): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, &(0x7f00000001c0)={[{@gid={'gid', 0x3d}, 0x2c}]}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, &(0x7f00000001c0)) 09:30:37 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0xffffffffffffffff) 09:30:37 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000c80)) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000380)=""/147) getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000001c0), &(0x7f0000000d00)=0x6) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f0000000200)=""/248, 0xf8) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) [ 132.767374] ISOFS: Unable to identify CD-ROM format. [ 132.792369] FAULT_INJECTION: forcing a failure. [ 132.792369] name failslab, interval 1, probability 0, space 0, times 0 [ 132.803710] CPU: 0 PID: 9268 Comm: syz-executor7 Not tainted 4.18.0-rc4-next-20180712+ #5 [ 132.812037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 132.821388] Call Trace: [ 132.823972] dump_stack+0x1c9/0x2b4 [ 132.827601] ? dump_stack_print_info.cold.2+0x52/0x52 [ 132.832790] ? __kernel_text_address+0xd/0x40 [ 132.837288] ? unwind_get_return_address+0x61/0xa0 [ 132.842217] should_fail.cold.4+0xa/0x11 [ 132.846272] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 132.851369] ? save_stack+0xa9/0xd0 [ 132.855009] ? save_stack+0x43/0xd0 [ 132.858643] ? kasan_kmalloc+0xc4/0xe0 [ 132.862520] ? kmem_cache_alloc_trace+0x152/0x780 [ 132.867349] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 132.872535] ? __list_lru_init+0x4d6/0x840 [ 132.876764] ? alloc_super+0x9a6/0xb10 [ 132.880642] ? vfs_get_super+0x6e/0x270 [ 132.884597] ? proc_get_tree+0x88/0xb0 [ 132.888469] ? vfs_get_tree+0x1cb/0x5c0 09:30:38 executing program 6: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r0 = syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0x4, 0x8000) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000240)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0xc800, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000180), r3, r2}}, 0x18) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000100)={0xa, 0x4, 0xfa00, {r3}}, 0xc) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r4 = syz_open_pts(r1, 0x0) read(r4, &(0x7f0000000280)=""/1, 0x1) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000fd0ffc)) r5 = gettid() ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000140)) ioctl$TIOCGPTPEER(r1, 0x5441, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) tkill(r5, 0x1000000000016) [ 132.892432] ? do_mount+0x6c1/0x1fb0 [ 132.896138] ? ksys_mount+0x12d/0x140 [ 132.899925] ? __x64_sys_mount+0xbe/0x150 [ 132.904059] ? do_syscall_64+0x1b9/0x820 [ 132.908106] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 132.913458] ? save_stack+0xa9/0xd0 [ 132.917089] ? lock_acquire+0x1e4/0x540 [ 132.921051] ? fs_reclaim_acquire+0x20/0x20 [ 132.925368] ? lock_downgrade+0x8f0/0x8f0 [ 132.929515] ? __x64_sys_mount+0xbe/0x150 [ 132.933671] ? check_same_owner+0x340/0x340 [ 132.938002] ? rcu_note_context_switch+0x730/0x730 [ 132.942943] __should_failslab+0x124/0x180 [ 132.947188] should_failslab+0x9/0x14 [ 132.950992] kmem_cache_alloc_trace+0x2cb/0x780 [ 132.955680] ? kasan_kmalloc+0xc4/0xe0 [ 132.959569] __memcg_init_list_lru_node+0x185/0x2d0 [ 132.964583] ? kvfree_rcu+0x20/0x20 [ 132.968200] ? __kmalloc_node+0x47/0x70 [ 132.972158] __list_lru_init+0x4d6/0x840 [ 132.976208] ? list_lru_destroy+0x500/0x500 [ 132.980527] ? prealloc_shrinker+0x213/0x480 [ 132.984916] ? __init_waitqueue_head+0x9e/0x150 [ 132.989660] ? inactive_list_is_low+0x850/0x850 [ 132.994319] ? __lockdep_init_map+0x105/0x590 [ 132.998818] alloc_super+0x9a6/0xb10 [ 133.002528] ? destroy_unused_super.part.11+0x110/0x110 [ 133.007886] ? lock_downgrade+0x8f0/0x8f0 [ 133.012046] ? kasan_check_read+0x11/0x20 [ 133.016184] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 133.020769] ? kasan_check_write+0x14/0x20 [ 133.024994] ? do_raw_spin_lock+0xc1/0x200 [ 133.029213] ? ns_test_super+0x50/0x50 [ 133.033083] sget_fc+0x269/0x950 [ 133.036452] ? compare_single+0x10/0x10 [ 133.040413] ? alloc_super+0xb10/0xb10 [ 133.044298] ? logfc+0x810/0x810 [ 133.047656] ? kasan_kmalloc+0xc4/0xe0 [ 133.051541] ? __kmalloc_track_caller+0x311/0x760 [ 133.056372] ? proc_root_lookup+0x60/0x60 [ 133.060505] vfs_get_super+0x6e/0x270 [ 133.064290] proc_get_tree+0x88/0xb0 [ 133.067993] vfs_get_tree+0x1cb/0x5c0 [ 133.071790] do_mount+0x6c1/0x1fb0 [ 133.075325] ? check_same_owner+0x340/0x340 [ 133.079647] ? lock_release+0xa30/0xa30 [ 133.083612] ? copy_mount_string+0x40/0x40 [ 133.087847] ? kasan_kmalloc+0xc4/0xe0 [ 133.091736] ? kmem_cache_alloc_trace+0x318/0x780 [ 133.097006] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 133.102535] ? _copy_from_user+0xdf/0x150 [ 133.106665] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 133.112212] ? copy_mount_options+0x285/0x380 [ 133.116697] ksys_mount+0x12d/0x140 [ 133.120316] __x64_sys_mount+0xbe/0x150 [ 133.124280] do_syscall_64+0x1b9/0x820 [ 133.128148] ? finish_task_switch+0x1d3/0x870 [ 133.132635] ? syscall_return_slowpath+0x5e0/0x5e0 [ 133.137547] ? syscall_return_slowpath+0x31d/0x5e0 [ 133.142472] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 133.147477] ? prepare_exit_to_usermode+0x291/0x3b0 [ 133.152474] ? perf_trace_sys_enter+0xb10/0xb10 [ 133.157128] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 133.161972] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 133.167147] RIP: 0033:0x455e29 [ 133.170317] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 09:30:38 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x3f, 0x10100) write$P9_RXATTRCREATE(r1, &(0x7f0000000000)={0x7, 0x21, 0x1}, 0x7) sendmmsg$nfc_llcp(r1, &(0x7f0000001600)=[{&(0x7f0000000180)={0x27, 0x0, 0x2, 0x0, 0x7fff, 0x6, "d499d2cf4089df56b3d8ffff2252b3f42b241154aac458855e2f73b7101e027feef4cbae25e4555f4e0e71313220949bae3c48ff76edb308c93f3a31d5960c", 0x24}, 0x60, &(0x7f00000014c0)=[{&(0x7f00000002c0)="80fb95fe6f2dc0b29ea00d9ec8b9dc5f0318abba0a3ddbb348d68c79e84fd50b45f68e5213ef2458f635dee0b43cd90f4fbdabddc63194fb46a45b5884cf66b00c4d4dc62efa65c79ac64bea8a361fca6e426c5a90bdb01795174847c716009e865ed143ef92b48ce4c7ad4110101757d1e7e8a64f2be926389ac59046763cfeaf6a4d403a8868cf69e92d0147132d8f0c7cadc662f0ed64f6205f3750d3cf64273e5edda49b83f781700e7a57da532e9b93ef9bc8a73faf4a6afad0d6a250d5ccf7685ea32aec09b59f268c07a0b58c45f4ff3f9d3cd32f1a9f1f54081965f0f52898c39454a107ffdb37f30728b9064795c31fe2cad39c2f5f68c9f1d1c16033811139cbfb0966424dd44a100e6552b3f19ed91bdaf2e765f03f278929341e86b9ef60f5b92fb2da0fc2e5871353d8098752e9cb6138d19c4ceec0c6767a7b5e480b3e841a72939585685fd2f98ec14a92526194491138e3df00945e3bd09ee220413ea5175dd7e47e1376a5cd32aa924d0d2c46110c50723fe25f9e150340a4dc841d20aec8bbed39af19fa347f74320039c1aaa755dbaec11b25fb891a67dab691e8bd1d690b079c7c4d34d0fbbdc87796df49faad05062082545aa369ec995091934300dd6ae7e9a261b4ab46ceff608a2b8f73aca2399522c9d14f7186e5abe2af266409739fe4379ab6f1ec802b9c0ffddc7c1c5ebffe36c38aa3dab38be2fb451674f7f0748a856924e9a5c64d7b613fc16274deff151d14d3f064192ab2f1c02ccfce1d0c7744e9ece1ae924df971007ff8391ea6a5bee8c9dd73a1e77ab8840960fce70de54c64ae7a7f44ba987ae0d590584bd09f9498f301c90ebde090c18e54fbafd8f17ec84d3a9ad3b78dda4b7c80cba5ad70f8fbc67bd877a020a0201c6a690285501f979c772552fe4fb94a4fb4a90f60489234e861e58cc27fc768bb0f6eefa2f9aba65c1b5388aa461021a56e35fe2250e34463356e821b9aba8572fe8692ccb362926572fa3ad382f7e0bf2c271504ad79e8d8f1a9f5384ca1c5b4f843168b679769dcfedf7d03927244a014c90094fe1c876d855514be8a79b3995f749dcecd798e9dddd276477b7dc4ec5623425a6f5a5b0b75be72bdb5da0569ad6b2a7d26a224b4887ca90e2af28ffc00ffe9bd2ccc4c0251d1a4bbe6bd055421ff38f9de99c51082e4ba36ab9a9b4fddfc2c4676ae3d3670dab2c6cbd245dcdef69b99a5e9a4a759547c005bbaac9c803c61a0181807f18258218da6eed005ab33a5b57055800f1954e1fff2096c81553b064f7311e50e16f2839b098e3e65c1473f94c9a7652d7722301e15e05bb2cc4852cfa28e09e12cba36a9eb85b5380245197d35c6891196df00cf28c701967e4ef8d1af1300a768b29f17589f178e88e8144fb3c7731d5765dcf6720d4c6c09d3f1d7a68c93f3f666b933947b2f620a1fd09c114c515768421e8b546ac3ad46657abe5122d33207c96cc6d80ec1c4cac00b2cfcd00f065243bed348e06a791650a5c0a0f07374260f6155f1da18f406749ecef4c6823defd1fd41cbe39981717fbf3730a12369eb36709d32f0b11047cd71b6ccdfd326dc36272d280b93a851bcf6b0b6b9bc940b737f2ff21be67b6b9e49d8e40104e8a015a61bfea76dc93ec9d94b73581f5e82bb3b5cb87713cc7e3c49eb9bd8c05f8d5aad1c15ea64cebd0d18de29619b67f685e010afd76fb0ad7c21444d6adb447c0071c48436013604a8f28a76318d05ea0e80207049e36b0081d349f047af78cdbab0efd1a2eecc3897485de1e8b0d403e4285cbddbc95bdbf975eb834ce9ae467f10ff44b6209d980841218055af86c5eb5eb846dadcc134d8322e20e487452c419cefbeb9cdedebe0c5b8a5e5a900b0487c0b740d9562bc2ddb0c570acc7253a412f4c7367b2dbe06099dea7b340893039088bb7f7cf9f50e4e8db0bf3f003b617deb1bf6dd07338a28e01127eb48e54ff3dd082d7441147c3a1c52db6e4511b582a9218118e67a545b76a4310456ba44d08cd904fb8ec977c3b8e43969a2433df1e6f753c6f0c8aa83bf9ad90f303a3f2178ee5bc642c558a6bdc7cd08f5bb73853bca5b73efed0e1c395d555c5e9d9e8d18b2543cac69aa5e63e0f640a759cc0d722adccb39a706d1475bd655c66a5056b97d0f08b014772c1105471527f733033d3d198d95a42ec817798d2e15687c28fb84faef23e3b18677e70a674666c5ba878047705b0f2da9e141218cf0f7cc59f58ed54856d6002f787f190300668c3eef19c17a9e35ae058299eafdc3d80dd8a76ff799854c8ea21ae93cd39d4ab18fe4f37e2dc35f70cd9faf83f146caa82856f9dcbba7c83eb624b1212d3d8ca4223bbe72a68b91ba3cdb0cc64f9555730b73843a751e5a1922503d266ff327b7859c7073866c0d88aef45a08a254d9b3da23d7a8630dbe3a614f9f6e00eb67626d4983820318ffbc095d77846214683aa27757b1d7de8e37e7003b623efc7343ba8cbf1f1d7b7643f5d2bc0054c3629529c5e93ea84975f0f26d201b36e221186c6ba4e1dec5bd2c565573a0ae0cacd743b214acc93b12c572168255d1ab16da40ac328630f3ccd63cfca8750f5254e6e62ad064b371dde3779a29f19959aba8bb2a987da281ed1f5d11612fee06e58ee9fbcae21d5697ab9a88cf82994443e90d1c5d9095318e8eaf237099c39888a96ad5bed040629b919eed8437c81e886797e610c7caa7878df75b0a5a22de8608af974953d463b86dc694e5d939a3396868d2aaff67332463b70dcc712e02f7b840401bed6d7c7b5c155fb39909deb6579ef51ab4b09797e71a73768bb6e53a5b3f7576f8c417943ad85c38e6ca74c9ebe4c4f96f975133eaad8b313fb8f84044d09390baade7f239fbda0b26a29700537c2019b02e71f4f8b08d462f4c702142905bc76b24a31d64ea1e237c95697f32130e0e879cb74a2effcf6bdeb36f4aa4f2f3016e33999d2a391cf2e91c691f615911079b9d5a78af2ad3707eb704a901623839a02db6f9193162587657e639e8cb26145877c18460c31316fe9802c16ce492174cb478e31405972dd8df295e4330eb1d2f2c4f8f4573e00e1028c0eae15c26bc591da0a7b60677750d5b886bc4f7c858c4f20a11beef607ee39d12b1120fd8ca4385b3c2c77ea1499f0e79b4869c33bf48b0ccec48fcc4e2a5dfd387dead98d1d55c79d64e0ccb94a4c943895c96fee81c8456d1d115e522887b1fe7d55e68fe6e8ef26b563aebb2a133e0b0c6e040061627bb6fa12e56e2ad7a7b4ada7753c97dbeedab564850fb461ab3d28e8b14ddca83245f26c162a28690fea422aa6abfe5662aee312f3a31a9db26b30430b2121fe9a9dd92fcf61c47ac7ffe4827434fafe5134b6a1c4beea660d81c166d061a1765ebe34f6fa403068303bd7d9bdfd2de938987f7774568e8a9afdc01191618473f804e1f11ae0d3c2a3310456e004fd0a1093307df9cd1a769d368a50bf4a45eda0bc005c767a76314401654bfc2aa751a8ab5ab46bee31827e1fbbe2f6d685f75134272ebef3a0d3897221f5c5b03ffaa4c5d8a3580fcabc3673b1ec4be5f9c7ce307cdaa1626b6824f4b39f4e051bc803dc39865fbbf5c2cb58850a7096865a1b3562263075ce1a32a98f007fc2d7492a2178400e1efeb8c30d3e9d091087a1556d4c5c9bedbb22c540e1204010da2e2185f3883f9486dfa5ae988e6a3da563799159cbd6179eaa21b6b8397c16dc006dce3d86c071cbfdfacd27a6941f47e20d90cfcf8637a3b16821aac7134713fbb834fcd6d9220996f0235d18ba9676e95ddb886c7e3241b57f353cff51a854be1ddab883c04982aa54a956a56759cec2a19b95eda501a88ab12d5cade4594d214d425f1681fdefe4a4e29e17ad41a22379fea79bf5cbd7b1ae84de05046ba1cd75828480a18c71a3797da530a7a8b2f4f3a92d06b4490246cae48974581177d3c249a0e441f24813eed1343014ca444c791fbb3f9e4de5c6eddc79828714ced19647ad5c3ada66b5b58b13523c744de407fea1349e387cfbf130f8081a16664f4eba4e0915e63a5f5b5b1a510ec1e92f8b4e9741ea582c38de22f48f0e5116849a2ef50877002acca52e24bc49ed7947c757d112e4fb5963b2a874ace33bfb26bcb2f544cf3a995efe811a5c14ffff4641ba911301018b1971425df3b4a8ecd99840fe7c1f98dff420bf88381073a6ef5be6fa77e594c45a9a492bcada52481007584d5a9c9f67b61c72942d0f95df9bdf82494956b26610108cbc4c14cb2aeacbe9762be2744662af6ea66f7698dfa9d267839f61755f24e47dc49545a4a2c398242726c3cecf9f7d454548ce9dff288fc2a6275eb8338c15541d305acc2bece7d3d4272dcfc063d6a9cf60591d1c1005bd666c4febadf027e770e9027c6ef2a9e0a2093458f4a36fa31d33fe03de348fbb94ef7b715e5f441eea68662a99ecfbb4d4e70dd02ae781532d751584ab31ba0c55357e452a6d76243ea47f1126a3793fa7ef31e3b41c70e1357dbd7add4084091f91228a5d5eafefb15a7cff1e10dc3542d0b787e120b819c0c8316a1c567ae20cd483ae32f1bad8e9044eec8404ad897dcaf9a192bf17c1efbfea224455a0c727c3823040cfe7b749a764139187c0dc59226b604966437d9576e29bb488c64455e45e2439c5a7ec5df817cb56fd748aeb43e8f41fb3ce3b233bef0477546f2e01cc287c5980ccc9f339a20bbf4c6adee928154e9cd87eb37bca720cef95eb9f6fd9f2f5816ee8b4bed3cc0ada91a28a3e17e8c19f176dcd282881c56162abc6e75652469fbf97f927655575e7a08e209fd6e1b3853d30884f0f32ba67030cb6e46324f3a718c40ae5a499e45631796758901fe4faefe899866b18ccf53e921a743627aedfa54d68f94f9413ca2c0ad21235775cd9b8b9ba40b02c661e996f63872d28d3c0bf53bca8df1947eeb6857fea83d4be7ae81fef9522e1c8344b6c8eac62c6531555579c6ed2fbd548f118a60be70e2b9f4f50f2136e976369d33261ef6a23e679caa8a1715a2fcf754cc9b4b0658d2e285a7530147e6bcebaa2d47f02c0e8ad4eb9fcfa060d9e37147ebcbc88ae5b8032660350f702cf71a78ecea4283fda8b6ebd552aff9095ace7ab7f51bb525e495830dd9f24256caba4bcf92629af8d47e6739532526dcd3498f986c2edbb2511d61d04dd41f603549e77732457fe9f254faa915db899cb5e974ee6e0de1222e5578dc2836b3eb1a6046beeefc3a87bcdd512c7597288e787cfaf1f4423b88f1c524f586aacf753725849e79fb19da6c5bc2dc7a422a6dab6430a5e444a84fd53cb52127121ce63b48998c2daa568c90f1bf11c4e840444187bad8b047dde467a6f96369d0a1c4dd925dd0a38472e716b7a3f2f125c906db57436088532a6e2151731e46969a2b43c25e02ed6994413c01fd3336e34635affc3682c4249fc727b6c667beca9f02fd28cc535d4701aeeac501a2d5cf86b2660f9786b27d683a013e1a23afaa1d22c4a25adefd5360986880f001d2b874bf0b3992937e46a0293acfbb4beb87e416234890827988f06378ea292d70806e401b29109565c4c7d4d3bfdbe5e0d183aa6aae482de46bac107b4544032715737499c37a6f61cf7bc6a0ae542efef72045e48ea6b66069a85ff1edbea388fd0026d4b22d67a7776a3413c02eca616a3555141c95fc132a77f88a46c8f5cf825bbb2c9f603002b6ac54dc3eef48a92b99cd149571dc7ff3a957d262fbd0f3fecae3", 0x1000}, {&(0x7f0000000200)="520af2c6dce8b5b1433e96fc278f67c4ee3a99fa26b7aa2d46aee9d4872fa92f2ab50195a6df29ea83fb2c891263b9f3b3ff6c8b5004f87c0b3f2dabfa5c568d3a57b31cb8e367debb10c40cb9fce80343bea5a820a6a19ee8a43ac44c1a1a186ef62a03ac337aee284302199f30abb567d983aa542bfd256f8aec4b60c787", 0x7f}, {&(0x7f00000012c0)="5b4a036ea9669f4a5e3de0ad655b9416fbd7e9c26f8abf952e95dadadd78e5663d489a9090a6fe521df6696b3d2ee5930dd1fb", 0x33}, {&(0x7f0000001300)="4508e8a85424d4f38f742712e53b1bf97d52be0b78a75d3570bb2960ac27615c890d6a44a6eb07ea3f880a0309f44da54d0222f02b836e751c725d4f2c3c3e68312d6b65e0d2b911490e86651fbb7c", 0x4f}, {&(0x7f0000001380)="f658817bc2740108841dcb050ba04844778ebd81c16ad2f39869d27e41", 0x1d}, {&(0x7f00000013c0)="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", 0xfc}], 0x6, &(0x7f0000001540)={0x90, 0x112, 0x1, "ef89947dfdf53ad443bc551ef01cc1e662d773bd0e0dabfe75bf31a4747d3ae1e95d504b57efa2421aa6c1d374d9b2705641bd50a3b70fb97fdf4967a95d1c79594266fdc63987c26e3ec3a503c20499c0072e1cf1069e6fd2b8744de838ad0941e0e1a5b74f286af8ed03bada4fe7a4ec2aab71ad5b2f19372a78052ce8"}, 0x90, 0x1}], 0x1, 0x10) 09:30:38 executing program 7 (fault-call:1 fault-nth:33): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, &(0x7f00000001c0)={[{@gid={'gid', 0x3d}, 0x2c}]}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, &(0x7f00000001c0)) 09:30:38 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c4600020000010000000000000003000300010000001f020000000000004000000000000000000300000000000095000000020038000100ffff04000800020000000500000064b000000000000002000000000000000200000000000000f5d000000000000004000000000000000800000000000000d041f52b8d1752275bc35414d75cde65ff49179375a0e45ad489b895ed32a8429a2a981d1540689f41a37d0000918125355e4a94800ac83b00ea9398716001360e2835c6eb2149539fbd1671ba5c3f22ce060f8241427048a3b2f1faafdfb9e2fd77c5323ff586314fad76072baff2b5a25d82d4ff86174f9edd0eb9b42c98732c46b1d6eaa2bd6d392d3066a9a06cd63b7ee9f89aa3fd822b52b3d8d0d157e31f8bc045e6cfc0ef551eb75cb65417c31944020100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000c80)) getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000001c0), &(0x7f0000000d00)=0x6) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f0000000200)=""/248, 0xf8) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) [ 133.189504] RSP: 002b:00007f94111afc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 133.197207] RAX: ffffffffffffffda RBX: 00007f94111b06d4 RCX: 0000000000455e29 [ 133.204463] RDX: 0000000020000140 RSI: 0000000020000040 RDI: 0000000020000000 [ 133.211712] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 [ 133.218965] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 133.226217] R13: 00000000004c248a R14: 00000000004d0058 R15: 0000000000000020 09:30:38 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x3}) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) [ 133.273849] ISOFS: Unable to identify CD-ROM format. [ 133.299904] FAULT_INJECTION: forcing a failure. [ 133.299904] name failslab, interval 1, probability 0, space 0, times 0 [ 133.311197] CPU: 1 PID: 9298 Comm: syz-executor7 Not tainted 4.18.0-rc4-next-20180712+ #5 [ 133.319518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 133.328875] Call Trace: [ 133.331470] dump_stack+0x1c9/0x2b4 [ 133.335115] ? dump_stack_print_info.cold.2+0x52/0x52 [ 133.340319] ? __kernel_text_address+0xd/0x40 [ 133.344823] ? unwind_get_return_address+0x61/0xa0 09:30:38 executing program 0: r0 = getpgid(0xffffffffffffffff) capset(&(0x7f0000000280)={0x20071026, r0}, &(0x7f0000000040)) r1 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r1, 0x4000000) setns(r1, 0x0) 09:30:38 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x17d, 0x0) ioctl$SG_SET_COMMAND_Q(r0, 0x2271, &(0x7f0000000080)) capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r1 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r1, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000100)={0x7, 0x0, 0x100, 'queue1\x00', 0x9}) [ 133.349767] should_fail.cold.4+0xa/0x11 [ 133.353840] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 133.358956] ? save_stack+0xa9/0xd0 [ 133.362594] ? save_stack+0x43/0xd0 [ 133.366224] ? kasan_kmalloc+0xc4/0xe0 [ 133.370117] ? kmem_cache_alloc_trace+0x152/0x780 [ 133.374961] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 133.380157] ? __list_lru_init+0x4d6/0x840 [ 133.384410] ? alloc_super+0x9a6/0xb10 [ 133.384425] ? vfs_get_super+0x6e/0x270 [ 133.384440] ? proc_get_tree+0x88/0xb0 [ 133.384454] ? vfs_get_tree+0x1cb/0x5c0 [ 133.384468] ? do_mount+0x6c1/0x1fb0 [ 133.384480] ? ksys_mount+0x12d/0x140 [ 133.384492] ? __x64_sys_mount+0xbe/0x150 [ 133.384507] ? do_syscall_64+0x1b9/0x820 [ 133.384521] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 133.384537] ? save_stack+0xa9/0xd0 [ 133.384554] ? lock_acquire+0x1e4/0x540 [ 133.384568] ? fs_reclaim_acquire+0x20/0x20 [ 133.384582] ? lock_downgrade+0x8f0/0x8f0 [ 133.384594] ? __x64_sys_mount+0xbe/0x150 [ 133.384610] ? check_same_owner+0x340/0x340 [ 133.384625] ? rcu_note_context_switch+0x730/0x730 [ 133.384640] __should_failslab+0x124/0x180 [ 133.384655] should_failslab+0x9/0x14 [ 133.384669] kmem_cache_alloc_trace+0x2cb/0x780 [ 133.384683] ? kasan_kmalloc+0xc4/0xe0 [ 133.384701] __memcg_init_list_lru_node+0x185/0x2d0 [ 133.384714] ? kvfree_rcu+0x20/0x20 [ 133.384728] ? __kmalloc_node+0x47/0x70 [ 133.384744] __list_lru_init+0x4d6/0x840 [ 133.384759] ? list_lru_destroy+0x500/0x500 [ 133.384775] ? prealloc_shrinker+0x213/0x480 [ 133.384788] ? __init_waitqueue_head+0x9e/0x150 [ 133.384800] ? inactive_list_is_low+0x850/0x850 [ 133.384816] ? __lockdep_init_map+0x105/0x590 [ 133.384832] alloc_super+0x9a6/0xb10 [ 133.384849] ? destroy_unused_super.part.11+0x110/0x110 [ 133.384864] ? lock_downgrade+0x8f0/0x8f0 [ 133.384882] ? kasan_check_read+0x11/0x20 [ 133.384895] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 133.384910] ? kasan_check_write+0x14/0x20 [ 133.384922] ? do_raw_spin_lock+0xc1/0x200 [ 133.384937] ? ns_test_super+0x50/0x50 [ 133.384951] sget_fc+0x269/0x950 [ 133.384965] ? compare_single+0x10/0x10 [ 133.384980] ? alloc_super+0xb10/0xb10 [ 133.384993] ? logfc+0x810/0x810 [ 133.385006] ? kasan_kmalloc+0xc4/0xe0 [ 133.385021] ? __kmalloc_track_caller+0x311/0x760 [ 133.385038] ? proc_root_lookup+0x60/0x60 [ 133.385051] vfs_get_super+0x6e/0x270 [ 133.385065] proc_get_tree+0x88/0xb0 [ 133.385079] vfs_get_tree+0x1cb/0x5c0 [ 133.385101] do_mount+0x6c1/0x1fb0 [ 133.385117] ? check_same_owner+0x340/0x340 [ 133.385131] ? lock_release+0xa30/0xa30 [ 133.385147] ? copy_mount_string+0x40/0x40 [ 133.385162] ? kasan_kmalloc+0xc4/0xe0 [ 133.385178] ? kmem_cache_alloc_trace+0x318/0x780 [ 133.385193] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 133.385211] ? _copy_from_user+0xdf/0x150 [ 133.613755] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 133.613773] ? copy_mount_options+0x285/0x380 [ 133.623787] ksys_mount+0x12d/0x140 [ 133.627414] __x64_sys_mount+0xbe/0x150 [ 133.631393] do_syscall_64+0x1b9/0x820 [ 133.635284] ? finish_task_switch+0x1d3/0x870 [ 133.639787] ? syscall_return_slowpath+0x5e0/0x5e0 [ 133.644722] ? syscall_return_slowpath+0x31d/0x5e0 [ 133.649663] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 133.654687] ? prepare_exit_to_usermode+0x291/0x3b0 [ 133.659710] ? perf_trace_sys_enter+0xb10/0xb10 [ 133.664382] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 133.669234] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 133.674422] RIP: 0033:0x455e29 [ 133.677603] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 09:30:38 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x400000, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f0000000080)=0xf000) 09:30:38 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x200, 0x0) bind$llc(r0, &(0x7f00000000c0)={0x1a, 0x300, 0x39, 0x8, 0x436, 0x3, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'syz_tun\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000400)={0x0, @dev, @broadcast}, &(0x7f0000000440)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000480)={'team0\x00', 0x0}) accept4(r0, &(0x7f00000004c0)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000540)=0x80, 0x80800) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000580)={'veth1_to_team\x00', 0x0}) accept$packet(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f00000006c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000700)={{{@in6, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000000800)=0xe8) getsockname$packet(r0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000a00)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000a40)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000b80)={0x0, @local, @remote}, &(0x7f0000000bc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001000)={{{@in6, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001100)=0xe8) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000001340)={@empty, @multicast2, 0x0}, &(0x7f0000001380)=0xc) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000013c0)={0x0, @remote, @remote}, &(0x7f0000001400)=0xc) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000001440)={@loopback, 0x0}, &(0x7f0000001480)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001580)={{{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000001680)=0xe8) getsockname$packet(r0, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000001700)=0x14) accept4$packet(r0, &(0x7f0000001f00)={0x0, 0x0, 0x0}, &(0x7f0000001f40)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000001f80)={'vcan0\x00', 0x0}) getsockname$packet(r0, &(0x7f00000029c0)={0x0, 0x0, 0x0}, &(0x7f0000002a00)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002a80)={'vcan0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000003480)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000003440)={&(0x7f0000002ac0)=ANY=[@ANYBLOB='h\t\x00\x00', @ANYRES16=r1, @ANYBLOB="00002dbd7000ffdbdf250300000008000100", @ANYRES32=r2, @ANYBLOB="f000020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000600000040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000100004006c6f616462616c616e63650038000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000080003000300000008000400020000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="c00002003c000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000000c00040072616e646f6d000040000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000001000040062726f61646361737400000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000100010008000600", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="9c01020040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040008000000080007000000000038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000400000038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000200000038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004007f00000038000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000080003000300000008000400fbffffff40000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040024560000080007000000000008000100", @ANYRES32=r7, @ANYBLOB="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", @ANYRES32=r8, @ANYBLOB="08000100", @ANYRES32=r9, @ANYBLOB="080202003c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c000400686173680000000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000000008008000600", @ANYRES32=r10, @ANYBLOB="44000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000001400040004005b0406000000010000ff010000003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r11, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000300000008000600", @ANYRES32=r12, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400eb0500005c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000002c00040009000501f8ffffff03000307070000000500f705cc9400000000da06ff7f00000600ff01050000003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r13, @ANYBLOB="08000100", @ANYRES32=r14, @ANYBLOB="4400020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r15, @ANYBLOB="080007000000000008000100", @ANYRES32=r16, @ANYBLOB="2801020040000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000001000040062726f6164636173740000003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r17, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r18, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000038000100240001006d636173745f72656a6f696e5f690000000000000000000000080003000300000008000400000100000800010000000000000000", @ANYRES32=r19, @ANYBLOB="ec0002003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r20, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000080003000300000008000400030000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r21, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r22], 0x968}, 0x1, 0x0, 0x0, 0x20000800}, 0x0) capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r23 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/mnt\x00') setns(r23, 0x0) [ 133.696883] RSP: 002b:00007f94111afc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 133.704601] RAX: ffffffffffffffda RBX: 00007f94111b06d4 RCX: 0000000000455e29 [ 133.704608] RDX: 0000000020000140 RSI: 0000000020000040 RDI: 0000000020000000 [ 133.704621] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 [ 133.726408] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 133.733675] R13: 00000000004c248a R14: 00000000004d0058 R15: 0000000000000021 09:30:39 executing program 4: r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000012000/0x4000)=nil, 0x4000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000080)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"410f44be5f55ea719cbb6635"}}], 0x30) ioctl$sock_SIOCDELDLCI(r3, 0x8981, &(0x7f0000000140)={'gre0\x00', 0x3}) link(&(0x7f0000f3bff8)='./file0\x00', &(0x7f00006b3ff0)='./file2\x00') rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file1\x00') lstat(&(0x7f0000003180)='./file2\x00', &(0x7f00000031c0)) dup2(r1, r2) 09:30:39 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x200000, 0x0) ioctl$KVM_PPC_GET_PVINFO(r1, 0x4080aea1, &(0x7f0000000100)=""/139) 09:30:39 executing program 7 (fault-call:1 fault-nth:34): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, &(0x7f00000001c0)={[{@gid={'gid', 0x3d}, 0x2c}]}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, &(0x7f00000001c0)) 09:30:39 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c4600020000010000000000000003000300010000001f020000000000004000000000000000000300000000000095000000020038000100ffff04000800020000000500000064b000000000000002000000000000000200000000000000f5d000000000000004000000000000000800000000000000d041f52b8d1752275bc35414d75cde65ff49179375a0e45ad489b895ed32a8429a2a981d1540689f41a37d0000918125355e4a94800ac83b00ea9398716001360e2835c6eb2149539fbd1671ba5c3f22ce060f8241427048a3b2f1faafdfb9e2fd77c5323ff586314fad76072baff2b5a25d82d4ff86174f9edd0eb9b42c98732c46b1d6eaa2bd6d392d3066a9a06cd63b7ee9f89aa3fd822b52b3d8d0d157e31f8bc045e6cfc0ef551eb75cb65417c31944020100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x82c) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f0000000200)=""/248, 0xf8) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) 09:30:39 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f0000000200)=""/248, 0xf8) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) 09:30:39 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000c80)) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000380)=""/147) getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000001c0), &(0x7f0000000d00)=0x6) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f0000000200)=""/248, 0xf8) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) 09:30:39 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) futex(&(0x7f00000001c0)=0x1, 0x9, 0x1, &(0x7f0000000080)={0x77359400}, &(0x7f0000000100)=0x2, 0x2) r1 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0xe7f, 0x4bc0c7264882038b) ioctl$PPPIOCGCHAN(r1, 0x80047437, &(0x7f0000000180)) [ 133.987648] ISOFS: Unable to identify CD-ROM format. [ 134.006727] FAULT_INJECTION: forcing a failure. [ 134.006727] name failslab, interval 1, probability 0, space 0, times 0 [ 134.018094] CPU: 1 PID: 9349 Comm: syz-executor7 Not tainted 4.18.0-rc4-next-20180712+ #5 [ 134.026409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 134.035758] Call Trace: [ 134.038358] dump_stack+0x1c9/0x2b4 [ 134.041972] ? dump_stack_print_info.cold.2+0x52/0x52 [ 134.047152] ? __kernel_text_address+0xd/0x40 [ 134.051631] ? unwind_get_return_address+0x61/0xa0 [ 134.056558] should_fail.cold.4+0xa/0x11 [ 134.060615] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 134.066259] ? save_stack+0xa9/0xd0 [ 134.069884] ? save_stack+0x43/0xd0 [ 134.073498] ? kasan_kmalloc+0xc4/0xe0 [ 134.077388] ? kmem_cache_alloc_trace+0x152/0x780 [ 134.082220] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 134.087396] ? __list_lru_init+0x4d6/0x840 [ 134.091616] ? alloc_super+0x9a6/0xb10 [ 134.095485] ? vfs_get_super+0x6e/0x270 [ 134.099444] ? proc_get_tree+0x88/0xb0 [ 134.103321] ? vfs_get_tree+0x1cb/0x5c0 [ 134.107286] ? do_mount+0x6c1/0x1fb0 [ 134.110995] ? ksys_mount+0x12d/0x140 [ 134.114789] ? __x64_sys_mount+0xbe/0x150 [ 134.118928] ? do_syscall_64+0x1b9/0x820 [ 134.122986] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 134.128352] ? save_stack+0xa9/0xd0 [ 134.131967] ? lock_acquire+0x1e4/0x540 [ 134.135929] ? fs_reclaim_acquire+0x20/0x20 [ 134.140235] ? lock_downgrade+0x8f0/0x8f0 [ 134.144365] ? __x64_sys_mount+0xbe/0x150 [ 134.148503] ? check_same_owner+0x340/0x340 [ 134.152820] ? rcu_note_context_switch+0x730/0x730 [ 134.157738] __should_failslab+0x124/0x180 [ 134.161959] should_failslab+0x9/0x14 [ 134.165744] kmem_cache_alloc_trace+0x2cb/0x780 [ 134.170402] ? kasan_kmalloc+0xc4/0xe0 [ 134.174280] __memcg_init_list_lru_node+0x185/0x2d0 [ 134.179292] ? kvfree_rcu+0x20/0x20 [ 134.182917] ? __kmalloc_node+0x47/0x70 [ 134.186876] __list_lru_init+0x4d6/0x840 [ 134.190926] ? list_lru_destroy+0x500/0x500 [ 134.195241] ? prealloc_shrinker+0x213/0x480 [ 134.199635] ? __init_waitqueue_head+0x9e/0x150 [ 134.204305] ? inactive_list_is_low+0x850/0x850 [ 134.208975] ? __lockdep_init_map+0x105/0x590 [ 134.213466] alloc_super+0x9a6/0xb10 [ 134.217176] ? destroy_unused_super.part.11+0x110/0x110 [ 134.222539] ? lock_downgrade+0x8f0/0x8f0 [ 134.226681] ? kasan_check_read+0x11/0x20 [ 134.230817] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 134.235399] ? kasan_check_write+0x14/0x20 [ 134.239614] ? do_raw_spin_lock+0xc1/0x200 [ 134.243835] ? ns_test_super+0x50/0x50 [ 134.247717] sget_fc+0x269/0x950 [ 134.251067] ? compare_single+0x10/0x10 [ 134.255035] ? alloc_super+0xb10/0xb10 [ 134.258910] ? logfc+0x810/0x810 [ 134.262262] ? kasan_kmalloc+0xc4/0xe0 [ 134.266143] ? __kmalloc_track_caller+0x311/0x760 [ 134.270985] ? proc_root_lookup+0x60/0x60 [ 134.275124] vfs_get_super+0x6e/0x270 [ 134.278909] proc_get_tree+0x88/0xb0 [ 134.282607] vfs_get_tree+0x1cb/0x5c0 [ 134.286398] do_mount+0x6c1/0x1fb0 [ 134.289921] ? kasan_check_write+0x14/0x20 [ 134.294140] ? copy_mount_string+0x40/0x40 [ 134.298357] ? kasan_kmalloc+0xc4/0xe0 [ 134.302231] ? kmem_cache_alloc_trace+0x318/0x780 [ 134.307072] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 134.312597] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 134.318119] ? copy_mount_options+0x285/0x380 [ 134.322628] ksys_mount+0x12d/0x140 [ 134.326250] __x64_sys_mount+0xbe/0x150 [ 134.330214] do_syscall_64+0x1b9/0x820 [ 134.334083] ? finish_task_switch+0x1d3/0x870 [ 134.338668] ? syscall_return_slowpath+0x5e0/0x5e0 [ 134.343587] ? syscall_return_slowpath+0x31d/0x5e0 [ 134.348508] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 134.353514] ? prepare_exit_to_usermode+0x291/0x3b0 [ 134.358534] ? perf_trace_sys_enter+0xb10/0xb10 [ 134.363187] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 134.368029] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 134.373213] RIP: 0033:0x455e29 [ 134.376388] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 134.395557] RSP: 002b:00007f94111afc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 134.403246] RAX: ffffffffffffffda RBX: 00007f94111b06d4 RCX: 0000000000455e29 [ 134.410505] RDX: 0000000020000140 RSI: 0000000020000040 RDI: 0000000020000000 [ 134.417768] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 [ 134.425032] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 134.432309] R13: 00000000004c248a R14: 00000000004d0058 R15: 0000000000000022 09:30:41 executing program 6: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r0 = syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0x4, 0x8000) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000240)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0xc800, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000180), r3, r2}}, 0x18) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000100)={0xa, 0x4, 0xfa00, {r3}}, 0xc) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r4 = syz_open_pts(r1, 0x0) read(r4, &(0x7f0000000280)=""/1, 0x1) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000fd0ffc)) r5 = gettid() ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000140)) ioctl$TIOCGPTPEER(r1, 0x5441, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) tkill(r5, 0x1000000000016) 09:30:41 executing program 7 (fault-call:1 fault-nth:35): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, &(0x7f00000001c0)={[{@gid={'gid', 0x3d}, 0x2c}]}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, &(0x7f00000001c0)) 09:30:41 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000c80)) getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000001c0), &(0x7f0000000d00)=0x6) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f0000000200)=""/248, 0xf8) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) 09:30:41 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) dup(r1) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f0000000200)=""/248, 0xf8) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) 09:30:41 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c4600020000010000000000000003000300010000001f020000000000004000000000000000000300000000000095000000020038000100ffff04000800020000000500000064b000000000000002000000000000000200000000000000f5d000000000000004000000000000000800000000000000d041f52b8d1752275bc35414d75cde65ff49179375a0e45ad489b895ed32a8429a2a981d1540689f41a37d0000918125355e4a94800ac83b00ea9398716001360e2835c6eb2149539fbd1671ba5c3f22ce060f8241427048a3b2f1faafdfb9e2fd77c5323ff586314fad76072baff2b5a25d82d4ff86174f9edd0eb9b42c98732c46b1d6eaa2bd6d392d3066a9a06cd63b7ee9f89aa3fd822b52b3d8d0d157e31f8bc045e6cfc0ef551eb75cb65417c31944020100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000c80)) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000380)=""/147) getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000001c0), &(0x7f0000000d00)=0x6) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f0000000200)=""/248, 0xf8) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) 09:30:41 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f0000000200)=""/248, 0xf8) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) 09:30:41 executing program 4: r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000012000/0x4000)=nil, 0x4000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000080)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"410f44be5f55ea719cbb6635"}}], 0x30) ioctl$sock_SIOCDELDLCI(r3, 0x8981, &(0x7f0000000140)={'gre0\x00', 0x3}) link(&(0x7f0000f3bff8)='./file0\x00', &(0x7f00006b3ff0)='./file2\x00') rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file1\x00') lstat(&(0x7f0000003180)='./file2\x00', &(0x7f00000031c0)) dup2(r1, r2) 09:30:41 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) 09:30:41 executing program 0: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)=0x0) capset(&(0x7f0000000080)={0x8020071026, r0}, &(0x7f0000000140)={0x0, 0x0, 0x1999, 0xfffffffffffffffe, 0x20000000, 0x100}) r1 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') r2 = accept(0xffffffffffffff9c, &(0x7f0000000000)=@generic, &(0x7f0000000180)=0x80) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f00000001c0)=0xfffffffffffffff9, 0x4) setns(r1, 0x0) 09:30:41 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x420080, 0x0) accept4$packet(r0, &(0x7f0000000080), &(0x7f0000000100)=0x14, 0x800) capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r1 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) setns(r1, 0x0) [ 136.020700] ISOFS: Unable to identify CD-ROM format. [ 136.033569] FAULT_INJECTION: forcing a failure. [ 136.033569] name failslab, interval 1, probability 0, space 0, times 0 [ 136.044882] CPU: 1 PID: 9381 Comm: syz-executor7 Not tainted 4.18.0-rc4-next-20180712+ #5 [ 136.053197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 136.063043] Call Trace: [ 136.065640] dump_stack+0x1c9/0x2b4 [ 136.069276] ? dump_stack_print_info.cold.2+0x52/0x52 [ 136.074481] ? __kernel_text_address+0xd/0x40 [ 136.078981] ? unwind_get_return_address+0x61/0xa0 [ 136.083922] should_fail.cold.4+0xa/0x11 [ 136.087993] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 136.093094] ? save_stack+0xa9/0xd0 [ 136.096715] ? save_stack+0x43/0xd0 [ 136.100335] ? kasan_kmalloc+0xc4/0xe0 [ 136.104207] ? kmem_cache_alloc_trace+0x152/0x780 [ 136.109041] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 136.114227] ? __list_lru_init+0x4d6/0x840 [ 136.118464] ? alloc_super+0x9a6/0xb10 [ 136.122335] ? vfs_get_super+0x6e/0x270 [ 136.126299] ? proc_get_tree+0x88/0xb0 [ 136.130177] ? vfs_get_tree+0x1cb/0x5c0 [ 136.134139] ? do_mount+0x6c1/0x1fb0 [ 136.137846] ? ksys_mount+0x12d/0x140 [ 136.141646] ? __x64_sys_mount+0xbe/0x150 [ 136.145786] ? do_syscall_64+0x1b9/0x820 [ 136.149835] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 136.155200] ? save_stack+0xa9/0xd0 [ 136.158812] ? lock_acquire+0x1e4/0x540 [ 136.162776] ? fs_reclaim_acquire+0x20/0x20 [ 136.167084] ? lock_downgrade+0x8f0/0x8f0 [ 136.171226] ? lock_downgrade+0x8f0/0x8f0 [ 136.175365] ? check_same_owner+0x340/0x340 [ 136.179675] ? do_raw_spin_unlock+0xa7/0x2f0 [ 136.184080] ? rcu_note_context_switch+0x730/0x730 [ 136.189007] __should_failslab+0x124/0x180 [ 136.193244] should_failslab+0x9/0x14 [ 136.197045] kmem_cache_alloc_trace+0x2cb/0x780 [ 136.201720] __memcg_init_list_lru_node+0x185/0x2d0 [ 136.206731] ? kvfree_rcu+0x20/0x20 [ 136.210350] ? __kmalloc_node+0x47/0x70 [ 136.214322] __list_lru_init+0x4d6/0x840 [ 136.218387] ? list_lru_destroy+0x500/0x500 [ 136.222710] ? prealloc_shrinker+0x213/0x480 [ 136.227114] ? __init_waitqueue_head+0x9e/0x150 [ 136.231777] ? inactive_list_is_low+0x850/0x850 [ 136.236431] ? __lockdep_init_map+0x105/0x590 [ 136.240927] alloc_super+0x9a6/0xb10 [ 136.244634] ? destroy_unused_super.part.11+0x110/0x110 [ 136.249982] ? lock_downgrade+0x8f0/0x8f0 [ 136.254127] ? kasan_check_read+0x11/0x20 [ 136.258267] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 136.262852] ? kasan_check_write+0x14/0x20 [ 136.267080] ? do_raw_spin_lock+0xc1/0x200 [ 136.271311] ? ns_test_super+0x50/0x50 [ 136.275187] sget_fc+0x269/0x950 [ 136.278547] ? compare_single+0x10/0x10 [ 136.282518] ? alloc_super+0xb10/0xb10 [ 136.286405] ? logfc+0x810/0x810 [ 136.289766] ? kasan_kmalloc+0xc4/0xe0 [ 136.293647] ? __kmalloc_track_caller+0x311/0x760 [ 136.298481] ? proc_root_lookup+0x60/0x60 [ 136.302613] vfs_get_super+0x6e/0x270 [ 136.306416] proc_get_tree+0x88/0xb0 [ 136.310129] vfs_get_tree+0x1cb/0x5c0 [ 136.313928] do_mount+0x6c1/0x1fb0 [ 136.317473] ? kasan_check_write+0x14/0x20 [ 136.321710] ? copy_mount_string+0x40/0x40 [ 136.325941] ? kasan_kmalloc+0xc4/0xe0 [ 136.329820] ? kmem_cache_alloc_trace+0x318/0x780 [ 136.334647] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 136.340172] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 136.345691] ? copy_mount_options+0x285/0x380 [ 136.350180] ksys_mount+0x12d/0x140 [ 136.353799] __x64_sys_mount+0xbe/0x150 [ 136.357770] do_syscall_64+0x1b9/0x820 [ 136.361637] ? finish_task_switch+0x1d3/0x870 [ 136.366118] ? syscall_return_slowpath+0x5e0/0x5e0 [ 136.371037] ? syscall_return_slowpath+0x31d/0x5e0 [ 136.375967] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 136.380979] ? prepare_exit_to_usermode+0x291/0x3b0 [ 136.385985] ? perf_trace_sys_enter+0xb10/0xb10 [ 136.390651] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 136.395491] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 136.400668] RIP: 0033:0x455e29 09:30:41 executing program 7 (fault-call:1 fault-nth:36): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, &(0x7f00000001c0)={[{@gid={'gid', 0x3d}, 0x2c}]}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, &(0x7f00000001c0)) 09:30:41 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = dup(0xffffffffffffff9c) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x1002}}, 0x20) syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x7, 0x10500) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000140)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, r1, 0x1c, 0x1, @in={0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0xa0) r2 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r2, 0x0) [ 136.403846] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 136.423082] RSP: 002b:00007f94111afc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 136.430792] RAX: ffffffffffffffda RBX: 00007f94111b06d4 RCX: 0000000000455e29 [ 136.438148] RDX: 0000000020000140 RSI: 0000000020000040 RDI: 0000000020000000 [ 136.445409] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 [ 136.452669] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 136.459923] R13: 00000000004c248a R14: 00000000004d0058 R15: 0000000000000023 [ 136.511869] ISOFS: Unable to identify CD-ROM format. [ 136.525682] FAULT_INJECTION: forcing a failure. [ 136.525682] name failslab, interval 1, probability 0, space 0, times 0 [ 136.537058] CPU: 1 PID: 9410 Comm: syz-executor7 Not tainted 4.18.0-rc4-next-20180712+ #5 [ 136.545380] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 136.554733] Call Trace: [ 136.557329] dump_stack+0x1c9/0x2b4 09:30:41 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x10000, 0x0) 09:30:41 executing program 0: capset(&(0x7f0000000000)={0x20071026}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) [ 136.560963] ? dump_stack_print_info.cold.2+0x52/0x52 [ 136.566164] ? __kernel_text_address+0xd/0x40 [ 136.570676] ? unwind_get_return_address+0x61/0xa0 [ 136.575616] should_fail.cold.4+0xa/0x11 [ 136.579686] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 136.584803] ? save_stack+0xa9/0xd0 [ 136.588438] ? save_stack+0x43/0xd0 [ 136.592071] ? kasan_kmalloc+0xc4/0xe0 [ 136.595964] ? kmem_cache_alloc_trace+0x152/0x780 [ 136.600816] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 136.606014] ? __list_lru_init+0x4d6/0x840 09:30:41 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0xfffffffffffffffd) 09:30:41 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00') flock(r0, 0x9) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000200)=0x5, &(0x7f0000000100)=0x2bd) setns(r0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x50100, 0x0) [ 136.610260] ? alloc_super+0x9a6/0xb10 [ 136.614156] ? vfs_get_super+0x6e/0x270 [ 136.618133] ? proc_get_tree+0x88/0xb0 [ 136.622023] ? vfs_get_tree+0x1cb/0x5c0 [ 136.626002] ? do_mount+0x6c1/0x1fb0 [ 136.629718] ? ksys_mount+0x12d/0x140 [ 136.633521] ? __x64_sys_mount+0xbe/0x150 [ 136.637672] ? do_syscall_64+0x1b9/0x820 [ 136.641744] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 136.647114] ? save_stack+0xa9/0xd0 [ 136.650748] ? lock_acquire+0x1e4/0x540 [ 136.654744] ? fs_reclaim_acquire+0x20/0x20 [ 136.659082] ? lock_downgrade+0x8f0/0x8f0 [ 136.663239] ? __x64_sys_mount+0xbe/0x150 [ 136.667400] ? check_same_owner+0x340/0x340 [ 136.671730] ? rcu_note_context_switch+0x730/0x730 [ 136.676672] __should_failslab+0x124/0x180 [ 136.681012] should_failslab+0x9/0x14 [ 136.684822] kmem_cache_alloc_trace+0x2cb/0x780 [ 136.689496] ? kasan_kmalloc+0xc4/0xe0 [ 136.693391] __memcg_init_list_lru_node+0x185/0x2d0 [ 136.698409] ? kvfree_rcu+0x20/0x20 [ 136.702039] ? __kmalloc_node+0x47/0x70 [ 136.706022] __list_lru_init+0x4d6/0x840 [ 136.710083] ? list_lru_destroy+0x500/0x500 [ 136.714392] ? prealloc_shrinker+0x213/0x480 [ 136.718787] ? __init_waitqueue_head+0x9e/0x150 [ 136.723441] ? inactive_list_is_low+0x850/0x850 [ 136.728096] ? __lockdep_init_map+0x105/0x590 [ 136.732587] alloc_super+0x9a6/0xb10 [ 136.736302] ? destroy_unused_super.part.11+0x110/0x110 [ 136.741660] ? lock_downgrade+0x8f0/0x8f0 [ 136.745797] ? kasan_check_read+0x11/0x20 [ 136.749932] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 136.754499] ? kasan_check_write+0x14/0x20 [ 136.758735] ? do_raw_spin_lock+0xc1/0x200 [ 136.762964] ? ns_test_super+0x50/0x50 [ 136.766835] sget_fc+0x269/0x950 [ 136.770187] ? compare_single+0x10/0x10 [ 136.774148] ? alloc_super+0xb10/0xb10 [ 136.778026] ? logfc+0x810/0x810 [ 136.781395] ? kasan_kmalloc+0xc4/0xe0 [ 136.785278] ? __kmalloc_track_caller+0x311/0x760 [ 136.790119] ? proc_root_lookup+0x60/0x60 [ 136.794258] vfs_get_super+0x6e/0x270 [ 136.798054] proc_get_tree+0x88/0xb0 [ 136.801777] vfs_get_tree+0x1cb/0x5c0 [ 136.805595] do_mount+0x6c1/0x1fb0 [ 136.809127] ? kasan_check_write+0x14/0x20 [ 136.813356] ? copy_mount_string+0x40/0x40 [ 136.817573] ? kasan_kmalloc+0xc4/0xe0 [ 136.821444] ? kmem_cache_alloc_trace+0x318/0x780 [ 136.826280] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 136.831823] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 136.837346] ? copy_mount_options+0x285/0x380 [ 136.841824] ksys_mount+0x12d/0x140 [ 136.845435] __x64_sys_mount+0xbe/0x150 [ 136.849391] do_syscall_64+0x1b9/0x820 [ 136.853265] ? finish_task_switch+0x1d3/0x870 [ 136.857765] ? syscall_return_slowpath+0x5e0/0x5e0 [ 136.862702] ? syscall_return_slowpath+0x31d/0x5e0 [ 136.867637] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 136.872649] ? prepare_exit_to_usermode+0x291/0x3b0 [ 136.877655] ? perf_trace_sys_enter+0xb10/0xb10 [ 136.882308] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 136.887147] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 136.892318] RIP: 0033:0x455e29 [ 136.895485] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 136.914615] RSP: 002b:00007f94111afc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 136.922325] RAX: ffffffffffffffda RBX: 00007f94111b06d4 RCX: 0000000000455e29 [ 136.929579] RDX: 0000000020000140 RSI: 0000000020000040 RDI: 0000000020000000 [ 136.936830] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 [ 136.944084] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 136.951340] R13: 00000000004c248a R14: 00000000004d0058 R15: 0000000000000024 09:30:44 executing program 6: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r0 = syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0x4, 0x8000) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000240)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0xc800, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000180), r3, r2}}, 0x18) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000100)={0xa, 0x4, 0xfa00, {r3}}, 0xc) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r4 = syz_open_pts(r1, 0x0) read(r4, &(0x7f0000000280)=""/1, 0x1) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000fd0ffc)) r5 = gettid() ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000140)) ioctl$TIOCGPTPEER(r1, 0x5441, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) tkill(r5, 0x1000000000016) 09:30:44 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r0, 0x0) fcntl$setlease(r0, 0x400, 0x0) 09:30:44 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000c80)) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000380)=""/147) getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000001c0), &(0x7f0000000d00)=0x6) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) 09:30:44 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f0000000200)=""/248, 0xf8) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) 09:30:44 executing program 7 (fault-call:1 fault-nth:37): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, &(0x7f00000001c0)={[{@gid={'gid', 0x3d}, 0x2c}]}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, &(0x7f00000001c0)) 09:30:44 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) dup(r1) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f0000000200)=""/248, 0xf8) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) 09:30:44 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000380)=""/147) getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000001c0), &(0x7f0000000d00)=0x6) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f0000000200)=""/248, 0xf8) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) 09:30:44 executing program 4: r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000012000/0x4000)=nil, 0x4000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000080)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"410f44be5f55ea719cbb6635"}}], 0x30) ioctl$sock_SIOCDELDLCI(r3, 0x8981, &(0x7f0000000140)={'gre0\x00', 0x3}) link(&(0x7f0000f3bff8)='./file0\x00', &(0x7f00006b3ff0)='./file2\x00') rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file1\x00') lstat(&(0x7f0000003180)='./file2\x00', &(0x7f00000031c0)) dup2(r1, r2) 09:30:44 executing program 0: capset(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x8}) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000300)={0x5, 0x0, 0x8, 0x8, 0x401}, 0xc) setns(r0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0xffffffff, 0x8001) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000000280)={0x0, 0xffffffff, 0x8, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'ipddp0\x00'}) getresuid(&(0x7f0000000040)=0x0, &(0x7f0000000100), &(0x7f0000000140)) getresgid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) fchown(r0, r3, r4) 09:30:44 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000c80)) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000380)=""/147) getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000001c0), &(0x7f0000000d00)=0x6) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) [ 139.068383] ISOFS: Unable to identify CD-ROM format. 09:30:44 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') ioctl$FICLONE(r0, 0x40049409, r0) setns(r0, 0x0) [ 139.092126] FAULT_INJECTION: forcing a failure. [ 139.092126] name failslab, interval 1, probability 0, space 0, times 0 [ 139.103488] CPU: 0 PID: 9454 Comm: syz-executor7 Not tainted 4.18.0-rc4-next-20180712+ #5 [ 139.111811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 139.121166] Call Trace: [ 139.123764] dump_stack+0x1c9/0x2b4 [ 139.127405] ? dump_stack_print_info.cold.2+0x52/0x52 [ 139.132607] should_fail.cold.4+0xa/0x11 [ 139.136664] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 139.141752] ? memcg_put_cache_ids+0x10/0x20 [ 139.146149] ? lock_downgrade+0x8f0/0x8f0 [ 139.150287] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 139.155294] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 139.160829] ? xas_find_tagged+0x45d/0x13d0 [ 139.165137] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 139.170659] ? xas_store+0x52f/0x1720 [ 139.174462] ? lock_acquire+0x1e4/0x540 [ 139.178435] ? fs_reclaim_acquire+0x20/0x20 [ 139.182744] ? lock_downgrade+0x8f0/0x8f0 [ 139.186875] ? check_same_owner+0x340/0x340 [ 139.191190] ? do_raw_spin_lock+0xc1/0x200 [ 139.195416] ? rcu_note_context_switch+0x730/0x730 [ 139.200339] ? kfree+0x15e/0x260 [ 139.203748] __should_failslab+0x124/0x180 [ 139.207979] should_failslab+0x9/0x14 [ 139.211773] __kmalloc+0x2c8/0x760 [ 139.215306] ? sget_fc+0x738/0x950 [ 139.218830] ? lock_downgrade+0x8f0/0x8f0 [ 139.222958] ? prealloc_shrinker+0x124/0x480 [ 139.227352] prealloc_shrinker+0x124/0x480 [ 139.231573] ? kasan_check_read+0x11/0x20 [ 139.235710] ? inactive_list_is_low+0x850/0x850 [ 139.240363] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 139.244928] register_shrinker+0x17/0x40 [ 139.248971] sget_fc+0x76f/0x950 [ 139.252317] ? compare_single+0x10/0x10 [ 139.256282] ? alloc_super+0xb10/0xb10 [ 139.260163] ? kasan_kmalloc+0xc4/0xe0 [ 139.264045] ? __kmalloc_track_caller+0x311/0x760 [ 139.268871] ? proc_root_lookup+0x60/0x60 [ 139.272997] vfs_get_super+0x6e/0x270 [ 139.276790] proc_get_tree+0x88/0xb0 [ 139.280505] vfs_get_tree+0x1cb/0x5c0 [ 139.284297] do_mount+0x6c1/0x1fb0 [ 139.287831] ? copy_mount_string+0x40/0x40 [ 139.292055] ? retint_kernel+0x10/0x10 [ 139.295927] ? copy_mount_options+0x213/0x380 [ 139.300416] ? write_comp_data+0x1b/0x70 [ 139.304471] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 139.309988] ? copy_mount_options+0x285/0x380 [ 139.314469] ksys_mount+0x12d/0x140 [ 139.318085] __x64_sys_mount+0xbe/0x150 [ 139.322050] do_syscall_64+0x1b9/0x820 [ 139.325918] ? finish_task_switch+0x1d3/0x870 [ 139.330399] ? syscall_return_slowpath+0x5e0/0x5e0 [ 139.335325] ? syscall_return_slowpath+0x31d/0x5e0 [ 139.340257] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 139.345266] ? prepare_exit_to_usermode+0x291/0x3b0 [ 139.350273] ? perf_trace_sys_enter+0xb10/0xb10 [ 139.354951] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 139.359786] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 139.364955] RIP: 0033:0x455e29 [ 139.368124] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 09:30:44 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000c80)) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000380)=""/147) getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000001c0), &(0x7f0000000d00)=0x6) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) 09:30:44 executing program 7 (fault-call:1 fault-nth:38): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, &(0x7f00000001c0)={[{@gid={'gid', 0x3d}, 0x2c}]}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, &(0x7f00000001c0)) 09:30:44 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = perf_event_open(&(0x7f00000028c0)={0x0, 0x70, 0x8, 0xa81, 0x58, 0x6495, 0x0, 0x1000, 0x11, 0xe, 0x1f, 0xffffffff, 0x20, 0x4000000000, 0x0, 0xea6, 0x7fff, 0x4, 0x0, 0x7, 0xc8fe, 0x8, 0x4, 0x6, 0x6, 0xffff, 0x2, 0xfffffffffffff060, 0x2, 0x100, 0x82, 0x3ff, 0x8001, 0x8, 0x5, 0x10000, 0x3, 0x8, 0x0, 0x9, 0x0, @perf_config_ext={0x9, 0x8}, 0x0, 0xff, 0x9, 0x5, 0x20, 0x2, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xb) pipe2(&(0x7f0000002940)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) sendfile(r0, r1, &(0x7f0000002980), 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000140)=0xc) r3 = syz_open_procfs$namespace(r2, &(0x7f00000000c0)='ns/mnt\x00') setns(r3, 0x0) [ 139.387260] RSP: 002b:00007f94111afc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 139.394953] RAX: ffffffffffffffda RBX: 00007f94111b06d4 RCX: 0000000000455e29 [ 139.402210] RDX: 0000000020000140 RSI: 0000000020000040 RDI: 0000000020000000 [ 139.409464] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 [ 139.416729] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 139.423980] R13: 00000000004c248a R14: 00000000004d0058 R15: 0000000000000025 09:30:44 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x4002, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = dup(r1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x82c) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x61) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000c80)) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000380)=""/147) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f0000000200)=""/248, 0xf8) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000003) [ 139.497095] ISOFS: Unable to identify CD-ROM format. 09:30:44 executing program 0: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, &(0x7f0000000100)=""/115, &(0x7f0000000000)=0x73) r1 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r1, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffff242, 0x20000) ioctl$KDMKTONE(r2, 0x4b30, 0x80000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x800, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r0) [ 139.520545] FAULT_INJECTION: forcing a failure. [ 139.520545] name failslab, interval 1, probability 0, space 0, times 0 [ 139.531847] CPU: 1 PID: 9487 Comm: syz-executor7 Not tainted 4.18.0-rc4-next-20180712+ #5 [ 139.540162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 139.549522] Call Trace: [ 139.552116] dump_stack+0x1c9/0x2b4 [ 139.555750] ? dump_stack_print_info.cold.2+0x52/0x52 [ 139.560950] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 139.566481] ? replace_slot+0xc9/0x4c0 [ 139.570393] should_fail.cold.4+0xa/0x11 [ 139.574464] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 139.579571] ? save_stack+0xa9/0xd0 [ 139.583207] ? save_stack+0x43/0xd0 [ 139.586838] ? kasan_kmalloc+0xc4/0xe0 [ 139.590734] ? __kmalloc+0x14e/0x760 [ 139.594451] ? register_shrinker+0x17/0x40 [ 139.598696] ? sget_fc+0x76f/0x950 [ 139.602243] ? __radix_tree_replace+0x188/0x2f0 [ 139.606921] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 139.612459] ? node_tag_clear+0xc0/0x1c0 [ 139.616526] ? lock_acquire+0x1e4/0x540 [ 139.620491] ? fs_reclaim_acquire+0x20/0x20 [ 139.624799] ? lock_downgrade+0x8f0/0x8f0 [ 139.628934] ? check_same_owner+0x340/0x340 [ 139.633241] ? rcu_note_context_switch+0x730/0x730 [ 139.638166] ? rcu_note_context_switch+0x730/0x730 [ 139.643088] __should_failslab+0x124/0x180 [ 139.647309] should_failslab+0x9/0x14 [ 139.651092] kmem_cache_alloc+0x2af/0x760 [ 139.655238] ? lock_downgrade+0x8f0/0x8f0 [ 139.659370] ? prealloc_shrinker+0x124/0x480 [ 139.663768] ? proc_i_callback+0x30/0x30 [ 139.667812] proc_alloc_inode+0x1b/0x190 [ 139.671859] alloc_inode+0x63/0x190 [ 139.675471] new_inode_pseudo+0x71/0x1a0 [ 139.679517] ? prune_icache_sb+0x1b0/0x1b0 [ 139.683737] ? __put_user_ns+0x60/0x60 [ 139.687614] ? register_shrinker+0x38/0x40 [ 139.691834] proc_get_inode+0x1e/0x680 [ 139.695705] proc_fill_super+0x32c/0x630 [ 139.699760] ? proc_root_lookup+0x60/0x60 [ 139.703892] ? __kmalloc_track_caller+0x311/0x760 [ 139.708726] ? proc_root_lookup+0x60/0x60 [ 139.712866] vfs_get_super+0x15e/0x270 [ 139.716748] proc_get_tree+0x88/0xb0 [ 139.720452] vfs_get_tree+0x1cb/0x5c0 [ 139.724236] do_mount+0x6c1/0x1fb0 [ 139.727775] ? kasan_check_write+0x14/0x20 [ 139.732012] ? copy_mount_string+0x40/0x40 [ 139.736242] ? kasan_kmalloc+0xc4/0xe0 [ 139.740115] ? kmem_cache_alloc_trace+0x318/0x780 [ 139.744954] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 139.750496] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 139.756047] ? copy_mount_options+0x285/0x380 [ 139.760541] ksys_mount+0x12d/0x140 [ 139.764162] __x64_sys_mount+0xbe/0x150 [ 139.768153] do_syscall_64+0x1b9/0x820 [ 139.772038] ? finish_task_switch+0x1d3/0x870 [ 139.776521] ? syscall_return_slowpath+0x5e0/0x5e0 [ 139.781432] ? syscall_return_slowpath+0x31d/0x5e0 [ 139.786346] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 139.791346] ? prepare_exit_to_usermode+0x291/0x3b0 [ 139.796359] ? perf_trace_sys_enter+0xb10/0xb10 [ 139.801027] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 139.805864] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 139.811039] RIP: 0033:0x455e29 [ 139.814213] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 139.833350] RSP: 002b:00007f94111afc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 139.841051] RAX: ffffffffffffffda RBX: 00007f94111b06d4 RCX: 0000000000455e29 [ 139.848330] RDX: 0000000020000140 RSI: 0000000020000040 RDI: 0000000020000000 [ 139.855592] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 [ 139.862848] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 139.870103] R13: 00000000004c248a R14: 00000000004d0058 R15: 0000000000000026 [ 139.877473] proc_fill_super: get root inode failed [ 139.882449] ================================================================== [ 139.889829] BUG: KASAN: use-after-free in dput.part.26+0x634/0x7a0 [ 139.896128] Read of size 4 at addr ffff8801b61f9e00 by task syz-executor7/9487 [ 139.903458] [ 139.905065] CPU: 0 PID: 9487 Comm: syz-executor7 Not tainted 4.18.0-rc4-next-20180712+ #5 [ 139.913352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 139.922688] Call Trace: [ 139.925252] dump_stack+0x1c9/0x2b4 [ 139.928856] ? dump_stack_print_info.cold.2+0x52/0x52 [ 139.934024] ? printk+0xa7/0xcf [ 139.937280] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 139.942014] ? dput.part.26+0x634/0x7a0 [ 139.945983] print_address_description+0x6c/0x20b [ 139.950804] ? dput.part.26+0x634/0x7a0 [ 139.954756] kasan_report.cold.7+0x242/0x30d [ 139.959141] __asan_report_load4_noabort+0x14/0x20 [ 139.964058] dput.part.26+0x634/0x7a0 [ 139.967835] ? shrink_dcache_sb+0x350/0x350 [ 139.972147] ? __kasan_slab_free+0x131/0x170 [ 139.976534] ? trace_hardirqs_on+0xd/0x10 [ 139.980657] dput+0x15/0x20 [ 139.983565] proc_kill_sb+0x125/0x1e0 [ 139.987340] ? proc_get_inode+0x680/0x680 [ 139.991466] ? proc_root_lookup+0x60/0x60 [ 139.995592] deactivate_locked_super+0x97/0x100 [ 140.000238] vfs_get_super+0x20f/0x270 [ 140.004105] proc_get_tree+0x88/0xb0 [ 140.007797] vfs_get_tree+0x1cb/0x5c0 [ 140.011584] do_mount+0x6c1/0x1fb0 [ 140.015106] ? kasan_check_write+0x14/0x20 [ 140.019321] ? copy_mount_string+0x40/0x40 [ 140.023538] ? kasan_kmalloc+0xc4/0xe0 [ 140.027408] ? kmem_cache_alloc_trace+0x318/0x780 [ 140.032231] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 140.037748] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 140.043264] ? copy_mount_options+0x285/0x380 [ 140.047740] ksys_mount+0x12d/0x140 [ 140.051345] __x64_sys_mount+0xbe/0x150 [ 140.055299] do_syscall_64+0x1b9/0x820 [ 140.059166] ? finish_task_switch+0x1d3/0x870 [ 140.063639] ? syscall_return_slowpath+0x5e0/0x5e0 [ 140.068548] ? syscall_return_slowpath+0x31d/0x5e0 [ 140.073457] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 140.078454] ? prepare_exit_to_usermode+0x291/0x3b0 [ 140.083461] ? perf_trace_sys_enter+0xb10/0xb10 [ 140.088108] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 140.092934] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 140.098103] RIP: 0033:0x455e29 [ 140.101266] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 140.120389] RSP: 002b:00007f94111afc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 140.128084] RAX: ffffffffffffffda RBX: 00007f94111b06d4 RCX: 0000000000455e29 [ 140.135333] RDX: 0000000020000140 RSI: 0000000020000040 RDI: 0000000020000000 [ 140.142582] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 [ 140.149830] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 140.157077] R13: 00000000004c248a R14: 00000000004d0058 R15: 0000000000000026 [ 140.164328] [ 140.165936] Allocated by task 9454: [ 140.169546] save_stack+0x43/0xd0 [ 140.172975] kasan_kmalloc+0xc4/0xe0 [ 140.176674] kasan_slab_alloc+0x12/0x20 [ 140.180624] kmem_cache_alloc+0x12e/0x760 [ 140.184749] __d_alloc+0xc8/0xd50 [ 140.188189] d_alloc+0x96/0x380 [ 140.191451] d_alloc_name+0xbb/0x120 [ 140.195142] proc_setup_self+0xe1/0x3af [ 140.199111] proc_fill_super+0x37e/0x630 [ 140.203151] vfs_get_super+0x15e/0x270 [ 140.207019] proc_get_tree+0x88/0xb0 [ 140.210717] vfs_get_tree+0x1cb/0x5c0 [ 140.214496] do_mount+0x6c1/0x1fb0 [ 140.218013] ksys_mount+0x12d/0x140 [ 140.221615] __x64_sys_mount+0xbe/0x150 [ 140.225578] do_syscall_64+0x1b9/0x820 [ 140.229901] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 140.235070] [ 140.236689] Freed by task 9484: [ 140.239953] save_stack+0x43/0xd0 [ 140.243387] __kasan_slab_free+0x11a/0x170 [ 140.247599] kasan_slab_free+0xe/0x10 [ 140.251393] kmem_cache_free+0x86/0x2d0 [ 140.255357] __d_free+0x20/0x30 [ 140.258626] rcu_process_callbacks+0xe01/0x2810 [ 140.263272] __do_softirq+0x2e8/0xb17 [ 140.267045] [ 140.268653] The buggy address belongs to the object at ffff8801b61f9e00 [ 140.268653] which belongs to the cache dentry(17:syz7) of size 288 [ 140.281809] The buggy address is located 0 bytes inside of [ 140.281809] 288-byte region [ffff8801b61f9e00, ffff8801b61f9f20) [ 140.293486] The buggy address belongs to the page: [ 140.298404] page:ffffea0006d87e40 count:1 mapcount:0 mapping:ffff8801ccdf1380 index:0x0 [ 140.306532] flags: 0x2fffc0000000100(slab) [ 140.310747] raw: 02fffc0000000100 ffffea0006d88748 ffffea0006adecc8 ffff8801ccdf1380 [ 140.318704] raw: 0000000000000000 ffff8801b61f9040 000000010000000b ffff8801aeb54e40 [ 140.326558] page dumped because: kasan: bad access detected [ 140.332242] page->mem_cgroup:ffff8801aeb54e40 [ 140.336706] [ 140.338308] Memory state around the buggy address: [ 140.343213] ffff8801b61f9d00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 140.350559] ffff8801b61f9d80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 140.357906] >ffff8801b61f9e00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 140.365239] ^ [ 140.368582] ffff8801b61f9e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 140.375917] ffff8801b61f9f00: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 140.383254] ================================================================== [ 140.390839] Kernel panic - not syncing: panic_on_warn set ... [ 140.390839] [ 140.398211] CPU: 0 PID: 9487 Comm: syz-executor7 Tainted: G B 4.18.0-rc4-next-20180712+ #5 [ 140.407907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 140.417250] Call Trace: [ 140.419830] dump_stack+0x1c9/0x2b4 [ 140.423453] ? dump_stack_print_info.cold.2+0x52/0x52 [ 140.428647] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 140.433395] panic+0x238/0x4e7 [ 140.436588] ? add_taint.cold.5+0x16/0x16 [ 140.440728] ? do_raw_spin_unlock+0xa7/0x2f0 [ 140.445124] ? do_raw_spin_unlock+0xa7/0x2f0 [ 140.449528] ? dput.part.26+0x634/0x7a0 [ 140.453492] kasan_end_report+0x47/0x4f [ 140.457454] kasan_report.cold.7+0x76/0x30d [ 140.461756] __asan_report_load4_noabort+0x14/0x20 [ 140.466665] dput.part.26+0x634/0x7a0 [ 140.470447] ? shrink_dcache_sb+0x350/0x350 [ 140.474750] ? __kasan_slab_free+0x131/0x170 [ 140.479144] ? trace_hardirqs_on+0xd/0x10 [ 140.483271] dput+0x15/0x20 [ 140.486186] proc_kill_sb+0x125/0x1e0 [ 140.489975] ? proc_get_inode+0x680/0x680 [ 140.494104] ? proc_root_lookup+0x60/0x60 [ 140.498243] deactivate_locked_super+0x97/0x100 [ 140.502906] vfs_get_super+0x20f/0x270 [ 140.506777] proc_get_tree+0x88/0xb0 [ 140.510475] vfs_get_tree+0x1cb/0x5c0 [ 140.514257] do_mount+0x6c1/0x1fb0 [ 140.517795] ? kasan_check_write+0x14/0x20 [ 140.522032] ? copy_mount_string+0x40/0x40 [ 140.526259] ? kasan_kmalloc+0xc4/0xe0 [ 140.530136] ? kmem_cache_alloc_trace+0x318/0x780 [ 140.534962] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 140.540482] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 140.546013] ? copy_mount_options+0x285/0x380 [ 140.550504] ksys_mount+0x12d/0x140 [ 140.554131] __x64_sys_mount+0xbe/0x150 [ 140.558089] do_syscall_64+0x1b9/0x820 [ 140.561956] ? finish_task_switch+0x1d3/0x870 [ 140.566442] ? syscall_return_slowpath+0x5e0/0x5e0 [ 140.571350] ? syscall_return_slowpath+0x31d/0x5e0 [ 140.576260] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 140.581263] ? prepare_exit_to_usermode+0x291/0x3b0 [ 140.586263] ? perf_trace_sys_enter+0xb10/0xb10 [ 140.590929] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 140.595758] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 140.600931] RIP: 0033:0x455e29 [ 140.604097] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 140.623224] RSP: 002b:00007f94111afc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 140.630929] RAX: ffffffffffffffda RBX: 00007f94111b06d4 RCX: 0000000000455e29 [ 140.638189] RDX: 0000000020000140 RSI: 0000000020000040 RDI: 0000000020000000 [ 140.646579] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 [ 140.653828] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 140.661087] R13: 00000000004c248a R14: 00000000004d0058 R15: 0000000000000026 [ 140.668793] Dumping ftrace buffer: [ 140.672329] (ftrace buffer empty) [ 140.676016] Kernel Offset: disabled [ 140.679635] Rebooting in 86400 seconds..