0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2238.971582][ T4849] RSP: 002b:00007f67d8ff2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2238.979993][ T4849] RAX: ffffffffffffffda RBX: 00007f67d8ff2b40 RCX: 000000000045b69a [ 2238.987970][ T4849] RDX: 00007f67d8ff2ae0 RSI: 00000000200002c0 RDI: 00007f67d8ff2b00 [ 2238.995940][ T4849] RBP: 0000000000000000 R08: 00007f67d8ff2b40 R09: 00007f67d8ff2ae0 [ 2239.003998][ T4849] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 2239.011966][ T4849] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000004 03:36:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserf+\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:36:20 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}}}}}}, 0x0) 03:36:20 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x2, 0x4, &(0x7f0000519fa8)=ANY=[@ANYBLOB="180700000000945f563d0002000023008507ffdf190000009500004000000000"], &(0x7f0000000000)='G.\xdd:@\x83\xb90PL\x00', 0x1, 0x1000, &(0x7f00000002c0)=""/4096, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000180), 0x10}, 0x70) readlinkat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/54, 0x36) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0x3) stat(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)) 03:36:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0x626b2, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfsL', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0x5f5e0ff, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:20 executing program 3 (fault-call:2 fault-nth:58): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:36:20 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}}}}}}}}, 0x0) 03:36:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x2, 0xcb, &(0x7f0000519fa8)=@framed={{0x18, 0x7}, [@ldst={0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x19}]}, &(0x7f0000000000)='G.\xdd:@\x83\xb90PL\x00', 0x1, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000)={0x800}}, 0x2dd) 03:36:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x2}]]}}}]}, 0x3c}}, 0x0) 03:36:20 executing program 1: r0 = getpgid(0xffffffffffffffff) ptrace$poke(0x5, r0, &(0x7f0000000040), 0xe7) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x2, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x7}, [@ldst={0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x19}]}, &(0x7f0000000000)='G.\xdd:@\x83\xb90PL\x00', 0x1, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 03:36:20 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}}}}}}}}, 0x0) [ 2239.315246][ T4881] FAULT_INJECTION: forcing a failure. [ 2239.315246][ T4881] name failslab, interval 1, probability 0, space 0, times 0 [ 2239.350356][ T4881] CPU: 1 PID: 4881 Comm: syz-executor.3 Not tainted 5.1.0-rc6 #79 [ 2239.358304][ T4881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2239.368376][ T4881] Call Trace: [ 2239.371681][ T4881] dump_stack+0x172/0x1f0 [ 2239.376029][ T4881] should_fail.cold+0xa/0x15 [ 2239.380711][ T4881] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2239.386534][ T4881] ? ___might_sleep+0x163/0x280 [ 2239.391579][ T4881] __should_failslab+0x121/0x190 [ 2239.396620][ T4881] should_failslab+0x9/0x14 [ 2239.401139][ T4881] kmem_cache_alloc_trace+0x2d1/0x760 [ 2239.406519][ T4881] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2239.415343][ T4881] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2239.423868][ T4881] __list_lru_init+0x3cf/0x6e0 [ 2239.428646][ T4881] alloc_super+0x762/0x890 [ 2239.433169][ T4881] ? test_single_super+0x10/0x10 [ 2239.438294][ T4881] sget_userns+0xf1/0x560 [ 2239.442636][ T4881] ? kill_litter_super+0x60/0x60 [ 2239.447616][ T4881] ? test_single_super+0x10/0x10 [ 2239.452560][ T4881] ? kill_litter_super+0x60/0x60 [ 2239.457507][ T4881] sget+0x10c/0x150 [ 2239.461325][ T4881] mount_bdev+0xff/0x3c0 [ 2239.465581][ T4881] ? finish_unfinished+0x1120/0x1120 [ 2239.470876][ T4881] get_super_block+0x35/0x40 [ 2239.475478][ T4881] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2239.480501][ T4881] legacy_get_tree+0xf2/0x200 [ 2239.485185][ T4881] vfs_get_tree+0x123/0x450 [ 2239.489695][ T4881] do_mount+0x1436/0x2c40 [ 2239.494115][ T4881] ? copy_mount_string+0x40/0x40 [ 2239.499059][ T4881] ? _copy_from_user+0xdd/0x150 [ 2239.503922][ T4881] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2239.510164][ T4881] ? copy_mount_options+0x280/0x3a0 [ 2239.515374][ T4881] ksys_mount+0xdb/0x150 [ 2239.519621][ T4881] __x64_sys_mount+0xbe/0x150 [ 2239.524412][ T4881] do_syscall_64+0x103/0x610 [ 2239.529015][ T4881] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2239.534910][ T4881] RIP: 0033:0x45b69a [ 2239.538806][ T4881] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2239.559895][ T4881] RSP: 002b:00007f67d8ff2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2239.568307][ T4881] RAX: ffffffffffffffda RBX: 00007f67d8ff2b40 RCX: 000000000045b69a [ 2239.576281][ T4881] RDX: 00007f67d8ff2ae0 RSI: 00000000200002c0 RDI: 00007f67d8ff2b00 [ 2239.584250][ T4881] RBP: 0000000000000000 R08: 00007f67d8ff2b40 R09: 00007f67d8ff2ae0 [ 2239.592221][ T4881] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 2239.600190][ T4881] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000004 03:36:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserf-\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:36:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x3}]]}}}]}, 0x3c}}, 0x0) 03:36:20 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x2, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18070000000000000000000200000000850000001900000095000000000000005cd978de28f2b8c61392ccc4942eae36009e03a71d3db72e50d43be4962c239becae"], &(0x7f0000000000)='G.\xdd:@\x83\xb90PL\x00', 0x1, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) fcntl$addseals(r0, 0x409, 0x4) 03:36:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs`', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:20 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}}}}}}}}, 0x0) 03:36:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x2, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x7}, [@ldst={0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x19}]}, &(0x7f0000000000)='G.\xdd:@\x83\xb90PL\x00', 0x1, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000080), &(0x7f00000000c0)=0x30) [ 2239.762793][ T5002] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:36:20 executing program 3 (fault-call:2 fault-nth:59): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:36:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x5}]]}}}]}, 0x3c}}, 0x0) 03:36:20 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21]}}}}}}}}, 0x0) [ 2239.883408][ T5016] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:36:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x2, 0x9, &(0x7f0000000080)=@raw=[@generic={0xfff, 0x6, 0x9, 0x6, 0x9}, @initr0={0x18, 0x0, 0x0, 0x0, 0x41, 0x0, 0x0, 0x0, 0x81}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1}, @ldst={0x2, 0x3, 0x0, 0x6, 0xf, 0xfffffffffffffff4, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x61}, @exit], &(0x7f0000000040)='G.\xdd:@\x83\xb90PL\x00', 0x1, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f6, 0x10, &(0x7f0000000100)={0xfffffffffffffffd, 0x0, 0x400000000000}, 0x10}, 0x70) 03:36:21 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x6}]]}}}]}, 0x3c}}, 0x0) 03:36:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfsh', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2239.995192][ T5018] FAULT_INJECTION: forcing a failure. [ 2239.995192][ T5018] name failslab, interval 1, probability 0, space 0, times 0 [ 2240.061019][ T5032] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2240.069679][ T5018] CPU: 1 PID: 5018 Comm: syz-executor.3 Not tainted 5.1.0-rc6 #79 [ 2240.077736][ T5018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2240.087818][ T5018] Call Trace: [ 2240.091129][ T5018] dump_stack+0x172/0x1f0 [ 2240.095471][ T5018] should_fail.cold+0xa/0x15 [ 2240.100067][ T5018] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2240.106149][ T5018] ? ___might_sleep+0x163/0x280 [ 2240.111010][ T5018] __should_failslab+0x121/0x190 [ 2240.116042][ T5018] should_failslab+0x9/0x14 [ 2240.120565][ T5018] kmem_cache_alloc_trace+0x2d1/0x760 [ 2240.126080][ T5018] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2240.132001][ T5018] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2240.137646][ T5018] __list_lru_init+0x3cf/0x6e0 [ 2240.142418][ T5018] alloc_super+0x762/0x890 [ 2240.147005][ T5018] ? test_single_super+0x10/0x10 [ 2240.152033][ T5018] sget_userns+0xf1/0x560 [ 2240.156398][ T5018] ? kill_litter_super+0x60/0x60 [ 2240.161342][ T5018] ? test_single_super+0x10/0x10 [ 2240.166359][ T5018] ? kill_litter_super+0x60/0x60 [ 2240.171291][ T5018] sget+0x10c/0x150 [ 2240.175110][ T5018] mount_bdev+0xff/0x3c0 [ 2240.179352][ T5018] ? finish_unfinished+0x1120/0x1120 [ 2240.184729][ T5018] get_super_block+0x35/0x40 [ 2240.189329][ T5018] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2240.194347][ T5018] legacy_get_tree+0xf2/0x200 [ 2240.199027][ T5018] vfs_get_tree+0x123/0x450 [ 2240.203629][ T5018] do_mount+0x1436/0x2c40 [ 2240.207964][ T5018] ? copy_mount_string+0x40/0x40 [ 2240.212901][ T5018] ? _copy_from_user+0xdd/0x150 [ 2240.217755][ T5018] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2240.224001][ T5018] ? copy_mount_options+0x280/0x3a0 [ 2240.229204][ T5018] ksys_mount+0xdb/0x150 [ 2240.233452][ T5018] __x64_sys_mount+0xbe/0x150 [ 2240.238136][ T5018] do_syscall_64+0x103/0x610 [ 2240.242730][ T5018] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2240.248616][ T5018] RIP: 0033:0x45b69a [ 2240.252508][ T5018] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2240.273239][ T5018] RSP: 002b:00007f67d8ff2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2240.281651][ T5018] RAX: ffffffffffffffda RBX: 00007f67d8ff2b40 RCX: 000000000045b69a [ 2240.289616][ T5018] RDX: 00007f67d8ff2ae0 RSI: 00000000200002c0 RDI: 00007f67d8ff2b00 [ 2240.297582][ T5018] RBP: 0000000000000000 R08: 00007f67d8ff2b40 R09: 00007f67d8ff2ae0 03:36:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserf.\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:36:21 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28]}}}}}}}}, 0x0) 03:36:21 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = epoll_create(0x0) ioctl$KDGKBMODE(r0, 0x4b44, 0x0) [ 2240.305547][ T5018] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 2240.313520][ T5018] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000004 03:36:21 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x7}]]}}}]}, 0x3c}}, 0x0) 03:36:21 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48]}}}}}}}}, 0x0) 03:36:21 executing program 3 (fault-call:2 fault-nth:60): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) [ 2240.493015][ T5043] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:36:21 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c]}}}}}}}}, 0x0) 03:36:21 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x10}]]}}}]}, 0x3c}}, 0x0) 03:36:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfsl', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2240.645882][ T5056] FAULT_INJECTION: forcing a failure. [ 2240.645882][ T5056] name failslab, interval 1, probability 0, space 0, times 0 [ 2240.657869][ T5059] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2240.675105][ T5056] CPU: 0 PID: 5056 Comm: syz-executor.3 Not tainted 5.1.0-rc6 #79 [ 2240.683469][ T5056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 03:36:21 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58]}}}}}}}}, 0x0) 03:36:21 executing program 1: getpgid(0xffffffffffffffff) write$P9_RAUTH(0xffffffffffffffff, 0x0, 0x0) gettid() rt_sigqueueinfo(0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, 0x0) pread64(0xffffffffffffffff, 0xfffffffffffffffe, 0xfffffffffffffe63, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r1 = dup2(r0, r0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) r2 = shmget$private(0x0, 0x4000, 0x8b, &(0x7f0000ffa000/0x4000)=nil) shmctl$IPC_STAT(r2, 0x2, 0x0) write$P9_RLINK(0xffffffffffffffff, 0x0, 0xffffffffffffffae) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, 0x0, 0x0) write$P9_RSTATu(r1, 0x0, 0x0) [ 2240.683476][ T5056] Call Trace: [ 2240.683502][ T5056] dump_stack+0x172/0x1f0 [ 2240.683528][ T5056] should_fail.cold+0xa/0x15 [ 2240.683549][ T5056] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2240.711757][ T5056] ? ___might_sleep+0x163/0x280 [ 2240.716622][ T5056] __should_failslab+0x121/0x190 [ 2240.721665][ T5056] should_failslab+0x9/0x14 [ 2240.726170][ T5056] kmem_cache_alloc_trace+0x2d1/0x760 [ 2240.726188][ T5056] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2240.726211][ T5056] __memcg_init_list_lru_node+0x8a/0x1e0 03:36:21 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x12}]]}}}]}, 0x3c}}, 0x0) [ 2240.726230][ T5056] __list_lru_init+0x3cf/0x6e0 [ 2240.726261][ T5056] alloc_super+0x762/0x890 [ 2240.752472][ T5056] ? test_single_super+0x10/0x10 [ 2240.757418][ T5056] sget_userns+0xf1/0x560 [ 2240.761834][ T5056] ? kill_litter_super+0x60/0x60 [ 2240.766796][ T5056] ? test_single_super+0x10/0x10 [ 2240.771737][ T5056] ? kill_litter_super+0x60/0x60 [ 2240.776796][ T5056] sget+0x10c/0x150 [ 2240.780607][ T5056] mount_bdev+0xff/0x3c0 [ 2240.784849][ T5056] ? finish_unfinished+0x1120/0x1120 [ 2240.790133][ T5056] get_super_block+0x35/0x40 [ 2240.794726][ T5056] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2240.799760][ T5056] legacy_get_tree+0xf2/0x200 [ 2240.804576][ T5056] vfs_get_tree+0x123/0x450 [ 2240.809078][ T5056] do_mount+0x1436/0x2c40 [ 2240.813409][ T5056] ? copy_mount_string+0x40/0x40 [ 2240.818349][ T5056] ? _copy_from_user+0xdd/0x150 [ 2240.823202][ T5056] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2240.829440][ T5056] ? copy_mount_options+0x280/0x3a0 [ 2240.834642][ T5056] ksys_mount+0xdb/0x150 [ 2240.838883][ T5056] __x64_sys_mount+0xbe/0x150 [ 2240.843670][ T5056] do_syscall_64+0x103/0x610 [ 2240.848350][ T5056] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2240.854233][ T5056] RIP: 0033:0x45b69a [ 2240.858133][ T5056] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2240.877914][ T5056] RSP: 002b:00007f67d8ff2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2240.886339][ T5056] RAX: ffffffffffffffda RBX: 00007f67d8ff2b40 RCX: 000000000045b69a [ 2240.894311][ T5056] RDX: 00007f67d8ff2ae0 RSI: 00000000200002c0 RDI: 00007f67d8ff2b00 [ 2240.902278][ T5056] RBP: 0000000000000000 R08: 00007f67d8ff2b40 R09: 00007f67d8ff2ae0 [ 2240.910252][ T5056] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 2240.918217][ T5056] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000004 03:36:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserf0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) [ 2241.011841][ T5063] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:36:22 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x14}]]}}}]}, 0x3c}}, 0x0) 03:36:22 executing program 3 (fault-call:2 fault-nth:61): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:36:22 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) 03:36:22 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60]}}}}}}}}, 0x0) 03:36:22 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) 03:36:22 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x39}]]}}}]}, 0x3c}}, 0x0) [ 2241.161454][ T5077] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:36:22 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68]}}}}}}}}, 0x0) 03:36:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfst', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfK\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) [ 2241.285540][ T5081] FAULT_INJECTION: forcing a failure. [ 2241.285540][ T5081] name failslab, interval 1, probability 0, space 0, times 0 [ 2241.332079][ T5093] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2241.338073][ T5081] CPU: 1 PID: 5081 Comm: syz-executor.3 Not tainted 5.1.0-rc6 #79 [ 2241.348075][ T5081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2241.358140][ T5081] Call Trace: [ 2241.361539][ T5081] dump_stack+0x172/0x1f0 [ 2241.365888][ T5081] should_fail.cold+0xa/0x15 [ 2241.370494][ T5081] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2241.376349][ T5081] ? ___might_sleep+0x163/0x280 [ 2241.381224][ T5081] __should_failslab+0x121/0x190 [ 2241.386171][ T5081] should_failslab+0x9/0x14 [ 2241.390689][ T5081] kmem_cache_alloc_trace+0x2d1/0x760 [ 2241.396075][ T5081] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2241.401901][ T5081] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2241.407643][ T5081] __list_lru_init+0x3cf/0x6e0 [ 2241.412417][ T5081] alloc_super+0x762/0x890 [ 2241.416835][ T5081] ? test_single_super+0x10/0x10 [ 2241.421873][ T5081] sget_userns+0xf1/0x560 [ 2241.426211][ T5081] ? kill_litter_super+0x60/0x60 [ 2241.431157][ T5081] ? test_single_super+0x10/0x10 [ 2241.436104][ T5081] ? kill_litter_super+0x60/0x60 [ 2241.441046][ T5081] sget+0x10c/0x150 [ 2241.444857][ T5081] mount_bdev+0xff/0x3c0 [ 2241.449106][ T5081] ? finish_unfinished+0x1120/0x1120 [ 2241.454396][ T5081] get_super_block+0x35/0x40 [ 2241.459000][ T5081] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2241.464070][ T5081] legacy_get_tree+0xf2/0x200 [ 2241.468764][ T5081] vfs_get_tree+0x123/0x450 [ 2241.473277][ T5081] do_mount+0x1436/0x2c40 [ 2241.477626][ T5081] ? copy_mount_string+0x40/0x40 03:36:22 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}}}}}}}}, 0x0) 03:36:22 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x5b}]]}}}]}, 0x3c}}, 0x0) [ 2241.482583][ T5081] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2241.488830][ T5081] ? copy_mount_options+0x280/0x3a0 [ 2241.494038][ T5081] ksys_mount+0xdb/0x150 [ 2241.498288][ T5081] __x64_sys_mount+0xbe/0x150 [ 2241.503014][ T5081] do_syscall_64+0x103/0x610 [ 2241.507611][ T5081] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2241.513502][ T5081] RIP: 0033:0x45b69a [ 2241.517397][ T5081] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2241.537789][ T5081] RSP: 002b:00007f67d8ff2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2241.546222][ T5081] RAX: ffffffffffffffda RBX: 00007f67d8ff2b40 RCX: 000000000045b69a [ 2241.554372][ T5081] RDX: 00007f67d8ff2ae0 RSI: 00000000200002c0 RDI: 00007f67d8ff2b00 [ 2241.563894][ T5081] RBP: 0000000000000000 R08: 00007f67d8ff2b40 R09: 00007f67d8ff2ae0 [ 2241.571962][ T5081] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 03:36:22 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) [ 2241.579938][ T5081] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000004 [ 2241.622161][ T5103] net_ratelimit: 34 callbacks suppressed [ 2241.622179][ T5103] dccp_v6_rcv: dropped packet with invalid checksum [ 2241.638633][ T5100] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:36:22 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x104}]]}}}]}, 0x3c}}, 0x0) [ 2241.692242][ T5103] dccp_v6_rcv: dropped packet with invalid checksum 03:36:22 executing program 3 (fault-call:2 fault-nth:62): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:36:22 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) 03:36:22 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74]}}}}}}}}, 0x0) [ 2241.812821][ T5116] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:36:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfX\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:36:22 executing program 1: getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, 0x0, &(0x7f0000000100)) 03:36:22 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x300}]]}}}]}, 0x3c}}, 0x0) [ 2241.856534][ T5121] dccp_v6_rcv: dropped packet with invalid checksum [ 2241.883463][ T5121] dccp_v6_rcv: dropped packet with invalid checksum [ 2241.939028][ T5120] FAULT_INJECTION: forcing a failure. [ 2241.939028][ T5120] name failslab, interval 1, probability 0, space 0, times 0 [ 2241.970978][ T5120] CPU: 0 PID: 5120 Comm: syz-executor.3 Not tainted 5.1.0-rc6 #79 [ 2241.978828][ T5120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2241.988903][ T5120] Call Trace: [ 2241.992209][ T5120] dump_stack+0x172/0x1f0 [ 2241.996648][ T5120] should_fail.cold+0xa/0x15 [ 2242.001255][ T5120] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2242.007093][ T5120] ? ___might_sleep+0x163/0x280 [ 2242.011961][ T5120] __should_failslab+0x121/0x190 [ 2242.016897][ T5120] should_failslab+0x9/0x14 [ 2242.021397][ T5120] kmem_cache_alloc_trace+0x2d1/0x760 [ 2242.026772][ T5120] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2242.032580][ T5120] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2242.038210][ T5120] __list_lru_init+0x3cf/0x6e0 [ 2242.042977][ T5120] alloc_super+0x762/0x890 [ 2242.047388][ T5120] ? test_single_super+0x10/0x10 [ 2242.052323][ T5120] sget_userns+0xf1/0x560 [ 2242.056647][ T5120] ? kill_litter_super+0x60/0x60 [ 2242.061589][ T5120] ? test_single_super+0x10/0x10 [ 2242.066522][ T5120] ? kill_litter_super+0x60/0x60 [ 2242.071464][ T5120] sget+0x10c/0x150 [ 2242.075270][ T5120] mount_bdev+0xff/0x3c0 [ 2242.079519][ T5120] ? finish_unfinished+0x1120/0x1120 [ 2242.084804][ T5120] get_super_block+0x35/0x40 [ 2242.089402][ T5120] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2242.094422][ T5120] legacy_get_tree+0xf2/0x200 [ 2242.099109][ T5120] vfs_get_tree+0x123/0x450 [ 2242.103617][ T5120] do_mount+0x1436/0x2c40 [ 2242.108035][ T5120] ? copy_mount_string+0x40/0x40 [ 2242.113062][ T5120] ? _copy_from_user+0xdd/0x150 [ 2242.117932][ T5120] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2242.124169][ T5120] ? copy_mount_options+0x280/0x3a0 [ 2242.129365][ T5120] ksys_mount+0xdb/0x150 [ 2242.133615][ T5120] __x64_sys_mount+0xbe/0x150 [ 2242.138291][ T5120] do_syscall_64+0x103/0x610 [ 2242.142879][ T5120] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2242.148761][ T5120] RIP: 0033:0x45b69a [ 2242.152657][ T5120] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2242.172255][ T5120] RSP: 002b:00007f67d8ff2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2242.180663][ T5120] RAX: ffffffffffffffda RBX: 00007f67d8ff2b40 RCX: 000000000045b69a 03:36:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfsz', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:23 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a]}}}}}}}}, 0x0) 03:36:23 executing program 1: getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, 0x0, &(0x7f0000000100)) 03:36:23 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4001}]]}}}]}, 0x3c}}, 0x0) [ 2242.188628][ T5120] RDX: 00007f67d8ff2ae0 RSI: 00000000200002c0 RDI: 00007f67d8ff2b00 [ 2242.196593][ T5120] RBP: 0000000000000000 R08: 00007f67d8ff2b40 R09: 00007f67d8ff2ae0 [ 2242.204580][ T5120] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 2242.212544][ T5120] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000004 03:36:23 executing program 1: getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, 0x0, &(0x7f0000000100)) [ 2242.281932][ T5137] dccp_v6_rcv: dropped packet with invalid checksum [ 2242.290940][ T5137] dccp_v6_rcv: dropped packet with invalid checksum 03:36:23 executing program 3 (fault-call:2 fault-nth:63): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:36:23 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0]}}}}}}}}, 0x0) 03:36:23 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4002}]]}}}]}, 0x3c}}, 0x0) 03:36:23 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) 03:36:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfa\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:36:23 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}}}}}}}}, 0x0) [ 2242.458945][ T5155] dccp_v6_rcv: dropped packet with invalid checksum [ 2242.469706][ T5155] dccp_v6_rcv: dropped packet with invalid checksum 03:36:23 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4003}]]}}}]}, 0x3c}}, 0x0) [ 2242.535159][ T5153] FAULT_INJECTION: forcing a failure. [ 2242.535159][ T5153] name failslab, interval 1, probability 0, space 0, times 0 [ 2242.564112][ T5164] dccp_v6_rcv: dropped packet with invalid checksum [ 2242.569821][ T5153] CPU: 0 PID: 5153 Comm: syz-executor.3 Not tainted 5.1.0-rc6 #79 [ 2242.578522][ T5153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2242.578528][ T5153] Call Trace: [ 2242.578553][ T5153] dump_stack+0x172/0x1f0 [ 2242.578573][ T5153] should_fail.cold+0xa/0x15 [ 2242.578592][ T5153] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2242.578611][ T5153] ? ___might_sleep+0x163/0x280 [ 2242.578631][ T5153] __should_failslab+0x121/0x190 [ 2242.591766][ T5164] dccp_v6_rcv: dropped packet with invalid checksum [ 2242.591973][ T5153] should_failslab+0x9/0x14 [ 2242.591994][ T5153] kmem_cache_alloc_trace+0x2d1/0x760 [ 2242.606683][ T5153] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2242.606701][ T5153] __list_lru_init+0x3cf/0x6e0 [ 2242.606719][ T5153] alloc_super+0x762/0x890 [ 2242.606733][ T5153] ? test_single_super+0x10/0x10 [ 2242.606746][ T5153] sget_userns+0xf1/0x560 [ 2242.606762][ T5153] ? kill_litter_super+0x60/0x60 [ 2242.662095][ T5153] ? test_single_super+0x10/0x10 [ 2242.667127][ T5153] ? kill_litter_super+0x60/0x60 [ 2242.672069][ T5153] sget+0x10c/0x150 [ 2242.675981][ T5153] mount_bdev+0xff/0x3c0 [ 2242.680317][ T5153] ? finish_unfinished+0x1120/0x1120 [ 2242.685619][ T5153] get_super_block+0x35/0x40 [ 2242.690212][ T5153] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2242.695233][ T5153] legacy_get_tree+0xf2/0x200 [ 2242.700258][ T5153] vfs_get_tree+0x123/0x450 [ 2242.704760][ T5153] do_mount+0x1436/0x2c40 [ 2242.709103][ T5153] ? copy_mount_string+0x40/0x40 [ 2242.714040][ T5153] ? _copy_from_user+0xdd/0x150 [ 2242.718905][ T5153] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2242.725147][ T5153] ? copy_mount_options+0x280/0x3a0 [ 2242.730354][ T5153] ksys_mount+0xdb/0x150 [ 2242.734596][ T5153] __x64_sys_mount+0xbe/0x150 [ 2242.739278][ T5153] do_syscall_64+0x103/0x610 [ 2242.743879][ T5153] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2242.749776][ T5153] RIP: 0033:0x45b69a [ 2242.753666][ T5153] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2242.773810][ T5153] RSP: 002b:00007f67d8ff2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2242.782306][ T5153] RAX: ffffffffffffffda RBX: 00007f67d8ff2b40 RCX: 000000000045b69a [ 2242.790280][ T5153] RDX: 00007f67d8ff2ae0 RSI: 00000000200002c0 RDI: 00007f67d8ff2b00 [ 2242.798270][ T5153] RBP: 0000000000000000 R08: 00007f67d8ff2b40 R09: 00007f67d8ff2ae0 [ 2242.806238][ T5153] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 2242.814205][ T5153] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000004 03:36:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs|', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:24 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}}}}}}}}, 0x0) 03:36:24 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) 03:36:24 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x5b00}]]}}}]}, 0x3c}}, 0x0) 03:36:24 executing program 3 (fault-call:2 fault-nth:64): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:36:24 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x6500}]]}}}]}, 0x3c}}, 0x0) 03:36:24 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x543]}}}}}}}}, 0x0) 03:36:24 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) [ 2243.129503][ T5284] FAULT_INJECTION: forcing a failure. [ 2243.129503][ T5284] name failslab, interval 1, probability 0, space 0, times 0 03:36:24 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x6600}]]}}}]}, 0x3c}}, 0x0) [ 2243.179890][ T5284] CPU: 1 PID: 5284 Comm: syz-executor.3 Not tainted 5.1.0-rc6 #79 [ 2243.187743][ T5284] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2243.197808][ T5284] Call Trace: [ 2243.201124][ T5284] dump_stack+0x172/0x1f0 [ 2243.205473][ T5284] should_fail.cold+0xa/0x15 [ 2243.210087][ T5284] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2243.215908][ T5284] ? ___might_sleep+0x163/0x280 [ 2243.220775][ T5284] __should_failslab+0x121/0x190 [ 2243.225733][ T5284] should_failslab+0x9/0x14 [ 2243.230239][ T5284] kmem_cache_alloc_trace+0x2d1/0x760 [ 2243.235614][ T5284] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2243.241437][ T5284] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2243.247086][ T5284] __list_lru_init+0x3cf/0x6e0 [ 2243.251853][ T5284] alloc_super+0x762/0x890 [ 2243.256268][ T5284] ? test_single_super+0x10/0x10 [ 2243.261208][ T5284] sget_userns+0xf1/0x560 [ 2243.265543][ T5284] ? kill_litter_super+0x60/0x60 [ 2243.270484][ T5284] ? test_single_super+0x10/0x10 [ 2243.275417][ T5284] ? kill_litter_super+0x60/0x60 [ 2243.280353][ T5284] sget+0x10c/0x150 [ 2243.284344][ T5284] mount_bdev+0xff/0x3c0 [ 2243.288589][ T5284] ? finish_unfinished+0x1120/0x1120 [ 2243.293971][ T5284] get_super_block+0x35/0x40 [ 2243.298565][ T5284] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2243.303590][ T5284] legacy_get_tree+0xf2/0x200 [ 2243.308272][ T5284] vfs_get_tree+0x123/0x450 [ 2243.312780][ T5284] do_mount+0x1436/0x2c40 [ 2243.317209][ T5284] ? copy_mount_string+0x40/0x40 [ 2243.322237][ T5284] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2243.328562][ T5284] ? copy_mount_options+0x280/0x3a0 [ 2243.333763][ T5284] ksys_mount+0xdb/0x150 [ 2243.338012][ T5284] __x64_sys_mount+0xbe/0x150 [ 2243.342726][ T5284] do_syscall_64+0x103/0x610 [ 2243.347320][ T5284] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2243.353231][ T5284] RIP: 0033:0x45b69a [ 2243.357131][ T5284] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2243.376734][ T5284] RSP: 002b:00007f67d8ff2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2243.385240][ T5284] RAX: ffffffffffffffda RBX: 00007f67d8ff2b40 RCX: 000000000045b69a [ 2243.393221][ T5284] RDX: 00007f67d8ff2ae0 RSI: 00000000200002c0 RDI: 00007f67d8ff2b00 [ 2243.401451][ T5284] RBP: 0000000000000000 R08: 00007f67d8ff2b40 R09: 00007f67d8ff2ae0 [ 2243.409424][ T5284] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 2243.417398][ T5284] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000004 03:36:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfb\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:36:24 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, 0x0, &(0x7f0000000100)) 03:36:24 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}}}}}}}}, 0x0) 03:36:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\xb0', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:24 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x6700}]]}}}]}, 0x3c}}, 0x0) 03:36:24 executing program 3 (fault-call:2 fault-nth:65): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:36:24 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, 0x0, &(0x7f0000000100)) 03:36:24 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x608]}}}}}}}}, 0x0) 03:36:24 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x8002}]]}}}]}, 0x3c}}, 0x0) 03:36:24 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, 0x0, &(0x7f0000000100)) [ 2243.678164][ T5310] FAULT_INJECTION: forcing a failure. [ 2243.678164][ T5310] name failslab, interval 1, probability 0, space 0, times 0 [ 2243.734746][ T5310] CPU: 1 PID: 5310 Comm: syz-executor.3 Not tainted 5.1.0-rc6 #79 [ 2243.742599][ T5310] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2243.752649][ T5310] Call Trace: [ 2243.752675][ T5310] dump_stack+0x172/0x1f0 [ 2243.752698][ T5310] should_fail.cold+0xa/0x15 [ 2243.752722][ T5310] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2243.764915][ T5310] ? ___might_sleep+0x163/0x280 [ 2243.764938][ T5310] __should_failslab+0x121/0x190 03:36:24 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x8003}]]}}}]}, 0x3c}}, 0x0) 03:36:24 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x689]}}}}}}}}, 0x0) [ 2243.764955][ T5310] should_failslab+0x9/0x14 [ 2243.764972][ T5310] kmem_cache_alloc_trace+0x2d1/0x760 [ 2243.764997][ T5310] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2243.765017][ T5310] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2243.765033][ T5310] __list_lru_init+0x3cf/0x6e0 [ 2243.765051][ T5310] alloc_super+0x762/0x890 [ 2243.765067][ T5310] ? test_single_super+0x10/0x10 [ 2243.765087][ T5310] sget_userns+0xf1/0x560 [ 2243.820476][ T5310] ? kill_litter_super+0x60/0x60 [ 2243.825678][ T5310] ? test_single_super+0x10/0x10 [ 2243.832023][ T5310] ? kill_litter_super+0x60/0x60 [ 2243.836966][ T5310] sget+0x10c/0x150 [ 2243.840790][ T5310] mount_bdev+0xff/0x3c0 [ 2243.845031][ T5310] ? finish_unfinished+0x1120/0x1120 [ 2243.850322][ T5310] get_super_block+0x35/0x40 [ 2243.854918][ T5310] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2243.859942][ T5310] legacy_get_tree+0xf2/0x200 [ 2243.864636][ T5310] vfs_get_tree+0x123/0x450 [ 2243.869140][ T5310] do_mount+0x1436/0x2c40 [ 2243.873526][ T5310] ? copy_mount_string+0x40/0x40 [ 2243.878477][ T5310] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2243.884714][ T5310] ? copy_mount_options+0x280/0x3a0 [ 2243.889924][ T5310] ksys_mount+0xdb/0x150 [ 2243.894168][ T5310] __x64_sys_mount+0xbe/0x150 [ 2243.898959][ T5310] do_syscall_64+0x103/0x610 [ 2243.903566][ T5310] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2243.909460][ T5310] RIP: 0033:0x45b69a [ 2243.913360][ T5310] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2243.933225][ T5310] RSP: 002b:00007f67d8ff2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2243.941638][ T5310] RAX: ffffffffffffffda RBX: 00007f67d8ff2b40 RCX: 000000000045b69a [ 2243.941648][ T5310] RDX: 00007f67d8ff2ae0 RSI: 00000000200002c0 RDI: 00007f67d8ff2b00 [ 2243.941656][ T5310] RBP: 0000000000000000 R08: 00007f67d8ff2b40 R09: 00007f67d8ff2ae0 [ 2243.941664][ T5310] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 2243.941672][ T5310] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000004 03:36:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfc\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:36:25 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}}}}}}}}, 0x0) 03:36:25 executing program 3 (fault-call:2 fault-nth:66): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:36:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\xd0', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:25 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0xc000}]]}}}]}, 0x3c}}, 0x0) 03:36:25 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, 0x0) 03:36:25 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x806]}}}}}}}}, 0x0) [ 2244.206915][ T5338] FAULT_INJECTION: forcing a failure. [ 2244.206915][ T5338] name failslab, interval 1, probability 0, space 0, times 0 [ 2244.228204][ T5338] CPU: 0 PID: 5338 Comm: syz-executor.3 Not tainted 5.1.0-rc6 #79 [ 2244.236135][ T5338] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2244.246283][ T5338] Call Trace: [ 2244.249597][ T5338] dump_stack+0x172/0x1f0 [ 2244.254029][ T5338] should_fail.cold+0xa/0x15 [ 2244.258630][ T5338] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2244.264458][ T5338] ? ___might_sleep+0x163/0x280 [ 2244.269317][ T5338] __should_failslab+0x121/0x190 [ 2244.274263][ T5338] should_failslab+0x9/0x14 [ 2244.278768][ T5338] kmem_cache_alloc_trace+0x2d1/0x760 [ 2244.284148][ T5338] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2244.289975][ T5338] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2244.295610][ T5338] __list_lru_init+0x3cf/0x6e0 [ 2244.300381][ T5338] alloc_super+0x78d/0x890 [ 2244.304882][ T5338] ? test_single_super+0x10/0x10 [ 2244.309820][ T5338] sget_userns+0xf1/0x560 [ 2244.314241][ T5338] ? kill_litter_super+0x60/0x60 [ 2244.319263][ T5338] ? test_single_super+0x10/0x10 [ 2244.324194][ T5338] ? kill_litter_super+0x60/0x60 [ 2244.329169][ T5338] sget+0x10c/0x150 [ 2244.332986][ T5338] mount_bdev+0xff/0x3c0 [ 2244.337230][ T5338] ? finish_unfinished+0x1120/0x1120 [ 2244.342518][ T5338] get_super_block+0x35/0x40 [ 2244.347103][ T5338] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2244.352216][ T5338] legacy_get_tree+0xf2/0x200 [ 2244.357069][ T5338] vfs_get_tree+0x123/0x450 [ 2244.361578][ T5338] do_mount+0x1436/0x2c40 [ 2244.365922][ T5338] ? copy_mount_string+0x40/0x40 [ 2244.370958][ T5338] ? _copy_from_user+0xdd/0x150 [ 2244.375814][ T5338] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2244.382052][ T5338] ? copy_mount_options+0x280/0x3a0 [ 2244.387860][ T5338] ksys_mount+0xdb/0x150 [ 2244.394642][ T5338] __x64_sys_mount+0xbe/0x150 [ 2244.399411][ T5338] do_syscall_64+0x103/0x610 [ 2244.404011][ T5338] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2244.409906][ T5338] RIP: 0033:0x45b69a [ 2244.422493][ T5338] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2244.442700][ T5338] RSP: 002b:00007f67d8ff2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2244.451301][ T5338] RAX: ffffffffffffffda RBX: 00007f67d8ff2b40 RCX: 000000000045b69a [ 2244.459271][ T5338] RDX: 00007f67d8ff2ae0 RSI: 00000000200002c0 RDI: 00007f67d8ff2b00 [ 2244.467250][ T5338] RBP: 0000000000000000 R08: 00007f67d8ff2b40 R09: 00007f67d8ff2ae0 [ 2244.475226][ T5338] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 2244.483202][ T5338] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000004 03:36:25 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, 0x0) 03:36:25 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0xc001}]]}}}]}, 0x3c}}, 0x0) 03:36:25 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00]}}}}}}}}, 0x0) 03:36:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfd\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:36:25 executing program 3 (fault-call:2 fault-nth:67): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:36:25 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe80]}}}}}}}}, 0x0) 03:36:25 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, 0x0) 03:36:25 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0xc002}]]}}}]}, 0x3c}}, 0x0) [ 2244.803645][ T5371] validate_nla: 11 callbacks suppressed [ 2244.803654][ T5371] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:36:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x04', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:25 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}}}}}}}}, 0x0) 03:36:25 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0xc003}]]}}}]}, 0x3c}}, 0x0) 03:36:25 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CAP(0xffffffffffffffff, 0xc010640c, 0x0) mmap(&(0x7f0000008000/0x600000)=nil, 0x600000, 0x0, 0x10, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r2 = openat$cgroup_ro(r1, &(0x7f0000000140)='mem\x00\x01y/\x06\x00\x00\x00\x00\x00\x00\x00\x16\xd4B\xab\xe3\xfarent\x00', 0x0, 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, &(0x7f0000001200)='TRUE', 0x4, 0x1) request_key(&(0x7f0000000600)='trusted\x00', &(0x7f0000000640)={'syz', 0x0}, &(0x7f0000000200)='mem\x00\x01y/\x06\x00\x00\x00\x00\x00\x00\x00\x16\xd4B\xab\xe3\xfarent\x00', 0xfffffffffffffffc) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000100)=0x40) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) [ 2244.860114][ T5366] FAULT_INJECTION: forcing a failure. [ 2244.860114][ T5366] name failslab, interval 1, probability 0, space 0, times 0 [ 2244.887818][ T5366] CPU: 1 PID: 5366 Comm: syz-executor.3 Not tainted 5.1.0-rc6 #79 [ 2244.895661][ T5366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2244.895669][ T5366] Call Trace: [ 2244.895696][ T5366] dump_stack+0x172/0x1f0 [ 2244.895716][ T5366] should_fail.cold+0xa/0x15 [ 2244.895735][ T5366] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2244.895755][ T5366] ? ___might_sleep+0x163/0x280 [ 2244.895781][ T5366] __should_failslab+0x121/0x190 [ 2244.909176][ T5366] should_failslab+0x9/0x14 [ 2244.918143][ T5366] kmem_cache_alloc_trace+0x2d1/0x760 [ 2244.918159][ T5366] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2244.918179][ T5366] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2244.918196][ T5366] __list_lru_init+0x3cf/0x6e0 [ 2244.918218][ T5366] alloc_super+0x762/0x890 [ 2244.944136][ T5366] ? test_single_super+0x10/0x10 [ 2244.955537][ T5366] sget_userns+0xf1/0x560 [ 2244.955550][ T5366] ? kill_litter_super+0x60/0x60 [ 2244.955564][ T5366] ? test_single_super+0x10/0x10 [ 2244.955574][ T5366] ? kill_litter_super+0x60/0x60 [ 2244.955585][ T5366] sget+0x10c/0x150 [ 2244.955599][ T5366] mount_bdev+0xff/0x3c0 [ 2244.955614][ T5366] ? finish_unfinished+0x1120/0x1120 [ 2244.955635][ T5366] get_super_block+0x35/0x40 03:36:26 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2100]}}}}}}}}, 0x0) [ 2244.978973][ T5366] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2245.002122][ T5366] legacy_get_tree+0xf2/0x200 [ 2245.016388][ T5366] vfs_get_tree+0x123/0x450 [ 2245.020922][ T5366] do_mount+0x1436/0x2c40 [ 2245.020943][ T5366] ? copy_mount_string+0x40/0x40 [ 2245.030200][ T5366] ? _copy_from_user+0xdd/0x150 [ 2245.030644][ T26] audit: type=1804 audit(2000000186.069:170): pid=5382 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir508832340/syzkaller.pl6IVM/7203/bus" dev="sda1" ino=17673 res=1 [ 2245.035072][ T5366] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2245.035087][ T5366] ? copy_mount_options+0x280/0x3a0 [ 2245.035102][ T5366] ksys_mount+0xdb/0x150 [ 2245.035117][ T5366] __x64_sys_mount+0xbe/0x150 [ 2245.035134][ T5366] do_syscall_64+0x103/0x610 [ 2245.035152][ T5366] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2245.035162][ T5366] RIP: 0033:0x45b69a [ 2245.035176][ T5366] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2245.035183][ T5366] RSP: 002b:00007f67d8ff2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2245.035197][ T5366] RAX: ffffffffffffffda RBX: 00007f67d8ff2b40 RCX: 000000000045b69a [ 2245.035206][ T5366] RDX: 00007f67d8ff2ae0 RSI: 00000000200002c0 RDI: 00007f67d8ff2b00 [ 2245.035215][ T5366] RBP: 0000000000000000 R08: 00007f67d8ff2b40 R09: 00007f67d8ff2ae0 [ 2245.035223][ T5366] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 2245.035230][ T5366] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000004 [ 2245.369732][ T5387] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:36:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfh\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:36:26 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x100000}]]}}}]}, 0x3c}}, 0x0) [ 2245.406427][ T26] audit: type=1804 audit(2000000186.449:171): pid=5382 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir508832340/syzkaller.pl6IVM/7203/bus" dev="sda1" ino=17673 res=1 03:36:26 executing program 3 (fault-call:2 fault-nth:68): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:36:26 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2800]}}}}}}}}, 0x0) 03:36:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfsL', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2245.529977][ T5396] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:36:26 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000180)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x1000000) write(r1, &(0x7f0000000600)="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", 0x1f8) sendfile(r1, r2, 0x0, 0x10000) 03:36:26 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3580]}}}}}}}}, 0x0) 03:36:26 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) [ 2245.612777][ T5400] FAULT_INJECTION: forcing a failure. [ 2245.612777][ T5400] name failslab, interval 1, probability 0, space 0, times 0 [ 2245.662947][ T5400] CPU: 1 PID: 5400 Comm: syz-executor.3 Not tainted 5.1.0-rc6 #79 [ 2245.670783][ T5400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2245.680948][ T5400] Call Trace: [ 2245.684253][ T5400] dump_stack+0x172/0x1f0 [ 2245.688603][ T5400] should_fail.cold+0xa/0x15 [ 2245.693196][ T5400] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2245.699019][ T5400] ? ___might_sleep+0x163/0x280 [ 2245.703886][ T5400] __should_failslab+0x121/0x190 [ 2245.708834][ T5400] should_failslab+0x9/0x14 [ 2245.713511][ T5400] kmem_cache_alloc_node_trace+0x270/0x720 [ 2245.719329][ T5400] __kmalloc_node+0x3d/0x70 [ 2245.723838][ T5400] kvmalloc_node+0x68/0x100 [ 2245.728353][ T5400] __list_lru_init+0x4a6/0x6e0 [ 2245.733135][ T5400] alloc_super+0x78d/0x890 [ 2245.737550][ T5400] ? test_single_super+0x10/0x10 [ 2245.742498][ T5400] sget_userns+0xf1/0x560 [ 2245.746846][ T5400] ? kill_litter_super+0x60/0x60 [ 2245.747330][ T26] audit: type=1800 audit(2000000186.789:172): pid=5409 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=17667 res=0 [ 2245.751786][ T5400] ? test_single_super+0x10/0x10 [ 2245.776994][ T5400] ? kill_litter_super+0x60/0x60 [ 2245.781940][ T5400] sget+0x10c/0x150 [ 2245.785760][ T5400] mount_bdev+0xff/0x3c0 [ 2245.790003][ T5400] ? finish_unfinished+0x1120/0x1120 [ 2245.795291][ T5400] get_super_block+0x35/0x40 [ 2245.796633][ T26] audit: type=1804 audit(2000000186.819:173): pid=5409 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir508832340/syzkaller.pl6IVM/7204/file0" dev="sda1" ino=17667 res=1 [ 2245.799878][ T5400] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2245.799893][ T5400] legacy_get_tree+0xf2/0x200 [ 2245.799911][ T5400] vfs_get_tree+0x123/0x450 [ 2245.799928][ T5400] do_mount+0x1436/0x2c40 [ 2245.799947][ T5400] ? copy_mount_string+0x40/0x40 [ 2245.848161][ T5400] ? _copy_from_user+0xdd/0x150 [ 2245.853016][ T5400] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2245.859257][ T5400] ? copy_mount_options+0x280/0x3a0 [ 2245.864457][ T5400] ksys_mount+0xdb/0x150 [ 2245.868702][ T5400] __x64_sys_mount+0xbe/0x150 [ 2245.873381][ T5400] do_syscall_64+0x103/0x610 [ 2245.877975][ T5400] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2245.883884][ T5400] RIP: 0033:0x45b69a [ 2245.887863][ T5400] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 03:36:27 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}}}}}}}}, 0x0) [ 2245.907468][ T5400] RSP: 002b:00007f67d8ff2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2245.915980][ T5400] RAX: ffffffffffffffda RBX: 00007f67d8ff2b40 RCX: 000000000045b69a [ 2245.923953][ T5400] RDX: 00007f67d8ff2ae0 RSI: 00000000200002c0 RDI: 00007f67d8ff2b00 [ 2245.932135][ T5400] RBP: 0000000000000000 R08: 00007f67d8ff2b40 R09: 00007f67d8ff2ae0 [ 2245.940130][ T5400] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 2245.948187][ T5400] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000004 03:36:27 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305]}}}}}}}}, 0x0) 03:36:27 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) [ 2246.058084][ T5419] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:36:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfi\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:36:27 executing program 3 (fault-call:2 fault-nth:69): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) [ 2246.185310][ T5424] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:36:27 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:27 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4788]}}}}}}}}, 0x0) 03:36:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\xac', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2246.262502][ T5428] FAULT_INJECTION: forcing a failure. [ 2246.262502][ T5428] name failslab, interval 1, probability 0, space 0, times 0 [ 2246.300083][ T5428] CPU: 1 PID: 5428 Comm: syz-executor.3 Not tainted 5.1.0-rc6 #79 [ 2246.307929][ T5428] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2246.313188][ T5434] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2246.318345][ T5428] Call Trace: [ 2246.318374][ T5428] dump_stack+0x172/0x1f0 [ 2246.318394][ T5428] should_fail.cold+0xa/0x15 [ 2246.318412][ T5428] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2246.318431][ T5428] ? ___might_sleep+0x163/0x280 [ 2246.318451][ T5428] __should_failslab+0x121/0x190 [ 2246.354622][ T5428] should_failslab+0x9/0x14 03:36:27 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) [ 2246.359132][ T5428] __kmalloc+0x2dc/0x740 [ 2246.363387][ T5428] ? __list_lru_init+0xd1/0x6e0 [ 2246.368259][ T5428] __list_lru_init+0xd1/0x6e0 [ 2246.372954][ T5428] alloc_super+0x78d/0x890 [ 2246.377387][ T5428] ? test_single_super+0x10/0x10 [ 2246.382344][ T5428] sget_userns+0xf1/0x560 [ 2246.386683][ T5428] ? kill_litter_super+0x60/0x60 [ 2246.393790][ T5428] ? test_single_super+0x10/0x10 [ 2246.398729][ T5428] ? kill_litter_super+0x60/0x60 [ 2246.404731][ T5428] sget+0x10c/0x150 [ 2246.408918][ T5428] mount_bdev+0xff/0x3c0 [ 2246.418731][ T5428] ? finish_unfinished+0x1120/0x1120 [ 2246.424292][ T5428] get_super_block+0x35/0x40 [ 2246.428885][ T5428] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2246.434042][ T5428] legacy_get_tree+0xf2/0x200 [ 2246.438749][ T5428] vfs_get_tree+0x123/0x450 [ 2246.443445][ T5428] do_mount+0x1436/0x2c40 [ 2246.447791][ T5428] ? copy_mount_string+0x40/0x40 [ 2246.452740][ T5428] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2246.458987][ T5428] ? copy_mount_options+0x280/0x3a0 [ 2246.464196][ T5428] ksys_mount+0xdb/0x150 [ 2246.468457][ T5428] __x64_sys_mount+0xbe/0x150 [ 2246.473138][ T5428] do_syscall_64+0x103/0x610 [ 2246.477738][ T5428] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2246.483636][ T5428] RIP: 0033:0x45b69a [ 2246.487570][ T5428] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2246.507172][ T5428] RSP: 002b:00007f67d8ff2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2246.515582][ T5428] RAX: ffffffffffffffda RBX: 00007f67d8ff2b40 RCX: 000000000045b69a [ 2246.523557][ T5428] RDX: 00007f67d8ff2ae0 RSI: 00000000200002c0 RDI: 00007f67d8ff2b00 [ 2246.531548][ T5428] RBP: 0000000000000000 R08: 00007f67d8ff2b40 R09: 00007f67d8ff2ae0 [ 2246.539792][ T5428] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 2246.547772][ T5428] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000004 03:36:27 executing program 1: r0 = gettid() sched_setaffinity(r0, 0xffffffffffffffdc, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mountinfo\x00') prctl$PR_SET_TIMERSLACK(0x1d, 0x8) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getpid() ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x42) select(0x40, &(0x7f0000000240)={0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x89}, 0x0, 0x0, 0x0) 03:36:27 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800]}}}}}}}}, 0x0) 03:36:27 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) [ 2246.612248][ T5441] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:36:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfk\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) [ 2246.712927][ T5447] net_ratelimit: 32 callbacks suppressed [ 2246.712935][ T5447] dccp_v6_rcv: dropped packet with invalid checksum [ 2246.727394][ T5447] dccp_v6_rcv: dropped packet with invalid checksum 03:36:27 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4888]}}}}}}}}, 0x0) 03:36:27 executing program 3 (fault-call:2 fault-nth:70): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) [ 2246.782469][ T5451] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2246.844540][ T5458] dccp_v6_rcv: dropped packet with invalid checksum [ 2246.873898][ T5458] dccp_v6_rcv: dropped packet with invalid checksum [ 2246.884371][ T5460] FAULT_INJECTION: forcing a failure. [ 2246.884371][ T5460] name failslab, interval 1, probability 0, space 0, times 0 [ 2246.911907][ T5460] CPU: 1 PID: 5460 Comm: syz-executor.3 Not tainted 5.1.0-rc6 #79 [ 2246.919756][ T5460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2246.930263][ T5460] Call Trace: [ 2246.933658][ T5460] dump_stack+0x172/0x1f0 [ 2246.938268][ T5460] should_fail.cold+0xa/0x15 03:36:27 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00]}}}}}}}}, 0x0) [ 2246.942875][ T5460] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2246.948784][ T5460] ? ___might_sleep+0x163/0x280 [ 2246.953666][ T5460] __should_failslab+0x121/0x190 [ 2246.958626][ T5460] should_failslab+0x9/0x14 [ 2246.963136][ T5460] kmem_cache_alloc_trace+0x2d1/0x760 [ 2246.968506][ T5460] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2246.974331][ T5460] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2246.979956][ T5460] __list_lru_init+0x3cf/0x6e0 [ 2246.984717][ T5460] alloc_super+0x78d/0x890 [ 2246.989118][ T5460] ? test_single_super+0x10/0x10 [ 2246.994035][ T5460] sget_userns+0xf1/0x560 [ 2246.998345][ T5460] ? kill_litter_super+0x60/0x60 [ 2247.003274][ T5460] ? test_single_super+0x10/0x10 [ 2247.008193][ T5460] ? kill_litter_super+0x60/0x60 [ 2247.013122][ T5460] sget+0x10c/0x150 [ 2247.016912][ T5460] mount_bdev+0xff/0x3c0 [ 2247.021136][ T5460] ? finish_unfinished+0x1120/0x1120 [ 2247.026414][ T5460] get_super_block+0x35/0x40 [ 2247.030990][ T5460] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2247.036084][ T5460] legacy_get_tree+0xf2/0x200 [ 2247.040752][ T5460] vfs_get_tree+0x123/0x450 [ 2247.045239][ T5460] do_mount+0x1436/0x2c40 [ 2247.049737][ T5460] ? copy_mount_string+0x40/0x40 [ 2247.054654][ T5460] ? _copy_from_user+0xdd/0x150 [ 2247.059574][ T5460] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2247.065795][ T5460] ? copy_mount_options+0x280/0x3a0 [ 2247.070986][ T5460] ksys_mount+0xdb/0x150 [ 2247.075211][ T5460] __x64_sys_mount+0xbe/0x150 [ 2247.079874][ T5460] do_syscall_64+0x103/0x610 [ 2247.084449][ T5460] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2247.090416][ T5460] RIP: 0033:0x45b69a [ 2247.094294][ T5460] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2247.113963][ T5460] RSP: 002b:00007f67d8ff2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2247.122357][ T5460] RAX: ffffffffffffffda RBX: 00007f67d8ff2b40 RCX: 000000000045b69a [ 2247.130397][ T5460] RDX: 00007f67d8ff2ae0 RSI: 00000000200002c0 RDI: 00007f67d8ff2b00 03:36:28 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2247.138347][ T5460] RBP: 0000000000000000 R08: 00007f67d8ff2b40 R09: 00007f67d8ff2ae0 [ 2247.146300][ T5460] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 2247.154253][ T5460] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000004 [ 2247.234356][ T5471] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2247.260830][ T5475] dccp_v6_rcv: dropped packet with invalid checksum 03:36:28 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:28 executing program 1 (fault-call:1 fault-nth:0): r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) 03:36:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfl\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) [ 2247.278428][ T5475] dccp_v6_rcv: dropped packet with invalid checksum 03:36:28 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5800]}}}}}}}}, 0x0) 03:36:28 executing program 3 (fault-call:2 fault-nth:71): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:36:28 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) [ 2247.353495][ T5480] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2247.374042][ T5472] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:36:28 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:28 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x3, 0x0, &(0x7f0000000100)) [ 2247.448576][ T5489] dccp_v6_rcv: dropped packet with invalid checksum [ 2247.478344][ T5489] dccp_v6_rcv: dropped packet with invalid checksum 03:36:28 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000]}}}}}}}}, 0x0) [ 2247.575632][ T5491] FAULT_INJECTION: forcing a failure. [ 2247.575632][ T5491] name failslab, interval 1, probability 0, space 0, times 0 [ 2247.619139][ T5491] CPU: 0 PID: 5491 Comm: syz-executor.3 Not tainted 5.1.0-rc6 #79 [ 2247.625926][ T5502] dccp_v6_rcv: dropped packet with invalid checksum [ 2247.626972][ T5491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2247.626978][ T5491] Call Trace: [ 2247.627004][ T5491] dump_stack+0x172/0x1f0 [ 2247.627028][ T5491] should_fail.cold+0xa/0x15 [ 2247.638052][ T5502] dccp_v6_rcv: dropped packet with invalid checksum [ 2247.643691][ T5491] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2247.643712][ T5491] ? ___might_sleep+0x163/0x280 [ 2247.643733][ T5491] __should_failslab+0x121/0x190 [ 2247.678023][ T5491] should_failslab+0x9/0x14 [ 2247.682530][ T5491] kmem_cache_alloc_trace+0x2d1/0x760 [ 2247.688181][ T5491] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2247.694027][ T5491] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2247.699678][ T5491] __list_lru_init+0x3cf/0x6e0 [ 2247.704446][ T5491] alloc_super+0x78d/0x890 [ 2247.708863][ T5491] ? test_single_super+0x10/0x10 [ 2247.713799][ T5491] sget_userns+0xf1/0x560 [ 2247.718149][ T5491] ? kill_litter_super+0x60/0x60 [ 2247.723154][ T5491] ? test_single_super+0x10/0x10 [ 2247.728100][ T5491] ? kill_litter_super+0x60/0x60 [ 2247.733033][ T5491] sget+0x10c/0x150 [ 2247.736850][ T5491] mount_bdev+0xff/0x3c0 [ 2247.741121][ T5491] ? finish_unfinished+0x1120/0x1120 [ 2247.746408][ T5491] get_super_block+0x35/0x40 [ 2247.751000][ T5491] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2247.756110][ T5491] legacy_get_tree+0xf2/0x200 [ 2247.760791][ T5491] vfs_get_tree+0x123/0x450 [ 2247.765294][ T5491] do_mount+0x1436/0x2c40 [ 2247.769631][ T5491] ? copy_mount_string+0x40/0x40 [ 2247.774594][ T5491] ? _copy_from_user+0xdd/0x150 [ 2247.779552][ T5491] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2247.785793][ T5491] ? copy_mount_options+0x280/0x3a0 [ 2247.790994][ T5491] ksys_mount+0xdb/0x150 [ 2247.795416][ T5491] __x64_sys_mount+0xbe/0x150 [ 2247.800099][ T5491] do_syscall_64+0x103/0x610 [ 2247.804726][ T5491] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2247.810619][ T5491] RIP: 0033:0x45b69a [ 2247.814520][ T5491] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2247.834651][ T5491] RSP: 002b:00007f67d8ff2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2247.843060][ T5491] RAX: ffffffffffffffda RBX: 00007f67d8ff2b40 RCX: 000000000045b69a [ 2247.851048][ T5491] RDX: 00007f67d8ff2ae0 RSI: 00000000200002c0 RDI: 00007f67d8ff2b00 [ 2247.859368][ T5491] RBP: 0000000000000000 R08: 00007f67d8ff2b40 R09: 00007f67d8ff2ae0 03:36:28 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:28 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6488]}}}}}}}}, 0x0) 03:36:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\xe1', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:28 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) syz_init_net_socket$ax25(0x3, 0x3, 0xcb) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) [ 2247.867425][ T5491] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 2247.875485][ T5491] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000004 03:36:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfo\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:36:29 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:29 executing program 3 (fault-call:2 fault-nth:72): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:36:29 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) fcntl$getflags(r0, 0x408) 03:36:29 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800]}}}}}}}}, 0x0) 03:36:29 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:29 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)=0xffffffab) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x101000, 0x0) getsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f00000000c0), &(0x7f0000000140)=0x4) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x6, 0x111001) ioctl$SG_GET_PACK_ID(r2, 0x227c, &(0x7f0000000040)) 03:36:29 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00]}}}}}}}}, 0x0) 03:36:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\xf0', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2248.210560][ T5524] FAULT_INJECTION: forcing a failure. [ 2248.210560][ T5524] name failslab, interval 1, probability 0, space 0, times 0 [ 2248.265291][ T5524] CPU: 0 PID: 5524 Comm: syz-executor.3 Not tainted 5.1.0-rc6 #79 [ 2248.273143][ T5524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2248.283215][ T5524] Call Trace: [ 2248.286518][ T5524] dump_stack+0x172/0x1f0 [ 2248.290855][ T5524] should_fail.cold+0xa/0x15 [ 2248.295455][ T5524] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2248.301261][ T5524] ? ___might_sleep+0x163/0x280 [ 2248.306118][ T5524] __should_failslab+0x121/0x190 [ 2248.311062][ T5524] should_failslab+0x9/0x14 [ 2248.315575][ T5524] kmem_cache_alloc_trace+0x2d1/0x760 [ 2248.320992][ T5524] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2248.326804][ T5524] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2248.332443][ T5524] __list_lru_init+0x3cf/0x6e0 [ 2248.337213][ T5524] alloc_super+0x78d/0x890 [ 2248.341627][ T5524] ? test_single_super+0x10/0x10 [ 2248.346648][ T5524] sget_userns+0xf1/0x560 [ 2248.350982][ T5524] ? kill_litter_super+0x60/0x60 [ 2248.355927][ T5524] ? test_single_super+0x10/0x10 [ 2248.360882][ T5524] ? kill_litter_super+0x60/0x60 [ 2248.365908][ T5524] sget+0x10c/0x150 [ 2248.369719][ T5524] mount_bdev+0xff/0x3c0 [ 2248.373987][ T5524] ? finish_unfinished+0x1120/0x1120 [ 2248.379277][ T5524] get_super_block+0x35/0x40 [ 2248.383974][ T5524] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2248.388993][ T5524] legacy_get_tree+0xf2/0x200 [ 2248.395885][ T5524] vfs_get_tree+0x123/0x450 [ 2248.400390][ T5524] do_mount+0x1436/0x2c40 [ 2248.404805][ T5524] ? copy_mount_string+0x40/0x40 [ 2248.413071][ T5524] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2248.422524][ T5524] ? copy_mount_options+0x280/0x3a0 [ 2248.427727][ T5524] ksys_mount+0xdb/0x150 [ 2248.432056][ T5524] __x64_sys_mount+0xbe/0x150 [ 2248.436735][ T5524] do_syscall_64+0x103/0x610 [ 2248.441337][ T5524] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2248.447309][ T5524] RIP: 0033:0x45b69a [ 2248.451200][ T5524] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2248.471002][ T5524] RSP: 002b:00007f67d8ff2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2248.479410][ T5524] RAX: ffffffffffffffda RBX: 00007f67d8ff2b40 RCX: 000000000045b69a [ 2248.487379][ T5524] RDX: 00007f67d8ff2ae0 RSI: 00000000200002c0 RDI: 00007f67d8ff2b00 [ 2248.495347][ T5524] RBP: 0000000000000000 R08: 00007f67d8ff2b40 R09: 00007f67d8ff2ae0 [ 2248.503319][ T5524] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 03:36:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfp\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) [ 2248.511291][ T5524] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000004 03:36:29 executing program 1: r0 = socket$pptp(0x18, 0x1, 0x2) statfs(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/84) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000080)=@req={0x28, &(0x7f0000000040)={'bcsh0\x00', @ifru_data=&(0x7f0000000000)="da23d4296f13025c82f0aaed425ac3800cdbed1ee6ce48d71ddd94781402adbd"}}) r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x5, 0x200000) symlinkat(&(0x7f00000001c0)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, 0x0, &(0x7f0000000100)) 03:36:29 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:29 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400]}}}}}}}}, 0x0) 03:36:29 executing program 3 (fault-call:2 fault-nth:73): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:36:29 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00]}}}}}}}}, 0x0) 03:36:29 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:29 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xbf3, 0x80) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)=0x0) getpriority(0x2, r2) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000040)=""/13) 03:36:29 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:29 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800e]}}}}}}}}, 0x0) 03:36:29 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = ioctl$TIOCGPTPEER(0xffffffffffffff9c, 0x5441, 0x2) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000000)={0x9, 0x7, 0x4}) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000040)) 03:36:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\xfb', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2248.915123][ T5564] FAULT_INJECTION: forcing a failure. [ 2248.915123][ T5564] name failslab, interval 1, probability 0, space 0, times 0 [ 2248.973998][ T5564] CPU: 1 PID: 5564 Comm: syz-executor.3 Not tainted 5.1.0-rc6 #79 [ 2248.981836][ T5564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2248.991901][ T5564] Call Trace: [ 2248.995202][ T5564] dump_stack+0x172/0x1f0 [ 2248.999709][ T5564] should_fail.cold+0xa/0x15 [ 2249.004304][ T5564] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2249.010119][ T5564] ? ___might_sleep+0x163/0x280 [ 2249.015064][ T5564] __should_failslab+0x121/0x190 [ 2249.020000][ T5564] should_failslab+0x9/0x14 [ 2249.024511][ T5564] kmem_cache_alloc_trace+0x2d1/0x760 [ 2249.029929][ T5564] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2249.035873][ T5564] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2249.041518][ T5564] __list_lru_init+0x3cf/0x6e0 [ 2249.046292][ T5564] alloc_super+0x78d/0x890 [ 2249.050723][ T5564] ? test_single_super+0x10/0x10 [ 2249.055668][ T5564] sget_userns+0xf1/0x560 [ 2249.060003][ T5564] ? kill_litter_super+0x60/0x60 [ 2249.064940][ T5564] ? test_single_super+0x10/0x10 [ 2249.069876][ T5564] ? kill_litter_super+0x60/0x60 [ 2249.074826][ T5564] sget+0x10c/0x150 [ 2249.078644][ T5564] mount_bdev+0xff/0x3c0 [ 2249.082887][ T5564] ? finish_unfinished+0x1120/0x1120 [ 2249.088206][ T5564] get_super_block+0x35/0x40 [ 2249.092801][ T5564] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2249.097823][ T5564] legacy_get_tree+0xf2/0x200 [ 2249.102501][ T5564] vfs_get_tree+0x123/0x450 [ 2249.107804][ T5564] do_mount+0x1436/0x2c40 [ 2249.112145][ T5564] ? copy_mount_string+0x40/0x40 [ 2249.117098][ T5564] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2249.123340][ T5564] ? copy_mount_options+0x280/0x3a0 [ 2249.128550][ T5564] ksys_mount+0xdb/0x150 [ 2249.132803][ T5564] __x64_sys_mount+0xbe/0x150 [ 2249.137569][ T5564] do_syscall_64+0x103/0x610 [ 2249.142344][ T5564] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2249.148237][ T5564] RIP: 0033:0x45b69a [ 2249.152142][ T5564] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 03:36:30 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8035]}}}}}}}}, 0x0) 03:36:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserft\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:36:30 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x480, 0x301002) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040)={0x0, 0x4}, 0x2) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, 0x0, &(0x7f0000000100)) [ 2249.172266][ T5564] RSP: 002b:00007f67d8ff2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2249.180682][ T5564] RAX: ffffffffffffffda RBX: 00007f67d8ff2b40 RCX: 000000000045b69a [ 2249.188652][ T5564] RDX: 00007f67d8ff2ae0 RSI: 00000000200002c0 RDI: 00007f67d8ff2b00 [ 2249.196636][ T5564] RBP: 0000000000000000 R08: 00007f67d8ff2b40 R09: 00007f67d8ff2ae0 [ 2249.204618][ T5564] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 2249.212589][ T5564] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000004 03:36:30 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:30 executing program 3 (fault-call:2 fault-nth:74): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:36:30 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100]}}}}}}}}, 0x0) 03:36:30 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x100000000, 0x6500) r2 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)="0046863d197b7d66ba67071462b87b4545aa4b8879cb46f69cbbe9d699e1bd942976665ed16b8ff663e463f26530e0214ea2c496a430a7f60edbaeedb8b933f083d9c746bdcf5ed53401d636e79b5c42c6713d778d00d5d120", 0x59, 0x0) keyctl$get_keyring_id(0x0, r2, 0x2) ioctl$VIDIOC_ENUM_DV_TIMINGS(r1, 0xc0945662, &(0x7f0000000040)={0xfb08, 0x0, [], {0x0, @reserved}}) 03:36:30 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) [ 2249.435704][ T5597] FAULT_INJECTION: forcing a failure. [ 2249.435704][ T5597] name failslab, interval 1, probability 0, space 0, times 0 [ 2249.457370][ T5597] CPU: 1 PID: 5597 Comm: syz-executor.3 Not tainted 5.1.0-rc6 #79 [ 2249.465204][ T5597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2249.475276][ T5597] Call Trace: [ 2249.478575][ T5597] dump_stack+0x172/0x1f0 [ 2249.482941][ T5597] should_fail.cold+0xa/0x15 [ 2249.487543][ T5597] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2249.493354][ T5597] ? ___might_sleep+0x163/0x280 [ 2249.498216][ T5597] __should_failslab+0x121/0x190 [ 2249.503251][ T5597] should_failslab+0x9/0x14 [ 2249.507757][ T5597] kmem_cache_alloc_trace+0x2d1/0x760 [ 2249.513131][ T5597] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2249.518942][ T5597] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2249.524586][ T5597] __list_lru_init+0x3cf/0x6e0 [ 2249.529538][ T5597] alloc_super+0x78d/0x890 [ 2249.534047][ T5597] ? test_single_super+0x10/0x10 [ 2249.538985][ T5597] sget_userns+0xf1/0x560 [ 2249.543323][ T5597] ? kill_litter_super+0x60/0x60 [ 2249.548702][ T5597] ? test_single_super+0x10/0x10 [ 2249.553633][ T5597] ? kill_litter_super+0x60/0x60 [ 2249.560092][ T5597] sget+0x10c/0x150 [ 2249.563903][ T5597] mount_bdev+0xff/0x3c0 [ 2249.568152][ T5597] ? finish_unfinished+0x1120/0x1120 [ 2249.573438][ T5597] get_super_block+0x35/0x40 [ 2249.578036][ T5597] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2249.583054][ T5597] legacy_get_tree+0xf2/0x200 [ 2249.587731][ T5597] vfs_get_tree+0x123/0x450 [ 2249.592250][ T5597] do_mount+0x1436/0x2c40 [ 2249.596587][ T5597] ? copy_mount_string+0x40/0x40 [ 2249.601532][ T5597] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2249.607767][ T5597] ? copy_mount_options+0x280/0x3a0 [ 2249.613070][ T5597] ksys_mount+0xdb/0x150 [ 2249.617321][ T5597] __x64_sys_mount+0xbe/0x150 [ 2249.622675][ T5597] do_syscall_64+0x103/0x610 [ 2249.627271][ T5597] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2249.633153][ T5597] RIP: 0033:0x45b69a [ 2249.637048][ T5597] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2249.656820][ T5597] RSP: 002b:00007f67d8ff2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2249.665227][ T5597] RAX: ffffffffffffffda RBX: 00007f67d8ff2b40 RCX: 000000000045b69a [ 2249.673195][ T5597] RDX: 00007f67d8ff2ae0 RSI: 00000000200002c0 RDI: 00007f67d8ff2b00 03:36:30 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8847]}}}}}}}}, 0x0) 03:36:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\xfd', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2249.681336][ T5597] RBP: 0000000000000000 R08: 00007f67d8ff2b40 R09: 00007f67d8ff2ae0 [ 2249.689488][ T5597] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 2249.697455][ T5597] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000004 03:36:30 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:30 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8848]}}}}}}}}, 0x0) 03:36:30 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000000)) 03:36:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfu\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:36:30 executing program 3 (fault-call:2 fault-nth:75): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:36:31 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8864]}}}}}}}}, 0x0) [ 2249.918951][ T5617] validate_nla: 9 callbacks suppressed [ 2249.918962][ T5617] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:36:31 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)=0x10f) 03:36:31 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:31 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8906]}}}}}}}}, 0x0) [ 2250.076001][ T5628] FAULT_INJECTION: forcing a failure. [ 2250.076001][ T5628] name failslab, interval 1, probability 0, space 0, times 0 [ 2250.083425][ T5635] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2250.141140][ T5628] CPU: 1 PID: 5628 Comm: syz-executor.3 Not tainted 5.1.0-rc6 #79 [ 2250.148984][ T5628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2250.148990][ T5628] Call Trace: [ 2250.149014][ T5628] dump_stack+0x172/0x1f0 [ 2250.149036][ T5628] should_fail.cold+0xa/0x15 [ 2250.171271][ T5628] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2250.177094][ T5628] ? ___might_sleep+0x163/0x280 [ 2250.181952][ T5628] __should_failslab+0x121/0x190 [ 2250.186896][ T5628] should_failslab+0x9/0x14 03:36:31 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x5, 0x101040) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000480)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xb008000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x328, r1, 0x101, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x80, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffffff81}]}]}, @TIPC_NLA_SOCK={0x40, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x280000}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8000}]}, @TIPC_NLA_MEDIA={0x40, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6f204dc7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffffffa2}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_BEARER={0x114, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x9, @multicast2}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x200, @empty, 0x4}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x4, @rand_addr="d96954a437a63c86415ff89fc55dd5e9", 0x80}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0xfffffffffffffffe, @mcast1, 0x4}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @empty}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x40000, @empty, 0x401}}}}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'eth', 0x3a, 'syzkaller0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @loopback}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1f}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4ff}]}, @TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x20}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x29d}]}, @TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xdd0}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0xbc, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x2, @rand_addr="bf4c41ce81d22e76fd5188b90fa778d8", 0xfffffffffffffffd}}, {0x14, 0x2, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xf}}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xf0}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x81}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x9, @mcast1, 0x3d50aa4c}}, {0x14, 0x2, @in={0x2, 0x4e24, @multicast1}}}}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'eth', 0x3a, 'netdevsim0\x00'}}]}]}, 0x328}, 0x1, 0x0, 0x0, 0x20000000}, 0x1) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, 0x0, &(0x7f0000000100)) 03:36:31 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) [ 2250.191411][ T5628] kmem_cache_alloc_trace+0x2d1/0x760 [ 2250.196801][ T5628] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2250.202618][ T5628] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2250.208259][ T5628] __list_lru_init+0x3cf/0x6e0 [ 2250.213027][ T5628] alloc_super+0x78d/0x890 [ 2250.217447][ T5628] ? test_single_super+0x10/0x10 [ 2250.222473][ T5628] sget_userns+0xf1/0x560 [ 2250.226802][ T5628] ? kill_litter_super+0x60/0x60 [ 2250.231743][ T5628] ? test_single_super+0x10/0x10 [ 2250.236674][ T5628] ? kill_litter_super+0x60/0x60 [ 2250.241611][ T5628] sget+0x10c/0x150 [ 2250.245438][ T5628] mount_bdev+0xff/0x3c0 [ 2250.249680][ T5628] ? finish_unfinished+0x1120/0x1120 [ 2250.249700][ T5628] get_super_block+0x35/0x40 [ 2250.249716][ T5628] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2250.249734][ T5628] legacy_get_tree+0xf2/0x200 [ 2250.259568][ T5628] vfs_get_tree+0x123/0x450 [ 2250.259587][ T5628] do_mount+0x1436/0x2c40 [ 2250.259611][ T5628] ? copy_mount_string+0x40/0x40 [ 2250.283012][ T5628] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2250.289253][ T5628] ? copy_mount_options+0x280/0x3a0 [ 2250.294462][ T5628] ksys_mount+0xdb/0x150 [ 2250.298706][ T5628] __x64_sys_mount+0xbe/0x150 [ 2250.303386][ T5628] do_syscall_64+0x103/0x610 [ 2250.307996][ T5628] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2250.313893][ T5628] RIP: 0033:0x45b69a [ 2250.317780][ T5628] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 03:36:31 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000]}}}}}}}}, 0x0) [ 2250.317787][ T5628] RSP: 002b:00007f67d8ff2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2250.317799][ T5628] RAX: ffffffffffffffda RBX: 00007f67d8ff2b40 RCX: 000000000045b69a [ 2250.317808][ T5628] RDX: 00007f67d8ff2ae0 RSI: 00000000200002c0 RDI: 00007f67d8ff2b00 [ 2250.317816][ T5628] RBP: 0000000000000000 R08: 00007f67d8ff2b40 R09: 00007f67d8ff2ae0 [ 2250.317825][ T5628] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 2250.317834][ T5628] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000004 03:36:31 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x410840, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x2}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000140)={r2, 0x100000000}, 0x8) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000)='SEG6\x00') [ 2250.505009][ T5639] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:36:31 executing program 3 (fault-call:2 fault-nth:76): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) [ 2250.554902][ T5652] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:36:31 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffff]}}}}}}}}, 0x0) 03:36:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfx\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:36:31 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x4002, 0x0) 03:36:31 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:31 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}}}}}}}, 0x0) [ 2250.705339][ T5656] FAULT_INJECTION: forcing a failure. [ 2250.705339][ T5656] name failslab, interval 1, probability 0, space 0, times 0 [ 2250.734739][ T5656] CPU: 1 PID: 5656 Comm: syz-executor.3 Not tainted 5.1.0-rc6 #79 [ 2250.742584][ T5656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2250.752646][ T5656] Call Trace: [ 2250.755962][ T5656] dump_stack+0x172/0x1f0 [ 2250.760306][ T5656] should_fail.cold+0xa/0x15 [ 2250.764917][ T5656] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2250.770755][ T5656] ? ___might_sleep+0x163/0x280 [ 2250.775619][ T5656] __should_failslab+0x121/0x190 [ 2250.780565][ T5656] should_failslab+0x9/0x14 [ 2250.785255][ T5656] kmem_cache_alloc_trace+0x2d1/0x760 [ 2250.790633][ T5656] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2250.796532][ T5656] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2250.802176][ T5656] __list_lru_init+0x3cf/0x6e0 [ 2250.806952][ T5656] alloc_super+0x78d/0x890 [ 2250.811371][ T5656] ? test_single_super+0x10/0x10 [ 2250.816322][ T5656] sget_userns+0xf1/0x560 [ 2250.820648][ T5656] ? kill_litter_super+0x60/0x60 [ 2250.825597][ T5656] ? test_single_super+0x10/0x10 [ 2250.830530][ T5656] ? kill_litter_super+0x60/0x60 [ 2250.835490][ T5656] sget+0x10c/0x150 [ 2250.839299][ T5656] mount_bdev+0xff/0x3c0 [ 2250.843540][ T5656] ? finish_unfinished+0x1120/0x1120 [ 2250.848835][ T5656] get_super_block+0x35/0x40 [ 2250.853425][ T5656] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2250.858455][ T5656] legacy_get_tree+0xf2/0x200 [ 2250.863145][ T5656] vfs_get_tree+0x123/0x450 [ 2250.867652][ T5656] do_mount+0x1436/0x2c40 [ 2250.871989][ T5656] ? copy_mount_string+0x40/0x40 [ 2250.876928][ T5656] ? copy_mount_options+0x1ea/0x3a0 [ 2250.882226][ T5656] ? copy_mount_options+0x1f0/0x3a0 [ 2250.887429][ T5656] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2250.893671][ T5656] ? copy_mount_options+0x280/0x3a0 [ 2250.898881][ T5656] ksys_mount+0xdb/0x150 [ 2250.903129][ T5656] __x64_sys_mount+0xbe/0x150 [ 2250.907814][ T5656] do_syscall_64+0x103/0x610 [ 2250.912413][ T5656] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2250.918305][ T5656] RIP: 0033:0x45b69a [ 2250.922194][ T5656] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2250.941890][ T5656] RSP: 002b:00007f67d8ff2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2250.950749][ T5656] RAX: ffffffffffffffda RBX: 00007f67d8ff2b40 RCX: 000000000045b69a [ 2250.950758][ T5656] RDX: 00007f67d8ff2ae0 RSI: 00000000200002c0 RDI: 00007f67d8ff2b00 [ 2250.950766][ T5656] RBP: 0000000000000000 R08: 00007f67d8ff2b40 R09: 00007f67d8ff2ae0 [ 2250.950775][ T5656] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 2250.950784][ T5656] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000004 [ 2250.952759][ T5658] REISERFS warning (device loop4): reiserfs_fill_super: Cannot allocate commit workqueue [ 2250.996523][ T5670] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:36:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:32 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000040)={0x0, 0x46, "739673964750cc43fd4c4afd8be292e5590de7000ab54770a1e25dc114f7b25e431e30e9d3865ba4883a38e73451ec6328ba7e16e8a6742bd041e4620e07a8ba40b89ff68447"}, &(0x7f00000000c0)=0x4e) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000140)={r2, 0x3, 0x7}, 0x8) 03:36:32 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}}}}}}, 0x0) 03:36:32 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:32 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}}}}}}}}, 0x0) 03:36:32 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x10000, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x7ff) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, 0x0, &(0x7f0000000100)) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0xa2040, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x82040, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe6000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="0f088a8238b4b80b008ec06359000f01be0060f20f2c7ffa0f01cf0f01c966b9b30300000f320f20c06635000000200f22c0", 0x32}], 0x1, 0x2, &(0x7f0000000140)=[@dstype3={0x7, 0xa}, @cr0={0x0, 0x6c22c40c399ebc70}], 0x2) [ 2251.185393][ T5679] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:36:32 executing program 3 (fault-call:2 fault-nth:77): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:36:32 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfy\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:36:32 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x8) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000140)={0x6, @vbi={0x6, 0x4, 0x8, 0x71717f7b, [0x707, 0x3], [0x3f], 0x2}}) 03:36:32 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}}}}}}}}, 0x0) [ 2251.345733][ T5686] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2251.349030][ T5695] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:36:32 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}}}}}}}}, 0x0) [ 2251.470838][ T5703] FAULT_INJECTION: forcing a failure. [ 2251.470838][ T5703] name failslab, interval 1, probability 0, space 0, times 0 [ 2251.503461][ T5703] CPU: 0 PID: 5703 Comm: syz-executor.3 Not tainted 5.1.0-rc6 #79 [ 2251.511480][ T5706] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2251.512505][ T5703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2251.512511][ T5703] Call Trace: [ 2251.512533][ T5703] dump_stack+0x172/0x1f0 [ 2251.512555][ T5703] should_fail.cold+0xa/0x15 [ 2251.536990][ T5703] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2251.545885][ T5703] ? ___might_sleep+0x163/0x280 [ 2251.557816][ T5703] __should_failslab+0x121/0x190 [ 2251.562748][ T5703] should_failslab+0x9/0x14 [ 2251.567250][ T5703] kmem_cache_alloc_node_trace+0x270/0x720 [ 2251.573055][ T5703] ? kmem_cache_alloc_trace+0x354/0x760 [ 2251.578773][ T5703] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2251.584594][ T5703] __kmalloc_node+0x3d/0x70 [ 2251.589097][ T5703] kvmalloc_node+0x68/0x100 [ 2251.593605][ T5703] __list_lru_init+0x4a6/0x6e0 [ 2251.598373][ T5703] alloc_super+0x78d/0x890 [ 2251.602788][ T5703] ? test_single_super+0x10/0x10 [ 2251.607904][ T5703] sget_userns+0xf1/0x560 [ 2251.612245][ T5703] ? kill_litter_super+0x60/0x60 [ 2251.617208][ T5703] ? test_single_super+0x10/0x10 [ 2251.622139][ T5703] ? kill_litter_super+0x60/0x60 [ 2251.627077][ T5703] sget+0x10c/0x150 [ 2251.630885][ T5703] mount_bdev+0xff/0x3c0 [ 2251.635131][ T5703] ? finish_unfinished+0x1120/0x1120 [ 2251.640422][ T5703] get_super_block+0x35/0x40 [ 2251.645013][ T5703] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2251.650034][ T5703] legacy_get_tree+0xf2/0x200 [ 2251.654718][ T5703] vfs_get_tree+0x123/0x450 [ 2251.659223][ T5703] do_mount+0x1436/0x2c40 [ 2251.663559][ T5703] ? copy_mount_string+0x40/0x40 [ 2251.668596][ T5703] ? copy_mount_options+0x1fb/0x3a0 [ 2251.673881][ T5703] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2251.680238][ T5703] ? copy_mount_options+0x280/0x3a0 [ 2251.685450][ T5703] ksys_mount+0xdb/0x150 [ 2251.689692][ T5703] __x64_sys_mount+0xbe/0x150 [ 2251.694370][ T5703] do_syscall_64+0x103/0x610 [ 2251.698962][ T5703] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2251.704848][ T5703] RIP: 0033:0x45b69a [ 2251.708743][ T5703] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2251.728343][ T5703] RSP: 002b:00007f67d8fd1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2251.736751][ T5703] RAX: ffffffffffffffda RBX: 00007f67d8fd1b40 RCX: 000000000045b69a [ 2251.745331][ T5703] RDX: 00007f67d8fd1ae0 RSI: 00000000200002c0 RDI: 00007f67d8fd1b00 [ 2251.753305][ T5703] RBP: 0000000000000000 R08: 00007f67d8fd1b40 R09: 00007f67d8fd1ae0 [ 2251.761803][ T5703] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 2251.769798][ T5703] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000004 [ 2251.779306][ T5711] net_ratelimit: 36 callbacks suppressed [ 2251.779315][ T5711] dccp_v6_rcv: dropped packet with invalid checksum [ 2251.794187][ T5711] dccp_v6_rcv: dropped packet with invalid checksum 03:36:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:33 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) 03:36:33 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:33 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}}}}}}}}, 0x0) 03:36:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfz\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:36:33 executing program 3 (fault-call:2 fault-nth:78): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) [ 2251.987562][ T5719] dccp_v6_rcv: dropped packet with invalid checksum [ 2252.000012][ T5720] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2252.022109][ T5719] dccp_v6_rcv: dropped packet with invalid checksum 03:36:33 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:33 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x8, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) [ 2252.059108][ T5722] FAULT_INJECTION: forcing a failure. [ 2252.059108][ T5722] name failslab, interval 1, probability 0, space 0, times 0 [ 2252.084985][ T5722] CPU: 0 PID: 5722 Comm: syz-executor.3 Not tainted 5.1.0-rc6 #79 [ 2252.092825][ T5722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2252.092831][ T5722] Call Trace: [ 2252.092857][ T5722] dump_stack+0x172/0x1f0 [ 2252.092878][ T5722] should_fail.cold+0xa/0x15 [ 2252.115299][ T5722] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2252.121145][ T5722] ? ___might_sleep+0x163/0x280 [ 2252.125998][ T5722] __should_failslab+0x121/0x190 [ 2252.130938][ T5722] should_failslab+0x9/0x14 [ 2252.135442][ T5722] kmem_cache_alloc_trace+0x2d1/0x760 [ 2252.140822][ T5722] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2252.146645][ T5722] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2252.152288][ T5722] __list_lru_init+0x3cf/0x6e0 03:36:33 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x4, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f0000000040)) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000080)=0x6) prctl$PR_SET_MM(0x23, 0xf, &(0x7f0000ffa000/0x4000)=nil) r2 = shmget(0x3, 0x2000, 0x0, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_INFO(r2, 0x3, &(0x7f0000000140)=""/27) [ 2252.157058][ T5722] alloc_super+0x78d/0x890 [ 2252.161477][ T5722] ? test_single_super+0x10/0x10 [ 2252.166420][ T5722] sget_userns+0xf1/0x560 [ 2252.170748][ T5722] ? kill_litter_super+0x60/0x60 [ 2252.175698][ T5722] ? test_single_super+0x10/0x10 [ 2252.180636][ T5722] ? kill_litter_super+0x60/0x60 [ 2252.185577][ T5722] sget+0x10c/0x150 [ 2252.189392][ T5722] mount_bdev+0xff/0x3c0 [ 2252.193632][ T5722] ? finish_unfinished+0x1120/0x1120 [ 2252.198925][ T5722] get_super_block+0x35/0x40 [ 2252.203512][ T5722] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2252.208541][ T5722] legacy_get_tree+0xf2/0x200 [ 2252.213216][ T5722] vfs_get_tree+0x123/0x450 [ 2252.217728][ T5722] do_mount+0x1436/0x2c40 [ 2252.222149][ T5722] ? copy_mount_string+0x40/0x40 [ 2252.227083][ T5722] ? copy_mount_options+0x1ea/0x3a0 [ 2252.232289][ T5722] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 2252.237849][ T5722] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2252.244084][ T5722] ? copy_mount_options+0x280/0x3a0 [ 2252.249292][ T5722] ksys_mount+0xdb/0x150 [ 2252.253623][ T5722] __x64_sys_mount+0xbe/0x150 [ 2252.258308][ T5722] do_syscall_64+0x103/0x610 [ 2252.262993][ T5722] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2252.268976][ T5722] RIP: 0033:0x45b69a [ 2252.272878][ T5722] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2252.292539][ T5722] RSP: 002b:00007f67d8ff2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2252.300955][ T5722] RAX: ffffffffffffffda RBX: 00007f67d8ff2b40 RCX: 000000000045b69a 03:36:33 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}}}}}}}}, 0x0) [ 2252.308925][ T5722] RDX: 00007f67d8ff2ae0 RSI: 00000000200002c0 RDI: 00007f67d8ff2b00 [ 2252.316901][ T5722] RBP: 0000000000000000 R08: 00007f67d8ff2b40 R09: 00007f67d8ff2ae0 [ 2252.324865][ T5722] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 2252.332834][ T5722] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000004 [ 2252.351977][ T5733] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:36:33 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) [ 2252.360419][ T5727] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:36:33 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x80, 0x0) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000040)={0x6, 0xc7d}) ioctl$KVM_ASSIGN_DEV_IRQ(r0, 0x4040ae70, &(0x7f0000000080)={0x1, 0x80000001, 0x80000000}) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000180)) [ 2252.481935][ T5742] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2252.491529][ T5743] dccp_v6_rcv: dropped packet with invalid checksum [ 2252.518325][ T5743] dccp_v6_rcv: dropped packet with invalid checksum [ 2252.621536][ T5744] REISERFS warning (device loop4): reiserfs_fill_super: Cannot allocate commit workqueue 03:36:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserf\x95\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:36:33 executing program 3 (fault-call:2 fault-nth:79): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:36:33 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:33 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}}}}}}}}, 0x0) 03:36:33 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) r1 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x7, 0x20000) getsockopt$inet_udp_int(r1, 0x11, 0x6f, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000180)=ANY=[@ANYBLOB="080000000000000000000000100000000300000000000000", @ANYRES32=r0, @ANYBLOB="00000000ffffff7f00"/28, @ANYRES32=r0, @ANYBLOB="0000000006000000000000000000", @ANYRES32=r0, @ANYBLOB='\x00'/28]) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) ioctl$VIDIOC_STREAMOFF(0xffffffffffffffff, 0x40045613, &(0x7f0000000140)=0x4) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000340)='/dev/video35\x00', 0x2, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x2000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x100) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) [ 2252.727444][ T5757] dccp_v6_rcv: dropped packet with invalid checksum [ 2252.736102][ T5756] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2252.745458][ T5757] dccp_v6_rcv: dropped packet with invalid checksum 03:36:33 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:33 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8060000]}}}}}}}}, 0x0) 03:36:33 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000000)=0xfffffffffffffff2) socket$inet6_dccp(0xa, 0x6, 0x0) [ 2252.855346][ T5761] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2252.884293][ T5763] FAULT_INJECTION: forcing a failure. [ 2252.884293][ T5763] name failslab, interval 1, probability 0, space 0, times 0 03:36:33 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) [ 2252.917092][ T5776] dccp_v6_rcv: dropped packet with invalid checksum [ 2252.931060][ T5763] CPU: 1 PID: 5763 Comm: syz-executor.3 Not tainted 5.1.0-rc6 #79 [ 2252.938890][ T5763] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2252.938896][ T5763] Call Trace: [ 2252.938920][ T5763] dump_stack+0x172/0x1f0 [ 2252.938940][ T5763] should_fail.cold+0xa/0x15 [ 2252.938964][ T5763] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2252.938985][ T5763] ? ___might_sleep+0x163/0x280 [ 2252.939003][ T5763] __should_failslab+0x121/0x190 [ 2252.939024][ T5763] should_failslab+0x9/0x14 [ 2252.949441][ T5776] dccp_v6_rcv: dropped packet with invalid checksum [ 2252.952374][ T5763] kmem_cache_alloc_node_trace+0x270/0x720 [ 2252.961274][ T5763] ? kmem_cache_alloc_trace+0x354/0x760 [ 2252.999398][ T5763] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2253.005222][ T5763] __kmalloc_node+0x3d/0x70 [ 2253.009741][ T5763] kvmalloc_node+0x68/0x100 [ 2253.014255][ T5763] __list_lru_init+0x4a6/0x6e0 [ 2253.019026][ T5763] alloc_super+0x78d/0x890 [ 2253.023466][ T5763] ? test_single_super+0x10/0x10 [ 2253.028404][ T5763] sget_userns+0xf1/0x560 [ 2253.032728][ T5763] ? kill_litter_super+0x60/0x60 [ 2253.037663][ T5763] ? test_single_super+0x10/0x10 [ 2253.042598][ T5763] ? kill_litter_super+0x60/0x60 [ 2253.047707][ T5763] sget+0x10c/0x150 [ 2253.051522][ T5763] mount_bdev+0xff/0x3c0 [ 2253.055758][ T5763] ? finish_unfinished+0x1120/0x1120 [ 2253.061044][ T5763] get_super_block+0x35/0x40 [ 2253.065633][ T5763] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2253.070741][ T5763] legacy_get_tree+0xf2/0x200 [ 2253.075423][ T5763] vfs_get_tree+0x123/0x450 [ 2253.079930][ T5763] do_mount+0x1436/0x2c40 [ 2253.084280][ T5763] ? copy_mount_string+0x40/0x40 [ 2253.089319][ T5763] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2253.095659][ T5763] ? copy_mount_options+0x280/0x3a0 [ 2253.101036][ T5763] ksys_mount+0xdb/0x150 [ 2253.105364][ T5763] __x64_sys_mount+0xbe/0x150 [ 2253.110042][ T5763] do_syscall_64+0x103/0x610 [ 2253.114642][ T5763] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2253.120533][ T5763] RIP: 0033:0x45b69a [ 2253.124427][ T5763] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2253.144304][ T5763] RSP: 002b:00007f67d8ff2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2253.152801][ T5763] RAX: ffffffffffffffda RBX: 00007f67d8ff2b40 RCX: 000000000045b69a 03:36:34 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xcc05, 0x109200) openat$cgroup(r1, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) 03:36:34 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000]}}}}}}}}, 0x0) [ 2253.161810][ T5763] RDX: 00007f67d8ff2ae0 RSI: 00000000200002c0 RDI: 00007f67d8ff2b00 [ 2253.169791][ T5763] RBP: 0000000000000000 R08: 00007f67d8ff2b40 R09: 00007f67d8ff2ae0 [ 2253.177941][ T5763] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 2253.185918][ T5763] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000004 [ 2253.300342][ T5780] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:36:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x02', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:36:34 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:34 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x408100, 0x0) ioctl$ASHMEM_GET_SIZE(r0, 0x7704, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) close(r1) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000040)={0x0, 0x2, 0x30, 0x8, 0x8}, &(0x7f0000000080)=0x18) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000000c0)={r2, 0x4}, 0x8) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)=0xfffffffffffffd7d) 03:36:34 executing program 3 (fault-call:2 fault-nth:80): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:36:34 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000]}}}}}}}}, 0x0) 03:36:34 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:34 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) [ 2253.509855][ T5796] FAULT_INJECTION: forcing a failure. [ 2253.509855][ T5796] name failslab, interval 1, probability 0, space 0, times 0 [ 2253.546047][ T5796] CPU: 0 PID: 5796 Comm: syz-executor.3 Not tainted 5.1.0-rc6 #79 [ 2253.553981][ T5796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2253.553988][ T5796] Call Trace: [ 2253.554013][ T5796] dump_stack+0x172/0x1f0 [ 2253.554036][ T5796] should_fail.cold+0xa/0x15 [ 2253.578163][ T5796] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2253.583997][ T5796] ? ___might_sleep+0x163/0x280 [ 2253.584017][ T5796] __should_failslab+0x121/0x190 [ 2253.584035][ T5796] should_failslab+0x9/0x14 [ 2253.598781][ T5796] kmem_cache_alloc_trace+0x2d1/0x760 [ 2253.604176][ T5796] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2253.604199][ T5796] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2253.604219][ T5796] __list_lru_init+0x3cf/0x6e0 [ 2253.615714][ T5796] alloc_super+0x78d/0x890 [ 2253.615731][ T5796] ? test_single_super+0x10/0x10 [ 2253.615746][ T5796] sget_userns+0xf1/0x560 [ 2253.615758][ T5796] ? kill_litter_super+0x60/0x60 [ 2253.615772][ T5796] ? test_single_super+0x10/0x10 [ 2253.615783][ T5796] ? kill_litter_super+0x60/0x60 [ 2253.615795][ T5796] sget+0x10c/0x150 [ 2253.615812][ T5796] mount_bdev+0xff/0x3c0 [ 2253.657323][ T5796] ? finish_unfinished+0x1120/0x1120 [ 2253.662632][ T5796] get_super_block+0x35/0x40 [ 2253.667222][ T5796] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2253.672267][ T5796] legacy_get_tree+0xf2/0x200 [ 2253.676945][ T5796] vfs_get_tree+0x123/0x450 [ 2253.681978][ T5796] do_mount+0x1436/0x2c40 [ 2253.686578][ T5796] ? copy_mount_string+0x40/0x40 [ 2253.691524][ T5796] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2253.697761][ T5796] ? copy_mount_options+0x280/0x3a0 [ 2253.702970][ T5796] ksys_mount+0xdb/0x150 [ 2253.707216][ T5796] __x64_sys_mount+0xbe/0x150 [ 2253.711982][ T5796] do_syscall_64+0x103/0x610 [ 2253.716587][ T5796] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2253.722479][ T5796] RIP: 0033:0x45b69a [ 2253.726374][ T5796] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2253.746280][ T5796] RSP: 002b:00007f67d8ff2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 03:36:34 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21000000]}}}}}}}}, 0x0) [ 2253.754794][ T5796] RAX: ffffffffffffffda RBX: 00007f67d8ff2b40 RCX: 000000000045b69a [ 2253.762775][ T5796] RDX: 00007f67d8ff2ae0 RSI: 00000000200002c0 RDI: 00007f67d8ff2b00 [ 2253.770918][ T5796] RBP: 0000000000000000 R08: 00007f67d8ff2b40 R09: 00007f67d8ff2ae0 [ 2253.778888][ T5796] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 2253.787386][ T5796] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000004 03:36:34 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x3) getpeername(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f0000000080)=0x80) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e20, @broadcast}], 0x10) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)=0x1c2) 03:36:34 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28000000]}}}}}}}}, 0x0) 03:36:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x03', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) [ 2253.884186][ T5802] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2254.067743][ T5820] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:36:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs ', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:35 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:35 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x2, 0x2) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000040)) 03:36:35 executing program 3 (fault-call:2 fault-nth:81): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:36:35 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}}}}}}}}, 0x0) 03:36:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x04', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:36:35 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000040)) [ 2254.308298][ T5831] FAULT_INJECTION: forcing a failure. [ 2254.308298][ T5831] name failslab, interval 1, probability 0, space 0, times 0 [ 2254.328709][ T5831] CPU: 1 PID: 5831 Comm: syz-executor.3 Not tainted 5.1.0-rc6 #79 [ 2254.336560][ T5831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2254.346649][ T5831] Call Trace: [ 2254.346678][ T5831] dump_stack+0x172/0x1f0 [ 2254.346700][ T5831] should_fail.cold+0xa/0x15 [ 2254.346720][ T5831] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2254.346739][ T5831] ? ___might_sleep+0x163/0x280 [ 2254.346756][ T5831] __should_failslab+0x121/0x190 [ 2254.346769][ T5831] should_failslab+0x9/0x14 [ 2254.346782][ T5831] kmem_cache_alloc_trace+0x2d1/0x760 [ 2254.346798][ T5831] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2254.346818][ T5831] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2254.346842][ T5831] __list_lru_init+0x3cf/0x6e0 [ 2254.404450][ T5831] alloc_super+0x78d/0x890 [ 2254.413376][ T5831] ? test_single_super+0x10/0x10 [ 2254.422074][ T5831] sget_userns+0xf1/0x560 [ 2254.426414][ T5831] ? kill_litter_super+0x60/0x60 [ 2254.431484][ T5831] ? test_single_super+0x10/0x10 [ 2254.436516][ T5831] ? kill_litter_super+0x60/0x60 [ 2254.441478][ T5831] sget+0x10c/0x150 [ 2254.445308][ T5831] mount_bdev+0xff/0x3c0 [ 2254.449571][ T5831] ? finish_unfinished+0x1120/0x1120 [ 2254.454880][ T5831] get_super_block+0x35/0x40 [ 2254.459488][ T5831] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2254.464895][ T5831] legacy_get_tree+0xf2/0x200 [ 2254.469577][ T5831] vfs_get_tree+0x123/0x450 [ 2254.474346][ T5831] do_mount+0x1436/0x2c40 [ 2254.478697][ T5831] ? copy_mount_string+0x40/0x40 [ 2254.483816][ T5831] ? _copy_from_user+0xdd/0x150 [ 2254.488768][ T5831] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2254.495013][ T5831] ? copy_mount_options+0x280/0x3a0 [ 2254.500213][ T5831] ksys_mount+0xdb/0x150 [ 2254.504459][ T5831] __x64_sys_mount+0xbe/0x150 [ 2254.509142][ T5831] do_syscall_64+0x103/0x610 [ 2254.513786][ T5831] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2254.519682][ T5831] RIP: 0033:0x45b69a [ 2254.523779][ T5831] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2254.544717][ T5831] RSP: 002b:00007f67d8ff2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 03:36:35 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:35 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43050000]}}}}}}}}, 0x0) 03:36:35 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) [ 2254.553129][ T5831] RAX: ffffffffffffffda RBX: 00007f67d8ff2b40 RCX: 000000000045b69a [ 2254.561655][ T5831] RDX: 00007f67d8ff2ae0 RSI: 00000000200002c0 RDI: 00007f67d8ff2b00 [ 2254.569638][ T5831] RBP: 0000000000000000 R08: 00007f67d8ff2b40 R09: 00007f67d8ff2ae0 [ 2254.577796][ T5831] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 2254.585889][ T5831] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000004 03:36:35 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:35 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000]}}}}}}}}, 0x0) 03:36:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:35 executing program 1: getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, 0x0, &(0x7f0000000100)) 03:36:35 executing program 3 (fault-call:2 fault-nth:82): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:36:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x05', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:36:35 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) [ 2254.972471][ T5866] FAULT_INJECTION: forcing a failure. [ 2254.972471][ T5866] name failslab, interval 1, probability 0, space 0, times 0 [ 2254.994864][ T5866] CPU: 1 PID: 5866 Comm: syz-executor.3 Not tainted 5.1.0-rc6 #79 [ 2255.002819][ T5866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2255.013153][ T5866] Call Trace: [ 2255.016480][ T5866] dump_stack+0x172/0x1f0 [ 2255.021191][ T5866] should_fail.cold+0xa/0x15 [ 2255.025823][ T5866] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2255.031751][ T5866] ? ___might_sleep+0x163/0x280 [ 2255.036718][ T5866] __should_failslab+0x121/0x190 [ 2255.042037][ T5866] should_failslab+0x9/0x14 [ 2255.046831][ T5866] kmem_cache_alloc_trace+0x2d1/0x760 [ 2255.052313][ T5866] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2255.058307][ T5866] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2255.064054][ T5866] __list_lru_init+0x3cf/0x6e0 [ 2255.068840][ T5866] alloc_super+0x78d/0x890 [ 2255.073451][ T5866] ? test_single_super+0x10/0x10 [ 2255.078497][ T5866] sget_userns+0xf1/0x560 [ 2255.082172][ T5881] validate_nla: 8 callbacks suppressed [ 2255.082182][ T5881] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2255.082831][ T5866] ? kill_litter_super+0x60/0x60 [ 2255.082849][ T5866] ? test_single_super+0x10/0x10 [ 2255.082858][ T5866] ? kill_litter_super+0x60/0x60 [ 2255.082876][ T5866] sget+0x10c/0x150 [ 2255.116272][ T5866] mount_bdev+0xff/0x3c0 [ 2255.120524][ T5866] ? finish_unfinished+0x1120/0x1120 [ 2255.125847][ T5866] get_super_block+0x35/0x40 [ 2255.130455][ T5866] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2255.135600][ T5866] legacy_get_tree+0xf2/0x200 [ 2255.140550][ T5866] vfs_get_tree+0x123/0x450 [ 2255.145066][ T5866] do_mount+0x1436/0x2c40 [ 2255.149679][ T5866] ? copy_mount_string+0x40/0x40 [ 2255.154628][ T5866] ? _copy_from_user+0xdd/0x150 [ 2255.159495][ T5866] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2255.165748][ T5866] ? copy_mount_options+0x280/0x3a0 03:36:36 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c000000]}}}}}}}}, 0x0) 03:36:36 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:36 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000040)={0x0, 0x86, "b82c257303879fe9bd220e643f3e68820bd4a6c8b335ed776afec0852dbe59b8938ff9bdb2248c3bd7f5ac1dd9e995df6cc15e14b0f88a2f6af78d9c9cddf5a4ad2546bc722908a6a703987aeb21478a28dc96caad08902d37a358929942e1a21ea60401386240c4e1631f9d75d39d7dec3c7c5ffac97cef38ae89f6c5dc2f19296728da7aab"}, &(0x7f0000000140)=0x8e) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000180)={r1, 0x30fb5990, 0x7, 0x9, 0x0, 0x2}, 0x14) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, 0x0, &(0x7f0000000100)) 03:36:36 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58000000]}}}}}}}}, 0x0) 03:36:36 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) sendmmsg(r0, &(0x7f0000000240)=[{{&(0x7f0000000000)=@caif, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="de7216bc98eae540ef3257d78e373d1a89d82572bb3e084f3eab0ddf9ae75c3d8acb378177cf11285f46263bd9c92d75ab02e59c031301a907b49c35341481197e2016ba7cb9c44365fc8e3cdf130284003a1710511a4cadb13d4a9aa18390974ad074deb7d3c060dac76ee8c7a62ab4aeed5b794bfd57b5073d623266d4638bb4600e2f0db69ebde958e6074b61b692db0f00176d42ea1a62190c8ed8b7e32f0dfcd3a2a36388e9e2dfeb", 0xab}, {&(0x7f0000000080)="78259c3dda4337027801f53a2ea3d26fc938e56fbf2812047499369cb86ca7", 0x1f}, {&(0x7f00000000c0)="98a893f208fcf840", 0x8}], 0x3}, 0x9}], 0x1, 0x84) r1 = open(&(0x7f0000000280)='./file0\x00', 0x8000, 0x100) setsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f00000002c0), 0x4) 03:36:36 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) [ 2255.170963][ T5866] ksys_mount+0xdb/0x150 [ 2255.175227][ T5866] __x64_sys_mount+0xbe/0x150 [ 2255.179921][ T5866] do_syscall_64+0x103/0x610 [ 2255.184528][ T5866] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2255.185271][ T5874] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2255.190419][ T5866] RIP: 0033:0x45b69a [ 2255.190435][ T5866] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2255.190443][ T5866] RSP: 002b:00007f67d8ff2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2255.190457][ T5866] RAX: ffffffffffffffda RBX: 00007f67d8ff2b40 RCX: 000000000045b69a [ 2255.190466][ T5866] RDX: 00007f67d8ff2ae0 RSI: 00000000200002c0 RDI: 00007f67d8ff2b00 [ 2255.190480][ T5866] RBP: 0000000000000000 R08: 00007f67d8ff2b40 R09: 00007f67d8ff2ae0 [ 2255.224357][ T5866] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 2255.224366][ T5866] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000004 03:36:36 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000]}}}}}}}}, 0x0) [ 2255.254850][ T5887] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2255.443982][ T5894] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:36:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x10', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:36 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:36 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffffc, 0x40000) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x81, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000080)=0xffffffffffffff2b) 03:36:36 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}}}}}}}, 0x0) 03:36:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x06', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:36:36 executing program 3 (fault-call:2 fault-nth:83): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:36:36 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x6, 0x2000) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000080)=0x10) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x22000, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, 0x0, &(0x7f00000000c0)=0x89) [ 2255.583032][ T5905] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2255.601910][ T5904] FAULT_INJECTION: forcing a failure. [ 2255.601910][ T5904] name failslab, interval 1, probability 0, space 0, times 0 [ 2255.633511][ T5904] CPU: 1 PID: 5904 Comm: syz-executor.3 Not tainted 5.1.0-rc6 #79 [ 2255.641357][ T5904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2255.651419][ T5904] Call Trace: [ 2255.654733][ T5904] dump_stack+0x172/0x1f0 [ 2255.659087][ T5904] should_fail.cold+0xa/0x15 [ 2255.663700][ T5904] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2255.669528][ T5904] ? ___might_sleep+0x163/0x280 [ 2255.674416][ T5904] __should_failslab+0x121/0x190 [ 2255.679366][ T5904] should_failslab+0x9/0x14 [ 2255.683884][ T5904] kmem_cache_alloc_trace+0x2d1/0x760 [ 2255.689271][ T5904] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2255.695100][ T5904] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2255.700753][ T5904] __list_lru_init+0x3cf/0x6e0 [ 2255.705538][ T5904] alloc_super+0x78d/0x890 [ 2255.709967][ T5904] ? test_single_super+0x10/0x10 [ 2255.714915][ T5904] sget_userns+0xf1/0x560 [ 2255.719250][ T5904] ? kill_litter_super+0x60/0x60 [ 2255.724181][ T5904] ? test_single_super+0x10/0x10 [ 2255.724194][ T5904] ? kill_litter_super+0x60/0x60 [ 2255.724207][ T5904] sget+0x10c/0x150 [ 2255.724225][ T5904] mount_bdev+0xff/0x3c0 [ 2255.724240][ T5904] ? finish_unfinished+0x1120/0x1120 [ 2255.724258][ T5904] get_super_block+0x35/0x40 [ 2255.752075][ T5904] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2255.757101][ T5904] legacy_get_tree+0xf2/0x200 [ 2255.761794][ T5904] vfs_get_tree+0x123/0x450 [ 2255.766311][ T5904] do_mount+0x1436/0x2c40 [ 2255.770655][ T5904] ? copy_mount_string+0x40/0x40 [ 2255.775591][ T5904] ? _copy_from_user+0xdd/0x150 [ 2255.780476][ T5904] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2255.786733][ T5904] ? copy_mount_options+0x280/0x3a0 [ 2255.791953][ T5904] ksys_mount+0xdb/0x150 [ 2255.796216][ T5904] __x64_sys_mount+0xbe/0x150 [ 2255.800904][ T5904] do_syscall_64+0x103/0x610 [ 2255.805553][ T5904] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2255.811452][ T5904] RIP: 0033:0x45b69a 03:36:36 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c000000]}}}}}}}}, 0x0) 03:36:36 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:36 executing program 1: r0 = socket$nl_crypto(0x10, 0x3, 0x15) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, 0x0, &(0x7f0000000100)) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x400, 0x0) [ 2255.815355][ T5904] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2255.834967][ T5904] RSP: 002b:00007f67d8ff2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2255.843473][ T5904] RAX: ffffffffffffffda RBX: 00007f67d8ff2b40 RCX: 000000000045b69a [ 2255.851445][ T5904] RDX: 00007f67d8ff2ae0 RSI: 00000000200002c0 RDI: 00007f67d8ff2b00 [ 2255.859422][ T5904] RBP: 0000000000000000 R08: 00007f67d8ff2b40 R09: 00007f67d8ff2ae0 [ 2255.867435][ T5904] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 2255.875407][ T5904] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000004 03:36:37 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x119000) ioctl$KVM_CHECK_EXTENSION_VM(r1, 0xae03, 0x9) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) prctl$PR_GET_DUMPABLE(0x3) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r1) 03:36:37 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74000000]}}}}}}}}, 0x0) [ 2255.950179][ T5923] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:36:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:37 executing program 3 (fault-call:2 fault-nth:84): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:36:37 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\a', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:36:37 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) writev(r0, &(0x7f0000000440)=[{&(0x7f0000000140)="3cdd27f4d8c2959e84ccba4ec10a6a6075cefaee3fa1cb05", 0x18}, {&(0x7f0000000180)="5d0d8480dc87c45c43718b359a9c60714f676148f2a4eb8fe6e21c29dddd08898373bc45e3053a43d572c871687d8ec04db2653db3829c6e8df3d75b713773bde03492001bd54ed351546b73edc7b6151d54db814e662f93df80cd6abffaef426751f0fdf9d151ce9cbfe5c3c3040481120fc7ac4d3c854bed1920ef7983eeb00f2457d31532b00a90a33c1edb7fb9ab3c3d9b38030eec7975c9c60fd198051b7cb41707ae4974d83cff70015b22added0b945b7b9", 0xb5}, {&(0x7f0000000240)="6a72bbcd3c040e108ec94d3d5bbbda6d94badd44fb0c9fbbb7bd17698c66fc0f22b888324ca03af5aae01c91e859060d094dd92a0b1afc44df4f6fc0363f9419f10eba939ad139287150c34d5bd8a28c1f4bdfec99d303f861c734190159e91546d242579939c37376132025ff6913753c9abca7ee9ecbc7770f4e6e57d4789b3759e7edf7fc9175018a9e2f09c8d4d7fc574f78d88b5f4c2ddff69aa3615e43a5c1aba1d8cfda3e6463c27f33c53cc096bbb0fa35fee3c17b1b9dab67c8c80bc44dc7888a166aef40250e9b5a60502d24f1d65025d431bc6eacb478c1db54f7", 0xe0}, {&(0x7f0000000340)="1a7c0a96c22507f8275896d6ff04f56d5ee507707e54967eda5baa44905a78d99326f1c8868604e1e4ff298332fee2eb4981be705ff998a69a7da6246ba43efb2761eedc357bc8b88dad72eabdd93a49ed6d534ae2bb879c129043f2a548075bdf271d4d57975828cc669c8b21e14daaf66e6a5a2761d1a0db79f4e2b8961af099e2d0f625944fea078df4ed07ff1a4753143030c314b415f5718f07f5b92956e5715e6b991f4df967aa34fb6d73f9ee8571c3b6df360cf4ffa5d7c3c3179d2255210b40bd59b15fd22268bda1b530f7463d38", 0xd3}], 0x4) r1 = accept4(r0, &(0x7f0000000480)=@pptp={0x18, 0x2, {0x0, @empty}}, &(0x7f0000000500)=0x80, 0x800) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x202}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x7c, r2, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffffffffffffffff}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x6c}]}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000c0}, 0x10) r3 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x20, 0x400) write$P9_RREAD(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="7f000000750100740000005feba5828bade3acb9776e8a0410c4884d93f44e26dba43045fe4e789c1042935461ff6ea24be88e0e2fa73e4eed7b2e8c8956abec2730fa5a50d74863e30ff789bc292403a1848ecb602c0b7d0374f788908001abb73ec6ebab1f389391bd5e5ad22ba306fe7683a6b855293c43f76579b62b97"], 0x7f) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x111) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000580)=0x28d, 0x4) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f0000000080)={0x1, 0xb, 0x4, 0x200e001, {0x77359400}, {0x5, 0x0, 0x6, 0xfffffffffffffff7, 0x7ff, 0x8, "0afba4b9"}, 0x6, 0x3, @fd=r4, 0x4}) 03:36:37 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a000000]}}}}}}}}, 0x0) 03:36:37 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800e0000]}}}}}}}}, 0x0) [ 2256.215963][ T5938] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2256.236321][ T5943] FAULT_INJECTION: forcing a failure. [ 2256.236321][ T5943] name failslab, interval 1, probability 0, space 0, times 0 [ 2256.262108][ T5943] CPU: 0 PID: 5943 Comm: syz-executor.3 Not tainted 5.1.0-rc6 #79 [ 2256.269946][ T5943] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2256.269951][ T5943] Call Trace: [ 2256.269976][ T5943] dump_stack+0x172/0x1f0 [ 2256.269997][ T5943] should_fail.cold+0xa/0x15 [ 2256.270018][ T5943] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2256.292279][ T5943] ? ___might_sleep+0x163/0x280 [ 2256.303178][ T5943] __should_failslab+0x121/0x190 [ 2256.308216][ T5943] should_failslab+0x9/0x14 [ 2256.312990][ T5943] kmem_cache_alloc_trace+0x2d1/0x760 [ 2256.318388][ T5943] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2256.324298][ T5943] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2256.329959][ T5943] __list_lru_init+0x3cf/0x6e0 [ 2256.334754][ T5943] alloc_super+0x78d/0x890 [ 2256.339273][ T5943] ? test_single_super+0x10/0x10 [ 2256.344251][ T5943] sget_userns+0xf1/0x560 [ 2256.348680][ T5943] ? kill_litter_super+0x60/0x60 [ 2256.353628][ T5943] ? test_single_super+0x10/0x10 [ 2256.358593][ T5943] ? kill_litter_super+0x60/0x60 [ 2256.363650][ T5943] sget+0x10c/0x150 [ 2256.367470][ T5943] mount_bdev+0xff/0x3c0 [ 2256.371723][ T5943] ? finish_unfinished+0x1120/0x1120 [ 2256.377101][ T5943] get_super_block+0x35/0x40 [ 2256.381696][ T5943] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2256.386718][ T5943] legacy_get_tree+0xf2/0x200 [ 2256.393582][ T5943] vfs_get_tree+0x123/0x450 [ 2256.398138][ T5943] do_mount+0x1436/0x2c40 [ 2256.402483][ T5943] ? copy_mount_string+0x40/0x40 [ 2256.407424][ T5943] ? copy_mount_options+0x1ea/0x3a0 [ 2256.412622][ T5943] ? __sanitizer_cov_trace_pc+0x2b/0x50 [ 2256.418172][ T5943] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2256.424436][ T5943] ? copy_mount_options+0x280/0x3a0 [ 2256.429645][ T5943] ksys_mount+0xdb/0x150 [ 2256.433901][ T5943] __x64_sys_mount+0xbe/0x150 [ 2256.438579][ T5943] do_syscall_64+0x103/0x610 [ 2256.443173][ T5943] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2256.449071][ T5943] RIP: 0033:0x45b69a [ 2256.453002][ T5943] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2256.472603][ T5943] RSP: 002b:00007f67d8ff2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2256.481014][ T5943] RAX: ffffffffffffffda RBX: 00007f67d8ff2b40 RCX: 000000000045b69a [ 2256.488986][ T5943] RDX: 00007f67d8ff2ae0 RSI: 00000000200002c0 RDI: 00007f67d8ff2b00 [ 2256.497069][ T5943] RBP: 0000000000000000 R08: 00007f67d8ff2b40 R09: 00007f67d8ff2ae0 [ 2256.505032][ T5943] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 03:36:37 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80350000]}}}}}}}}, 0x0) 03:36:37 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) [ 2256.513006][ T5943] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000004 03:36:37 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) [ 2256.570769][ T5944] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:36:37 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xffffffffffffffff, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) 03:36:37 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81000000]}}}}}}}}, 0x0) [ 2256.766415][ T6067] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2256.775338][ T6060] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2256.844950][ T6070] net_ratelimit: 32 callbacks suppressed [ 2256.844958][ T6070] dccp_v6_rcv: dropped packet with invalid checksum [ 2256.866722][ T6070] dccp_v6_rcv: dropped packet with invalid checksum 03:36:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:37 executing program 3 (fault-call:2 fault-nth:85): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:36:37 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x101140, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000040)={0x3, [0x0, 0x0, 0x0]}, &(0x7f00000000c0)=0x10) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000140)) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) 03:36:37 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\n', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:36:37 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff]}}}}}}}}, 0x0) [ 2256.968146][ T6076] dccp_v6_rcv: dropped packet with invalid checksum [ 2256.973742][ T6077] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:36:38 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) [ 2257.014573][ T6084] FAULT_INJECTION: forcing a failure. [ 2257.014573][ T6084] name failslab, interval 1, probability 0, space 0, times 0 [ 2257.024210][ T6076] dccp_v6_rcv: dropped packet with invalid checksum [ 2257.038760][ T6081] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2257.061374][ T6084] CPU: 0 PID: 6084 Comm: syz-executor.3 Not tainted 5.1.0-rc6 #79 [ 2257.069217][ T6084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2257.079316][ T6084] Call Trace: [ 2257.082644][ T6084] dump_stack+0x172/0x1f0 [ 2257.086981][ T6084] should_fail.cold+0xa/0x15 [ 2257.091576][ T6084] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2257.097392][ T6084] ? ___might_sleep+0x163/0x280 [ 2257.102252][ T6084] __should_failslab+0x121/0x190 [ 2257.107209][ T6084] should_failslab+0x9/0x14 [ 2257.111716][ T6084] kmem_cache_alloc_trace+0x2d1/0x760 [ 2257.117266][ T6084] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2257.123089][ T6084] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2257.128799][ T6084] __list_lru_init+0x3cf/0x6e0 [ 2257.133575][ T6084] alloc_super+0x78d/0x890 [ 2257.138192][ T6084] ? test_single_super+0x10/0x10 [ 2257.143134][ T6084] sget_userns+0xf1/0x560 [ 2257.147464][ T6084] ? kill_litter_super+0x60/0x60 [ 2257.152402][ T6084] ? test_single_super+0x10/0x10 [ 2257.157332][ T6084] ? kill_litter_super+0x60/0x60 [ 2257.162283][ T6084] sget+0x10c/0x150 [ 2257.166262][ T6084] mount_bdev+0xff/0x3c0 [ 2257.170522][ T6084] ? finish_unfinished+0x1120/0x1120 [ 2257.175809][ T6084] get_super_block+0x35/0x40 [ 2257.180416][ T6084] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2257.185437][ T6084] legacy_get_tree+0xf2/0x200 [ 2257.190117][ T6084] vfs_get_tree+0x123/0x450 [ 2257.194618][ T6084] do_mount+0x1436/0x2c40 [ 2257.198950][ T6084] ? copy_mount_string+0x40/0x40 [ 2257.203903][ T6084] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2257.210142][ T6084] ? copy_mount_options+0x280/0x3a0 [ 2257.215339][ T6084] ksys_mount+0xdb/0x150 [ 2257.219581][ T6084] __x64_sys_mount+0xbe/0x150 [ 2257.224257][ T6084] do_syscall_64+0x103/0x610 [ 2257.228858][ T6084] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2257.234977][ T6084] RIP: 0033:0x45b69a [ 2257.238883][ T6084] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2257.258490][ T6084] RSP: 002b:00007f67d8ff2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2257.266903][ T6084] RAX: ffffffffffffffda RBX: 00007f67d8ff2b40 RCX: 000000000045b69a 03:36:38 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88470000]}}}}}}}}, 0x0) 03:36:38 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000000)={'broute\x00'}, &(0x7f0000000080)=0x78) r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x9, 0x2) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x1, @empty, 0x1f}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000240)={0x3f, 0x4, 0x2, 0x6, r2}, 0x10) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r3, 0x12, 0x2, 0x0, &(0x7f0000000100)) [ 2257.274870][ T6084] RDX: 00007f67d8ff2ae0 RSI: 00000000200002c0 RDI: 00007f67d8ff2b00 [ 2257.282844][ T6084] RBP: 0000000000000000 R08: 00007f67d8ff2b40 R09: 00007f67d8ff2ae0 [ 2257.290819][ T6084] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 2257.298787][ T6084] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000004 03:36:38 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) [ 2257.352554][ T6090] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:36:38 executing program 3 (fault-call:2 fault-nth:86): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) [ 2257.413841][ T6093] dccp_v6_rcv: dropped packet with invalid checksum [ 2257.446221][ T6093] dccp_v6_rcv: dropped packet with invalid checksum [ 2257.454525][ T6096] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:36:38 executing program 1: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x0, 0x0, 0x80000001, [], &(0x7f0000000140)={0x9f0975, 0x8000, [], @p_u8=&(0x7f0000000040)}}) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, 0x0, &(0x7f0000000100)) [ 2257.489576][ T6100] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2257.604355][ T6107] FAULT_INJECTION: forcing a failure. [ 2257.604355][ T6107] name failslab, interval 1, probability 0, space 0, times 0 [ 2257.617904][ T6107] CPU: 1 PID: 6107 Comm: syz-executor.3 Not tainted 5.1.0-rc6 #79 [ 2257.625732][ T6107] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2257.635808][ T6107] Call Trace: [ 2257.639109][ T6107] dump_stack+0x172/0x1f0 [ 2257.643447][ T6107] should_fail.cold+0xa/0x15 [ 2257.648395][ T6107] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2257.654213][ T6107] ? ___might_sleep+0x163/0x280 [ 2257.659073][ T6107] __should_failslab+0x121/0x190 [ 2257.664012][ T6107] should_failslab+0x9/0x14 [ 2257.668628][ T6107] kmem_cache_alloc_trace+0x2d1/0x760 [ 2257.674686][ T6107] ? trace_hardirqs_on+0x67/0x230 [ 2257.679702][ T6107] ? kasan_check_read+0x11/0x20 [ 2257.684565][ T6107] alloc_workqueue+0x866/0xf00 [ 2257.689328][ T6107] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2257.695139][ T6107] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 2257.700869][ T6107] ? lockdep_init_map+0x1be/0x6d0 [ 2257.705891][ T6107] ? debug_mutex_init+0x2d/0x60 [ 2257.710748][ T6107] reiserfs_fill_super+0x369/0x2ea0 [ 2257.716045][ T6107] ? finish_unfinished+0x1120/0x1120 [ 2257.721337][ T6107] ? snprintf+0xbb/0xf0 [ 2257.725489][ T6107] ? vsprintf+0x40/0x40 [ 2257.729644][ T6107] ? wait_for_completion+0x440/0x440 [ 2257.734954][ T6107] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2257.740675][ T6107] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2257.746929][ T6107] mount_bdev+0x307/0x3c0 [ 2257.751257][ T6107] ? finish_unfinished+0x1120/0x1120 [ 2257.756548][ T6107] get_super_block+0x35/0x40 [ 2257.761144][ T6107] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2257.766199][ T6107] legacy_get_tree+0xf2/0x200 [ 2257.770880][ T6107] vfs_get_tree+0x123/0x450 [ 2257.775409][ T6107] do_mount+0x1436/0x2c40 [ 2257.779742][ T6107] ? copy_mount_string+0x40/0x40 [ 2257.784684][ T6107] ? _copy_from_user+0xdd/0x150 [ 2257.789543][ T6107] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2257.795793][ T6107] ? copy_mount_options+0x280/0x3a0 [ 2257.800995][ T6107] ksys_mount+0xdb/0x150 [ 2257.805252][ T6107] __x64_sys_mount+0xbe/0x150 [ 2257.809932][ T6107] do_syscall_64+0x103/0x610 [ 2257.814617][ T6107] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2257.820593][ T6107] RIP: 0033:0x45b69a [ 2257.824508][ T6107] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2257.844467][ T6107] RSP: 002b:00007f67d8ff2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2257.852887][ T6107] RAX: ffffffffffffffda RBX: 00007f67d8ff2b40 RCX: 000000000045b69a [ 2257.860862][ T6107] RDX: 00007f67d8ff2ae0 RSI: 00000000200002c0 RDI: 00007f67d8ff2b00 [ 2257.868941][ T6107] RBP: 0000000000000000 R08: 00007f67d8ff2b40 R09: 00007f67d8ff2ae0 [ 2257.876914][ T6107] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 2257.885072][ T6107] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000004 03:36:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:38 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88480000]}}}}}}}}, 0x0) 03:36:38 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfsH', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:36:38 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) llistxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/238, 0xee) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x20000, 0x0) write$P9_RXATTRWALK(r0, &(0x7f0000000180)={0xf, 0x1f, 0x1, 0x4}, 0xf) [ 2257.900253][ T6107] REISERFS warning (device loop3): reiserfs_fill_super: Cannot allocate commit workqueue 03:36:39 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x2) 03:36:39 executing program 3 (fault-call:2 fault-nth:87): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) [ 2257.996495][ T6116] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2258.015613][ T6119] dccp_v6_rcv: dropped packet with invalid checksum 03:36:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) [ 2258.046804][ T6119] dccp_v6_rcv: dropped packet with invalid checksum 03:36:39 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88640000]}}}}}}}}, 0x0) [ 2258.121977][ T6127] FAULT_INJECTION: forcing a failure. [ 2258.121977][ T6127] name failslab, interval 1, probability 0, space 0, times 0 [ 2258.144912][ T6127] CPU: 1 PID: 6127 Comm: syz-executor.3 Not tainted 5.1.0-rc6 #79 [ 2258.152786][ T6127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2258.162843][ T6127] Call Trace: [ 2258.166162][ T6127] dump_stack+0x172/0x1f0 [ 2258.170498][ T6127] should_fail.cold+0xa/0x15 [ 2258.175102][ T6127] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2258.180914][ T6127] ? ___might_sleep+0x163/0x280 [ 2258.185785][ T6127] __should_failslab+0x121/0x190 [ 2258.190722][ T6127] should_failslab+0x9/0x14 [ 2258.195235][ T6127] kmem_cache_alloc_trace+0x2d1/0x760 [ 2258.200611][ T6127] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2258.206423][ T6127] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2258.212234][ T6127] __list_lru_init+0x3cf/0x6e0 [ 2258.217003][ T6127] alloc_super+0x78d/0x890 [ 2258.221454][ T6127] ? test_single_super+0x10/0x10 [ 2258.226432][ T6127] sget_userns+0xf1/0x560 [ 2258.230788][ T6127] ? kill_litter_super+0x60/0x60 [ 2258.235740][ T6127] ? test_single_super+0x10/0x10 [ 2258.240679][ T6127] ? kill_litter_super+0x60/0x60 [ 2258.245702][ T6127] sget+0x10c/0x150 [ 2258.249521][ T6127] mount_bdev+0xff/0x3c0 [ 2258.253768][ T6127] ? finish_unfinished+0x1120/0x1120 [ 2258.259065][ T6127] get_super_block+0x35/0x40 [ 2258.263656][ T6127] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2258.268698][ T6127] legacy_get_tree+0xf2/0x200 [ 2258.273485][ T6127] vfs_get_tree+0x123/0x450 [ 2258.278001][ T6127] do_mount+0x1436/0x2c40 [ 2258.282347][ T6127] ? copy_mount_string+0x40/0x40 [ 2258.287293][ T6127] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2258.293530][ T6127] ? copy_mount_options+0x280/0x3a0 [ 2258.298749][ T6127] ksys_mount+0xdb/0x150 [ 2258.302994][ T6127] __x64_sys_mount+0xbe/0x150 [ 2258.307782][ T6127] do_syscall_64+0x103/0x610 [ 2258.312373][ T6127] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2258.318264][ T6127] RIP: 0033:0x45b69a [ 2258.322161][ T6127] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2258.341857][ T6127] RSP: 002b:00007f67d8ff2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2258.350372][ T6127] RAX: ffffffffffffffda RBX: 00007f67d8ff2b40 RCX: 000000000045b69a [ 2258.358352][ T6127] RDX: 00007f67d8ff2ae0 RSI: 00000000200002c0 RDI: 00007f67d8ff2b00 03:36:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:39 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) ioctl$UI_SET_PHYS(r1, 0x4008556c, &(0x7f0000000040)='syz1\x00') getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)=0x59b) [ 2258.366457][ T6127] RBP: 0000000000000000 R08: 00007f67d8ff2b40 R09: 00007f67d8ff2ae0 [ 2258.374438][ T6127] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 2258.382415][ T6127] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000004 [ 2258.399984][ T6120] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:36:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfsL', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) [ 2258.464671][ T6140] dccp_v6_rcv: dropped packet with invalid checksum [ 2258.499372][ T6140] dccp_v6_rcv: dropped packet with invalid checksum [ 2258.568880][ T6143] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:36:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:39 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x803) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0xffffffffffff0000, 0x4d4e}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000000c0)={r2, 0x1}, &(0x7f0000000140)=0x8) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) 03:36:39 executing program 3 (fault-call:2 fault-nth:88): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:36:39 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff]}}}}}}}}, 0x0) 03:36:39 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) r2 = add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="bfdf1e5469ba70f2c1558bfe5dcdaa19e69ecd5eebb9587dc2495fad5768feca78b4a70aad5c4ec69ab693f9274ef93a51d13cbb205513a616fab70b0578528a84e37ce136d263f2bdb8596e64c8dc6ffcd524392810fab3efe338cc47223dd28c2bb30a460139730238108bb0a44eb9dd3411527f6779612bb0b97acc8c9497fb3a47a6cba1687e0b7b9ebb34d2d32e62a7b45828c98733d174679761c7c5865d84f085b85271b970749587f3f95b3c07af813805a40019", 0xb8, 0xfffffffffffffff9) socket$unix(0x1, 0x5, 0x0) keyctl$instantiate_iov(0x14, r1, &(0x7f00000000c0)=[{&(0x7f0000000140)="cc540d1f776e99c2fd07cd6d27a631736f5ceb36ef17cd2e44aae604e35a2ad3066b4e40ebe78c69f0b1520ad5d63670e10e754439d4e224b45b9f918f3b3d12deca6f41966709a7be3e8717c4a631c5ddf314efbb35b529cd3cb1e5c836f1c2000deebd0c968925db356dafdd6ff2ab49ce28e846dab0194ca60b43cad9900a9a43a471656c61fbfb30cff0f8d02b85430ad53de0758b0204792a37c1919c2c6869a833997b8406cf4266bd972a3c99488d4b4b949835c02df7eccdce4dadb0fa7eabcee573cfa796b9ddb2534719fb580ba01eb33af419988c1ceb36dfc78cb1e1eb2680b935ba955cd0a9499bc50fc27dc4", 0xf3}, {&(0x7f0000000080)="1763dc60db823f70d51941e950fd3facfd8cc8d7c3fd2914c40372b3f1b4", 0x1e}, {&(0x7f0000000240)="1b5946947128e7ade6e10b1dc5b7a71e44c97e11d05d2c3875de7c25357e1bc8efa93387944bf4bb4e0e538af491ff0d86350fcf6bc5ef6b773902c563f268b502799412ccd1c5a12fc46e5fa10f05cda79863950700dcb30f7d4ca9b06ed156f4799792a7d50abdacbf8e995a7f8300fd8937e5f8936189cdf1852e1e53dd3146313bad123faeb794de09a0075185b4fc53be37e3250f99218ba67493048191cdc95fe7411e8515b0f004311ffc376234131b98891ae283779d414c8a579f2f290bfcc0df12a31aafaac20430eac458d2f39fa25a33fc51648254bef62770aff763", 0xe2}], 0x3, r2) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) 03:36:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:39 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88caffff]}}}}}}}}, 0x0) 03:36:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs`', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) [ 2258.856026][ T6157] FAULT_INJECTION: forcing a failure. [ 2258.856026][ T6157] name failslab, interval 1, probability 0, space 0, times 0 [ 2258.875357][ T6161] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:36:39 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x89060000]}}}}}}}}, 0x0) 03:36:39 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x1f, 0x20800) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000000)=0x34e) [ 2258.901743][ T6157] CPU: 1 PID: 6157 Comm: syz-executor.3 Not tainted 5.1.0-rc6 #79 [ 2258.909657][ T6157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2258.909664][ T6157] Call Trace: [ 2258.909698][ T6157] dump_stack+0x172/0x1f0 [ 2258.909719][ T6157] should_fail.cold+0xa/0x15 [ 2258.932952][ T6157] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2258.938771][ T6157] ? ___might_sleep+0x163/0x280 [ 2258.938792][ T6157] __should_failslab+0x121/0x190 [ 2258.948641][ T6157] should_failslab+0x9/0x14 [ 2258.948659][ T6157] kmem_cache_alloc_trace+0x2d1/0x760 [ 2258.948693][ T6157] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2258.958532][ T6157] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2258.958551][ T6157] __list_lru_init+0x3cf/0x6e0 [ 2258.958566][ T6157] alloc_super+0x78d/0x890 [ 2258.958580][ T6157] ? test_single_super+0x10/0x10 [ 2258.958593][ T6157] sget_userns+0xf1/0x560 [ 2258.958610][ T6157] ? kill_litter_super+0x60/0x60 [ 2258.993325][ T6157] ? test_single_super+0x10/0x10 [ 2258.998275][ T6157] ? kill_litter_super+0x60/0x60 03:36:40 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) [ 2259.003307][ T6157] sget+0x10c/0x150 [ 2259.007125][ T6157] mount_bdev+0xff/0x3c0 [ 2259.011396][ T6157] ? finish_unfinished+0x1120/0x1120 [ 2259.016716][ T6157] get_super_block+0x35/0x40 [ 2259.021312][ T6157] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2259.026342][ T6157] legacy_get_tree+0xf2/0x200 [ 2259.031023][ T6157] vfs_get_tree+0x123/0x450 [ 2259.035529][ T6157] do_mount+0x1436/0x2c40 [ 2259.039864][ T6157] ? copy_mount_string+0x40/0x40 [ 2259.044800][ T6157] ? _copy_from_user+0xdd/0x150 [ 2259.049656][ T6157] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2259.055907][ T6157] ? copy_mount_options+0x280/0x3a0 [ 2259.061132][ T6157] ksys_mount+0xdb/0x150 [ 2259.065400][ T6157] __x64_sys_mount+0xbe/0x150 [ 2259.070195][ T6157] do_syscall_64+0x103/0x610 [ 2259.074801][ T6157] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2259.080778][ T6157] RIP: 0033:0x45b69a [ 2259.084684][ T6157] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2259.104459][ T6157] RSP: 002b:00007f67d8ff2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2259.112953][ T6157] RAX: ffffffffffffffda RBX: 00007f67d8ff2b40 RCX: 000000000045b69a [ 2259.120922][ T6157] RDX: 00007f67d8ff2ae0 RSI: 00000000200002c0 RDI: 00007f67d8ff2b00 [ 2259.128975][ T6157] RBP: 0000000000000000 R08: 00007f67d8ff2b40 R09: 00007f67d8ff2ae0 [ 2259.137027][ T6157] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 2259.144997][ T6157] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000004 [ 2259.311514][ T6183] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:36:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:40 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:40 executing program 1: getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, 0x0, &(0x7f0000000100)) 03:36:40 executing program 3 (fault-call:2 fault-nth:89): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:36:40 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff]}}}}}}}}, 0x0) 03:36:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfsh', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:36:40 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='system.sockprotoname\x00', &(0x7f0000000140)=""/146, 0x92) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) 03:36:40 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff]}}}}}}}}, 0x0) 03:36:40 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) [ 2259.562869][ T6191] FAULT_INJECTION: forcing a failure. [ 2259.562869][ T6191] name failslab, interval 1, probability 0, space 0, times 0 [ 2259.600744][ T6191] CPU: 1 PID: 6191 Comm: syz-executor.3 Not tainted 5.1.0-rc6 #79 03:36:40 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x100) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e24, @rand_addr=0x469}}, 0x8, 0xec, 0xfffffffffffffffd, 0x6, 0x90}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000180)={r2, 0x10000, 0x200, 0x1, 0x720, 0x401}, &(0x7f00000001c0)=0x14) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) [ 2259.608600][ T6191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2259.618671][ T6191] Call Trace: [ 2259.621984][ T6191] dump_stack+0x172/0x1f0 [ 2259.626335][ T6191] should_fail.cold+0xa/0x15 [ 2259.630959][ T6191] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2259.636791][ T6191] ? ___might_sleep+0x163/0x280 [ 2259.642018][ T6191] __should_failslab+0x121/0x190 [ 2259.647099][ T6191] should_failslab+0x9/0x14 [ 2259.651629][ T6191] kmem_cache_alloc_trace+0x2d1/0x760 [ 2259.657014][ T6191] ? reacquire_held_locks+0xfb/0x520 [ 2259.662313][ T6191] ? alloc_super+0x158/0x890 [ 2259.667009][ T6191] reiserfs_fill_super+0xfe/0x2ea0 [ 2259.672133][ T6191] ? finish_unfinished+0x1120/0x1120 [ 2259.677431][ T6191] ? snprintf+0xbb/0xf0 [ 2259.681588][ T6191] ? vsprintf+0x40/0x40 [ 2259.685762][ T6191] ? wait_for_completion+0x440/0x440 [ 2259.691055][ T6191] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2259.696790][ T6191] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2259.703128][ T6191] mount_bdev+0x307/0x3c0 [ 2259.707553][ T6191] ? finish_unfinished+0x1120/0x1120 [ 2259.712842][ T6191] get_super_block+0x35/0x40 [ 2259.717442][ T6191] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2259.722498][ T6191] legacy_get_tree+0xf2/0x200 [ 2259.727181][ T6191] vfs_get_tree+0x123/0x450 [ 2259.731697][ T6191] do_mount+0x1436/0x2c40 [ 2259.736039][ T6191] ? copy_mount_string+0x40/0x40 [ 2259.741301][ T6191] ? _copy_from_user+0xdd/0x150 [ 2259.746172][ T6191] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2259.752414][ T6191] ? copy_mount_options+0x280/0x3a0 [ 2259.757704][ T6191] ksys_mount+0xdb/0x150 [ 2259.761953][ T6191] __x64_sys_mount+0xbe/0x150 [ 2259.766643][ T6191] do_syscall_64+0x103/0x610 [ 2259.771248][ T6191] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2259.777135][ T6191] RIP: 0033:0x45b69a [ 2259.781033][ T6191] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2259.800727][ T6191] RSP: 002b:00007f67d8ff2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 03:36:40 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffa888]}}}}}}}}, 0x0) 03:36:40 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) [ 2259.809229][ T6191] RAX: ffffffffffffffda RBX: 00007f67d8ff2b40 RCX: 000000000045b69a [ 2259.817202][ T6191] RDX: 00007f67d8ff2ae0 RSI: 00000000200002c0 RDI: 00007f67d8ff2b00 [ 2259.825181][ T6191] RBP: 0000000000000000 R08: 00007f67d8ff2b40 R09: 00007f67d8ff2ae0 [ 2259.833156][ T6191] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 2259.841144][ T6191] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000004 [ 2259.886338][ T6205] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2260.080552][ T6220] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:36:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x01', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfsl', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:36:41 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffca88]}}}}}}}}, 0x0) 03:36:41 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:41 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x20000, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000240)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0xf8, r2, 0x428c6765dc745142, 0x70bd2a, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @local}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffffffff}, @IPVS_CMD_ATTR_DAEMON={0x5c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3f}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x5}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @broadcast}}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x12}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x597f4843}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7fff}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x5}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xe7e1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x5b}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x65}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80000001}]}, 0xf8}, 0x1, 0x0, 0x0, 0x20000000}, 0x200400c1) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) 03:36:41 executing program 3 (fault-call:2 fault-nth:90): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:36:41 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffdd86]}}}}}}}}, 0x0) 03:36:41 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x1) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000680)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1a}}, {0x2, 0x4e20, @broadcast}, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0xba, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000100)='hwsim0\x00', 0xfff, 0x1, 0x5}) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) socketpair(0x10, 0x6, 0x400, &(0x7f00000000c0)) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x4000, 0x0) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20ncci\x00', 0x200880, 0x0) r4 = dup3(r1, r1, 0x80000) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r4, 0x12, 0x2, 0x0, &(0x7f0000000140)=0xfffffffffffffdc8) r5 = dup3(r1, r1, 0x80000) write$uinput_user_dev(r2, &(0x7f0000000200)={'syz1\x00', {0x7000000000, 0x3, 0x6}, 0x23, [0x2, 0x1, 0x6, 0xd8, 0xa5, 0xffffffffffffff53, 0x800, 0x10001, 0x100000000, 0x7ff, 0x4, 0x2, 0x5, 0x1, 0x5, 0x662cffca, 0x3, 0x9, 0x100, 0x5, 0x3, 0x4, 0xfff, 0x80000000000000, 0x2, 0x80000000, 0x0, 0xdd7, 0x4, 0x2245, 0x3, 0x7, 0x0, 0x100000000, 0x1, 0x4, 0x0, 0x0, 0x9, 0x7, 0x0, 0x4, 0x6, 0xb7, 0x2, 0x5, 0x57ca700d, 0x2, 0x81, 0xc27f, 0x0, 0x6, 0x2f00, 0x1, 0x3, 0x8001, 0x3, 0x0, 0x9, 0x6, 0x3f, 0x8, 0x3, 0x4], [0x3, 0x5, 0x7, 0x82d4, 0x80000000, 0xfffffffffffffffb, 0x9df8, 0x5f0, 0x100000000, 0x1000, 0x2, 0x5cc, 0x4, 0x1, 0xfff, 0x3f, 0x55e, 0x5, 0x5, 0x6, 0x100000000, 0x0, 0x9, 0x1, 0x5, 0x8, 0x5d, 0x7f, 0x5, 0x101, 0x2, 0x7fff, 0xc71, 0x5, 0x4, 0x6, 0xfff, 0x7, 0x5, 0x3, 0x9, 0xf60b, 0x401, 0x4, 0x7fffffff, 0x7, 0x7, 0x9, 0x5d3, 0x7fffffff, 0x9, 0x2, 0x2, 0x0, 0x200, 0x749, 0x1000, 0x3, 0x8, 0x3, 0x9e, 0x101, 0x5, 0xffffffff80000001], [0x6, 0x6, 0x6d4, 0x2, 0x0, 0x400, 0xebe, 0x3, 0x4c6, 0x3f9d7b96, 0x5, 0xb452, 0x6, 0xe9bd, 0x2, 0x6, 0x8656, 0x0, 0x80, 0x308, 0x4, 0x5, 0xdb, 0xfffffffffffffff8, 0x8, 0x8, 0x8000, 0x2a, 0x7, 0x3, 0x5, 0x6, 0x84, 0x5, 0xffffffffffff8001, 0x802e, 0x8, 0x37f, 0xfffffffffffffffd, 0x3, 0x0, 0x9, 0x7, 0x0, 0x1, 0x40, 0xb17, 0x49cb2a4b, 0x100000000, 0x9, 0x6, 0x8, 0x80, 0x9, 0x9, 0x942, 0x9, 0x1, 0xb3, 0x100000000, 0xfffffffffffff7a9, 0x3e8, 0x28, 0x7], [0x6, 0x100, 0x3f, 0x5, 0x7df, 0x401, 0x20, 0x3, 0x9, 0x9, 0x8, 0x3, 0x5, 0x401, 0x80000000, 0x6, 0x4, 0x3, 0x4, 0x8, 0x9, 0xdce6, 0x60000, 0x100, 0x0, 0x3, 0x36, 0x100000001, 0x800, 0x6, 0x9, 0xc33, 0x81, 0x40, 0x1, 0x1000, 0xff, 0x401, 0x8000000000000, 0x4, 0x7, 0x0, 0x8, 0x0, 0x2, 0x400, 0x5c, 0x1ff, 0x0, 0x4ff, 0x3f, 0x2, 0x0, 0x8, 0x3f, 0x5, 0x0, 0xffffffff00000001, 0x1, 0x101, 0x200, 0x401, 0x5, 0x2]}, 0x45c) fchdir(r3) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r5, 0x800443d2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) [ 2260.257234][ T6226] validate_nla: 9 callbacks suppressed [ 2260.257244][ T6226] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:36:41 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) [ 2260.340164][ T6232] FAULT_INJECTION: forcing a failure. [ 2260.340164][ T6232] name failslab, interval 1, probability 0, space 0, times 0 [ 2260.379226][ T6232] CPU: 1 PID: 6232 Comm: syz-executor.3 Not tainted 5.1.0-rc6 #79 [ 2260.387079][ T6232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2260.398786][ T6232] Call Trace: [ 2260.402105][ T6232] dump_stack+0x172/0x1f0 [ 2260.406451][ T6232] should_fail.cold+0xa/0x15 [ 2260.411050][ T6232] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2260.417043][ T6232] ? ___might_sleep+0x163/0x280 [ 2260.421901][ T6232] __should_failslab+0x121/0x190 [ 2260.421917][ T6232] should_failslab+0x9/0x14 [ 2260.421932][ T6232] kmem_cache_alloc_trace+0x2d1/0x760 [ 2260.421953][ T6232] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2260.431482][ T6232] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2260.431503][ T6232] __list_lru_init+0x3cf/0x6e0 [ 2260.431529][ T6232] alloc_super+0x78d/0x890 [ 2260.442692][ T6232] ? test_single_super+0x10/0x10 [ 2260.442710][ T6232] sget_userns+0xf1/0x560 [ 2260.442724][ T6232] ? kill_litter_super+0x60/0x60 [ 2260.442739][ T6232] ? test_single_super+0x10/0x10 [ 2260.442754][ T6232] ? kill_litter_super+0x60/0x60 [ 2260.481513][ T6232] sget+0x10c/0x150 [ 2260.485427][ T6232] mount_bdev+0xff/0x3c0 [ 2260.489677][ T6232] ? finish_unfinished+0x1120/0x1120 [ 2260.494967][ T6232] get_super_block+0x35/0x40 [ 2260.499568][ T6232] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2260.504596][ T6232] legacy_get_tree+0xf2/0x200 [ 2260.509274][ T6232] vfs_get_tree+0x123/0x450 [ 2260.513787][ T6232] do_mount+0x1436/0x2c40 [ 2260.518382][ T6232] ? copy_mount_string+0x40/0x40 [ 2260.523341][ T6232] ? _copy_from_user+0xdd/0x150 [ 2260.528196][ T6232] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2260.534431][ T6232] ? copy_mount_options+0x280/0x3a0 [ 2260.539631][ T6232] ksys_mount+0xdb/0x150 [ 2260.543908][ T6232] __x64_sys_mount+0xbe/0x150 [ 2260.548591][ T6232] do_syscall_64+0x103/0x610 [ 2260.553184][ T6232] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2260.559076][ T6232] RIP: 0033:0x45b69a [ 2260.562973][ T6232] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2260.582570][ T6232] RSP: 002b:00007f67d8ff2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 03:36:41 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff000]}}}}}}}}, 0x0) 03:36:41 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$TIOCCBRK(r0, 0x5428) 03:36:41 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) [ 2260.590980][ T6232] RAX: ffffffffffffffda RBX: 00007f67d8ff2b40 RCX: 000000000045b69a [ 2260.599034][ T6232] RDX: 00007f67d8ff2ae0 RSI: 00000000200002c0 RDI: 00007f67d8ff2b00 [ 2260.607005][ T6232] RBP: 0000000000000000 R08: 00007f67d8ff2b40 R09: 00007f67d8ff2ae0 [ 2260.615146][ T6232] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 2260.623145][ T6232] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000004 [ 2260.814478][ T6356] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:36:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfst', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:36:41 executing program 3 (fault-call:2 fault-nth:91): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:36:41 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8d]}}}}}}}}, 0x0) 03:36:41 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x80000, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000080)={0x0, r2}) 03:36:41 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:42 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fsetxattr$security_selinux(r0, &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000040)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x8a801, 0x0) 03:36:42 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5]}}}}}}}}, 0x0) [ 2260.965631][ T6374] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2260.973986][ T6363] REISERFS warning (device loop3): super-6505 reiserfs_getopt: head of option "jdev" is only correct [ 2260.973986][ T6363] 03:36:42 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:42 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) pipe2(&(0x7f0000000000), 0x800) syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x0, 0x2) syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x2, 0x0) fcntl$dupfd(r0, 0x406, r0) r1 = dup2(r0, r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, 0x0, &(0x7f00000000c0)=0xfffffffffffffd95) 03:36:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfsz', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) [ 2261.097665][ T6363] FAULT_INJECTION: forcing a failure. [ 2261.097665][ T6363] name failslab, interval 1, probability 0, space 0, times 0 [ 2261.114697][ T6363] CPU: 0 PID: 6363 Comm: syz-executor.3 Not tainted 5.1.0-rc6 #79 [ 2261.122543][ T6363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2261.132606][ T6363] Call Trace: [ 2261.135936][ T6363] dump_stack+0x172/0x1f0 [ 2261.140272][ T6363] should_fail.cold+0xa/0x15 [ 2261.144965][ T6363] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2261.150778][ T6363] ? ___might_sleep+0x163/0x280 [ 2261.155645][ T6363] __should_failslab+0x121/0x190 [ 2261.160588][ T6363] should_failslab+0x9/0x14 [ 2261.165093][ T6363] kmem_cache_alloc_trace+0x2d1/0x760 [ 2261.170484][ T6363] kobject_uevent_env+0x2fb/0x1030 [ 2261.175614][ T6363] kobject_uevent+0x20/0x26 [ 2261.180132][ T6363] __loop_clr_fd+0x4ee/0xd60 [ 2261.184728][ T6363] lo_ioctl+0x210/0x2150 [ 2261.188978][ T6363] ? tomoyo_domain+0xc5/0x160 [ 2261.193746][ T6363] ? lo_rw_aio+0x1120/0x1120 [ 2261.198338][ T6363] blkdev_ioctl+0x6f2/0x1d10 [ 2261.202959][ T6363] ? blkpg_ioctl+0xa90/0xa90 [ 2261.207587][ T6363] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2261.213405][ T6363] ? __fget+0x35a/0x550 [ 2261.217593][ T6363] block_ioctl+0xee/0x130 [ 2261.221950][ T6363] ? blkdev_fallocate+0x410/0x410 [ 2261.226981][ T6363] do_vfs_ioctl+0xd6e/0x1390 [ 2261.231579][ T6363] ? ioctl_preallocate+0x210/0x210 [ 2261.236691][ T6363] ? __fget+0x381/0x550 [ 2261.241245][ T6363] ? ksys_dup3+0x3e0/0x3e0 [ 2261.245759][ T6363] ? kfree+0x173/0x230 [ 2261.249832][ T6363] ? kfree+0x173/0x230 [ 2261.254261][ T6363] ? tomoyo_file_ioctl+0x23/0x30 [ 2261.259298][ T6363] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2261.265541][ T6363] ? security_file_ioctl+0x93/0xc0 [ 2261.270658][ T6363] ksys_ioctl+0xab/0xd0 [ 2261.274817][ T6363] __x64_sys_ioctl+0x73/0xb0 [ 2261.279408][ T6363] do_syscall_64+0x103/0x610 [ 2261.284009][ T6363] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2261.299110][ T6363] RIP: 0033:0x458a97 [ 2261.303201][ T6363] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2261.322806][ T6363] RSP: 002b:00007f67d8ff2a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2261.331221][ T6363] RAX: ffffffffffffffda RBX: 00007f67d8ff2b40 RCX: 0000000000458a97 [ 2261.339227][ T6363] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000006 03:36:42 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffffffffff]}}}}}}}}, 0x0) [ 2261.347287][ T6363] RBP: 0000000000000000 R08: 00007f67d8ff2b40 R09: 00007f67d8ff2ae0 [ 2261.355257][ T6363] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 2261.363228][ T6363] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000004 [ 2261.421797][ T6373] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2261.432574][ T6388] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:36:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:42 executing program 3 (fault-call:2 fault-nth:92): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:36:42 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={r0}) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, 0x0, &(0x7f0000000140)=0xffffffffffffffc2) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0xc) 03:36:42 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:42 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}}}}}}, 0x0) 03:36:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs|', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) [ 2261.693771][ T6399] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:36:42 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:42 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}}}}}}}, 0x0) 03:36:42 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) r1 = accept4(r0, &(0x7f0000000000)=@isdn, &(0x7f0000000080)=0x80, 0x800) ioctl$SIOCX25GSUBSCRIP(r1, 0x89e0, &(0x7f0000000140)={'bond_slave_1\x00', 0x7f, 0xfffffffffffffe97}) [ 2261.770226][ T6406] FAULT_INJECTION: forcing a failure. [ 2261.770226][ T6406] name failslab, interval 1, probability 0, space 0, times 0 [ 2261.805025][ T6412] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2261.843848][ T6406] CPU: 1 PID: 6406 Comm: syz-executor.3 Not tainted 5.1.0-rc6 #79 [ 2261.851691][ T6406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2261.861956][ T6406] Call Trace: [ 2261.865262][ T6406] dump_stack+0x172/0x1f0 [ 2261.869634][ T6406] should_fail.cold+0xa/0x15 [ 2261.874242][ T6406] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2261.880065][ T6406] ? ___might_sleep+0x163/0x280 [ 2261.884942][ T6406] __should_failslab+0x121/0x190 [ 2261.889913][ T6406] should_failslab+0x9/0x14 [ 2261.894438][ T6406] kmem_cache_alloc_node_trace+0x270/0x720 [ 2261.900350][ T6406] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2261.905898][ T6406] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 2261.911709][ T6406] alloc_worker+0x47/0x1c0 [ 2261.916134][ T6406] init_rescuer.part.0+0x1f/0x190 [ 2261.921162][ T6406] alloc_workqueue+0x669/0xf00 [ 2261.926025][ T6406] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2261.931839][ T6406] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 2261.937561][ T6406] ? lockdep_init_map+0x1be/0x6d0 [ 2261.942589][ T6406] ? debug_mutex_init+0x2d/0x60 [ 2261.947456][ T6406] reiserfs_fill_super+0x369/0x2ea0 [ 2261.952662][ T6406] ? finish_unfinished+0x1120/0x1120 [ 2261.957957][ T6406] ? snprintf+0xbb/0xf0 [ 2261.962112][ T6406] ? vsprintf+0x40/0x40 [ 2261.966269][ T6406] ? wait_for_completion+0x440/0x440 [ 2261.971551][ T6406] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2261.977275][ T6406] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2261.983517][ T6406] mount_bdev+0x307/0x3c0 [ 2261.987845][ T6406] ? finish_unfinished+0x1120/0x1120 [ 2261.993135][ T6406] get_super_block+0x35/0x40 [ 2261.997731][ T6406] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2262.002756][ T6406] legacy_get_tree+0xf2/0x200 [ 2262.007445][ T6406] vfs_get_tree+0x123/0x450 [ 2262.011951][ T6406] do_mount+0x1436/0x2c40 [ 2262.016294][ T6406] ? copy_mount_string+0x40/0x40 [ 2262.021240][ T6406] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2262.027566][ T6406] ? copy_mount_options+0x280/0x3a0 [ 2262.032928][ T6406] ksys_mount+0xdb/0x150 [ 2262.037173][ T6406] __x64_sys_mount+0xbe/0x150 [ 2262.041861][ T6406] do_syscall_64+0x103/0x610 [ 2262.046456][ T6406] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2262.052345][ T6406] RIP: 0033:0x45b69a [ 2262.056240][ T6406] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2262.075839][ T6406] RSP: 002b:00007f67d8ff2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2262.084338][ T6406] RAX: ffffffffffffffda RBX: 00007f67d8ff2b40 RCX: 000000000045b69a 03:36:43 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}}}}}}}}, 0x0) [ 2262.092317][ T6406] RDX: 00007f67d8ff2ae0 RSI: 00000000200002c0 RDI: 00007f67d8ff2b00 [ 2262.100292][ T6406] RBP: 0000000000000000 R08: 00007f67d8ff2b40 R09: 00007f67d8ff2ae0 [ 2262.108258][ T6406] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 2262.116226][ T6406] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000004 [ 2262.125256][ T6417] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:36:43 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000140)={0x0, 0xfb, 0x1015, 0x2, 0x7, "ca984d91efa8e60fdd6a2107f26672b3", "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"}, 0x1015, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) 03:36:43 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) [ 2262.174788][ T6406] REISERFS warning (device loop3): reiserfs_fill_super: Cannot allocate commit workqueue [ 2262.197340][ T6424] net_ratelimit: 28 callbacks suppressed [ 2262.197348][ T6424] dccp_v6_rcv: dropped packet with invalid checksum [ 2262.214737][ T6424] dccp_v6_rcv: dropped packet with invalid checksum [ 2262.327452][ T6428] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2262.346312][ T6432] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:36:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:43 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}}}}}}}}, 0x0) 03:36:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\xb0', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:36:43 executing program 3 (fault-call:2 fault-nth:93): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:36:43 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:43 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)='/dev/zero\x00', r0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x400040, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x100, 0x0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r1, 0x800455d1, &(0x7f00000000c0)) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, 0x0, &(0x7f0000000000)) [ 2262.497805][ T6441] dccp_v6_rcv: dropped packet with invalid checksum [ 2262.509033][ T6444] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2262.530531][ T6441] dccp_v6_rcv: dropped packet with invalid checksum 03:36:43 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x7, 0x80) ioctl$VIDIOC_SUBDEV_S_CROP(r0, 0xc038563c, &(0x7f0000000080)={0x1, 0x0, {0x1, 0x5b4, 0x4, 0x31fc}}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0xdc, 0x420000) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, 0x0, &(0x7f0000000100)) 03:36:43 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}}}}}}}}, 0x0) 03:36:43 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) [ 2262.550928][ T6442] FAULT_INJECTION: forcing a failure. [ 2262.550928][ T6442] name failslab, interval 1, probability 0, space 0, times 0 [ 2262.615271][ T6442] CPU: 1 PID: 6442 Comm: syz-executor.3 Not tainted 5.1.0-rc6 #79 [ 2262.623110][ T6442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2262.628522][ T6457] dccp_v6_rcv: dropped packet with invalid checksum [ 2262.633182][ T6442] Call Trace: [ 2262.643063][ T6442] dump_stack+0x172/0x1f0 [ 2262.647499][ T6442] should_fail.cold+0xa/0x15 [ 2262.651278][ T6457] dccp_v6_rcv: dropped packet with invalid checksum [ 2262.652097][ T6442] ? fault_create_debugfs_attr+0x1e0/0x1e0 03:36:43 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}}}}}}}}, 0x0) [ 2262.652125][ T6442] ? ___might_sleep+0x163/0x280 [ 2262.652149][ T6442] __should_failslab+0x121/0x190 [ 2262.674290][ T6442] should_failslab+0x9/0x14 [ 2262.678802][ T6442] kmem_cache_alloc_trace+0x2d1/0x760 [ 2262.684187][ T6442] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2262.690013][ T6442] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2262.695740][ T6442] __list_lru_init+0x3cf/0x6e0 [ 2262.700507][ T6442] alloc_super+0x78d/0x890 [ 2262.704923][ T6442] ? test_single_super+0x10/0x10 [ 2262.710053][ T6442] sget_userns+0xf1/0x560 [ 2262.714391][ T6442] ? kill_litter_super+0x60/0x60 [ 2262.719331][ T6442] ? test_single_super+0x10/0x10 [ 2262.724271][ T6442] ? kill_litter_super+0x60/0x60 [ 2262.729204][ T6442] sget+0x10c/0x150 [ 2262.733013][ T6442] mount_bdev+0xff/0x3c0 [ 2262.737256][ T6442] ? finish_unfinished+0x1120/0x1120 [ 2262.742546][ T6442] get_super_block+0x35/0x40 [ 2262.747159][ T6442] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2262.752183][ T6442] legacy_get_tree+0xf2/0x200 [ 2262.756874][ T6442] vfs_get_tree+0x123/0x450 [ 2262.761485][ T6442] do_mount+0x1436/0x2c40 [ 2262.765820][ T6442] ? copy_mount_string+0x40/0x40 [ 2262.770762][ T6442] ? copy_mount_options+0x1fb/0x3a0 [ 2262.775984][ T6442] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2262.782226][ T6442] ? copy_mount_options+0x280/0x3a0 [ 2262.787431][ T6442] ksys_mount+0xdb/0x150 [ 2262.791676][ T6442] __x64_sys_mount+0xbe/0x150 [ 2262.796365][ T6442] do_syscall_64+0x103/0x610 [ 2262.800957][ T6442] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2262.806975][ T6442] RIP: 0033:0x45b69a [ 2262.810880][ T6442] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2262.830480][ T6442] RSP: 002b:00007f67d8ff2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2262.838981][ T6442] RAX: ffffffffffffffda RBX: 00007f67d8ff2b40 RCX: 000000000045b69a [ 2262.847125][ T6442] RDX: 00007f67d8ff2ae0 RSI: 00000000200002c0 RDI: 00007f67d8ff2b00 [ 2262.855092][ T6442] RBP: 0000000000000000 R08: 00007f67d8ff2b40 R09: 00007f67d8ff2ae0 03:36:43 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000040)=0x5) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, 0x0, &(0x7f0000000100)) [ 2262.863063][ T6442] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 2262.871039][ T6442] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000004 [ 2262.880865][ T6450] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2262.911803][ T6464] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2262.944404][ T6467] dccp_v6_rcv: dropped packet with invalid checksum [ 2262.954913][ T6467] dccp_v6_rcv: dropped packet with invalid checksum 03:36:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\xd0', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) [ 2263.146469][ T6472] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:36:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:44 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:44 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x3) getsockname(r0, &(0x7f0000000000)=@rc, &(0x7f0000000080)=0x80) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) 03:36:44 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}}}}}}}}, 0x0) 03:36:44 executing program 3 (fault-call:2 fault-nth:94): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:36:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x04', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) [ 2263.267965][ T6481] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2263.289236][ T6486] dccp_v6_rcv: dropped packet with invalid checksum 03:36:44 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:44 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) recvfrom(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x2000, &(0x7f0000000000)=@l2={0x1f, 0x8, {0x3f, 0x5ef9, 0x0, 0x9, 0x8, 0x4}, 0x8, 0x8000}, 0x80) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) 03:36:44 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}}}}}}}}, 0x0) [ 2263.324889][ T6486] dccp_v6_rcv: dropped packet with invalid checksum 03:36:44 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) [ 2263.424887][ T6485] REISERFS warning (device loop3): super-6505 reiserfs_getopt: head of option "jdev" is only correct [ 2263.424887][ T6485] 03:36:44 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x806000000000000]}}}}}}}}, 0x0) [ 2263.472221][ T6490] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:36:44 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) [ 2263.565026][ T6485] FAULT_INJECTION: forcing a failure. [ 2263.565026][ T6485] name failslab, interval 1, probability 0, space 0, times 0 [ 2263.597497][ T6485] CPU: 1 PID: 6485 Comm: syz-executor.3 Not tainted 5.1.0-rc6 #79 [ 2263.605336][ T6485] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2263.615388][ T6485] Call Trace: [ 2263.618681][ T6485] dump_stack+0x172/0x1f0 [ 2263.623011][ T6485] should_fail.cold+0xa/0x15 [ 2263.627607][ T6485] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2263.633683][ T6485] ? ___might_sleep+0x163/0x280 [ 2263.638536][ T6485] __should_failslab+0x121/0x190 [ 2263.643470][ T6485] should_failslab+0x9/0x14 [ 2263.647973][ T6485] kmem_cache_alloc_trace+0x2d1/0x760 [ 2263.653445][ T6485] kobject_uevent_env+0x2fb/0x1030 [ 2263.658562][ T6485] kobject_uevent+0x20/0x26 [ 2263.663064][ T6485] __loop_clr_fd+0x4ee/0xd60 [ 2263.667670][ T6485] lo_ioctl+0x210/0x2150 [ 2263.671912][ T6485] ? tomoyo_domain+0xc5/0x160 [ 2263.676587][ T6485] ? lo_rw_aio+0x1120/0x1120 [ 2263.681173][ T6485] blkdev_ioctl+0x6f2/0x1d10 [ 2263.685761][ T6485] ? blkpg_ioctl+0xa90/0xa90 [ 2263.690350][ T6485] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2263.696160][ T6485] ? __fget+0x35a/0x550 [ 2263.700319][ T6485] block_ioctl+0xee/0x130 [ 2263.704651][ T6485] ? blkdev_fallocate+0x410/0x410 [ 2263.709762][ T6485] do_vfs_ioctl+0xd6e/0x1390 [ 2263.714357][ T6485] ? ioctl_preallocate+0x210/0x210 [ 2263.719466][ T6485] ? __fget+0x381/0x550 [ 2263.723625][ T6485] ? ksys_dup3+0x3e0/0x3e0 [ 2263.728128][ T6485] ? kfree+0x173/0x230 [ 2263.732286][ T6485] ? kfree+0x173/0x230 [ 2263.736355][ T6485] ? tomoyo_file_ioctl+0x23/0x30 [ 2263.741378][ T6485] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2263.747617][ T6485] ? security_file_ioctl+0x93/0xc0 [ 2263.752991][ T6485] ksys_ioctl+0xab/0xd0 [ 2263.757163][ T6485] __x64_sys_ioctl+0x73/0xb0 [ 2263.761766][ T6485] do_syscall_64+0x103/0x610 [ 2263.766366][ T6485] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2263.772341][ T6485] RIP: 0033:0x458a97 [ 2263.776234][ T6485] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2263.795836][ T6485] RSP: 002b:00007f67d8ff2a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2263.804328][ T6485] RAX: ffffffffffffffda RBX: 00007f67d8ff2b40 RCX: 0000000000458a97 [ 2263.812316][ T6485] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000006 [ 2263.820300][ T6485] RBP: 0000000000000000 R08: 00007f67d8ff2b40 R09: 00007f67d8ff2ae0 [ 2263.828274][ T6485] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 2263.836413][ T6485] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000004 [ 2263.938151][ T6508] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:36:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfsL', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:36:45 executing program 3 (fault-call:2 fault-nth:95): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:36:45 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:45 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000]}}}}}}}}, 0x0) 03:36:45 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:45 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000]}}}}}}}}, 0x0) [ 2264.129944][ T6518] FAULT_INJECTION: forcing a failure. [ 2264.129944][ T6518] name failslab, interval 1, probability 0, space 0, times 0 [ 2264.165154][ T6518] CPU: 0 PID: 6518 Comm: syz-executor.3 Not tainted 5.1.0-rc6 #79 [ 2264.173011][ T6518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2264.183420][ T6518] Call Trace: [ 2264.186733][ T6518] dump_stack+0x172/0x1f0 [ 2264.191077][ T6518] should_fail.cold+0xa/0x15 [ 2264.195767][ T6518] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2264.201677][ T6518] ? ___might_sleep+0x163/0x280 [ 2264.206547][ T6518] __should_failslab+0x121/0x190 [ 2264.211502][ T6518] should_failslab+0x9/0x14 [ 2264.216022][ T6518] kmem_cache_alloc_node_trace+0x270/0x720 [ 2264.221925][ T6518] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2264.227483][ T6518] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2264.233571][ T6518] alloc_worker+0x47/0x1c0 [ 2264.238001][ T6518] init_rescuer.part.0+0x1f/0x190 [ 2264.243036][ T6518] alloc_workqueue+0x669/0xf00 [ 2264.247805][ T6518] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2264.253648][ T6518] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 2264.259378][ T6518] ? lockdep_init_map+0x1be/0x6d0 [ 2264.264763][ T6518] ? debug_mutex_init+0x2d/0x60 [ 2264.269635][ T6518] reiserfs_fill_super+0x369/0x2ea0 [ 2264.275034][ T6518] ? finish_unfinished+0x1120/0x1120 [ 2264.280333][ T6518] ? snprintf+0xbb/0xf0 [ 2264.284493][ T6518] ? vsprintf+0x40/0x40 [ 2264.288656][ T6518] ? wait_for_completion+0x440/0x440 [ 2264.293941][ T6518] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2264.299676][ T6518] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2264.305928][ T6518] mount_bdev+0x307/0x3c0 [ 2264.310267][ T6518] ? finish_unfinished+0x1120/0x1120 [ 2264.315553][ T6518] get_super_block+0x35/0x40 [ 2264.320142][ T6518] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2264.325279][ T6518] legacy_get_tree+0xf2/0x200 [ 2264.329959][ T6518] vfs_get_tree+0x123/0x450 [ 2264.334554][ T6518] do_mount+0x1436/0x2c40 [ 2264.339063][ T6518] ? copy_mount_string+0x40/0x40 [ 2264.344170][ T6518] ? _copy_from_user+0xdd/0x150 [ 2264.349117][ T6518] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2264.355358][ T6518] ? copy_mount_options+0x280/0x3a0 [ 2264.360561][ T6518] ksys_mount+0xdb/0x150 [ 2264.364808][ T6518] __x64_sys_mount+0xbe/0x150 [ 2264.369577][ T6518] do_syscall_64+0x103/0x610 [ 2264.374184][ T6518] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2264.380084][ T6518] RIP: 0033:0x45b69a [ 2264.384327][ T6518] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2264.406699][ T6518] RSP: 002b:00007f67d8ff2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2264.422501][ T6518] RAX: ffffffffffffffda RBX: 00007f67d8ff2b40 RCX: 000000000045b69a [ 2264.430639][ T6518] RDX: 00007f67d8ff2ae0 RSI: 00000000200002c0 RDI: 00007f67d8ff2b00 [ 2264.438715][ T6518] RBP: 0000000000000000 R08: 00007f67d8ff2b40 R09: 00007f67d8ff2ae0 [ 2264.448268][ T6518] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 2264.456414][ T6518] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000004 03:36:45 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$VIDIOC_G_FREQUENCY(r1, 0xc02c5638, &(0x7f0000000040)={0x5, 0x2, 0x7}) 03:36:45 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:45 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2100000000000000]}}}}}}}}, 0x0) [ 2264.475159][ T6524] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:36:45 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2800000000000000]}}}}}}}}, 0x0) 03:36:45 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) mount$9p_virtio(&(0x7f0000000000)='\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x90, &(0x7f0000000140)={'trans=virtio,', {[{@cache_none='cache=none'}, {@cache_fscache='cache=fscache'}, {@debug={'debug', 0x3d, 0x8001}}, {@access_client='access=client'}, {@access_any='access=any'}]}}) r1 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0xfffffffffffffffe, 0x800) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f00000001c0)={{0xa, 0x4e24, 0x9, @mcast1, 0x7fffffff}, {0xa, 0x4e20, 0x4, @ipv4={[], [], @remote}, 0x7fffffff}, 0xe1, [0x400, 0x4, 0x8000, 0x3, 0x8, 0x100000001, 0x6, 0x10001]}, 0x5c) [ 2264.555262][ T6518] REISERFS warning (device loop3): reiserfs_fill_super: Cannot allocate commit workqueue 03:36:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\xac', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:36:45 executing program 3 (fault-call:2 fault-nth:96): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:36:45 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:45 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}}}}}}}}, 0x0) 03:36:45 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000000)) 03:36:45 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305000000000000]}}}}}}}}, 0x0) 03:36:45 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:45 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0xed, 0x10}, 0xc) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000040)={0x0, @aes128, 0x1, "cca8c04879125175"}) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, 0x0, &(0x7f0000000100)) socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x101000, 0x0) request_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='GPLself\x00', 0xfffffffffffffffe) ioctl$EVIOCGBITSW(r2, 0x80404525, &(0x7f0000000140)=""/68) accept4$bt_l2cap(r1, 0x0, &(0x7f0000000080), 0x800) ioctl$CAPI_MANUFACTURER_CMD(r2, 0xc0104320, &(0x7f0000000340)={0x8, &(0x7f0000000280)="900fd534f29ab11e7f942aa94c63ed2c466b32e374f76b7f40dd7018809657e722043c3bdf152040b8c585b97a4c84604641741acaea6902a94032538d96c9bf5872a78171c599fdd83954ffe08e82c9365f559a584752428bc90c58f4b6c40bf60da189863d"}) [ 2264.802725][ T6551] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2264.872684][ T6566] FAULT_INJECTION: forcing a failure. [ 2264.872684][ T6566] name failslab, interval 1, probability 0, space 0, times 0 [ 2264.904847][ T6566] CPU: 1 PID: 6566 Comm: syz-executor.3 Not tainted 5.1.0-rc6 #79 [ 2264.912955][ T6566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2264.923013][ T6566] Call Trace: [ 2264.926358][ T6566] dump_stack+0x172/0x1f0 [ 2264.931070][ T6566] should_fail.cold+0xa/0x15 [ 2264.935680][ T6566] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2264.941765][ T6566] ? ___might_sleep+0x163/0x280 [ 2264.946650][ T6566] __should_failslab+0x121/0x190 [ 2264.951612][ T6566] ? cancel_delayed_work+0x2d0/0x2d0 [ 2264.956919][ T6566] should_failslab+0x9/0x14 [ 2264.961445][ T6566] kmem_cache_alloc_trace+0x2d1/0x760 [ 2264.966840][ T6566] ? lockdep_init_map+0x1be/0x6d0 [ 2264.971875][ T6566] ? cancel_delayed_work+0x2d0/0x2d0 [ 2264.977179][ T6566] __kthread_create_on_node+0xf2/0x460 [ 2264.982661][ T6566] ? kthread_parkme+0xb0/0xb0 [ 2264.987424][ T6566] ? find_held_lock+0x35/0x130 [ 2264.992213][ T6566] ? cancel_delayed_work+0x2d0/0x2d0 [ 2264.997525][ T6566] kthread_create_on_node+0xbb/0xf0 [ 2265.002726][ T6566] ? __kthread_create_on_node+0x460/0x460 [ 2265.008460][ T6566] ? kmem_cache_alloc_node_trace+0x352/0x720 [ 2265.014439][ T6566] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2265.020084][ T6566] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2265.025900][ T6566] init_rescuer.part.0+0x7d/0x190 [ 2265.030939][ T6566] alloc_workqueue+0x669/0xf00 [ 2265.035710][ T6566] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2265.041526][ T6566] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 2265.047249][ T6566] ? lockdep_init_map+0x1be/0x6d0 [ 2265.052360][ T6566] ? debug_mutex_init+0x2d/0x60 [ 2265.057220][ T6566] reiserfs_fill_super+0x369/0x2ea0 [ 2265.062452][ T6566] ? finish_unfinished+0x1120/0x1120 [ 2265.067745][ T6566] ? snprintf+0xbb/0xf0 [ 2265.071895][ T6566] ? vsprintf+0x40/0x40 [ 2265.076076][ T6566] ? wait_for_completion+0x440/0x440 [ 2265.081711][ T6566] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2265.087520][ T6566] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2265.093766][ T6566] mount_bdev+0x307/0x3c0 [ 2265.098098][ T6566] ? finish_unfinished+0x1120/0x1120 [ 2265.103410][ T6566] get_super_block+0x35/0x40 [ 2265.108180][ T6566] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2265.113217][ T6566] legacy_get_tree+0xf2/0x200 [ 2265.117909][ T6566] vfs_get_tree+0x123/0x450 [ 2265.122526][ T6566] do_mount+0x1436/0x2c40 [ 2265.127139][ T6566] ? copy_mount_string+0x40/0x40 [ 2265.132180][ T6566] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2265.138596][ T6566] ? copy_mount_options+0x280/0x3a0 [ 2265.143799][ T6566] ksys_mount+0xdb/0x150 [ 2265.148397][ T6566] __x64_sys_mount+0xbe/0x150 [ 2265.153086][ T6566] do_syscall_64+0x103/0x610 [ 2265.157680][ T6566] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2265.163674][ T6566] RIP: 0033:0x45b69a [ 2265.167578][ T6566] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2265.187350][ T6566] RSP: 002b:00007f67d8ff2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2265.195857][ T6566] RAX: ffffffffffffffda RBX: 00007f67d8ff2b40 RCX: 000000000045b69a [ 2265.204017][ T6566] RDX: 00007f67d8ff2ae0 RSI: 00000000200002c0 RDI: 00007f67d8ff2b00 [ 2265.212074][ T6566] RBP: 0000000000000000 R08: 00007f67d8ff2b40 R09: 00007f67d8ff2ae0 03:36:45 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:46 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800000000000000]}}}}}}}}, 0x0) [ 2265.220040][ T6566] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 2265.228011][ T6566] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000004 03:36:46 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)=0x33f) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/8, 0x8}, {&(0x7f0000000040)=""/7, 0x7}], 0x2) [ 2265.276437][ T6580] validate_nla: 8 callbacks suppressed [ 2265.276446][ T6580] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2265.294709][ T6566] REISERFS warning (device loop3): reiserfs_fill_super: Cannot allocate commit workqueue 03:36:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x02', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:36:46 executing program 3 (fault-call:2 fault-nth:97): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:36:46 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00000000000000]}}}}}}}}, 0x0) 03:36:46 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:46 executing program 1: getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, 0x0, &(0x7f0000000100)) 03:36:46 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:46 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x81, 0x200) r1 = dup2(r0, r0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000040)={{0xa, 0x4e21, 0x42, @ipv4={[], [], @rand_addr=0x9}, 0x4}, {0xa, 0x4e22, 0x80, @local, 0x7}, 0xfffffffffffffffe, [0x6, 0x1, 0x1, 0x200, 0x7f, 0x200, 0xb9e2, 0x8]}, 0x5c) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x10) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r2, 0x80045700, &(0x7f00000001c0)) 03:36:46 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5800000000000000]}}}}}}}}, 0x0) [ 2265.569183][ T6598] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2265.591863][ T6593] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2265.591863][ T6593] [ 2265.651262][ T6602] REISERFS warning (device loop3): super-6505 reiserfs_getopt: head of option "jdev" is only correct [ 2265.651262][ T6602] [ 2265.676666][ T6611] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:36:46 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000000000000]}}}}}}}}, 0x0) 03:36:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:46 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:46 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7, 0x200) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040)={0x7}, 0x4) 03:36:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\xe1', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:36:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:36:46 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800000000000000]}}}}}}}}, 0x0) [ 2265.856400][ T6619] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:36:46 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = semget$private(0x0, 0x0, 0x480) semop(r1, &(0x7f0000000040)=[{0x2, 0x6, 0x1000}, {0x4, 0xff}, {0x1, 0x7, 0x1000}, {0x50e6c6022e391fbe, 0x1000}, {0x3, 0x5, 0x1000}, {0x3, 0x3ff, 0x800}, {0x2, 0x0, 0x1800}], 0x7) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000000)=0x2fa) 03:36:47 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) [ 2265.914987][ T6627] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2265.980064][ T6633] REISERFS warning (device loop3): super-6505 reiserfs_getopt: head of option "jdev" is only correct [ 2265.980064][ T6633] 03:36:47 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x40, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000001c0), &(0x7f0000000200)=0xb) sendmsg$can_raw(r1, &(0x7f0000000180)={&(0x7f0000000040), 0x10, &(0x7f0000000140)={&(0x7f0000000080)=@canfd={{0x3, 0x3a3, 0xffffffff, 0xd9}, 0x15, 0x3, 0x0, 0x0, "cc87d316818072dc5bcaeb94251a6172dc08e0909529334c25ee2dacc1071672e953b2a458ae0716b10d76ce3b810b50da3e3490085c7c5cdb1705320a89b326"}, 0x48}}, 0x90) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) 03:36:47 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00000000000000]}}}}}}}}, 0x0) 03:36:47 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) [ 2266.022401][ T6643] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:36:47 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) socket$bt_rfcomm(0x1f, 0x1, 0x3) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x80, 0x0) r1 = socket(0x5, 0x4, 0x401) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, 0x0, &(0x7f0000000040)=0x39e) ioctl$SCSI_IOCTL_GET_IDLUN(r0, 0x5382, &(0x7f0000000080)) [ 2266.164682][ T6655] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2266.184789][ T6644] REISERFS warning (device loop4): reiserfs_fill_super: Cannot allocate commit workqueue 03:36:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\xf0', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:36:47 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400000000000000]}}}}}}}}, 0x0) 03:36:47 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='\neiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:36:47 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000002580)=0x7fffffff, 0x4) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) accept(r1, &(0x7f0000000000)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000080)=0x80) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, 0x0, &(0x7f0000000100)) [ 2266.321380][ T6665] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:36:47 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00000000000000]}}}}}}}}, 0x0) 03:36:47 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:47 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x4, 0x200) dup3(r0, r0, 0x80000) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x10000, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, 0x0, &(0x7f0000000100)) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) 03:36:47 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800e000000000000]}}}}}}}}, 0x0) [ 2266.466440][ T6685] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2266.475377][ T6677] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:36:47 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\xfb', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) [ 2266.718337][ T6697] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2266.728529][ T6702] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:36:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x03', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:47 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x100003, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) 03:36:47 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8035000000000000]}}}}}}}}, 0x0) 03:36:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='%eiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:36:47 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\xfd', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:36:47 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0xfffffffffffffffb, 0x2a0000) accept4$netrom(r0, &(0x7f0000000040)={{0x3, @null}, [@rose, @null, @default, @null, @default, @default, @remote, @null]}, &(0x7f00000000c0)=0x48, 0x800) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x23, 0x3) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000180)) getpeername$netrom(r0, &(0x7f00000001c0)={{0x3, @default}, [@rose, @rose, @bcast, @remote, @default, @bcast, @default, @default]}, &(0x7f0000000240)=0x48) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, 0x0, &(0x7f0000000100)) sendto(r0, &(0x7f0000000140)="48b2dcc5f491b5fdbb7bf8929934", 0xe, 0x40008c0, 0x0, 0x0) 03:36:47 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100000000000000]}}}}}}}}, 0x0) [ 2266.898994][ T6713] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:36:48 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:48 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x30200, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000080)=0xf89217462a46b9e5) 03:36:48 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}}}}}}}}, 0x0) 03:36:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='\x92eiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:36:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\xc0', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:48 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:48 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = fcntl$dupfd(r0, 0x406, r0) sendmsg$kcm(r1, &(0x7f0000000a80)={&(0x7f0000000400)=@ipx={0x4, 0x0, 0xfff, "040153e24b5a", 0x40}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000480)="bdf8d1", 0x3}], 0x1, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/1341], 0x548}, 0x10) write$UHID_CREATE(r1, &(0x7f0000000280)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/209, 0xd1, 0x7f, 0x1, 0x1ff, 0x7, 0x10000}, 0x120) ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f0000000140)={{0x4000, 0x1, 0x8, 0x5, 0x400, 0x80000000, 0x28, 0x400, 0x7cd, 0x558, 0x6, 0x400}, {0x1f000, 0x6000, 0x1f, 0x40, 0x8, 0x9, 0x5d, 0x70, 0x3ff, 0x80, 0x1f, 0x8}, {0x12000, 0x2000, 0xd, 0x700000000, 0x3, 0x8001, 0x2, 0x8, 0x7f, 0x9a0, 0x3, 0x4}, {0x2000, 0x3000, 0x14, 0x0, 0x101, 0x1000, 0x8, 0x8, 0x7f, 0x0, 0x80000001, 0x8}, {0x1000, 0x3000, 0x9, 0x101, 0x40, 0x9e, 0xfffffffffffffff9, 0x2, 0x9, 0x5, 0x81, 0x8d54}, {0xf000, 0x15000, 0xb, 0x8, 0x4, 0x8, 0x2, 0xffff, 0x8000, 0x0, 0xdb7, 0x7f}, {0x0, 0x1, 0x0, 0x4, 0x1, 0x5, 0x7, 0x3f, 0x10000, 0x1, 0x2, 0x800000}, {0xf000, 0x7000, 0x3, 0xff, 0xd48, 0x5, 0xe3c, 0xda, 0x3, 0x101, 0x1, 0x10000}, {0x10000, 0x10000}, {0x1000, 0x100000}, 0x0, 0x0, 0x5000, 0x400002, 0x8, 0x1000, 0x1000, [0x8000, 0x3, 0x80000000, 0x100000000]}) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) setsockopt$inet_opts(r1, 0x0, 0x9, &(0x7f0000000ac0)="a00ebeb440aef4154f121607874532a5a76c00e32576078934683c32003f8fed2649f4fef42a21469893612ec4a6619f015c82a080fbee3baf090c76361a98db792a9be88d235ba9471a16ca8fd88081c5b86c4a71dc2a8fa48c797edcbe074f02553e2587967c3469900c0be4a4e19a684375010d1681df2481c1f122dd7c708a07610e28fa990f93da616981b35c1bfaa34fcd006b61d83c41", 0x9a) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c9, &(0x7f0000000a40)={{0x2, 0x9, 0x0, 0x3, 0x10001, 0x6}, 0x4}) ioctl$UI_GET_VERSION(r1, 0x8004552d, &(0x7f0000000b80)) ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f00000003c0)={0xb, 0x0, 0x1, {0x2, 0x10001, 0xbc4, 0xab}}) 03:36:48 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8847000000000000]}}}}}}}}, 0x0) 03:36:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:36:48 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000140)={'veth1\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x27}}}) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x20000, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f0000000040)={0x101, {{0xa, 0x4e20, 0x400, @ipv4={[], [], @broadcast}, 0x5}}}, 0x88) getsockopt$sock_int(r0, 0x1, 0x13, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 03:36:48 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) [ 2267.292528][ T6758] net_ratelimit: 40 callbacks suppressed [ 2267.292536][ T6758] dccp_v6_rcv: dropped packet with invalid checksum [ 2267.304128][ T6758] dccp_v6_rcv: dropped packet with invalid checksum 03:36:48 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8848000000000000]}}}}}}}}, 0x0) 03:36:48 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) [ 2267.354794][ T6756] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2267.354794][ T6756] 03:36:48 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1f, 0x40) r2 = dup3(r0, r1, 0x80000) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000140)={0x2, 0x41a, 0xa9d}) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f00000000c0)=[0x0, 0x4]) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000040)='vmnet1^&bdev&\x00') 03:36:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='r\niserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:36:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x03', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2267.491434][ T6773] dccp_v6_rcv: dropped packet with invalid checksum [ 2267.527765][ T6773] dccp_v6_rcv: dropped packet with invalid checksum 03:36:48 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:48 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)=0x1d3) 03:36:48 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8864000000000000]}}}}}}}}, 0x0) [ 2267.574128][ T6778] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2267.574128][ T6778] 03:36:48 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x200, 0x0) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000740)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000800)={0x10, 0x30, 0xfa00, {&(0x7f00000007c0)={0xffffffffffffffff}, 0x0, {0xa, 0x4e22, 0x5, @mcast2, 0x1ff}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000840)={0x11, 0x10, 0xfa00, {&(0x7f0000000780), r2}}, 0x18) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000000a00)={0x8000000000001c7, 0x0, [{0xf000, 0xfe, &(0x7f0000000140)=""/254}, {0x110001, 0xb2, &(0x7f0000000040)=""/178}, {0x0, 0xd1, &(0x7f0000000900)=""/209}, {0x6000, 0xae, &(0x7f0000000340)=""/174}, {0x3, 0x1c, &(0x7f0000000400)=""/28}, {0x100004, 0x78, &(0x7f0000000440)=""/120}, {0x3000, 0x6d, &(0x7f0000000880)=""/109}, {0x0, 0x8, &(0x7f0000000540)=""/62}, {0x0, 0x53, &(0x7f0000000580)=""/83}]}) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) [ 2267.687230][ T6794] dccp_v6_rcv: dropped packet with invalid checksum [ 2267.709708][ T6794] dccp_v6_rcv: dropped packet with invalid checksum 03:36:48 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:48 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff00000000]}}}}}}}}, 0x0) 03:36:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:36:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x03', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:48 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x20200, 0x0) ioctl$UI_DEV_CREATE(r1, 0x5501) 03:36:48 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) [ 2267.852727][ T6805] dccp_v6_rcv: dropped packet with invalid checksum [ 2267.875504][ T6805] dccp_v6_rcv: dropped packet with invalid checksum 03:36:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='r%iserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:36:48 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88caffff00000000]}}}}}}}}, 0x0) 03:36:49 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) [ 2267.962969][ T6813] dccp_v6_rcv: dropped packet with invalid checksum 03:36:49 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xffffffffffffffff, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x4000, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000040)) syz_open_pts(r1, 0x20402) [ 2268.009646][ T6813] dccp_v6_rcv: dropped packet with invalid checksum 03:36:49 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8906000000000000]}}}}}}}}, 0x0) 03:36:49 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x5, 0x2040) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r1, 0xc040564b, &(0x7f0000000040)={0x4, 0x0, 0x3014, 0x3ec, 0x1ff, {0x943, 0x9}}) [ 2268.061665][ T6815] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2268.061665][ T6815] 03:36:49 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff00000000]}}}}}}}}, 0x0) 03:36:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x03', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2268.360695][ T6842] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2268.360695][ T6842] 03:36:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:36:49 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:49 executing program 1: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000000)) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000080)=0xb6e3, 0x2) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, 0x0, &(0x7f0000000040)=0xffffffffffffff5a) 03:36:49 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}}}}}}}}, 0x0) 03:36:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='r\x92iserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:36:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x0f', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:49 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:49 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) syz_read_part_table(0x7, 0x1, &(0x7f0000000140)=[{&(0x7f0000000000)="5285fe67983bb5c2282b7ce7cfcf489f819caff179158ef978d3a88cfb373b956c8669cf78e964601553eabc6466c4a724589cb2b01fc90cbf378c60c7f0d4bd994773bc21f0990f1625dcaf443492923b8eae204bd24deabc64a293dba3540a673ffec3440a35178d7421ca793b69ce64bfa4fb19f90c020124623254eced7131560d5ef7d6309df657545453e24b14f0086135a0e1219d9d29c7a0ca7c388269047ec6ffa811303e14870a7c45a0c355099865301f574158cfc7d3908d64f9360e06cff6bc15ad423c9b9c68314c52232517790acff5dd3e60a18a9d8e209a6ed140291b4ee1b8f1b7955ba539", 0xee, 0xfffffffffffffffd}]) 03:36:49 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff000]}}}}}}}}, 0x0) 03:36:49 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) [ 2268.653703][ T6865] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2268.653703][ T6865] 03:36:49 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}}}}}}, 0x0) 03:36:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='re\nserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:36:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:36:49 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:49 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}}}}}}}}, 0x0) 03:36:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:50 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:50 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}}}}}}}, 0x0) 03:36:50 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) 03:36:50 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}}}}}}}, 0x0) 03:36:50 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) [ 2269.092334][ T6895] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2269.092334][ T6895] 03:36:50 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8, 0x100) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000040)={0x0, 0x80000001}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000000c0)={r2, 0x1}, &(0x7f0000000140)=0x8) 03:36:50 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) [ 2269.192190][ T6904] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:36:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='re%serfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:36:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs ', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:36:50 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}}}}}}, 0x0) 03:36:50 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x40000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x10000000}) fstat(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000000c0)=0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000006900)={0xf004, &(0x7f00000068c0), 0xc, r0}) ptrace(0x10, r4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = gettid() ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000006940)=0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000004f40)=0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005080)={0x0, 0x0}, &(0x7f00000050c0)=0xc) r10 = fcntl$getown(r0, 0x9) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000006800)={0xc, 0x0, &(0x7f0000006740)=[@decrefs={0x40046307, 0x2}, @register_looper], 0x7c, 0x0, &(0x7f0000006780)="f68744ac1ddb2d1db71d3f9fdf31799f4d8928994950a725e858eb01fca5e5d7be4795cf54ed7b27ca0f7381bf22e4d8c2fe59b22ac10bb6c318baeb0ec0ab4c530181878aa3a7b9da06b0a21b9aa77a473b1d92f8e1fb460ff874f685dd49e86acadc6d5f8023073b549d1875531d007ec73b3addde77ead87adb43"}) sendmsg$netlink(r1, &(0x7f0000006680)={&(0x7f0000000080), 0xc, &(0x7f00000065c0)=[{&(0x7f0000000280)={0x240c, 0x1b, 0x20, 0x70bd26, 0x25dfdbfb, "", [@typed={0x8, 0x95, @uid=r2}, @nested={0x320, 0x67, [@generic="d203db48e2262712e1b7ae5297bd537fa034d19654afcc0aea62ccc43aa20a6e03757dac5752a81ee5e363c6b59f2977afaf8f66831bd72e992621181f7ca067b3f18122e1d4f409251f8f94b0dabbfb96bc25f50205dcf4c75f50fdd25b64c253bca558897f2ab2f3c12302c2468909be6b793609ff0a04050dfd42fc768375ffa7ec5b5e83c73a6f46fd20c20a6ad23dd1f8088006646e5b696bd5e5e86ad64612cb3767401cdabd52ee33bc6db2ba142707198533706e2971da7d2e9b9e87e06274db675f55711ca6b64680112aff5a45ed0cb768d243794aaceb2e6a815c21d302cd94c92f3bd3f368b1", @generic="33488cc3129d80efb5e201ea1e57cc637298bee5cc185cace9986a72693ba712d25312029e8ded5c3f9f55d979cbd32622e460d8cdaf4ebccf0c0ec5ff1926907ba05983dba32e8246153d37b71997ea3d68b811c506643c74ccc3edc2e39cb423d0b77048228ae6254739a69a10f57a7e519f558b25215d1d4d96", @typed={0x8, 0xd, @ipv4=@dev={0xac, 0x14, 0x14, 0x1c}}, @generic="6bf493db2de483f340d8f4e84365ae88df8b971de3d1e71577ac657f2c26db59c6fbba731e77b4f7bf2f6d573301eee23aaea763540d9a35207b92173a3d2293d24eb38b0e1bcf4bdb1c0a80490483c8429758a0a5998d23d1ed11aab3ab53eac565714035f97c2236123ca5c0662a7c126d5483d282aee4084397656e150aa032fa1e1d3cfa79bbcd4a813513785fb574402b283782ac2e9291007ff851ee4c57a695d1569151810c70515301cd1fde3680d0a287ff448233df6279ab5c752f", @generic="d4cbf6d614324afa5e548550d088f9f41a7414859b2406404244a124f080aa898626ac00526f4a9cc7dcf68b3d5764741bb22236a93af22c477f1a5b61c698cec2d4760e1ac7f7637abb58f61260946c438bbc4a060e17078e0e647ece047ff34a0e65f4c9ea6cb58a9ebbbb8b3381f6502f446cb6fc9c2335b783ffc13e9f70fb1ffa6623b54b2e85d95e40e4d95b5872f68852d84ae521108e4747803ec50c584791f5eba6982780f0b1cc15f52f38ae122d02fc289b81980e2b3b0f647d439b969db91525251e55b75d49c60de5b532444414fe", @typed={0x18, 0x20, @binary="c80b8bab5e138ee8021d25ae986f5e81a5f0"}]}, @typed={0x4, 0x28}, @nested={0x1020, 0x91, [@typed={0x8, 0x57, @pid=r3}, @generic="dd603ea4a89ceb6c8dd859e09ef7d0f0d8acb70b6098937cdd99284a8d40cc893c1cb66f57117e86597b8befe6f7f7c238564419758756146e1c5752b2484a3e78b7f30f0faa4ad2d4fb9d82516b4b8cd351fc26616bb8a2c3017ead1653d091fdc34555cb81adff48f084cf92d759b971cbdea88e21fdfd695de26fb569492323b5361eabd96d3785577a7c92b03fce64763dcf270bd6e3f02a2ea76c980c1853a7cc0a9210afa35626c625c22b96f3b499fc0e75bd0ce098a831d3da91b73c5893d9f01c15c171c44e138fef1bf9be02af2ab73725a9b26da518ce2f019f93b5c979995dd4d0c2dbea9365d41a27847531c82acbbb9d3baf74236ed61ce3c8894c77b3419ea93ffe18da4ad5be15571455c0f318e8c714a3108588732ff84fe8299b0362062d65d36eeaaa57fe91208b0a3b94a5d7e1200e59c00d23c55a706d95cb74bf045d2bdf64f26b84fc43a892fe08c398099e6546e88138a657ab8dd17575eda70cf43fc96f02d11c61f0976ef34f82ad30f6c9b16a262e0a8504a1398b273f6f26f0c0d1e06bfc37acccc4de7bab487e4045b0c342a2808baab7cdddc9f40bd3a6fe20f1551ef891d84d96b60f62583d1307ffd29b927c225e4fcbaa3899be4c152d07ff920f548825bf3c16b6d3beca786d33674ca0ecdad53c0a4d49f6abf5fd3102f9ff9a0475c728208466958f8e8d0c7fd509ec908e6f9bbf92a16cd78f48fe38d14d2d3994fb3b3880e6953ec02753dc84432cd9391377c0ff024a4d442ab0d39f4f6e98165b31157597c20a62e4ab1d7c160cf29437b25cbe39c38add5db5d3969826995986e090dd80a46f00e1c77a8c6e6d6600a6fc2009d0a2b05f84762c3ea0c91f2f774783398880d5853a89d2d8f1ba9011e9eb2cb32463a6942bb74f453d5a0d2601473df77da49cc7c53b5fdc29321d4581eb457bd28bbbf2c9121aab60c4f3ebd6368a1fd9f056768c49c2227002354b61694b5afb642ed9eb124fef576a25547b18c09788e027df4a129764e102c4bed249e2f24cd57f9837aff28be2c8329c19a3a1808a181db7cce0212c28a6069c81df7cc8507027a03d3063a59c2eaebc246350598fafe2959b2896e1022008ca4b3793cc5ad7b1538198182b98d21bf532d27a6f2ab98273eddd1e78b81e9e99b6efe7deef301fdf32a78707107ce00cbcbb288d87638e457a996547b907fcb63c4f69dc5433e50eaa20c59267b8422516fe1075c9c4ba9927991a3dc3283c4e28c730add48ce3dbb39f5c40c39c128ea2097636efb8097e764cc5a8054a7ed28071b4d3c3f264a024f11bc4cf95b71a892a7d43849524c5912e59032d986b4b966308ff95c697626bcc133224411f963cf9d73fa97e115fcfb4c4ba168575aa591d514bbec7504ecf0ae477cfde39718b96285e9e9454c0dde773342d6354dd53e7806a7595ecc4b6ecd2774a2037dfea18968c2ba9ae3aa73d03ff3819500c0bf00d88f24dfcf8c2a22729f057a92e8a884e4a9f19a12ac0b50064cc84adf1313d1fc366d5af80a5f0d61d12bd9365c2d6734e737ebfacecb17d90f4a10a50a87b4ec9fa5ef2d643b36bb275f39bf7f175cf507292f30c6286a409bf41f1569cd6fd13c01709e54afa3869ac5b3e98803d3dc76fdfeec787d01c734cb5314941ffc7aff97996673449e25dcf9fa305b2114e357733f245679e7e8a3136955d17a9334ee634f5a83bbe6cf9cc4cc8e3931a9d907f6b4bd1eb3da505edb552088169adfca250133d161ff9011523ab76f29615cef05a8f168a2ee70da9ed24bb5cd012faea59871ed2f893d3f9214e2a13de06595bcc0c790e780e437a7f6c9949367292f15982994df72d5a6a5d6dcc25cb8795691a2d460a5906092bb4157b776d7b9a201fb1d9d9b340e22dff20c794d3bea9dc838c7b61c61cfec3195a15453f9fc3bf9a1efddc505619bfa25d2fb3f8d4dd78ddf48effda946ed37dbde72f85412a2724e675a47ab23cdbdb362428174627cd438af7c26873f1874af4f587681c2cf88ebe206f0fd82def2dc1ed04698d4e1288bf110099919c65cc55df541ceea3695d419c662d31e642745bab5c281ffd12a0cd1c4155fb2f21099bf0aac3c7721d6246fe71487e68a1ff44f511f79f9cb5abce898adbc7ff4c94f62ce8a769d9c154fab307a5f2b6a26008ade6da14968f0f1f184c2bfbc16c656ce58e1cde9c20f22e784621ab33849916a89220751c1102b8524e11b243e0df08c6ea7617455db969fd51efd0d6e86525a0129fcc192f75df8fc04ce86d4581dc74ae153e343ec9484268343e671ffbf9452edccbca6d6dd5c63ae04f8f3210af681fc081c72b74d5b630270484c57cac48707ecfe143c84ea72aa5df7fc089cc686148daacfd7dc42fe7988586ae1bb0b7ccfbb690aab73baad2eda0cdcefa7d6a69533287ad055f03c46c4c068f00c34655246c60355d69a3230a36f02734caf8825a3be0141c8517177abfa78b60a21c2ee78b37510b2acecf8dbbca1dd24986f5d9a699164b1202d36c39979eef99a93d37dce10cb39a6252853024ec38be1f571928facb84b75bd6b925c80d3448ff002cad5d076cc41ab5eb2698e9d7a297113f1d176c2440cf724713c8678b55fa5dff45089fedcff32b38fd7ac30c2082712599b772b693b2875420e28f94acf053b56f99004b4256bb7777b8e68b95427ba16ebc24ef0622be673ab9eda0dcd434a656ebe158bbe01037302f38dbf823b5eb18f000f4a1285a6a870d7ee150613b20f1b72f89f925f60397499f0831f6f66bbe762ac9b418fa28075f6f2b2930623d30ab64a1935edd58da1f844de8f3cb964f94851bd20e1dd64712cc5d58f30fc88209239e1347808a6b47f280562a854a1483c5102c9adea8bbaaf8dfbf4ef08228b922d65c139c65099e63f3cfeec62bda453e4e500090846b729848e41a4776163b9b99a1f9b0d1e947d1a925f3c3c79ecac04e6b35623453c8982dcdb48fb1dcd2c33baecaaa3a475f5c5eb83ea2c6d8065d9aa0d7991eef9fdacbba065c86bb29c691cee0de82158c47fb7a3a0c3151908c2ec3897867aafc52fd332863f0bd7fbfdd42543470ab1a98f566c74b4cebb4a54a550ccfe10d19945e7c0ac381044765e083627543d8cd8e5b56fe767954308078cc6159346bb645994e5fd2c2352be3008feef84ab8396f1f9348f1e4055b203a58c485e1dc9f9b309558719b77925cd3c2fcb3fd55079b98c5ba3be9747f86e7cefae006111a63a23722253cdabf3a01bafe877e7689a4754a28a1230ad6bf81d9207fe86c999f273a2413328c10a2a7f2730ac67593a76340667583562b5720b1b973707974a873c653db4efef0d6eb1c3bc31dff719ae1b3c28e354bf31dd63e8237e4d1e54ff607f5757ea8e5baf7fcf35dc943dcd899eb1120848187ae7deda599034a23c190fb7a66ba8f58fc504979749eff94d3f494456880082aa400acb49c483913a6eef0c4c690548ba1753e8145cc5bd125b5e0ee305c3876fdf8920ab7952567613b4ba9b4e613547bc3ce88d8d1ec5241dbdbc901407e5a1bea234d563203a5da4cf4c8ef48cfe7b4db1a68fbb611157b94544b438a8b7886fefb1d673b0ad3e9ebf901db2ca1a409800dc4fe7750b12394992d8de4b20588ef19b5278fdde5b4cea6ac66d1ce6f7853dfb6785907f1e6881b05ba62c6112c75b6104952d941f1ff574f2ef78c7aca6a683144dfb76bf4fe9d4b9eefd2c4000285fbe47ec8f7515a30a445b6ef6dc97ae9dae7408334d91ee4cd214fc4e6340af78c77c93cdc24bcb3328837c01c2050769d77834a1ccde683bf4205844fa76786abadc86698c1a1a923f64552cb6652ca56efe3a795715e2c928a9f96b125424cd7a0356c369de0bc3d74eb86fe08ccd9708dcc226d63dc7658db06769f833f4c46ef83cd3f4f75033ebabfc03e375e3f57be024d9b9a40133f14dafd75320ae8e94908cfa673f89f17cc47d1f1580a6171604008992f3fea707b2f5d211cd6e167f9692e954a71f46befc310950518de11ffdfc84d05481698916c2deea9d017659854f9a3217ce08da132f423e5ef72690d9e5974d9b7ba9239a37613629864483755f91a0e2b20c28778ae0cc5bb000d795a076d6c9b83d1c74f8cafeea39a69c253d9225c1342f800ae5f678e267e0253ec5ce33f652329b6df63173dd109e90ef1f8f28f93395f0e41f55a3bc4a24ac9ac39017a75643759423870a1a4d4023bc0c9f68b7954a111338550a92235aaa0e41144cf88f2ddc1f673347cf5727274d8f0e3fd5f57dc136a5f72f0ccb9c1e5ef17a134e3bb6bbec2e9653ee313dca0f715f48a8b05dacf69659fea708b2db6a5d9f55c54e6cf7405becfeaea15180786a86ad47be99f568f84d9e5eb5fba38e6bb7070253bf6ac6e1d2b80296634440284a29af91005e16153e2cac439131baa6a753776c824172daa7b22e10cdaa517724360d3b895bfdb4780936f5d63c087061dafa859aea6397e36fcdf70279c5740bc3b1348e9a395bf0402ce5a13c3c944c0ab7719fd5ac7bf8cdc4537c8542c2d4de396b55120425a2d82a6024dc9c55cecf12ddfd74ee006f65dc1bf86c992a48b5baa19a9ee49af02ea8b7ebc43bef5a315704676f0d619b95ba1afad73dcc0360183bb7b1482139384f293e9f6bef4bdc9811e99e297ba06da777867894c88d942dd07b2b0118d4fb8093a02c0478d8752b61e8f7a661a8be137472c6322db77d518915bbbfb04c79cc35ba2e529f30c464ad3c4a5cd2e071831314e3e05250ae67463f5b56dac548abf802437919e1fe3ad3924e0ded685ecb2ad831bea50dd6dd68e956ce91e028683526d1aadb0a1834a4334c51cfc635675d656ccee1d508fa4134971b6cf844fdaf0700665a4450452acd955d18468d51a33f268bd6d663d8b04bb2f4feba47b4eaf4467aea107049d29eff49756bcc5e7ef3aa2c2e06b1811ef6750fdedccb15dcf38e0d1ff1126de7ce0f97bf99ea585f5400f1ce051b658694724503da8e0d9a40299d0c0ff9c24ac715a789950648ddca1daeeb1835103e02ddbd8f2f5ca7cc14214c34d024ea61561f4e9812ff48c0b75c2893e1900a7582fc3ffb7c4ad17e2e8107567abffc8f553512e3080bd0e36cf7bd50cf16c9e27e62f04401fd3d2f2173e55a659eea1df22b79ed2ea389d9b201c4c8529aae888098d467dc1f678e06328f5e0ac3253a5039a2bb908ed9b9c59f3c318851d6dea9ac349f5e14eb5300f3c875f8e76ca9ac0b78fe24fadb50f35738b083e3f14578d3aa9b34f2c0f2d4f9dd232a4dd05b01be8dacb0d868728545cd9f201dabd33e8ca3c17ea2c224ab0c2a9e08f1472bf96a0cf34e9ab22856c8f208d3a246ec82076b880fb6dff98b90954dd8bc8d055c40ee4dc19ed18a2f82fc71ea3955175ccb4b4a51cf767dba66737dba2b130db2f0de1ce4fb789038ad4b84ea9ad685003aba4eb6cbb72494e33b82c548a461d4906ddb912655cc455c5d0ac682eba430ad564c1b47351f82c8e6f93d5738b38097eea0b1a964c397c64c62ee837f6538f3345ee8af4739f5c68a9d3d8dfc878026fa8d15ff83ea54486046cb6c5c3af60fe9ef255cc483e8182e7d05ecff0318f67f2500e1380046e1462924502dabf4f2e64e46c0f2eda46c711aaecec7839386b102ea002da92493aedafa07b6b9a1c0407dd5191d8f543010d7b754c1df1f905c6a06e600378179ee0fa6f3428bb314d705383c39c928cd13466928dd0481ef1fb21", @typed={0x4, 0x32}, @typed={0x8, 0x26, @pid=r4}, @typed={0x8, 0x4a, @uid=r5}]}, @generic="75882a49497fa44391f1b0b2586b1409e3acf38e419943859aec095f5d2685d0488cdb2c9e826fb5264250f3d31a3ff3e4d954b813e271e0d597588e4e3fb2c97d8f4c584878b574e317ffe862e5a7c2d37f37f83c02266c7f76da26b5b9edaf6c7ebb16008f2e1fb0640217b9578fd93cfdf7d76194a81124e1069843c4bbbb81e6e2fc77ee004f1c0aab4ef6934c3a54d57581c77ee9d12518e23ebb3e1a9ae1f3216f3547bd0fcaed2d31e906199298e236b8b542fba8ee239012b59ffd6e7039cee873c130c00138d2d10517da73a5a6e45d82c7a54a4d6443f08fd2a91b9721c7e87460df070fdf8ff0b9e39ad2a8e075a70ba77bf59e8d4e96652749d7b766743738fb60e359a232f25104e90feee4504ac002ffa0b0918a69bcad49a0d2b401b79c26765c73b28e028f244429669902a7e053288bac8e1df65a0af5e2a415b483c5f5b0c0975f9be363068e5b77e6df5003ec64222f55604e1c1a12fb4c1a9d80fe19bc39d2db3b30ec866555de26c1c6eb6550e393025d2ea529ea654cc73501564ba0c2a8711a82fc0af3a4f377397130bcdd8b438faa07b7a067251a1d4e78f16f5048ca63bd26c4c0abd060a5a2826dd43a13db132cafb4d1d778628914c620a79309bc6f28ff27173142714af81e16d7a59dcf2f12199817c1c7601ee01dc993f6454d28f78d2a7d82499703bce4ed7b3d3198e7d5d3f2c75e0f1ec6d26eacd147e955a10665354521b80bdf21a585a94fe4a7f635bec4866b7b9cbf2c6e3bbb2355b651848adf336864b89f4087cb96afcec40f0f97aa5ff3686a25da6d0bebc4928f93319b5fa2aee99645ade0b0c0a4316e1d217f3f38d004e3a12f29cfa82ff614e008b9b93024f6a840a8df1a429e5626db3b98567256ade2b9525f485b1a7726e3f53049e51cce3ea07f49e3c82b755a00ff69c2aed370343fcf81eae631c0a343780ded5f623aa552168a7a18dccfbea58973e0b26f174e1bbca3119cf3eb78de2be60643aa13765961765bc8b9b8ebc2076bc3e3d3b22953476f0c1726c2a77b7e09ace552169cd5a0a79cb2651b5e2f66b2cc4518643cb872f12cab8b081fc619beda0c59f7f2557e87b1a77a350ce6b4bb0433b492f1dac89566b569501d7ac83bd69ef91122811caf35e00671bafa41145d894fff868087b4e7aa9dbeae5400c97b44319b48dfcce51486e16220dd2a96c2a87a664f0a7ce6dc11a4fed4a01073842847bee833ebef2ccf48df879e4ac46603d1f6aaaaf74505919e1108b5decabd9b9bbc47e46133b271e6c70644da503b3ec7c0e3f224453f9489c2d5f5e3636f51094b561490d36e4f08601504919428005aaf5543d315a33752aeabf9d576fa45084e3e10e1a808627f86edd50cd10ff0a8f6dbab5bb8c1fb8b612906450375b687c62a63c5782ceaa36952528236a9130b6d33ea4e9217edfa307e1c562b7277157809df3be0c567be671c4b75cd8fb185bc81071b9e2f45b137a535e5dbd2367625dceaf8df6c0c5239802f94605398655a2f029fe6432c265399b1876c92dfd2e7034264742f25dc36a68327f390d95450621b4d79b75b70360426425fdbe460854571b0028f2bf54bf4095fd4f9efa3e37d15a227ab5024ff310c282af8ce688996eb31c2dbb45f6321184d892ab10305e122526c1e7703755a37df39f3e9275e0591d3d405e3c5f7e0f674229b4055edec863e607b9d461c411ebd4bc54cf603effe22ee57428d788ae6922ce850f2ea0790702a0322d9a66ae30555b62bbfe6965af43e80ed71e561296f08b24927bc05fae4b05e5daa46acca5f70950c4eb0bf4a75c9aaf3bcb9d5088f36dde28f6494c6834c7cb952364547317b1039c4fb16e37d7667e8fe9cfaada0a9bfa6e89f79245a05f693cefab4ff384046a5ae022fd0a93b98a8478483006453b1aa440f9f76339120bb2efbfdbf4201ffead147a5e0a3ff2132917d1db8e147938f7652600e0617b7f97c12c6bc453673f300c6659ac5d808b1c2def9722086b348ceee091d9f196d79730eb722e1c8cd5b4c4ce4ae0866f3ffda245285cda2e26d4f77698277afe6a9e19998f06af84be2fe3d20d8756a2fc47dceba8be2244e9643a1ade743277ff653962e69b150c8830d3acf69c4239be9eae0ea443441947eeba2d9baa033d209b046db458dde59bc947ed096ce53ff67bec04a3e5f8770f0bba4f3935f1800fca267b3ab7e897ce531cd74756e8baefc40400c5119406bb8309fa6719b3f71f24928a23fb11660476c13023e9c86ef99fd214c3735e1545112e2ed7d62c12893d8c6a0da2bd7cbc7234eeeda56f9f8de224a46728cd2b285a6534ec17fd244d36936b20394b47d09b5523c58ed73230a32fd425a1d98ced94d30c8048108042e055c9081dfb265852fd2306e92cf3e4ab01991df1571a222acaf683228bfc26336de4a95e5a88642f395e91a8406dadcf5d5a3f7c564e8efc67c53c30020bb54c3aedae3b5dbf3b61fd98cdeaa1fdcdf5975ae7cf2db01cb89ef5c21d6e29a9f5e4517c97e282abcddf033ac8fa5169801903d5068281eaea981040ef649f14583ffde088924d467f3aba21681b65a8d752c4e46d766da6fcf395ee4a071ae88a2aa2411a7cf6c2a9fc6fa9bb01c2ce2d8ab511248635f8703720de7eefae39ae0a9ecaba7cbeea302d22c62470db4e54caece301109ba5a2bb7147127d3b24a15679178ee9d0c7780bc36cc37e7bb436f63e453ad535b66a92e77975ee306f205e7fc7b9b633d7cdc7d00723f19b14cb2895cf5d5905daa94cf4863ffb28a6c45add8d4e1155b7469518f0b3249f253e154972cdc7838fc9553a3f0313cff57efbc92e82e3957e8b52c17189b08d27d33bd21fa696823c2a429f72cf817994fed11978f44c0374e186e9e6487cae275c3b1cae46c60967a334772aa5b754ff8319981a749b30b1decca597a78260d6e133e8bc12dd8bb1708a093e63d01acae23a496ff97a0eae7a99fa222073b5a98688cef59523b4e58cd78819acf8326dc29b4f1def0a11ff306d308db3aee61a15b2ae84b3318bba947f5668b7a470a574d00594cb98defeb28a02d82fdd5cff28b21b9aab959563c17272ed20ca9da056b12a395690d9ac779ac6d131d4e7d0413521f325df0b4505fc9fb633368ac8a12536388cca15880f882a99e5cf791acb68b2065a6949a02c7b8130fde771c5b8a93572be15982ed4fd1ac9063554732543117af80fc12a5197d3098219f37d8d9c33e01accfed5294d4988afc366149697ff0ad00e7e2e3fd80a1c624492e18540e47af8df2a389101d61f7b1365145cdd491460b31a3d29a3f8d599b347ad11ded22409d208edbf1957f3d051ae10624d12088da986c73d706c07805a2dbb9dd7f566d817df82c4801241040e61b276d66045a070f50c8740be1ff252b33e5a13a327170077fae55ea0be842d5d480849b4631b394fcbf248685cdf3ab5e729daf33617a2584f50312c2deef388bb2b0bc24ebf8c8959d3987935b0e01e95dad00fdc7fd4b93b6238b2b4271e84df938e083749287fb83380cf4d1710f42a61448040e02b30b1bbffe854af69aba8cbf6ee6047f3cbf2b1cc6690b746a484c1a51adb312be79ee231af070b2d2ebea6135b9149109798221dd38973d86a3a7f74154d1c25c5b4c358d8cd30f179d0f6ceb3a2327c5ef38dcb40d9333b18d40015fbdbf80631a58feb15828626eb1ad8e3fe88ca9c0e33305e9c277559f6acf17bb60644811e784e2756b4842e7179f6ba764c3cd17f82b73bbac808690de4dc0ee0d4d0d132d3c92ce855a25339a47242cfc5f492c1f884fe9d049e9ee83f8241a9bddd19e7ba65ec6a98d094d44c6ff8c08859cc97d526d84ad91611515b567a29b158d18bc9b714163ce4970a34487964c30dfb8f5dbac8917a6897b3f9bf9922d3d0281722423658ef2a74101cdc8cdf3bd6758f02342edd191f3d19f259f63045012190339d889da8659f16e5c9e3a830aa3c70ed8b81e7d24d95e5cfd3dc4be86b5e98a7105cb7c948fce335a3317a6fb655d5e2205489d6b4a2c7327a2c4171c7daab33f0a894471e87ae3e272190f3ebb920833d62f4a79c899468a71cc40955c971378079d73beaeb7e8d34f0869614b2bf5e505833b8f9170ff6badb257f1b671a10848d4b35eb6d8d5ac215135197eb0e5c77c2027218e9f04b735466d9980d807101ecf26d664cbf5a7ca45a275763d1153ac1e3fae2fe407224656fa8a0395f5c6549295ee787d3c821b6bfca325dde131a6534189fa7d55447fba07bc385f674bc5b871597b5efcc33640c3e0d1ff4097aaa932819e05b49f7cfb2e6ee2ec4df33605ccc0ca7f8450e2c44efc18a7b73dc06be4e887424f1c5c9c018055377e3264e361ef0c275895dec039500db16dc27ef99ceea3d27548a33725a9ae71781d218a93940505b8329689c996583dd6cf057394b9dc31c6fe331fcc22fc34812b4dc69ffc4bb383a7c02ae1d29fd51934554035b145525ee014a3da2cbda7772a7291564aa72f7f6c57e8d67eb7a5a97ebc5667e60f4319d70bdf10b57c9909e479d4498a8f404d92f71ed31659630b0cfae0467c75ce9a0c632aaaeb875ec2f3c818668195478372c9aa19c8a2fbc0698200121c7e56cafd7128b80ab6521a74ff2cad66bc95c579717b1a51e957e7b73495025b48ff5721ded21e957e4da59e5e53363bcfe2ccb42c8581cb38603fbb78e3972ed6e034ebf27ddadb15d542287e243a2e582b87d7b2a8cde1384b122abb7b8aeb6a4cc251270bfe3bd280d591280cec432fa59f3d1697f48d019e95bb0bf21c8765a42a58959ad9dbb05c76ae59e0f9eeab4a8d6538b62a70e90b0d3a4acbea785ba8b1c06c7eb096bc29471e00d1d4c47f79ac91f8bb9e40891cca7c7310fda1771a5622316e0453286be4b30701c75061f3268bf11b1dcc4885ccdf13c44e1123d6cabe5f37b32fad6cdc13aa6e9ff5335ea1e915cc8cf6167c43c77703a8f8f295b33025209ccf394304093e355fc9f45402ec4ea74137bb9b1a9694274e3c06c14dfbc0de149b2af06706865b6b66263da72166814794d390a052bd9d016620d704120a261084612e26934e0ed20fab13635056ee21ffb9f606e97bc0ad35acae6f0691ba650541a096d8e32dd5054a6710f891ebeccf3a12177f3a5a8e8a49e4451c394506d77a4f92cbc0d7b3e707e9f40c1ce497f2826799371a3ec98131fa67ea013a3780a7673d711dabbaf79fb33d9081a5cfbd4729ecc5189cbf7896f5c150c91d644db1023aeb0706a402a62f4cedabfa055d90ff3bea269cbba38128f159abbd3d1901cab11aa6b3c099c5a67e8ae840095205c7a13153df1fe547923eb58ceff94a9d8ea7b659cd4e4f2771010b19fb9f5475e2c2c160a61c6e0d0d2c0ecb5f5cbed0c480946bddb1de7c5354441994f56eff35fd62e6ccd7e034c14a0b4c106ccff29584686a231f96aea34acebd24efb2802197a894612a50657510d4780ff9d752d36a0515292669ca7228e182ac0c4e5c2857cb6de5881d05a188eecab0806b1ce0b176d371965e6d159871a2ba113e37b90b0aaf57068ac73bd5e68af6c0acc7c490185b546d22acb8d11a92cf1c6fcbba92f8eda79725446205659b7fe1a13e1cba14d204e0ef1e3633d7e7beab66eb47be45de248d0aa6d187e28885d6b6ba06ad94cb208a66ee0f8d2a10d52d26250e04fbe6912b1c427667ea0998d7c57c4de5a10328a49f5ef32436712b2f8266670a1ac656", @typed={0x8, 0x4, @pid=r6}, @typed={0xa8, 0x93, @binary="9358b9eed4b44711b37bccc4a3dbdb49a7d086c10a3ed5ab5fd8d806834c365cfb6b121c112c61d46fef5af428f6842bd5def32a1ea567625f7bba46b4736d69fe2c64662c2b176de9bf9647363fc42fdd26d94baf5aacc2ee6f124453fcbd336e13d5d7b7357128a398b23f726c5e4d5a188166b29d2a8c2bd5abf679a3cdae0bd8088919d01cbf63d5f8d45d1062927526c2ade18c545a9750874f1cb4569cf56f618f"}]}, 0x240c}, {&(0x7f00000026c0)={0x21c, 0x22, 0x501, 0x70bd2b, 0x25dfdbfd, "", [@generic="654755d58e628022a7a089cbcf8006e990d9561fee6813fe3ec3a13b942043ed54d678e185a05312206b5816f5b56c3f2e7f7bdec7fa44bd667eca78a5538c44da66022d6ff4b84a461953b37b32d2faf4841fc96a7c0d9d86ef6b099c7d8b384ed123a411f3ecb6c9ba6143822d6ced6a8fae690bb9458b7bfa62372cd1752dbfd8781779f302d4dcde42e3807f5b", @nested={0x17c, 0x30, [@typed={0x4, 0x4e}, @typed={0x14, 0x17, @ipv6=@mcast1}, @typed={0xc, 0x5, @u64=0x4}, @generic="82494c0dd3c335ff72548bf8fd4110e1473186682d005aaedfb38214432547d1f36bfd65cc706606bffc3f6cd5f5272d2bcddfc188c2d6231cd2d0c982689b87cc3e1dae6c991b3fb64f7433708c5e81b72190205b6dca3ec6cd2dd4e5a268727b943ca97de5021fb2bf71c7f82babff3c642844e63136ad76ffe77d98f4c4043535e5748e0fddf1e4b987327e9c19088d283c74f09edb7236952ae31ddc93cc4a9b17501d10c52b8ecafcc0b4fc637e54890c1b0eb30c397fcbc21661e70cb9586dc3a28308b37277c36ac5ef9f", @generic="bcb41d875a8ecab3f62a9232d7534158e022b5e4f79c6c08f9541c0490e7055f2e6e457c91b0af4498e72fef303fbcb05c44bfd9e5d5e56177338a0e7bbf8183f6b7b60c00279b2b9d6cf8e2bdd8581786f5b54653daa55e3a604403b3388c24ef2830d4e0453ebdf56e680f6da766a0982b2c1ca1433dd5bafd5cf458", @typed={0x8, 0x54, @fd=r0}]}]}, 0x21c}, {&(0x7f0000002940)={0x1350, 0x29, 0x20, 0x70bd27, 0x25dfdbfb, "", [@generic="23c43415184125f2e23bc203c442426a9bc5215f143b5d5389233c61a380ad460f81c1e3e46fde1c8abc96973f643e061531ccadb5e9eb39042a4e5bd4676623ea40ae08d2dc5fd92a5f2e2e1e654f75802e568f6687981f68075fe9877eea1c17f709c9061919edb06c68cd74e17e2e29fd8c275c720bc25c2f526be60875a476df5453610a", @typed={0xc, 0x10, @u64=0x3}, @typed={0xb0, 0xffffffffffff8000, @binary="b8cd533898fdeab98be8de6a7fac1cc87f6072de9e83c31ccbf1509425cfdf1853028f1bc30d704ecd6713b1c41875ae4dd7f50d25349b330ed7e41609fe68fc612f2796db4c7ddf8fef4414fae57f6976a727cb63652fb123f0300f2ba26765aeb3081d238b95b74906f2068e89f3f8b95b42440e05b46afd9927e01412331d2dbde6e07a7b02f6bd58a15acf2179800d1f659b916e3ce62a61d605326cdafbd43520307e28e38110"}, @typed={0xc, 0x77, @binary="0e40871d109164dc"}, @typed={0x8, 0x94, @fd=r0}, @nested={0x11a4, 0x41, [@generic="9423d293425561a10a4340aa76a91247d920f4a60e22137a40189675d272652adcb8d1b594b68c300d0880cbddb5de273b2913185ce95e9892ffc657fb87523848cfb9d1f44d1a711419b39160a93e4f9fd3a2cbbec139a813685d598e79ece4a83a08ee493253ecdf7e16574aac4764df8d94a6696af37519e4bc458e3c88767720b1aa8c93038ae0b78b70b266de61274eff3f52", @typed={0x8, 0x80, @pid=r7}, @generic="8e44affbfcf1036661c1e3dc3a32d00b41d6fd9a126f2875404fe6508747bc3b5ffdfae03b5510c7915244621591d3685ad9f65854f54632feedae606901826d57e3c40d499c1ef7849a2e0122c3e01455a71eff00fd14783757f1f047a1d158bbbc88b247f311797892b0afcc12f8394aa87eb08cdbdef58f0adfe0124d61d6147ffc98bdb31433ae94308fbe15ba5f2c6dd0405ee434", @generic="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", @typed={0x8, 0x53, @fd=r1}, @generic="3aec29183025db9f2cc8812665304f33e89f64f5799aafb08fd5f756db0c8d59008b8cbee926cb1a1e3c027d687b3273a22c3055610cc4caeec7a1231d8606c35644c83d5a99b3c1cc8bff07d5fc68f4f3547a08b0f29fd985091730211bb93202b101"]}, @generic="180c2b28b0878e55b17e75074e62f46e83c569785dd4f0e7d0dbb7eee34fa9db92be86a9f801793facb22ef22645ad7dce94c20a381cc9bab4319eb7cfb7a7b6261eecbd"]}, 0x1350}, {&(0x7f0000003cc0)={0x1278, 0x10, 0x208, 0x70bd29, 0x25dfdbfc, "", [@nested={0x11f8, 0x25, [@generic="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", @typed={0x10, 0x3e, @str='/dev/zero\x00'}, @generic="2c45be635cae3af85f6196bf09a557cb1a65ec55fc49305f3c0f36101b8667420798664e861d10a460dde22194f4c7a07a127138ffc5d16eb2e24fb1ce91f904b59ebfe4d3fb843a6a2c296e7c7975a7e73d20952eda04fac635a7846c9dd8fd6dfc62e94c2b54f48da631d96660a2c79e76fbddd474c3084797a6e7a1b37ffe8b13feed216a9831a80a5b7d026bbbc07f63868850a5e32615edd2d0945b465e81ff5de65daecc743a1a6f3ca43925", @generic="da9e7a672f5785e04617b45fc9fa56fa1e14d918b13750ebcf6da2f7716c73aad26d4810ad5662a93eddd1220d7b15c5050b7592a13ec6d13d143416f87524e4f5d878ca78615e69634752b781794c3f536a40079759594a5f24ab80e9f4c7c1aeec716344ac5d7ba56892288a2d741024a4658751fd5b198e5bfd72243d9592aea854c575bc030d10", @generic="d3df7dab6015911940713cdd56dfba087610e1a2f93dc35eb50d72da7f9cc6af70e5c15e952b982cf376a55bbe5171d049fc6d064a93be77dfbf12822e6dc99c40f29e46a98c06960a3833e0b9be147e46a7f928f047076d370be06deb1bbee2ad97bda50ada3ba4cbed949e831113e00c864b863c1c660a080bc0844b80563ddb98e290da0f6810eb0ecb73b844449ca448a3f240e89f7ccc2de2b29547d2dffa6e93e2630da7bdc1"]}, @nested={0x70, 0xe, [@typed={0x64, 0x26, @binary="90c8b0ed233b929414d9dfa56d289fe989af908cf02e8256484ac55bf7fef09880de5b723d43a69457e1a285eb4dfc26b0e517195f41c48bc3900d9b9885b025d76ac627ad4ce8af21e878669075c106e7a9e1c798a8e10a5eb510b7c5c5221d"}, @typed={0x8, 0x88, @fd=r1}]}]}, 0x1278}, {&(0x7f0000004f80)={0xf0, 0x1b, 0x100, 0x70bd29, 0x25dfdbfc, "", [@generic="b1cf1b3f9df4a4c362903dba04107fa851d805bc1b839287500d83fb45b90dc4428ba7a1380adc6795338a95d4de3a38b4409f91233c22f0afecdd7982ad6f8848bbff96b1f15db2e0f904790fdd6dae842b1933a6715b5af7c49b305ca2e0615338ae74383d3098b28d9f79d11a6ab4b28ae3d6cdce43f109092a4066671689866b85ed06cfcd6dea12a6b61c6fb35347d4c5ad7f30a163f056ea857c745c23de0c2f4fdb68ee8053e4aab65167c529b23342afa6658db63a26db578a91ce06a03dd74c8263eb9fdc202270cda4fa6142", @nested={0xc, 0x5a, [@typed={0x8, 0x20, @pid=r8}]}]}, 0xf0}, {&(0x7f0000005100)={0x1498, 0x27, 0x0, 0x70bd26, 0x25dfdbfb, "", [@nested={0x11fc, 0x4e, [@generic="506c3570bb66652510c29249419972634c8fc71e649d3ff7d122f8981a7cb7a6a21705184bf36a0ad265a8b744ece18d94c1f8e94b80cc412eff277a1119e05f264f21eca3c0b86a74458e644c145f2f6fd93d6b94584ce9e7ce8a438ee12359ee7b60245d1edcf4a5597d77777551e057d1158f75c7a2847d948e764571524f24aac5aa8847f67e1b6433e290213875e600949e8e77bc5dfca0aa39120271afc0604d523d98b5746ce673123e2203135082f98de588b6696d16532937dc4b14d9c217b2b785a6849fce6b7eda5ed9fabaecc7cb673e6b2324ed153fb79f4a", @typed={0x4, 0xa}, @generic="65762c8b8cf390d7b32b7dedb19f77ebbfb4db5e1699e4c4cacbbce33a0ce79206f68fa6e815167a1a1c75ddd687b467210d4813e5476a7404a395e3ce790c07231640e7c1938f63f8a7fc7f9af1d93d2057bb656cd5497e1fd59ef2fd1b671806bda3c2b78cdcf1b43f60bc4c4a4b7fd0a6e6807d5c38b14e66102c73762c7b98bd8bef2205f5f93c5914a8e6f90e9bb498418f44af8f1222372bcc3894252737ce04301daf3eba66b4a403467d6689017c936caa9bc5fb30581eb0344e1e71503209614effc62457026926f7c94adf0c66f51c5aac3af44c9f40efd99b402f07a9b8feeb69cece2738f9cc739418fe0bff3cea11d74c47dc9a8f01311c641a208ecb2d5a0850918a9d705944a5b6d437f32c66b1684a1b6882311d2a89ecfa4eab53b87f3909b169c42cffc22be012fc35f327effa0b37d8e3118c2cf5a620e5242d9fad73c7d07890194f14792e9d1c9543f1b30d832ad34ac1164660d9235257c10761827e2cc29d7f34188a3ab4c6e60d10f727474356da50234e968ce5f234f376479bc1d6f1453733240c90a9323f60a2f43a51e963462c7a519d3efb7c422c03882dfa10df63652af4b3a63e0797f553520a53fe72d028ea91abca7be831eb6caa152f1d481a40ed3b77dc0095aa2184c1735de4004ca8c3a46f41c031ecbec632ea220197d01cd57e4fe1b18157cd63c396f215c5a5545dff56243a3780e63d7faf65c404399630ab6a2f668bcf4f2b7aad46e946fe0957cd56e3d8d84a43af603f4dd2d1d2f0477153c0c845638416d031f08f58ed63fb6a40053eebf6f0dfefba6149a3fb08fea26bac466bbf9a8b3aed969f161fa17c55414a93134820d0e444e53655503773b6be4b99d72eb6d7a0464748f87e80b941001c41aa558cf6250ea2625fccb726ab03fdadf23a47d8beb20fc679862906ad3114b4c072272235849e49905fc6c76b2adb5e5337a899d8d1ac1ae57d5663455bccadfbab59ace02efb083ed38d7534dd2b9a22cfb268c9e3c77e845946b36468f275bd2099438ab76c993d15f48ebcb30af658737c0275c2fc4538c29d556aa37619808688eb13025058ca6aa99bda66df26b6caed90d844ab961c23eacb7ec9dc7f9995319d2b41d19eecb02500211836f03fcd679e5c9b349a7112c1c9e3b183c872fe6170809e0017c851b9d78f823f113e28e001b63b023ee433fd391b0786cdd436ecf4938b7f203c8779e5220b15828640afd2382f604eb9876e62fca2b89a452be73510aaf8b10d257d42e5211218779d7d7cf031467a457159e41b5124e3d220daf54c8682885693d53d7fdcce30490364da2fb9ae719452750c27454d2eb6143f091c57fe6eb765b16fee800f929309bb51d4287152e28ff6db0bc1c21dce1546f9048bbab8c3bc8d6bc0f51125b41ec38d7edba0cfe06a90462cfbae86388476043070d2dba99eed910910e17eb075dadaf56701c329f3543b46a5e1c858a23798a60762f3b05c1025425bc97229ba1af3118825d2ea9474ca6f62d867dcfe939a887e9ccb6a8ee84018c46304204062250772b4c6bd1dafb92eb4bc769124655fb11cff07777b63a8a44a6d129c246166a2d974c51e46df473b05e4eecccaf0101186023220a9cfdfb5bd6bfdfdc942b767013a509e7120e883ea60fe0f677d6c36527aea764d70fc4fc8988fa26dab14e2e22599a8f7102b7eca6fe2796ad4481f14ef04c2cbc52ccb72df255c6cebdf50649ff6ed371ff26f0ac1bae71f00e160768ad11e99b5a1df096eb45816ee04ac1451333fecc23a9cd4a9d197db40f8111c25312fa631fc70075902bde01e4fd6dc8ab859ff0232ecd5bddd290a22bb09f16f3f96b6688918723f03980a0b007b6d86e64df710748d34d08792c2fda4aa7d2263e8df23317d7a5931da5901095c84c3d58e07e452e38fdde38ba82c752758cb7e3067b8891f0dda73407eb53da45db21c2a6146e17280ca06a7cec28ca8747761764447006072f524bb34694cab45207344e272b2913885ddfb5e3ac256671902a25848b06bc2fc9f27ef6934a739905e1e73868b03d6956dc58f623fa06102612122dc3237944cf623283c0d787f63a98c312ec1ce830c245143a1fc8a4915ac1b6a7a041482233958659bf112a7f1d042787dd1f303ec41d5330b3a8a2f9ca7c6142a41166b05f3d5fbb670b2c08db983a5b35841be351016fcea3aa6d54a411d0b6ef0b2fc6750e7e55cf7e37b4351cf8d92744ada8f0e19de040f8b352549a3da63d06a9f5a85a555507b804a4c03cd7825502c2c0091b6515e31792e606c747b99ed62c50e8e59668322dd291bf47284a2ff2e01d6331578165b45065163783b86883d3bf2f3c1c2c1d315cd4662f6ea0eb76338d9d2224fcef1ca48118b022c228b77f53da51e5d8441340a2dd7205111766528398dc48c4f1b50a74008d9811c2bd670e8329127f60418142721a8006918371c8219c114384d937ab183525b11e37e398009ee93fb09fdc599b41d3c53feef758132a1d6d2d2448c92681db274cd998c928fae8048ee1dafc9459ed640a90c864e7e5da944d685a1c5508548d17ecb20e4927c02dc3b9e46cb37793dfedefb74b74f70e7c6bd6e6e4c62eb842e717db98fe72507e2b123dc6964366515ffa51370f161e64e6198a57b7baafe759657862ebd72d4a0350d04e6ba6c77ae86c220a337997c218c134c68b2abdb0dba716e056e3d207892c9cbed9e5b88af14bd0ec385b6be666c5038312f41191b8c31bc69b42b24582a768e1ea092e77f061b55d8c94e4ad3ab9aff895e3ed8db31843f9b7a0c79caf47803c36a691f638eaba077900053b49e7890769d66ef00c98a2d403e4d2a60e393b3eef665c50ea21c04177c682855517117c83c0c66edbec1eb14a8220a0a790bd5ebb0dca43e77a42ff9581e10bfe8502011ea677b08773e587d72a699b6bd56e84a5181b30a9f02d74535d61efe6784b4f2e7a2f44112611fae0fb50cd8d864603e8eda685622746afa641b30426ce0c0842f7960a72c6aaa0645ed17560022265efe205d57b6558d9645ba5d0f470a574604c5da6861822a718a1cf5730507569e383f3e4f5895007d1e4c413004c8ee159078be591ab3179369db063ae6b69d3bffa8676947b8314d20058a55d259d7fa921c2bd4e2cc29e43230d16cb1d4b6f4fbe2e0d70a325a72b1f223d510fac9673ca5f0a8a0c99e943852c227c96cbff36c8774a764026400638d1c1b2a2ba53ff123885085975aaa35daec6a8a5c9eeee88d1edd52e6fa78d93571255b214cddc431f8cf15e88c618b7f1514d8fd7741baead1944094c1723e86dfe74a37076b9dac929789d983e133c8d127fc2c1e681023f5f33088e2514fe587df1d65f6c85c414f36f0ae07faa8e5631f5f1ca9062306ba09b3b2b92863ef32eedba2e776e447f2dc22d7391f13479798ae8dd58fc041c3b964d63979e272e3b3e17353b889bc6eafcd1124e8a2262ff354e131534bf68ebefe2d2309f54f2a68d28c3219e5fe1dfdc1cde7efc0f4a6bf62d63f91660acab197026f617dae515d7ffe3d68a0d6f09b497837c9b0d26ab69edbe868c2c5550465ae8d244af7b92e77029eee3486a200d8206c192c87e54792b84945d1d8a28e6bdb7023f87fae98048ae5fd2cc0684f619281748553ff669e5fe4b646e494867bb6601d62df34b38d697315a7a9eb9b1e6ed4ffc068e6c37afe25fed162ba35b38df0ff4a5b1e239813f45a757611b3b41c9c8b745af001eaf250a6a50180c7da1fa86019b9a44b6f802e946d9e0f31470c302bcffca6ef44c3ed38f7975191defa1c6ef63146fe1c6280bd31b482d61a8384492eee4bbc1741b2e293f2129024370c8903d3689bd3146561cdac9dba28a83469f60ca62b8af9ea313a4356d4524e632caa1d03eec9ba1d445641722c34c174fa7d73225765d59c75a8de26493149f65615f2026f7e8df179e0811e6fb87d42f6005132a0e5153e9e979befeab90a6e8c1fb6dcb8a069b3dc61fdac845b94bfa354caec606dbb7ee1e00d987382bc053366a8280f6067c6205c378c35501a4a99702506fe1f4c5cdf9c1c504f9d836e388cdc8411ef203d16215ab240cc0e3826da37c6a87f3702dce79353639aaf9576c0e67f4b2237cf15d89dd195b0678133e02ece7d48e7c1e97f3f3250c5097e6eb1aee4f0264c2f8be48a2eda6b61db4f37c759432b3acb90e127a7b35efdd5d32fb5cd68210e0a0e24e229023e2c32b56e66f2c8b87d1a886887b6506de2d0985929fb81ce716fce792c2078ac8b6e767441b5b27c9f49dd8519fad6026e3b566d612603cbb88e2632168ef35a5532987c44e55651b0e13d6f6f3f1d9ddc8637462bb9052c182e239cb599b1b7a0f92e81c5753f8fe0fb1ae72caf4487caf53d51a6286b5eab231eb8d0a9e1ebba85b505d15ec6eb49cf89e5b23bf2e4dd3f959129537e00bd3b91653f1d29700a9c9ac0722417ca39660fefc3e91e1b3d3230a589cfcb3265342e9d50e3b5f51c241ac9c04c1eab07ee16fa6d244c4b1185e41314e15be7bbfc69936bda51be9a083ed798725fef4c4a01ed9fbfe2685b6126ab55ebf15620944007f2db5ccffa88492d1fb6b85a72b5af0fa4aa0322e78c4b6e13b26248e711882777b9fe5d9d0d9f95ff183f45bca96766cbbeff72c9fa64a8ba40d215fc5c7b9108ef145a87b86a44b81d3e457d9b211945a7b32b66df366be5e0b96bb612aee90c2968c5d1457d44ec5643fe17496867f289ec001bcda44c85b43ff9ac24515b5a58e406fbc573b074fd8d41fb21ccfdde1ada2be1109ba70841dd54ddc2b00b0422f36f26d43fe6c3c939933e5bd22d552ad633de96bb509d2bc5807d16c70c9b4844b2dbe086fb92e93d86b146143c35c36571fa4f8bc3f1cfad8671284a4d87a2756796aaf5091a1201a7439b9986e3ba78d52cd3951b5ca9617f2c636b5ba0df8cf0a0813c5d72fe6a2958fc7cd35b55750b6571482fad6ad9ef2a888d4de1395a6ba41a6c793c90fa490ad090c85ac77f07db0cbf4e79f03f8b75478ef295a529614e19312c01fd6c0de08d3ea239bb4d112f5ae72012213f4c4f8cbf044248e6df5d1c4d9c5ead9936863f7a359f5d964a96699ea63f6d25b46ee6c395886b36776f9241e6023730df4389aa6b56315b52415132d4d777c946d02153e28bd174305d7a8ce08d5f928e351a31204a21bfcff65e1a6aa0c9f651c262f888c607e1772d0d1781c6dcbaa57b98fdf4bce0cf0fa818322c23fd47e8aacffee5e517af1ff7b0555c21b8bbf656fb0efd88798653a62b3c1e5d9813bee3d501d9a30d2b8271c693073f73739be53c522f44befbc922d127c52c3d30d05e879accb7104b912f7f3a097bcc16e0dd4082fa712d856bf0882e805a9777b6467463fba2ab85190f1ae357c0d8df8cd576342db1770e85c274c48718f3548ca22094307d968b489a788806d7ca7cb202fe9c64ae466acd6ba88a604fc0f581470e67f2ef9eba345736fe9ebe7fb3e15ed64c8e5387deff72d33afc27d44c2d3cbe1bb25b6a8be20bac95ebf115bc47e2f23b99893efddb0f93e572c146ca49a0e3043e49b3e7911573a206c1e3c70d9b2acaeb12b207fd44d1599d3606d666cacdf4574ca0e6cad41bc9a629b13f420976cdddffbf42912f93575d9eff0d99b80706121f7ce9ad27e61200e8972c511ab50257037a4009192d17303204f4f1b1ad48ee778971d6aaa8cdb9af69c4e11672c3d0901c8245e0ba422b", @generic="8708288d0a9de6951b16e59148935b3fbb52e0fa47b61b81b2eca4363f0022570cef41d1d50d3e68ae07ffd13785831cad891ef4f086f2a1f0bae3a83671b0baa63a8f4c7d9e09b20ee8d821c7f1490a0052", @generic="b96ea596401785788efe0a2828ecc8e1347de82c18a4003bfa93e22cba7a61556ea97cba3df2cca70d31620cd3a1f67ee1701d5af75c30441f5b7c50891b19a49be0fd7efbb419e274e69836f35ec05257482a768f86b75bd466e519f075384a88a8f3281b07f0a01ef2f70f645d5958ae74f0a00bbc73e5bc308d42b3ea275134df4cdf0b4150b2c9dee9eeb4133ec95ee4f16d1631afdd0cedaa7089afa105ce479819efddd5f0b7f6516eb11558a9e7403b79f5361764e4941fa88317251683"]}, @nested={0x18c, 0x7, [@generic="9153b99e55e19ef27980ac75b373bd3d484271169308088b802fc5fe74b5537a3523", @typed={0x14, 0xd, @ipv6=@local}, @typed={0x4, 0x91}, @generic="005174b5d47a6d3f88b5b1246e46506e8ae09e5d197a594202aba1dd2b192e4e20844d4faadeebf9f11733c5f8a47289e3640b7006a5c44c3d890382bd800415dcc45ff00d0942561555b4fa52d86127c7f60c3fec13d935489d4ac982de30209421d80b2794b514", @generic="b1f3e2b6db3ad9019ff6e397ac50ff34f12e352b877a2d26b72870041b716252ae48129691eb85197eff507b65e1353e70cee5e3e353753d7e06eea6b5116d35b884fea2f6395be47ef2586929d16b0d4d93b663f12dd8af8a2945926cd161225953ec860df735d893aabc1895ebb82090b0df7aa7656fea9130e89f04dfb2344de9746739976aedf8f47cc88216658cb320c54c540f9ac174c727a4413e8b88295fecd89e2452316ffd8a95eef27559e7636e68a77a7a21703226b8c1f10aaa7214b09c4bfca9a3423f30d18ceaacfadbfc6a54", @typed={0x8, 0x0, @ipv4=@multicast1}, @typed={0x8, 0x3a, @uid=r9}]}, @typed={0x8, 0x55, @pid=r10}, @nested={0x8, 0x52, [@typed={0x4, 0x79, @binary}]}, @generic="0d7bf81dd853b506485c64354e90a8d70348405bc45102996c166b91bcf82ec7dee3d9d05698a6dc70bbf6cba34cc9fd43ea76c88f969ade2d752659a3f199069eb83ed7a1cd59cadd27803250e6f134e1c2d6db5d25df4cdda3730c1cca6ffbab48165c08a1090302e9cf6ebdcc2417ef1e8c96ff30381ece90093ea06bb9a7497f46a1dbbc03fc0c9ba418045a6cfc92b1e78a4b4bde7d85de8c184092f3c1b5a6ea0d526c33e16bf5065d17e226e4c3bc9287c62fc04c713970708966efc531cd8fee4002555e5ba0e600fef1e6c616db7f1499c72419f23bbaa1a917ca6089e470b02006ff", @typed={0x8, 0x69, @str='.\x00'}]}, 0x1498}], 0x6, &(0x7f0000006640)=ANY=[@ANYBLOB="30004d260004000000ac990001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00'], 0x30, 0x200000c0}, 0x4) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f0000006840)='security.SMACK64IPIN\x00', &(0x7f0000006880)='\x00', 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) getsockname$llc(r1, &(0x7f00000066c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000006700)=0x10) [ 2269.337410][ T6921] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:36:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x80', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:50 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}}}}}}}}, 0x0) 03:36:50 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:50 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xc111bd94ecddb45c, 0x3) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) 03:36:50 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:50 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x40080, 0x0) 03:36:50 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}}}}}}}}, 0x0) 03:36:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:36:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='re\x92serfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:36:50 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:50 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000000)) 03:36:50 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}}}}}}}}, 0x0) 03:36:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:50 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:50 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21]}}}}}}}}, 0x0) 03:36:50 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x200001000000001, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000180)=0xffffffffffffffcd) 03:36:51 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) [ 2269.948542][ T6971] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2269.948542][ T6971] 03:36:51 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28]}}}}}}}}, 0x0) 03:36:51 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r0 = socket(0x15, 0x4, 0x7) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x80080, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x10000, 0x0) ioctl$TCGETX(r1, 0x5432, &(0x7f0000000200)) setsockopt$ax25_SO_BINDTODEVICE(r0, 0x101, 0x19, &(0x7f0000000140)=@rose={'rose', 0x0}, 0x10) r2 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x400, 0x2) write$FUSE_NOTIFY_INVAL_ENTRY(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="3300000000000000000500000000000000b3892f6465762f736e642f70636d432344236300"/51], 0x33) pause() r3 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x9, 0x801) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000000040)={{0x3, 0xffffffffffffff01}, 'port0\x00', 0x1, 0x2, 0x2, 0x1ff, 0x80000000, 0x81, 0x1, 0x0, 0x3, 0x8}) ioctl$TCFLSH(r3, 0x540b, 0x100) [ 2269.999610][ T6977] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2270.252559][ T6997] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2270.252559][ T6997] [ 2270.278543][ T6999] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:36:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x10', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:36:51 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:51 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48]}}}}}}}}, 0x0) 03:36:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='rei\nerfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:36:51 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) [ 2270.422501][ T7007] validate_nla: 20 callbacks suppressed [ 2270.422511][ T7007] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:36:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:51 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c]}}}}}}}}, 0x0) 03:36:51 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58]}}}}}}}}, 0x0) [ 2270.539108][ T7014] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:36:51 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:51 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60]}}}}}}}}, 0x0) 03:36:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) [ 2270.701910][ T7021] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2270.714108][ T7030] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:36:51 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x10080, 0x0) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000040)=0x4008, 0x4) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) prctl$PR_SET_FPEXC(0xc, 0x10000) 03:36:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='rei#erfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:36:51 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68]}}}}}}}}, 0x0) 03:36:51 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) [ 2270.875279][ T7034] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2270.875279][ T7034] [ 2270.892560][ T7036] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:36:52 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, &(0x7f0000000100)) writev(r0, &(0x7f0000000440)=[{&(0x7f0000000140)="3cdd27f4d8c2959e84ccba4ec10a6a6075cefaee3fa1cb05", 0x18}, {&(0x7f0000000180)="5d0d8480dc87c45c43718b359a9c60714f676148f2a4eb8fe6e21c29dddd08898373bc45e3053a43d572c871687d8ec04db2653db3829c6e8df3d75b713773bde03492001bd54ed351546b73edc7b6151d54db814e662f93df80cd6abffaef426751f0fdf9d151ce9cbfe5c3c3040481120fc7ac4d3c854bed1920ef7983eeb00f2457d31532b00a90a33c1edb7fb9ab3c3d9b38030eec7975c9c60fd198051b7cb41707ae4974d83cff70015b22added0b945b7b9", 0xb5}, {&(0x7f0000000240)="6a72bbcd3c040e108ec94d3d5bbbda6d94badd44fb0c9fbbb7bd17698c66fc0f22b888324ca03af5aae01c91e859060d094dd92a0b1afc44df4f6fc0363f9419f10eba939ad139287150c34d5bd8a28c1f4bdfec99d303f861c734190159e91546d242579939c37376132025ff6913753c9abca7ee9ecbc7770f4e6e57d4789b3759e7edf7fc9175018a9e2f09c8d4d7fc574f78d88b5f4c2ddff69aa3615e43a5c1aba1d8cfda3e6463c27f33c53cc096bbb0fa35fee3c17b1b9dab67c8c80bc44dc7888a166aef40250e9b5a60502d24f1d65025d431bc6eacb478c1db54f7", 0xe0}, {&(0x7f0000000340)="1a7c0a96c22507f8275896d6ff04f56d5ee507707e54967eda5baa44905a78d99326f1c8868604e1e4ff298332fee2eb4981be705ff998a69a7da6246ba43efb2761eedc357bc8b88dad72eabdd93a49ed6d534ae2bb879c129043f2a548075bdf271d4d57975828cc669c8b21e14daaf66e6a5a2761d1a0db79f4e2b8961af099e2d0f625944fea078df4ed07ff1a4753143030c314b415f5718f07f5b92956e5715e6b991f4df967aa34fb6d73f9ee8571c3b6df360cf4ffa5d7c3c3179d2255210b40bd59b15fd22268bda1b530f7463d38", 0xd3}], 0x4) r1 = accept4(r0, &(0x7f0000000480)=@pptp={0x18, 0x2, {0x0, @empty}}, &(0x7f0000000500)=0x80, 0x800) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x202}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x7c, r2, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffffffffffffffff}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x6c}]}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000c0}, 0x10) r3 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x20, 0x400) write$P9_RREAD(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="7f000000750100740000005feba5828bade3acb9776e8a0410c4884d93f44e26dba43045fe4e789c1042935461ff6ea24be88e0e2fa73e4eed7b2e8c8956abec2730fa5a50d74863e30ff789bc292403a1848ecb602c0b7d0374f788908001abb73ec6ebab1f389391bd5e5ad22ba306fe7683a6b855293c43f76579b62b97"], 0x7f) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x111) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000580)=0x28d, 0x4) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f0000000080)={0x1, 0xb, 0x4, 0x200e001, {0x77359400}, {0x5, 0x0, 0x6, 0xfffffffffffffff7, 0x7ff, 0x8, "0afba4b9"}, 0x6, 0x3, @fd=r4, 0x4}) 03:36:52 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}}}}}}}}, 0x0) [ 2270.978216][ T7048] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:36:52 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:36:52 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74]}}}}}}}}, 0x0) [ 2271.103401][ T7060] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:36:52 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:52 executing program 1: r0 = socket$nl_crypto(0x10, 0x3, 0x15) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, 0x0, &(0x7f0000000100)) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x400, 0x0) [ 2271.192425][ T7062] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:36:52 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a]}}}}}}}}, 0x0) 03:36:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='rei%erfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) [ 2271.282816][ T7076] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2271.283057][ T7070] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2271.283057][ T7070] 03:36:52 executing program 1 (fault-call:0 fault-nth:0): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:52 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:52 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0]}}}}}}}}, 0x0) [ 2271.365576][ T7078] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2271.427678][ T7088] FAULT_INJECTION: forcing a failure. [ 2271.427678][ T7088] name failslab, interval 1, probability 0, space 0, times 0 [ 2271.470976][ T7091] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2271.504817][ T7088] CPU: 1 PID: 7088 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 03:36:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:36:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:52 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}}}}}}}}, 0x0) [ 2271.512656][ T7088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2271.522806][ T7088] Call Trace: [ 2271.526114][ T7088] dump_stack+0x172/0x1f0 [ 2271.530462][ T7088] should_fail.cold+0xa/0x15 [ 2271.535067][ T7088] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2271.540896][ T7088] ? ___might_sleep+0x163/0x280 [ 2271.545752][ T7088] __should_failslab+0x121/0x190 [ 2271.550702][ T7088] should_failslab+0x9/0x14 [ 2271.550719][ T7088] __kmalloc+0x2dc/0x740 [ 2271.550731][ T7088] ? fput_many+0x12c/0x1a0 [ 2271.550753][ T7088] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2271.571374][ T7088] ? strnlen_user+0x1f0/0x280 [ 2271.576146][ T7088] ? __x64_sys_memfd_create+0x13c/0x470 [ 2271.581700][ T7088] __x64_sys_memfd_create+0x13c/0x470 [ 2271.587083][ T7088] ? memfd_fcntl+0x1550/0x1550 [ 2271.591847][ T7088] ? do_syscall_64+0x26/0x610 [ 2271.596526][ T7088] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2271.602071][ T7088] ? trace_hardirqs_on+0x67/0x230 [ 2271.607100][ T7088] do_syscall_64+0x103/0x610 [ 2271.611697][ T7088] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2271.617757][ T7088] RIP: 0033:0x458c29 [ 2271.621652][ T7088] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2271.641251][ T7088] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2271.649663][ T7088] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000458c29 [ 2271.657632][ T7088] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bdb87 03:36:52 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:52 executing program 1 (fault-call:0 fault-nth:1): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2271.665600][ T7088] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2271.673571][ T7088] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9f903e26d4 [ 2271.681539][ T7088] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:36:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='rei*erfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:36:52 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}}}}}}}}, 0x0) [ 2271.780947][ T7102] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2271.794256][ T7103] FAULT_INJECTION: forcing a failure. [ 2271.794256][ T7103] name failslab, interval 1, probability 0, space 0, times 0 [ 2271.828288][ T7100] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2271.858231][ T7103] CPU: 1 PID: 7103 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2271.866087][ T7103] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2271.876141][ T7103] Call Trace: [ 2271.876169][ T7103] dump_stack+0x172/0x1f0 [ 2271.876187][ T7103] should_fail.cold+0xa/0x15 [ 2271.876205][ T7103] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2271.876229][ T7103] ? ___might_sleep+0x163/0x280 [ 2271.883960][ T7103] __should_failslab+0x121/0x190 [ 2271.894351][ T7103] ? shmem_destroy_callback+0xc0/0xc0 [ 2271.894365][ T7103] should_failslab+0x9/0x14 [ 2271.894381][ T7103] kmem_cache_alloc+0x2b2/0x6f0 [ 2271.894397][ T7103] ? __alloc_fd+0x44d/0x560 [ 2271.894412][ T7103] ? shmem_destroy_callback+0xc0/0xc0 [ 2271.894431][ T7103] shmem_alloc_inode+0x1c/0x50 [ 2271.938923][ T7103] alloc_inode+0x66/0x190 [ 2271.947993][ T7103] new_inode_pseudo+0x19/0xf0 [ 2271.952677][ T7103] new_inode+0x1f/0x40 [ 2271.956752][ T7103] shmem_get_inode+0x84/0x7e0 [ 2271.961448][ T7103] __shmem_file_setup.part.0+0x7e/0x2b0 [ 2271.966999][ T7103] shmem_file_setup+0x66/0x90 [ 2271.971678][ T7103] __x64_sys_memfd_create+0x2a2/0x470 [ 2271.977049][ T7103] ? memfd_fcntl+0x1550/0x1550 [ 2271.981810][ T7103] ? do_syscall_64+0x26/0x610 [ 2271.986485][ T7103] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2271.991776][ T7103] ? trace_hardirqs_on+0x67/0x230 [ 2271.996902][ T7103] do_syscall_64+0x103/0x610 [ 2272.001507][ T7103] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2272.007410][ T7103] RIP: 0033:0x458c29 [ 2272.011343][ T7103] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2272.030949][ T7103] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2272.039380][ T7103] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000458c29 [ 2272.047351][ T7103] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bdb87 [ 2272.055322][ T7103] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2272.063291][ T7103] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9f903e26d4 [ 2272.071268][ T7103] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:36:53 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:53 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x543]}}}}}}}}, 0x0) 03:36:53 executing program 1 (fault-call:0 fault-nth:2): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2272.088814][ T7104] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2272.088814][ T7104] 03:36:53 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}}}}}}}}, 0x0) 03:36:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2272.176718][ T7120] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2272.314284][ T7129] net_ratelimit: 52 callbacks suppressed [ 2272.314293][ T7129] dccp_v6_rcv: dropped packet with invalid checksum [ 2272.318040][ T7128] FAULT_INJECTION: forcing a failure. [ 2272.318040][ T7128] name failslab, interval 1, probability 0, space 0, times 0 [ 2272.343049][ T7128] CPU: 0 PID: 7128 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2272.350877][ T7128] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2272.360937][ T7128] Call Trace: [ 2272.364261][ T7128] dump_stack+0x172/0x1f0 [ 2272.364283][ T7128] should_fail.cold+0xa/0x15 [ 2272.364310][ T7128] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2272.379011][ T7128] ? ___might_sleep+0x163/0x280 [ 2272.383883][ T7128] __should_failslab+0x121/0x190 [ 2272.391346][ T7128] should_failslab+0x9/0x14 [ 2272.395849][ T7128] kmem_cache_alloc+0x2b2/0x6f0 [ 2272.400697][ T7128] ? current_time+0x6b/0x140 [ 2272.407033][ T7128] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 2272.415194][ T7128] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2272.420477][ T7128] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2272.426724][ T7128] ? timespec64_trunc+0xf0/0x180 [ 2272.431671][ T7128] __d_alloc+0x2e/0x8c0 [ 2272.435833][ T7128] d_alloc_pseudo+0x1e/0x30 [ 2272.440340][ T7128] alloc_file_pseudo+0xe2/0x280 [ 2272.445187][ T7128] ? alloc_file+0x4d0/0x4d0 [ 2272.449688][ T7128] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 2272.455938][ T7128] __shmem_file_setup.part.0+0x108/0x2b0 [ 2272.461576][ T7128] shmem_file_setup+0x66/0x90 [ 2272.466254][ T7128] __x64_sys_memfd_create+0x2a2/0x470 [ 2272.471712][ T7128] ? memfd_fcntl+0x1550/0x1550 [ 2272.476474][ T7128] ? do_syscall_64+0x26/0x610 [ 2272.481155][ T7128] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2272.486441][ T7128] ? trace_hardirqs_on+0x67/0x230 [ 2272.491464][ T7128] do_syscall_64+0x103/0x610 [ 2272.496064][ T7128] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2272.501974][ T7128] RIP: 0033:0x458c29 [ 2272.505560][ T7129] dccp_v6_rcv: dropped packet with invalid checksum [ 2272.505867][ T7128] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2272.532037][ T7128] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2272.540462][ T7128] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000458c29 [ 2272.548444][ T7128] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bdb87 [ 2272.548454][ T7128] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2272.548463][ T7128] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9f903e26d4 [ 2272.548472][ T7128] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 [ 2272.590933][ T7127] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2272.590933][ T7127] 03:36:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:36:53 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:53 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x608]}}}}}}}}, 0x0) 03:36:53 executing program 1 (fault-call:0 fault-nth:3): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='rei+erfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) [ 2272.685977][ T7131] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2272.730807][ T7137] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2272.742090][ T7140] dccp_v6_rcv: dropped packet with invalid checksum [ 2272.753083][ T7141] FAULT_INJECTION: forcing a failure. [ 2272.753083][ T7141] name failslab, interval 1, probability 0, space 0, times 0 [ 2272.757522][ T7140] dccp_v6_rcv: dropped packet with invalid checksum [ 2272.788600][ T7141] CPU: 1 PID: 7141 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2272.796433][ T7141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2272.806500][ T7141] Call Trace: [ 2272.806528][ T7141] dump_stack+0x172/0x1f0 [ 2272.806549][ T7141] should_fail.cold+0xa/0x15 [ 2272.806568][ T7141] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2272.806588][ T7141] ? ___might_sleep+0x163/0x280 [ 2272.806604][ T7141] __should_failslab+0x121/0x190 [ 2272.806622][ T7141] should_failslab+0x9/0x14 [ 2272.818803][ T7141] kmem_cache_alloc+0x2b2/0x6f0 [ 2272.818819][ T7141] ? current_time+0x6b/0x140 [ 2272.818837][ T7141] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 2272.818854][ T7141] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2272.818868][ T7141] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2272.818886][ T7141] ? timespec64_trunc+0xf0/0x180 [ 2272.839389][ T7141] __d_alloc+0x2e/0x8c0 [ 2272.839408][ T7141] d_alloc_pseudo+0x1e/0x30 [ 2272.839424][ T7141] alloc_file_pseudo+0xe2/0x280 [ 2272.839438][ T7141] ? alloc_file+0x4d0/0x4d0 [ 2272.839458][ T7141] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 2272.848883][ T7141] __shmem_file_setup.part.0+0x108/0x2b0 [ 2272.848903][ T7141] shmem_file_setup+0x66/0x90 [ 2272.848920][ T7141] __x64_sys_memfd_create+0x2a2/0x470 [ 2272.848936][ T7141] ? memfd_fcntl+0x1550/0x1550 [ 2272.848951][ T7141] ? do_syscall_64+0x26/0x610 [ 2272.848967][ T7141] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2272.848982][ T7141] ? trace_hardirqs_on+0x67/0x230 [ 2272.849000][ T7141] do_syscall_64+0x103/0x610 [ 2272.935316][ T7141] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2272.941214][ T7141] RIP: 0033:0x458c29 [ 2272.945121][ T7141] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2272.964719][ T7141] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2272.973130][ T7141] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000458c29 [ 2272.981096][ T7141] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bdb87 03:36:54 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x689]}}}}}}}}, 0x0) 03:36:54 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) [ 2272.989062][ T7141] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2272.997031][ T7141] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9f903e26d4 [ 2273.005003][ T7141] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:36:54 executing program 1 (fault-call:0 fault-nth:4): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2273.075505][ T7148] dccp_v6_rcv: dropped packet with invalid checksum [ 2273.089846][ T7148] dccp_v6_rcv: dropped packet with invalid checksum 03:36:54 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}}}}}}}}, 0x0) [ 2273.130814][ T7146] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2273.130814][ T7146] [ 2273.163708][ T7131] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:36:54 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) [ 2273.180052][ T7159] FAULT_INJECTION: forcing a failure. [ 2273.180052][ T7159] name failslab, interval 1, probability 0, space 0, times 0 [ 2273.224238][ T7159] CPU: 0 PID: 7159 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2273.232072][ T7159] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2273.242129][ T7159] Call Trace: [ 2273.245521][ T7159] dump_stack+0x172/0x1f0 [ 2273.249865][ T7159] should_fail.cold+0xa/0x15 [ 2273.254469][ T7159] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2273.260285][ T7159] ? ___might_sleep+0x163/0x280 [ 2273.265138][ T7159] __should_failslab+0x121/0x190 [ 2273.270077][ T7159] should_failslab+0x9/0x14 [ 2273.274576][ T7159] kmem_cache_alloc+0x2b2/0x6f0 [ 2273.279430][ T7159] ? rcu_read_lock_sched_held+0x110/0x130 [ 2273.285146][ T7159] ? kmem_cache_alloc+0x32e/0x6f0 [ 2273.290269][ T7159] security_file_alloc+0x39/0x170 [ 2273.295292][ T7159] __alloc_file+0xac/0x300 [ 2273.299711][ T7159] alloc_empty_file+0x72/0x170 [ 2273.304480][ T7159] alloc_file+0x5e/0x4d0 [ 2273.308725][ T7159] alloc_file_pseudo+0x189/0x280 [ 2273.313662][ T7159] ? alloc_file+0x4d0/0x4d0 [ 2273.318299][ T7159] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 2273.324549][ T7159] __shmem_file_setup.part.0+0x108/0x2b0 [ 2273.330187][ T7159] shmem_file_setup+0x66/0x90 [ 2273.334868][ T7159] __x64_sys_memfd_create+0x2a2/0x470 [ 2273.340239][ T7159] ? memfd_fcntl+0x1550/0x1550 [ 2273.345008][ T7159] ? do_syscall_64+0x26/0x610 [ 2273.349708][ T7159] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2273.354993][ T7159] ? trace_hardirqs_on+0x67/0x230 [ 2273.360017][ T7159] do_syscall_64+0x103/0x610 [ 2273.364609][ T7159] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2273.370585][ T7159] RIP: 0033:0x458c29 [ 2273.374478][ T7159] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2273.394331][ T7159] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2273.402748][ T7159] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000458c29 [ 2273.410719][ T7159] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bdb87 03:36:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='rei-erfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) [ 2273.418693][ T7159] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2273.426663][ T7159] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9f903e26d4 [ 2273.434683][ T7159] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:36:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2273.483232][ T7163] dccp_v6_rcv: dropped packet with invalid checksum [ 2273.508600][ T7163] dccp_v6_rcv: dropped packet with invalid checksum [ 2273.655171][ T7164] REISERFS warning (device loop0): reiserfs_fill_super: Cannot allocate commit workqueue 03:36:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x01', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:36:54 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:54 executing program 1 (fault-call:0 fault-nth:5): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:54 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x806]}}}}}}}}, 0x0) 03:36:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='rei.erfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) [ 2273.783535][ T7172] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2273.790410][ T7179] FAULT_INJECTION: forcing a failure. [ 2273.790410][ T7179] name failslab, interval 1, probability 0, space 0, times 0 [ 2273.806621][ T7181] dccp_v6_rcv: dropped packet with invalid checksum [ 2273.833651][ T7181] dccp_v6_rcv: dropped packet with invalid checksum [ 2273.854269][ T7179] CPU: 1 PID: 7179 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2273.862106][ T7179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2273.872179][ T7179] Call Trace: [ 2273.875485][ T7179] dump_stack+0x172/0x1f0 [ 2273.879824][ T7179] should_fail.cold+0xa/0x15 [ 2273.884423][ T7179] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2273.890236][ T7179] ? ___might_sleep+0x163/0x280 [ 2273.895209][ T7179] __should_failslab+0x121/0x190 [ 2273.900158][ T7179] should_failslab+0x9/0x14 [ 2273.904661][ T7179] kmem_cache_alloc+0x2b2/0x6f0 [ 2273.909514][ T7179] ? notify_change+0x6d5/0xfb0 [ 2273.914275][ T7179] ? do_sys_ftruncate+0x41e/0x550 [ 2273.919300][ T7179] getname_flags+0xd6/0x5b0 [ 2273.923805][ T7179] getname+0x1a/0x20 [ 2273.927711][ T7179] do_sys_open+0x2c9/0x5d0 [ 2273.932138][ T7179] ? filp_open+0x80/0x80 [ 2273.936386][ T7179] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2273.942636][ T7179] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2273.948099][ T7179] ? do_syscall_64+0x26/0x610 [ 2273.952863][ T7179] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2273.958934][ T7179] ? do_syscall_64+0x26/0x610 [ 2273.963614][ T7179] __x64_sys_open+0x7e/0xc0 [ 2273.968117][ T7179] do_syscall_64+0x103/0x610 [ 2273.972709][ T7179] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2273.978695][ T7179] RIP: 0033:0x412bc1 [ 2273.982586][ T7179] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2274.002183][ T7179] RSP: 002b:00007f9f903e1a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 2274.010588][ T7179] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000412bc1 [ 2274.018581][ T7179] RDX: 00007f9f903e1b0a RSI: 0000000000000002 RDI: 00007f9f903e1b00 [ 2274.026552][ T7179] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 03:36:55 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00]}}}}}}}}, 0x0) 03:36:55 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) [ 2274.034521][ T7179] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 2274.042490][ T7179] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:36:55 executing program 1 (fault-call:0 fault-nth:6): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:55 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe80]}}}}}}}}, 0x0) 03:36:55 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) [ 2274.189634][ T7193] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2274.223966][ T7200] FAULT_INJECTION: forcing a failure. [ 2274.223966][ T7200] name failslab, interval 1, probability 0, space 0, times 0 [ 2274.256331][ T7200] CPU: 0 PID: 7200 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2274.264172][ T7200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2274.274243][ T7200] Call Trace: [ 2274.277542][ T7200] dump_stack+0x172/0x1f0 [ 2274.281888][ T7200] should_fail.cold+0xa/0x15 [ 2274.286486][ T7200] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2274.292303][ T7200] ? ___might_sleep+0x163/0x280 [ 2274.297173][ T7200] __should_failslab+0x121/0x190 [ 2274.302114][ T7200] should_failslab+0x9/0x14 03:36:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) [ 2274.306623][ T7200] kmem_cache_alloc+0x2b2/0x6f0 [ 2274.311476][ T7200] ? notify_change+0x6d5/0xfb0 [ 2274.316242][ T7200] ? do_sys_ftruncate+0x41e/0x550 [ 2274.321281][ T7200] getname_flags+0xd6/0x5b0 [ 2274.325790][ T7200] getname+0x1a/0x20 [ 2274.329694][ T7200] do_sys_open+0x2c9/0x5d0 [ 2274.334122][ T7200] ? filp_open+0x80/0x80 [ 2274.338376][ T7200] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2274.344627][ T7200] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2274.350089][ T7200] ? do_syscall_64+0x26/0x610 [ 2274.354784][ T7200] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2274.360855][ T7200] ? do_syscall_64+0x26/0x610 [ 2274.365540][ T7200] __x64_sys_open+0x7e/0xc0 [ 2274.370052][ T7200] do_syscall_64+0x103/0x610 [ 2274.374651][ T7200] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2274.380556][ T7200] RIP: 0033:0x412bc1 [ 2274.384459][ T7200] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2274.405582][ T7200] RSP: 002b:00007f9f903e1a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 2274.420580][ T7200] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000412bc1 [ 2274.428556][ T7200] RDX: 00007f9f903e1b0a RSI: 0000000000000002 RDI: 00007f9f903e1b00 [ 2274.436623][ T7200] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2274.444587][ T7200] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 2274.452652][ T7200] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:36:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:55 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:55 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}}}}}}}}, 0x0) 03:36:55 executing program 1 (fault-call:0 fault-nth:7): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2274.540925][ T7308] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2274.540925][ T7308] [ 2274.594137][ T7319] FAULT_INJECTION: forcing a failure. [ 2274.594137][ T7319] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2274.607373][ T7319] CPU: 1 PID: 7319 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2274.607382][ T7319] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2274.607386][ T7319] Call Trace: [ 2274.607411][ T7319] dump_stack+0x172/0x1f0 [ 2274.607432][ T7319] should_fail.cold+0xa/0x15 [ 2274.632889][ T7319] ? __lock_acquire+0x548/0x3fb0 [ 2274.632910][ T7319] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2274.632929][ T7319] ? __lock_acquire+0x548/0x3fb0 [ 2274.653156][ T7319] should_fail_alloc_page+0x50/0x60 [ 2274.658360][ T7319] __alloc_pages_nodemask+0x1a1/0x7e0 [ 2274.663740][ T7319] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 2274.669457][ T7319] ? find_held_lock+0x35/0x130 [ 2274.674234][ T7319] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2274.680042][ T7319] cache_grow_begin+0x9c/0x860 [ 2274.684808][ T7319] ? getname_flags+0xd6/0x5b0 [ 2274.689488][ T7319] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2274.695734][ T7319] kmem_cache_alloc+0x62d/0x6f0 [ 2274.700582][ T7319] ? notify_change+0x6d5/0xfb0 [ 2274.705343][ T7319] ? do_sys_ftruncate+0x41e/0x550 [ 2274.710371][ T7319] getname_flags+0xd6/0x5b0 [ 2274.714875][ T7319] getname+0x1a/0x20 [ 2274.718767][ T7319] do_sys_open+0x2c9/0x5d0 [ 2274.723195][ T7319] ? filp_open+0x80/0x80 [ 2274.727446][ T7319] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2274.733717][ T7319] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2274.739173][ T7319] ? do_syscall_64+0x26/0x610 [ 2274.743849][ T7319] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2274.749997][ T7319] ? do_syscall_64+0x26/0x610 [ 2274.754680][ T7319] __x64_sys_open+0x7e/0xc0 [ 2274.759185][ T7319] do_syscall_64+0x103/0x610 [ 2274.763780][ T7319] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2274.769665][ T7319] RIP: 0033:0x412bc1 [ 2274.773559][ T7319] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 03:36:55 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2100]}}}}}}}}, 0x0) [ 2274.793160][ T7319] RSP: 002b:00007f9f903e1a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 2274.801567][ T7319] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000412bc1 [ 2274.809540][ T7319] RDX: 00007f9f903e1b0a RSI: 0000000000000002 RDI: 00007f9f903e1b00 [ 2274.817506][ T7319] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2274.825480][ T7319] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 2274.833449][ T7319] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:36:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='rei0erfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:36:55 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) 03:36:56 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2800]}}}}}}}}, 0x0) 03:36:56 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}}, 0x0) [ 2274.940330][ T7319] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 [ 2275.001114][ T7321] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2275.022238][ T7330] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2275.022238][ T7330] 03:36:56 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x9}}, 0x0) 03:36:56 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3580]}}}}}}}}, 0x0) 03:36:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:36:56 executing program 1 (fault-call:0 fault-nth:8): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:56 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}}}}}}}}, 0x0) 03:36:56 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0xf}}, 0x0) 03:36:56 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305]}}}}}}}}, 0x0) [ 2275.299005][ T7353] FAULT_INJECTION: forcing a failure. [ 2275.299005][ T7353] name failslab, interval 1, probability 0, space 0, times 0 [ 2275.331786][ T7353] CPU: 1 PID: 7353 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2275.339717][ T7353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2275.339724][ T7353] Call Trace: [ 2275.339749][ T7353] dump_stack+0x172/0x1f0 [ 2275.339768][ T7353] should_fail.cold+0xa/0x15 [ 2275.339788][ T7353] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2275.353127][ T7353] ? ___might_sleep+0x163/0x280 [ 2275.353148][ T7353] __should_failslab+0x121/0x190 [ 2275.353162][ T7353] should_failslab+0x9/0x14 [ 2275.353182][ T7353] kmem_cache_alloc+0x2b2/0x6f0 [ 2275.387115][ T7353] ? rcu_read_lock_sched_held+0x110/0x130 [ 2275.392837][ T7353] ? kmem_cache_alloc+0x32e/0x6f0 [ 2275.397869][ T7353] security_file_alloc+0x39/0x170 [ 2275.402898][ T7353] __alloc_file+0xac/0x300 [ 2275.407315][ T7353] alloc_empty_file+0x72/0x170 [ 2275.412077][ T7353] path_openat+0xef/0x46e0 [ 2275.416495][ T7353] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2275.422390][ T7353] ? kasan_slab_alloc+0xf/0x20 [ 2275.427153][ T7353] ? kmem_cache_alloc+0x11a/0x6f0 [ 2275.432173][ T7353] ? getname_flags+0xd6/0x5b0 [ 2275.436853][ T7353] ? getname+0x1a/0x20 [ 2275.440920][ T7353] ? do_sys_open+0x2c9/0x5d0 [ 2275.445505][ T7353] ? __x64_sys_open+0x7e/0xc0 [ 2275.450178][ T7353] ? do_syscall_64+0x103/0x610 [ 2275.454944][ T7353] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2275.461019][ T7353] ? __lock_acquire+0x548/0x3fb0 [ 2275.465955][ T7353] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 2275.471334][ T7353] ? __alloc_fd+0x44d/0x560 [ 2275.475850][ T7353] do_filp_open+0x1a1/0x280 [ 2275.480353][ T7353] ? may_open_dev+0x100/0x100 [ 2275.485038][ T7353] ? lock_downgrade+0x880/0x880 [ 2275.489894][ T7353] ? kasan_check_read+0x11/0x20 [ 2275.494743][ T7353] ? do_raw_spin_unlock+0x57/0x270 [ 2275.499855][ T7353] ? _raw_spin_unlock+0x2d/0x50 [ 2275.504706][ T7353] ? __alloc_fd+0x44d/0x560 [ 2275.509218][ T7353] do_sys_open+0x3fe/0x5d0 [ 2275.513653][ T7353] ? filp_open+0x80/0x80 [ 2275.517899][ T7353] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2275.524144][ T7353] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2275.529599][ T7353] ? do_syscall_64+0x26/0x610 [ 2275.534286][ T7353] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2275.540493][ T7353] ? do_syscall_64+0x26/0x610 [ 2275.545183][ T7353] __x64_sys_open+0x7e/0xc0 [ 2275.549704][ T7353] do_syscall_64+0x103/0x610 [ 2275.554304][ T7353] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2275.561826][ T7353] RIP: 0033:0x412bc1 [ 2275.565721][ T7353] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2275.585341][ T7353] RSP: 002b:00007f9f903e1a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 2275.593751][ T7353] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000412bc1 [ 2275.601720][ T7353] RDX: 00007f9f903e1b0a RSI: 0000000000000002 RDI: 00007f9f903e1b00 [ 2275.609726][ T7353] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2275.617717][ T7353] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 2275.625684][ T7353] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:36:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiKerfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:36:56 executing program 1 (fault-call:0 fault-nth:9): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:56 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x10}}, 0x0) [ 2275.735029][ T7354] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2275.735468][ T7357] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2275.735468][ T7357] 03:36:56 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4788]}}}}}}}}, 0x0) [ 2275.816482][ T7366] FAULT_INJECTION: forcing a failure. [ 2275.816482][ T7366] name failslab, interval 1, probability 0, space 0, times 0 [ 2275.860982][ T7366] CPU: 0 PID: 7366 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2275.868814][ T7366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2275.878871][ T7366] Call Trace: [ 2275.882179][ T7366] dump_stack+0x172/0x1f0 [ 2275.886524][ T7366] should_fail.cold+0xa/0x15 [ 2275.891117][ T7366] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2275.896933][ T7366] ? ___might_sleep+0x163/0x280 [ 2275.901790][ T7366] __should_failslab+0x121/0x190 [ 2275.906735][ T7366] ? loop_info64_to_compat+0x6d0/0x6d0 [ 2275.912201][ T7366] should_failslab+0x9/0x14 [ 2275.916713][ T7366] kmem_cache_alloc_trace+0x2d1/0x760 [ 2275.922112][ T7366] ? lockdep_init_map+0x1be/0x6d0 [ 2275.927147][ T7366] ? loop_info64_to_compat+0x6d0/0x6d0 [ 2275.932606][ T7366] __kthread_create_on_node+0xf2/0x460 [ 2275.938061][ T7366] ? lock_acquire+0x16f/0x3f0 [ 2275.942741][ T7366] ? kthread_parkme+0xb0/0xb0 [ 2275.947425][ T7366] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2275.953670][ T7366] ? kasan_check_read+0x11/0x20 [ 2275.958521][ T7366] ? mutex_trylock+0x1e0/0x1e0 [ 2275.963281][ T7366] ? loop_info64_to_compat+0x6d0/0x6d0 [ 2275.968739][ T7366] kthread_create_on_node+0xbb/0xf0 [ 2275.973938][ T7366] ? __kthread_create_on_node+0x460/0x460 [ 2275.979669][ T7366] ? lockdep_init_map+0x1be/0x6d0 [ 2275.984778][ T7366] ? lockdep_init_map+0x1be/0x6d0 [ 2275.989810][ T7366] lo_ioctl+0xc1b/0x2150 [ 2275.994056][ T7366] ? lo_rw_aio+0x1120/0x1120 [ 2275.998657][ T7366] blkdev_ioctl+0x6f2/0x1d10 [ 2276.003243][ T7366] ? blkpg_ioctl+0xa90/0xa90 [ 2276.007852][ T7366] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2276.013668][ T7366] ? __fget+0x35a/0x550 [ 2276.017826][ T7366] block_ioctl+0xee/0x130 [ 2276.022178][ T7366] ? blkdev_fallocate+0x410/0x410 [ 2276.027214][ T7366] do_vfs_ioctl+0xd6e/0x1390 [ 2276.031815][ T7366] ? ioctl_preallocate+0x210/0x210 [ 2276.036922][ T7366] ? __fget+0x381/0x550 [ 2276.041170][ T7366] ? ksys_dup3+0x3e0/0x3e0 [ 2276.045597][ T7366] ? do_sys_open+0x31d/0x5d0 [ 2276.050194][ T7366] ? tomoyo_file_ioctl+0x23/0x30 [ 2276.055133][ T7366] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2276.061473][ T7366] ? security_file_ioctl+0x93/0xc0 [ 2276.066594][ T7366] ksys_ioctl+0xab/0xd0 [ 2276.070779][ T7366] __x64_sys_ioctl+0x73/0xb0 [ 2276.075374][ T7366] do_syscall_64+0x103/0x610 [ 2276.079967][ T7366] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2276.085859][ T7366] RIP: 0033:0x458a97 [ 2276.089753][ T7366] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2276.109449][ T7366] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2276.117857][ T7366] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458a97 [ 2276.125825][ T7366] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2276.133813][ T7366] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2276.141778][ T7366] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2276.149751][ T7366] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:36:57 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x5b}}, 0x0) 03:36:57 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800]}}}}}}}}, 0x0) [ 2276.360905][ T7377] validate_nla: 7 callbacks suppressed [ 2276.360915][ T7377] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2276.375527][ T7378] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2276.375527][ T7378] 03:36:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:36:57 executing program 1 (fault-call:0 fault-nth:10): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:57 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4888]}}}}}}}}, 0x0) 03:36:57 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0xc0}}, 0x0) 03:36:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiXerfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:36:57 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00]}}}}}}}}, 0x0) [ 2276.649487][ T7393] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2276.675563][ T7395] FAULT_INJECTION: forcing a failure. [ 2276.675563][ T7395] name failslab, interval 1, probability 0, space 0, times 0 [ 2276.702655][ T7395] CPU: 0 PID: 7395 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2276.710511][ T7395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2276.720658][ T7395] Call Trace: [ 2276.723956][ T7395] dump_stack+0x172/0x1f0 [ 2276.728293][ T7395] should_fail.cold+0xa/0x15 [ 2276.732888][ T7395] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2276.738706][ T7395] ? ___might_sleep+0x163/0x280 [ 2276.743561][ T7395] __should_failslab+0x121/0x190 [ 2276.748501][ T7395] should_failslab+0x9/0x14 03:36:57 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0xec0}}, 0x0) [ 2276.753006][ T7395] kmem_cache_alloc+0x2b2/0x6f0 [ 2276.757893][ T7395] __kernfs_new_node+0xef/0x690 [ 2276.762753][ T7395] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2276.768229][ T7395] ? __lock_acquire+0x548/0x3fb0 [ 2276.773170][ T7395] kernfs_new_node+0x99/0x130 [ 2276.777850][ T7395] kernfs_create_dir_ns+0x52/0x160 [ 2276.782967][ T7395] internal_create_group+0x7f8/0xc40 [ 2276.788248][ T7395] ? bd_set_size+0x89/0xb0 [ 2276.792698][ T7395] ? remove_files.isra.0+0x190/0x190 [ 2276.797992][ T7395] sysfs_create_group+0x20/0x30 [ 2276.802839][ T7395] lo_ioctl+0x10af/0x2150 [ 2276.807175][ T7395] ? lo_rw_aio+0x1120/0x1120 [ 2276.811764][ T7395] blkdev_ioctl+0x6f2/0x1d10 [ 2276.816437][ T7395] ? blkpg_ioctl+0xa90/0xa90 [ 2276.821027][ T7395] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2276.826929][ T7395] ? __fget+0x35a/0x550 [ 2276.831072][ T7395] block_ioctl+0xee/0x130 [ 2276.835395][ T7395] ? blkdev_fallocate+0x410/0x410 [ 2276.840421][ T7395] do_vfs_ioctl+0xd6e/0x1390 [ 2276.845016][ T7395] ? ioctl_preallocate+0x210/0x210 [ 2276.850130][ T7395] ? __fget+0x381/0x550 [ 2276.854303][ T7395] ? ksys_dup3+0x3e0/0x3e0 [ 2276.858725][ T7395] ? do_sys_open+0x31d/0x5d0 [ 2276.863317][ T7395] ? tomoyo_file_ioctl+0x23/0x30 [ 2276.868256][ T7395] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2276.874494][ T7395] ? security_file_ioctl+0x93/0xc0 [ 2276.879614][ T7395] ksys_ioctl+0xab/0xd0 [ 2276.883775][ T7395] __x64_sys_ioctl+0x73/0xb0 [ 2276.888366][ T7395] do_syscall_64+0x103/0x610 [ 2276.892968][ T7395] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2276.898852][ T7395] RIP: 0033:0x458a97 [ 2276.902740][ T7395] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2276.922439][ T7395] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2276.930851][ T7395] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458a97 [ 2276.938820][ T7395] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2276.946792][ T7395] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2276.954767][ T7395] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2276.962733][ T7395] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 [ 2277.017380][ T7398] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2277.017380][ T7398] [ 2277.031252][ T7395] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 [ 2277.043337][ T7409] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2277.052353][ T7392] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:36:58 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5800]}}}}}}}}, 0x0) 03:36:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x33fe0}}, 0x0) 03:36:58 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000]}}}}}}}}, 0x0) 03:36:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:36:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiaerfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) [ 2277.280787][ T7418] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2277.341289][ T7419] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2277.360418][ T7426] net_ratelimit: 26 callbacks suppressed [ 2277.360426][ T7426] dccp_v6_rcv: dropped packet with invalid checksum 03:36:58 executing program 1 (fault-call:0 fault-nth:11): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2277.389004][ T7424] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2277.389004][ T7424] [ 2277.408905][ T7426] dccp_v6_rcv: dropped packet with invalid checksum 03:36:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x2000007c}}, 0x0) 03:36:58 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6488]}}}}}}}}, 0x0) [ 2277.523711][ T7433] FAULT_INJECTION: forcing a failure. [ 2277.523711][ T7433] name failslab, interval 1, probability 0, space 0, times 0 [ 2277.562850][ T7433] CPU: 1 PID: 7433 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2277.570688][ T7433] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2277.580748][ T7433] Call Trace: [ 2277.584087][ T7433] dump_stack+0x172/0x1f0 [ 2277.588430][ T7433] should_fail.cold+0xa/0x15 [ 2277.593023][ T7433] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2277.598846][ T7433] ? ___might_sleep+0x163/0x280 [ 2277.603705][ T7433] __should_failslab+0x121/0x190 [ 2277.608641][ T7433] should_failslab+0x9/0x14 [ 2277.613143][ T7433] kmem_cache_alloc+0x2b2/0x6f0 [ 2277.617990][ T7433] ? find_held_lock+0x35/0x130 [ 2277.622758][ T7433] ? kernfs_activate+0x192/0x1f0 [ 2277.627713][ T7433] __kernfs_new_node+0xef/0x690 [ 2277.632746][ T7433] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2277.638213][ T7433] ? lock_downgrade+0x880/0x880 [ 2277.643083][ T7433] ? kasan_check_write+0x14/0x20 [ 2277.648027][ T7433] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2277.653585][ T7433] ? wait_for_completion+0x440/0x440 [ 2277.658909][ T7433] kernfs_new_node+0x99/0x130 [ 2277.663596][ T7433] __kernfs_create_file+0x51/0x340 [ 2277.668714][ T7433] sysfs_add_file_mode_ns+0x222/0x560 [ 2277.674091][ T7433] internal_create_group+0x35b/0xc40 [ 2277.679371][ T7433] ? bd_set_size+0x89/0xb0 [ 2277.683793][ T7433] ? remove_files.isra.0+0x190/0x190 [ 2277.689097][ T7433] sysfs_create_group+0x20/0x30 [ 2277.693946][ T7433] lo_ioctl+0x10af/0x2150 [ 2277.698280][ T7433] ? lo_rw_aio+0x1120/0x1120 [ 2277.702869][ T7433] blkdev_ioctl+0x6f2/0x1d10 [ 2277.707465][ T7433] ? blkpg_ioctl+0xa90/0xa90 [ 2277.712064][ T7433] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2277.717987][ T7433] ? __fget+0x35a/0x550 [ 2277.722146][ T7433] block_ioctl+0xee/0x130 [ 2277.726471][ T7433] ? blkdev_fallocate+0x410/0x410 [ 2277.731496][ T7433] do_vfs_ioctl+0xd6e/0x1390 [ 2277.736092][ T7433] ? ioctl_preallocate+0x210/0x210 [ 2277.741202][ T7433] ? __fget+0x381/0x550 [ 2277.745360][ T7433] ? ksys_dup3+0x3e0/0x3e0 [ 2277.749773][ T7433] ? do_sys_open+0x31d/0x5d0 [ 2277.754368][ T7433] ? tomoyo_file_ioctl+0x23/0x30 [ 2277.759303][ T7433] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2277.765542][ T7433] ? security_file_ioctl+0x93/0xc0 [ 2277.770655][ T7433] ksys_ioctl+0xab/0xd0 [ 2277.774819][ T7433] __x64_sys_ioctl+0x73/0xb0 [ 2277.779419][ T7433] do_syscall_64+0x103/0x610 [ 2277.784020][ T7433] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2277.789922][ T7433] RIP: 0033:0x458a97 [ 2277.793824][ T7433] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2277.813505][ T7433] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 03:36:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiberfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) [ 2277.821919][ T7433] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458a97 [ 2277.829884][ T7433] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2277.837856][ T7433] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2277.845871][ T7433] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2277.853853][ T7433] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:36:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x7ffff000}}, 0x0) [ 2277.888878][ T7433] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 [ 2277.910807][ T7573] dccp_v6_rcv: dropped packet with invalid checksum 03:36:59 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800]}}}}}}}}, 0x0) [ 2277.934943][ T7573] dccp_v6_rcv: dropped packet with invalid checksum 03:36:59 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0xfffffdef}}, 0x0) 03:36:59 executing program 1 (fault-call:0 fault-nth:12): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2278.034740][ T7581] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2278.034740][ T7581] 03:36:59 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x2}, 0x0) [ 2278.074891][ T7590] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2278.085921][ T7593] dccp_v6_rcv: dropped packet with invalid checksum [ 2278.103974][ T7593] dccp_v6_rcv: dropped packet with invalid checksum 03:36:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:36:59 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00]}}}}}}}}, 0x0) [ 2278.213097][ T7598] FAULT_INJECTION: forcing a failure. [ 2278.213097][ T7598] name failslab, interval 1, probability 0, space 0, times 0 [ 2278.226231][ T7598] CPU: 0 PID: 7598 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2278.234046][ T7598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2278.244107][ T7598] Call Trace: [ 2278.247447][ T7598] dump_stack+0x172/0x1f0 [ 2278.251783][ T7598] should_fail.cold+0xa/0x15 [ 2278.256386][ T7598] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2278.262201][ T7598] ? ___might_sleep+0x163/0x280 [ 2278.267058][ T7598] __should_failslab+0x121/0x190 [ 2278.272000][ T7598] should_failslab+0x9/0x14 [ 2278.276503][ T7598] kmem_cache_alloc+0x2b2/0x6f0 [ 2278.281349][ T7598] ? find_held_lock+0x35/0x130 [ 2278.286110][ T7598] ? kernfs_activate+0x192/0x1f0 [ 2278.291070][ T7598] __kernfs_new_node+0xef/0x690 [ 2278.295930][ T7598] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2278.301384][ T7598] ? lock_downgrade+0x880/0x880 [ 2278.306235][ T7598] ? kasan_check_write+0x14/0x20 [ 2278.311173][ T7598] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2278.316718][ T7598] ? wait_for_completion+0x440/0x440 [ 2278.322015][ T7598] kernfs_new_node+0x99/0x130 [ 2278.326694][ T7598] __kernfs_create_file+0x51/0x340 [ 2278.331807][ T7598] sysfs_add_file_mode_ns+0x222/0x560 [ 2278.337181][ T7598] internal_create_group+0x35b/0xc40 [ 2278.342462][ T7598] ? bd_set_size+0x89/0xb0 [ 2278.347063][ T7598] ? remove_files.isra.0+0x190/0x190 [ 2278.352359][ T7598] sysfs_create_group+0x20/0x30 [ 2278.357208][ T7598] lo_ioctl+0x10af/0x2150 [ 2278.361539][ T7598] ? lo_rw_aio+0x1120/0x1120 [ 2278.366128][ T7598] blkdev_ioctl+0x6f2/0x1d10 [ 2278.370717][ T7598] ? blkpg_ioctl+0xa90/0xa90 [ 2278.375307][ T7598] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2278.381119][ T7598] ? __fget+0x35a/0x550 [ 2278.385277][ T7598] block_ioctl+0xee/0x130 [ 2278.392121][ T7598] ? blkdev_fallocate+0x410/0x410 [ 2278.397160][ T7598] do_vfs_ioctl+0xd6e/0x1390 [ 2278.401749][ T7598] ? ioctl_preallocate+0x210/0x210 [ 2278.406856][ T7598] ? __fget+0x381/0x550 [ 2278.411016][ T7598] ? ksys_dup3+0x3e0/0x3e0 [ 2278.415429][ T7598] ? do_sys_open+0x31d/0x5d0 [ 2278.420107][ T7598] ? tomoyo_file_ioctl+0x23/0x30 [ 2278.425042][ T7598] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2278.431282][ T7598] ? security_file_ioctl+0x93/0xc0 [ 2278.436414][ T7598] ksys_ioctl+0xab/0xd0 [ 2278.440571][ T7598] __x64_sys_ioctl+0x73/0xb0 [ 2278.445161][ T7598] do_syscall_64+0x103/0x610 [ 2278.449753][ T7598] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2278.455639][ T7598] RIP: 0033:0x458a97 [ 2278.459528][ T7598] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2278.479213][ T7598] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2278.487631][ T7598] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458a97 [ 2278.495594][ T7598] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2278.503559][ T7598] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2278.511524][ T7598] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2278.519490][ T7598] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 [ 2278.565636][ T7604] dccp_v6_rcv: dropped packet with invalid checksum [ 2278.573408][ T7604] dccp_v6_rcv: dropped packet with invalid checksum [ 2278.582324][ T7605] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:36:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reicerfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) [ 2278.625655][ T7598] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 [ 2278.670128][ T7607] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2278.713764][ T7611] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2278.713764][ T7611] 03:36:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:36:59 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400]}}}}}}}}, 0x0) 03:36:59 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x3}, 0x0) 03:36:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiderfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:36:59 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x4}, 0x0) 03:36:59 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00]}}}}}}}}, 0x0) [ 2278.851064][ T7621] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2278.856778][ T7622] dccp_v6_rcv: dropped packet with invalid checksum [ 2278.873816][ T7622] dccp_v6_rcv: dropped packet with invalid checksum 03:37:00 executing program 1 (fault-call:0 fault-nth:13): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2278.956648][ T7611] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2278.956648][ T7611] 03:37:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiherfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:00 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800e]}}}}}}}}, 0x0) 03:37:00 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x5}, 0x0) [ 2279.181684][ T7638] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2279.212529][ T7639] FAULT_INJECTION: forcing a failure. [ 2279.212529][ T7639] name failslab, interval 1, probability 0, space 0, times 0 [ 2279.226316][ T7639] CPU: 1 PID: 7639 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2279.234152][ T7639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2279.244206][ T7639] Call Trace: [ 2279.247507][ T7639] dump_stack+0x172/0x1f0 [ 2279.251847][ T7639] should_fail.cold+0xa/0x15 [ 2279.256443][ T7639] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2279.262259][ T7639] ? ___might_sleep+0x163/0x280 [ 2279.267116][ T7639] __should_failslab+0x121/0x190 [ 2279.272056][ T7639] should_failslab+0x9/0x14 [ 2279.276558][ T7639] kmem_cache_alloc+0x2b2/0x6f0 [ 2279.281438][ T7639] ? lock_downgrade+0x880/0x880 [ 2279.286295][ T7639] ? kasan_check_read+0x11/0x20 [ 2279.291149][ T7639] __kernfs_new_node+0xef/0x690 [ 2279.296001][ T7639] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2279.301459][ T7639] ? wait_for_completion+0x440/0x440 [ 2279.306751][ T7639] ? mutex_unlock+0xd/0x10 [ 2279.311164][ T7639] ? kernfs_activate+0x192/0x1f0 [ 2279.316124][ T7639] kernfs_new_node+0x99/0x130 [ 2279.320805][ T7639] __kernfs_create_file+0x51/0x340 [ 2279.325927][ T7639] sysfs_add_file_mode_ns+0x222/0x560 [ 2279.331866][ T7639] internal_create_group+0x35b/0xc40 [ 2279.337156][ T7639] ? bd_set_size+0x89/0xb0 [ 2279.341581][ T7639] ? remove_files.isra.0+0x190/0x190 [ 2279.346953][ T7639] sysfs_create_group+0x20/0x30 [ 2279.351804][ T7639] lo_ioctl+0x10af/0x2150 [ 2279.356142][ T7639] ? lo_rw_aio+0x1120/0x1120 [ 2279.360923][ T7639] blkdev_ioctl+0x6f2/0x1d10 [ 2279.365518][ T7639] ? blkpg_ioctl+0xa90/0xa90 [ 2279.370111][ T7639] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2279.375930][ T7639] ? __fget+0x35a/0x550 [ 2279.380089][ T7639] block_ioctl+0xee/0x130 [ 2279.384421][ T7639] ? blkdev_fallocate+0x410/0x410 [ 2279.389452][ T7639] do_vfs_ioctl+0xd6e/0x1390 [ 2279.394055][ T7639] ? ioctl_preallocate+0x210/0x210 [ 2279.399168][ T7639] ? __fget+0x381/0x550 [ 2279.403328][ T7639] ? ksys_dup3+0x3e0/0x3e0 [ 2279.408108][ T7639] ? do_sys_open+0x31d/0x5d0 [ 2279.422173][ T7639] ? tomoyo_file_ioctl+0x23/0x30 [ 2279.427112][ T7639] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2279.433369][ T7639] ? security_file_ioctl+0x93/0xc0 [ 2279.438484][ T7639] ksys_ioctl+0xab/0xd0 [ 2279.442645][ T7639] __x64_sys_ioctl+0x73/0xb0 [ 2279.447246][ T7639] do_syscall_64+0x103/0x610 [ 2279.451843][ T7639] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2279.457728][ T7639] RIP: 0033:0x458a97 [ 2279.461622][ T7639] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2279.481315][ T7639] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2279.489727][ T7639] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458a97 [ 2279.497699][ T7639] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2279.505668][ T7639] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2279.513634][ T7639] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2279.521613][ T7639] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 [ 2279.605667][ T7639] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 [ 2279.613513][ T7649] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2279.625658][ T7636] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:37:00 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8035]}}}}}}}}, 0x0) [ 2279.688564][ T7651] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2279.688564][ T7651] [ 2279.889869][ T7659] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2279.910744][ T7661] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2279.910744][ T7661] 03:37:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:01 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x6}, 0x0) 03:37:01 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100]}}}}}}}}, 0x0) 03:37:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiierfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:01 executing program 1 (fault-call:0 fault-nth:14): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x02', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:01 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8847]}}}}}}}}, 0x0) 03:37:01 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x8}, 0x0) [ 2280.031063][ T7672] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2280.122421][ T7669] FAULT_INJECTION: forcing a failure. [ 2280.122421][ T7669] name failslab, interval 1, probability 0, space 0, times 0 [ 2280.141249][ T7669] CPU: 0 PID: 7669 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2280.149081][ T7669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2280.159137][ T7669] Call Trace: [ 2280.162432][ T7669] dump_stack+0x172/0x1f0 [ 2280.166776][ T7669] should_fail.cold+0xa/0x15 [ 2280.171411][ T7669] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2280.177216][ T7669] ? ___might_sleep+0x163/0x280 [ 2280.182065][ T7669] __should_failslab+0x121/0x190 [ 2280.187008][ T7669] should_failslab+0x9/0x14 [ 2280.191511][ T7669] kmem_cache_alloc+0x2b2/0x6f0 [ 2280.196358][ T7669] ? lock_downgrade+0x880/0x880 [ 2280.201205][ T7669] ? kasan_check_read+0x11/0x20 [ 2280.206057][ T7669] __kernfs_new_node+0xef/0x690 [ 2280.210915][ T7669] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2280.216370][ T7669] ? wait_for_completion+0x440/0x440 [ 2280.221660][ T7669] ? mutex_unlock+0xd/0x10 [ 2280.226335][ T7669] ? kernfs_activate+0x192/0x1f0 [ 2280.231288][ T7669] kernfs_new_node+0x99/0x130 [ 2280.235963][ T7669] __kernfs_create_file+0x51/0x340 [ 2280.241074][ T7669] sysfs_add_file_mode_ns+0x222/0x560 [ 2280.246460][ T7669] internal_create_group+0x35b/0xc40 [ 2280.251738][ T7669] ? bd_set_size+0x89/0xb0 [ 2280.256156][ T7669] ? remove_files.isra.0+0x190/0x190 [ 2280.261458][ T7669] sysfs_create_group+0x20/0x30 [ 2280.266304][ T7669] lo_ioctl+0x10af/0x2150 [ 2280.270632][ T7669] ? lo_rw_aio+0x1120/0x1120 [ 2280.275241][ T7669] blkdev_ioctl+0x6f2/0x1d10 [ 2280.279834][ T7669] ? blkpg_ioctl+0xa90/0xa90 [ 2280.284422][ T7669] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2280.290231][ T7669] ? __fget+0x35a/0x550 [ 2280.294386][ T7669] block_ioctl+0xee/0x130 [ 2280.298710][ T7669] ? blkdev_fallocate+0x410/0x410 [ 2280.303732][ T7669] do_vfs_ioctl+0xd6e/0x1390 [ 2280.308325][ T7669] ? ioctl_preallocate+0x210/0x210 [ 2280.313427][ T7669] ? __fget+0x381/0x550 [ 2280.317581][ T7669] ? ksys_dup3+0x3e0/0x3e0 [ 2280.321992][ T7669] ? do_sys_open+0x31d/0x5d0 [ 2280.326579][ T7669] ? tomoyo_file_ioctl+0x23/0x30 [ 2280.331513][ T7669] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2280.337753][ T7669] ? security_file_ioctl+0x93/0xc0 [ 2280.342870][ T7669] ksys_ioctl+0xab/0xd0 [ 2280.347023][ T7669] __x64_sys_ioctl+0x73/0xb0 [ 2280.351609][ T7669] do_syscall_64+0x103/0x610 [ 2280.356200][ T7669] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2280.362092][ T7669] RIP: 0033:0x458a97 [ 2280.365986][ T7669] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2280.385667][ T7669] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2280.395641][ T7669] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458a97 [ 2280.403610][ T7669] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2280.411575][ T7669] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2280.419537][ T7669] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2280.427499][ T7669] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 [ 2280.525368][ T7669] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 [ 2280.553087][ T7684] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:37:01 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8848]}}}}}}}}, 0x0) 03:37:01 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x9}, 0x0) [ 2280.591622][ T7683] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:37:01 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8864]}}}}}}}}, 0x0) 03:37:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reikerfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) [ 2280.815003][ T7702] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:37:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:02 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0xa}, 0x0) 03:37:02 executing program 1 (fault-call:0 fault-nth:15): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:02 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8906]}}}}}}}}, 0x0) 03:37:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:02 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000]}}}}}}}}, 0x0) 03:37:02 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0xb}, 0x0) [ 2281.057691][ T7715] FAULT_INJECTION: forcing a failure. [ 2281.057691][ T7715] name failslab, interval 1, probability 0, space 0, times 0 [ 2281.070899][ T7715] CPU: 0 PID: 7715 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2281.078801][ T7715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2281.088857][ T7715] Call Trace: [ 2281.092162][ T7715] dump_stack+0x172/0x1f0 [ 2281.096496][ T7715] should_fail.cold+0xa/0x15 [ 2281.101095][ T7715] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2281.106908][ T7715] ? ___might_sleep+0x163/0x280 [ 2281.111776][ T7715] __should_failslab+0x121/0x190 [ 2281.116726][ T7715] should_failslab+0x9/0x14 [ 2281.121239][ T7715] kmem_cache_alloc+0x2b2/0x6f0 [ 2281.126096][ T7715] ? lock_downgrade+0x880/0x880 [ 2281.130942][ T7715] ? kasan_check_read+0x11/0x20 [ 2281.135798][ T7715] __kernfs_new_node+0xef/0x690 [ 2281.140651][ T7715] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2281.146110][ T7715] ? wait_for_completion+0x440/0x440 [ 2281.151404][ T7715] ? mutex_unlock+0xd/0x10 [ 2281.155820][ T7715] ? kernfs_activate+0x192/0x1f0 [ 2281.160770][ T7715] kernfs_new_node+0x99/0x130 [ 2281.165454][ T7715] __kernfs_create_file+0x51/0x340 [ 2281.170566][ T7715] sysfs_add_file_mode_ns+0x222/0x560 [ 2281.175942][ T7715] internal_create_group+0x35b/0xc40 [ 2281.181230][ T7715] ? bd_set_size+0x89/0xb0 [ 2281.185649][ T7715] ? remove_files.isra.0+0x190/0x190 [ 2281.190946][ T7715] sysfs_create_group+0x20/0x30 [ 2281.195798][ T7715] lo_ioctl+0x10af/0x2150 [ 2281.200223][ T7715] ? lo_rw_aio+0x1120/0x1120 [ 2281.204814][ T7715] blkdev_ioctl+0x6f2/0x1d10 [ 2281.209404][ T7715] ? blkpg_ioctl+0xa90/0xa90 [ 2281.213991][ T7715] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2281.219829][ T7715] ? __fget+0x35a/0x550 [ 2281.223987][ T7715] block_ioctl+0xee/0x130 [ 2281.228318][ T7715] ? blkdev_fallocate+0x410/0x410 [ 2281.233343][ T7715] do_vfs_ioctl+0xd6e/0x1390 [ 2281.237939][ T7715] ? ioctl_preallocate+0x210/0x210 [ 2281.243057][ T7715] ? __fget+0x381/0x550 [ 2281.247216][ T7715] ? ksys_dup3+0x3e0/0x3e0 [ 2281.251633][ T7715] ? do_sys_open+0x31d/0x5d0 [ 2281.256227][ T7715] ? tomoyo_file_ioctl+0x23/0x30 [ 2281.261162][ T7715] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2281.267400][ T7715] ? security_file_ioctl+0x93/0xc0 [ 2281.272515][ T7715] ksys_ioctl+0xab/0xd0 [ 2281.276871][ T7715] __x64_sys_ioctl+0x73/0xb0 [ 2281.281461][ T7715] do_syscall_64+0x103/0x610 [ 2281.286066][ T7715] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2281.291957][ T7715] RIP: 0033:0x458a97 [ 2281.295856][ T7715] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2281.315456][ T7715] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2281.323865][ T7715] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458a97 [ 2281.331832][ T7715] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2281.339797][ T7715] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2281.347764][ T7715] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2281.355740][ T7715] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 [ 2281.412478][ T7715] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 [ 2281.423098][ T7717] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2281.423098][ T7717] 03:37:02 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffff]}}}}}}}}, 0x0) 03:37:02 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x10}, 0x0) [ 2281.455133][ T7734] validate_nla: 2 callbacks suppressed [ 2281.455142][ T7734] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:37:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reilerfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) [ 2281.522403][ T7729] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:37:02 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}}}}}}}, 0x0) 03:37:02 executing program 1 (fault-call:0 fault-nth:16): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2281.562859][ T7739] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2281.709861][ T7744] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2281.720635][ T7743] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2281.720635][ T7743] [ 2281.734366][ T7750] FAULT_INJECTION: forcing a failure. [ 2281.734366][ T7750] name failslab, interval 1, probability 0, space 0, times 0 [ 2281.753603][ T7750] CPU: 1 PID: 7750 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2281.761427][ T7750] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2281.771490][ T7750] Call Trace: [ 2281.774788][ T7750] dump_stack+0x172/0x1f0 [ 2281.779123][ T7750] should_fail.cold+0xa/0x15 [ 2281.783725][ T7750] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2281.789543][ T7750] ? ___might_sleep+0x163/0x280 [ 2281.794398][ T7750] __should_failslab+0x121/0x190 [ 2281.799347][ T7750] should_failslab+0x9/0x14 [ 2281.803876][ T7750] kmem_cache_alloc+0x2b2/0x6f0 [ 2281.808725][ T7750] ? lock_downgrade+0x880/0x880 [ 2281.813575][ T7750] ? kasan_check_read+0x11/0x20 [ 2281.818430][ T7750] __kernfs_new_node+0xef/0x690 [ 2281.823285][ T7750] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2281.828748][ T7750] ? wait_for_completion+0x440/0x440 [ 2281.834046][ T7750] ? mutex_unlock+0xd/0x10 [ 2281.838477][ T7750] ? kernfs_activate+0x192/0x1f0 [ 2281.843419][ T7750] kernfs_new_node+0x99/0x130 [ 2281.848103][ T7750] __kernfs_create_file+0x51/0x340 [ 2281.853214][ T7750] sysfs_add_file_mode_ns+0x222/0x560 [ 2281.858614][ T7750] internal_create_group+0x35b/0xc40 [ 2281.863894][ T7750] ? bd_set_size+0x89/0xb0 [ 2281.868314][ T7750] ? remove_files.isra.0+0x190/0x190 [ 2281.873612][ T7750] sysfs_create_group+0x20/0x30 [ 2281.878476][ T7750] lo_ioctl+0x10af/0x2150 [ 2281.882806][ T7750] ? lo_rw_aio+0x1120/0x1120 [ 2281.887394][ T7750] blkdev_ioctl+0x6f2/0x1d10 [ 2281.891984][ T7750] ? blkpg_ioctl+0xa90/0xa90 [ 2281.903097][ T7750] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2281.909882][ T7750] ? __fget+0x35a/0x550 [ 2281.914060][ T7750] block_ioctl+0xee/0x130 [ 2281.918385][ T7750] ? blkdev_fallocate+0x410/0x410 [ 2281.923407][ T7750] do_vfs_ioctl+0xd6e/0x1390 [ 2281.928018][ T7750] ? ioctl_preallocate+0x210/0x210 [ 2281.933127][ T7750] ? __fget+0x381/0x550 [ 2281.937287][ T7750] ? ksys_dup3+0x3e0/0x3e0 [ 2281.941704][ T7750] ? do_sys_open+0x31d/0x5d0 [ 2281.946297][ T7750] ? tomoyo_file_ioctl+0x23/0x30 [ 2281.951235][ T7750] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2281.957559][ T7750] ? security_file_ioctl+0x93/0xc0 [ 2281.962678][ T7750] ksys_ioctl+0xab/0xd0 [ 2281.966834][ T7750] __x64_sys_ioctl+0x73/0xb0 [ 2281.971439][ T7750] do_syscall_64+0x103/0x610 [ 2281.976035][ T7750] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2281.981922][ T7750] RIP: 0033:0x458a97 [ 2281.985812][ T7750] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2282.005495][ T7750] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2282.013904][ T7750] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458a97 [ 2282.021878][ T7750] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2282.029843][ T7750] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2282.037815][ T7750] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2282.045782][ T7750] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 [ 2282.070701][ T7750] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 03:37:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:03 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x11}, 0x0) 03:37:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:03 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}}}}}}, 0x0) [ 2282.220780][ T7758] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:37:03 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x12}, 0x0) 03:37:03 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}}}}}}}}, 0x0) 03:37:03 executing program 1 (fault-call:0 fault-nth:17): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reioerfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) [ 2282.407055][ T7768] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2282.428051][ T7771] net_ratelimit: 24 callbacks suppressed [ 2282.428059][ T7771] dccp_v6_rcv: dropped packet with invalid checksum 03:37:03 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x13}, 0x0) [ 2282.498089][ T7771] dccp_v6_rcv: dropped packet with invalid checksum [ 2282.533479][ T7774] FAULT_INJECTION: forcing a failure. [ 2282.533479][ T7774] name failslab, interval 1, probability 0, space 0, times 0 [ 2282.547032][ T7770] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2282.547032][ T7770] [ 2282.573043][ T7774] CPU: 0 PID: 7774 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2282.580904][ T7774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2282.590969][ T7774] Call Trace: [ 2282.594283][ T7774] dump_stack+0x172/0x1f0 [ 2282.598716][ T7774] should_fail.cold+0xa/0x15 [ 2282.603325][ T7774] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2282.609152][ T7774] ? ___might_sleep+0x163/0x280 [ 2282.614052][ T7774] __should_failslab+0x121/0x190 [ 2282.619166][ T7774] should_failslab+0x9/0x14 [ 2282.623685][ T7774] kmem_cache_alloc_trace+0x2d1/0x760 [ 2282.629089][ T7774] kobject_uevent_env+0x2fb/0x1030 [ 2282.634219][ T7774] kobject_uevent+0x20/0x26 [ 2282.638729][ T7774] lo_ioctl+0x112b/0x2150 [ 2282.643078][ T7774] ? lo_rw_aio+0x1120/0x1120 [ 2282.647671][ T7774] blkdev_ioctl+0x6f2/0x1d10 [ 2282.652265][ T7774] ? blkpg_ioctl+0xa90/0xa90 [ 2282.656860][ T7774] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2282.662686][ T7774] ? __fget+0x35a/0x550 [ 2282.666856][ T7774] block_ioctl+0xee/0x130 [ 2282.671205][ T7774] ? blkdev_fallocate+0x410/0x410 [ 2282.676244][ T7774] do_vfs_ioctl+0xd6e/0x1390 [ 2282.680854][ T7774] ? ioctl_preallocate+0x210/0x210 [ 2282.685977][ T7774] ? __fget+0x381/0x550 [ 2282.690147][ T7774] ? ksys_dup3+0x3e0/0x3e0 [ 2282.694571][ T7774] ? do_sys_open+0x31d/0x5d0 [ 2282.699180][ T7774] ? tomoyo_file_ioctl+0x23/0x30 [ 2282.704130][ T7774] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2282.710376][ T7774] ? security_file_ioctl+0x93/0xc0 [ 2282.715498][ T7774] ksys_ioctl+0xab/0xd0 [ 2282.719675][ T7774] __x64_sys_ioctl+0x73/0xb0 [ 2282.724274][ T7774] do_syscall_64+0x103/0x610 [ 2282.729110][ T7774] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2282.735101][ T7774] RIP: 0033:0x458a97 [ 2282.739006][ T7774] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2282.758619][ T7774] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2282.767043][ T7774] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458a97 [ 2282.775030][ T7774] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2282.783109][ T7774] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2282.791112][ T7774] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 03:37:03 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}}}}}}}}, 0x0) [ 2282.799101][ T7774] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 [ 2282.884333][ T7769] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2282.895443][ T7784] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:37:04 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x14}, 0x0) [ 2282.925318][ T7788] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2282.925318][ T7788] [ 2282.940916][ T7774] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 03:37:04 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}}}}}}}}, 0x0) [ 2282.972902][ T7792] dccp_v6_rcv: dropped packet with invalid checksum [ 2282.984361][ T7792] dccp_v6_rcv: dropped packet with invalid checksum [ 2283.005745][ T7794] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2283.185436][ T7769] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2283.230497][ T7799] dccp_v6_rcv: dropped packet with invalid checksum [ 2283.240461][ T7799] dccp_v6_rcv: dropped packet with invalid checksum 03:37:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:04 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x25}, 0x0) 03:37:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiperfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x03', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:04 executing program 1 (fault-call:0 fault-nth:18): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:04 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}}}}}}}}, 0x0) [ 2283.367204][ T7805] dccp_v6_rcv: dropped packet with invalid checksum [ 2283.374005][ T7806] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2283.391172][ T7805] dccp_v6_rcv: dropped packet with invalid checksum [ 2283.404137][ T7808] FAULT_INJECTION: forcing a failure. [ 2283.404137][ T7808] name failslab, interval 1, probability 0, space 0, times 0 [ 2283.417654][ T7808] CPU: 1 PID: 7808 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2283.425475][ T7808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2283.435535][ T7808] Call Trace: [ 2283.438847][ T7808] dump_stack+0x172/0x1f0 [ 2283.443193][ T7808] should_fail.cold+0xa/0x15 [ 2283.447791][ T7808] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2283.453609][ T7808] ? ___might_sleep+0x163/0x280 [ 2283.458474][ T7808] __should_failslab+0x121/0x190 [ 2283.463423][ T7808] should_failslab+0x9/0x14 03:37:04 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}}}}}}}}, 0x0) 03:37:04 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x39}, 0x0) [ 2283.467935][ T7808] __kmalloc+0x2dc/0x740 [ 2283.472183][ T7808] ? kobject_uevent_env+0x2fb/0x1030 [ 2283.477478][ T7808] ? rcu_read_lock_sched_held+0x110/0x130 [ 2283.483204][ T7808] ? kobject_get_path+0xc4/0x1b0 [ 2283.488151][ T7808] kobject_get_path+0xc4/0x1b0 [ 2283.492926][ T7808] kobject_uevent_env+0x31f/0x1030 [ 2283.498050][ T7808] kobject_uevent+0x20/0x26 [ 2283.502564][ T7808] lo_ioctl+0x112b/0x2150 [ 2283.506898][ T7808] ? lo_rw_aio+0x1120/0x1120 [ 2283.512797][ T7808] blkdev_ioctl+0x6f2/0x1d10 [ 2283.517388][ T7808] ? blkpg_ioctl+0xa90/0xa90 [ 2283.521975][ T7808] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2283.527797][ T7808] ? __fget+0x35a/0x550 [ 2283.531964][ T7808] block_ioctl+0xee/0x130 [ 2283.536289][ T7808] ? blkdev_fallocate+0x410/0x410 [ 2283.541417][ T7808] do_vfs_ioctl+0xd6e/0x1390 [ 2283.546009][ T7808] ? ioctl_preallocate+0x210/0x210 [ 2283.551121][ T7808] ? __fget+0x381/0x550 [ 2283.556787][ T7808] ? ksys_dup3+0x3e0/0x3e0 [ 2283.561211][ T7808] ? do_sys_open+0x31d/0x5d0 [ 2283.565812][ T7808] ? tomoyo_file_ioctl+0x23/0x30 [ 2283.570758][ T7808] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2283.577012][ T7808] ? security_file_ioctl+0x93/0xc0 [ 2283.582133][ T7808] ksys_ioctl+0xab/0xd0 [ 2283.586293][ T7808] __x64_sys_ioctl+0x73/0xb0 [ 2283.590895][ T7808] do_syscall_64+0x103/0x610 [ 2283.595488][ T7808] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2283.601376][ T7808] RIP: 0033:0x458a97 [ 2283.605277][ T7808] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2283.625307][ T7808] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2283.633720][ T7808] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458a97 [ 2283.641691][ T7808] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2283.649669][ T7808] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2283.657644][ T7808] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2283.665958][ T7808] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 [ 2283.723466][ T7820] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2283.724706][ T7821] dccp_v6_rcv: dropped packet with invalid checksum [ 2283.740253][ T7821] dccp_v6_rcv: dropped packet with invalid checksum [ 2283.753870][ T7814] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:37:04 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x5b}, 0x0) 03:37:04 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}}}}}}}}, 0x0) [ 2283.776256][ T7808] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 03:37:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2283.856023][ T7832] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:37:04 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8060000]}}}}}}}}, 0x0) 03:37:04 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x63}, 0x0) 03:37:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiterfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\xc0', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:05 executing program 1 (fault-call:0 fault-nth:19): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2284.014882][ T7836] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:37:05 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000]}}}}}}}}, 0x0) 03:37:05 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x300}, 0x0) [ 2284.163308][ T7838] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2284.174940][ T7851] FAULT_INJECTION: forcing a failure. [ 2284.174940][ T7851] name failslab, interval 1, probability 0, space 0, times 0 [ 2284.214090][ T7851] CPU: 1 PID: 7851 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2284.221931][ T7851] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2284.231993][ T7851] Call Trace: [ 2284.235292][ T7851] dump_stack+0x172/0x1f0 [ 2284.239636][ T7851] should_fail.cold+0xa/0x15 [ 2284.244233][ T7851] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2284.250055][ T7851] ? ___might_sleep+0x163/0x280 [ 2284.254915][ T7851] __should_failslab+0x121/0x190 [ 2284.259860][ T7851] should_failslab+0x9/0x14 [ 2284.264387][ T7851] kmem_cache_alloc_node+0x264/0x710 [ 2284.269675][ T7851] ? find_held_lock+0x35/0x130 [ 2284.274452][ T7851] __alloc_skb+0xd5/0x5e0 [ 2284.278792][ T7851] ? skb_trim+0x190/0x190 [ 2284.283124][ T7851] ? kasan_check_read+0x11/0x20 [ 2284.287983][ T7851] alloc_uevent_skb+0x83/0x1e2 [ 2284.292745][ T7851] kobject_uevent_env+0xa63/0x1030 [ 2284.297875][ T7851] kobject_uevent+0x20/0x26 [ 2284.302378][ T7851] lo_ioctl+0x112b/0x2150 [ 2284.306710][ T7851] ? lo_rw_aio+0x1120/0x1120 [ 2284.311301][ T7851] blkdev_ioctl+0x6f2/0x1d10 [ 2284.315897][ T7851] ? blkpg_ioctl+0xa90/0xa90 [ 2284.320490][ T7851] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2284.326307][ T7851] ? __fget+0x35a/0x550 [ 2284.330478][ T7851] block_ioctl+0xee/0x130 [ 2284.334807][ T7851] ? blkdev_fallocate+0x410/0x410 [ 2284.339838][ T7851] do_vfs_ioctl+0xd6e/0x1390 [ 2284.344437][ T7851] ? ioctl_preallocate+0x210/0x210 [ 2284.349553][ T7851] ? __fget+0x381/0x550 [ 2284.353713][ T7851] ? ksys_dup3+0x3e0/0x3e0 [ 2284.358130][ T7851] ? do_sys_open+0x31d/0x5d0 [ 2284.362728][ T7851] ? tomoyo_file_ioctl+0x23/0x30 [ 2284.367675][ T7851] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2284.373917][ T7851] ? security_file_ioctl+0x93/0xc0 [ 2284.379030][ T7851] ksys_ioctl+0xab/0xd0 [ 2284.383187][ T7851] __x64_sys_ioctl+0x73/0xb0 [ 2284.389222][ T7851] do_syscall_64+0x103/0x610 [ 2284.393821][ T7851] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2284.399712][ T7851] RIP: 0033:0x458a97 [ 2284.403602][ T7851] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2284.430074][ T7851] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2284.438491][ T7851] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458a97 [ 2284.446469][ T7851] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2284.454609][ T7851] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 03:37:05 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x3200}, 0x0) 03:37:05 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000]}}}}}}}}, 0x0) [ 2284.462575][ T7851] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2284.470541][ T7851] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:37:05 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x7ffffff2}, 0x0) [ 2284.541980][ T7851] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 03:37:05 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21000000]}}}}}}}}, 0x0) [ 2284.642134][ T7865] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:37:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiuerfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x03', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:05 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28000000]}}}}}}}}, 0x0) 03:37:05 executing program 1 (fault-call:0 fault-nth:20): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:05 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x7ffffff8}, 0x0) 03:37:05 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x7ffffff9}, 0x0) 03:37:05 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}}}}}}}}, 0x0) [ 2284.836316][ T7877] FAULT_INJECTION: forcing a failure. [ 2284.836316][ T7877] name failslab, interval 1, probability 0, space 0, times 0 [ 2284.854796][ T7877] CPU: 0 PID: 7877 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2284.862621][ T7877] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2284.872679][ T7877] Call Trace: [ 2284.876018][ T7877] dump_stack+0x172/0x1f0 [ 2284.880369][ T7877] should_fail.cold+0xa/0x15 [ 2284.885093][ T7877] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2284.890923][ T7877] ? ___might_sleep+0x163/0x280 [ 2284.895815][ T7877] __should_failslab+0x121/0x190 [ 2284.900756][ T7877] should_failslab+0x9/0x14 [ 2284.905271][ T7877] kmem_cache_alloc_node+0x264/0x710 [ 2284.910555][ T7877] ? find_held_lock+0x35/0x130 [ 2284.915325][ T7877] __alloc_skb+0xd5/0x5e0 [ 2284.919656][ T7877] ? skb_trim+0x190/0x190 [ 2284.923997][ T7877] ? kasan_check_read+0x11/0x20 [ 2284.928854][ T7877] alloc_uevent_skb+0x83/0x1e2 [ 2284.933624][ T7877] kobject_uevent_env+0xa63/0x1030 [ 2284.938743][ T7877] kobject_uevent+0x20/0x26 [ 2284.943245][ T7877] lo_ioctl+0x112b/0x2150 [ 2284.947575][ T7877] ? lo_rw_aio+0x1120/0x1120 [ 2284.952181][ T7877] blkdev_ioctl+0x6f2/0x1d10 [ 2284.956862][ T7877] ? blkpg_ioctl+0xa90/0xa90 [ 2284.961449][ T7877] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2284.967264][ T7877] ? __fget+0x35a/0x550 [ 2284.971519][ T7877] block_ioctl+0xee/0x130 [ 2284.975843][ T7877] ? blkdev_fallocate+0x410/0x410 [ 2284.980871][ T7877] do_vfs_ioctl+0xd6e/0x1390 [ 2284.985470][ T7877] ? ioctl_preallocate+0x210/0x210 [ 2284.990576][ T7877] ? __fget+0x381/0x550 [ 2284.994733][ T7877] ? ksys_dup3+0x3e0/0x3e0 [ 2284.999149][ T7877] ? do_sys_open+0x31d/0x5d0 [ 2285.003740][ T7877] ? tomoyo_file_ioctl+0x23/0x30 [ 2285.008688][ T7877] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2285.014926][ T7877] ? security_file_ioctl+0x93/0xc0 [ 2285.020038][ T7877] ksys_ioctl+0xab/0xd0 [ 2285.024200][ T7877] __x64_sys_ioctl+0x73/0xb0 [ 2285.028792][ T7877] do_syscall_64+0x103/0x610 [ 2285.033383][ T7877] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2285.039276][ T7877] RIP: 0033:0x458a97 [ 2285.043164][ T7877] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2285.062867][ T7877] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2285.071272][ T7877] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458a97 [ 2285.079239][ T7877] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2285.087205][ T7877] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2285.095173][ T7877] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2285.103142][ T7877] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 [ 2285.255232][ T7877] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 03:37:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0xffffff1f}, 0x0) 03:37:06 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43050000]}}}}}}}}, 0x0) [ 2285.349690][ T7895] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:37:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x03', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:06 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000]}}}}}}}}, 0x0) [ 2285.657522][ T7910] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:37:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x2}, 0x0) 03:37:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reixerfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:06 executing program 1 (fault-call:0 fault-nth:21): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:06 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c000000]}}}}}}}}, 0x0) 03:37:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x03', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) [ 2285.889821][ T7925] FAULT_INJECTION: forcing a failure. [ 2285.889821][ T7925] name failslab, interval 1, probability 0, space 0, times 0 [ 2285.910585][ T7925] CPU: 1 PID: 7925 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2285.918415][ T7925] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2285.928472][ T7925] Call Trace: [ 2285.931776][ T7925] dump_stack+0x172/0x1f0 [ 2285.936123][ T7925] should_fail.cold+0xa/0x15 [ 2285.940725][ T7925] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2285.946545][ T7925] ? ___might_sleep+0x163/0x280 [ 2285.951406][ T7925] __should_failslab+0x121/0x190 [ 2285.956355][ T7925] should_failslab+0x9/0x14 [ 2285.960867][ T7925] kmem_cache_alloc+0x2b2/0x6f0 [ 2285.965728][ T7925] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 2285.971704][ T7925] ? lock_downgrade+0x880/0x880 [ 2285.976563][ T7925] skb_clone+0x150/0x3b0 [ 2285.980809][ T7925] netlink_broadcast_filtered+0x870/0xb20 [ 2285.986541][ T7925] netlink_broadcast+0x3a/0x50 [ 2285.991307][ T7925] kobject_uevent_env+0xa94/0x1030 [ 2285.996437][ T7925] kobject_uevent+0x20/0x26 [ 2286.000939][ T7925] lo_ioctl+0x112b/0x2150 [ 2286.005273][ T7925] ? lo_rw_aio+0x1120/0x1120 [ 2286.009866][ T7925] blkdev_ioctl+0x6f2/0x1d10 [ 2286.014456][ T7925] ? blkpg_ioctl+0xa90/0xa90 [ 2286.019044][ T7925] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2286.024859][ T7925] ? __fget+0x35a/0x550 [ 2286.029021][ T7925] block_ioctl+0xee/0x130 [ 2286.033437][ T7925] ? blkdev_fallocate+0x410/0x410 [ 2286.038481][ T7925] do_vfs_ioctl+0xd6e/0x1390 [ 2286.043079][ T7925] ? ioctl_preallocate+0x210/0x210 [ 2286.048195][ T7925] ? __fget+0x381/0x550 [ 2286.052361][ T7925] ? ksys_dup3+0x3e0/0x3e0 [ 2286.056780][ T7925] ? do_sys_open+0x31d/0x5d0 [ 2286.061383][ T7925] ? tomoyo_file_ioctl+0x23/0x30 [ 2286.066326][ T7925] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2286.072566][ T7925] ? security_file_ioctl+0x93/0xc0 [ 2286.077686][ T7925] ksys_ioctl+0xab/0xd0 [ 2286.081847][ T7925] __x64_sys_ioctl+0x73/0xb0 [ 2286.086450][ T7925] do_syscall_64+0x103/0x610 [ 2286.091051][ T7925] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2286.096946][ T7925] RIP: 0033:0x458a97 [ 2286.100839][ T7925] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2286.120442][ T7925] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2286.128862][ T7925] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458a97 03:37:07 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x3}, 0x0) 03:37:07 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58000000]}}}}}}}}, 0x0) [ 2286.136881][ T7925] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2286.144847][ T7925] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2286.152816][ T7925] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2286.160790][ T7925] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 [ 2286.250750][ T7925] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 [ 2286.262692][ T7932] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:37:07 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x4}, 0x0) 03:37:07 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000]}}}}}}}}, 0x0) 03:37:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiyerfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x0f', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) [ 2286.506976][ T7951] validate_nla: 3 callbacks suppressed [ 2286.506985][ T7951] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2286.648308][ T7954] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:37:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:07 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}}}}}}}, 0x0) 03:37:07 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x5}, 0x0) 03:37:07 executing program 1 (fault-call:0 fault-nth:22): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reizerfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:07 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x6}, 0x0) [ 2286.825189][ T7971] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:37:07 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c000000]}}}}}}}}, 0x0) [ 2286.876335][ T7970] FAULT_INJECTION: forcing a failure. [ 2286.876335][ T7970] name failslab, interval 1, probability 0, space 0, times 0 [ 2286.921606][ T7970] CPU: 0 PID: 7970 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2286.929449][ T7970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2286.939606][ T7970] Call Trace: [ 2286.942906][ T7970] dump_stack+0x172/0x1f0 [ 2286.947327][ T7970] should_fail.cold+0xa/0x15 [ 2286.951920][ T7970] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2286.957730][ T7970] ? ___might_sleep+0x163/0x280 [ 2286.962587][ T7970] __should_failslab+0x121/0x190 [ 2286.967529][ T7970] should_failslab+0x9/0x14 [ 2286.972087][ T7970] kmem_cache_alloc+0x2b2/0x6f0 [ 2286.976938][ T7970] ? __fget+0x381/0x550 [ 2286.981102][ T7970] getname_flags+0xd6/0x5b0 [ 2286.985607][ T7970] do_mkdirat+0xa0/0x2a0 [ 2286.989849][ T7970] ? __ia32_sys_mknod+0xb0/0xb0 [ 2286.994695][ T7970] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2287.000149][ T7970] ? do_syscall_64+0x26/0x610 [ 2287.004822][ T7970] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2287.010893][ T7970] ? do_syscall_64+0x26/0x610 [ 2287.015566][ T7970] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2287.020851][ T7970] __x64_sys_mkdir+0x5c/0x80 [ 2287.025446][ T7970] do_syscall_64+0x103/0x610 [ 2287.030037][ T7970] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2287.035923][ T7970] RIP: 0033:0x458047 [ 2287.039824][ T7970] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2287.059420][ T7970] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2287.067824][ T7970] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458047 [ 2287.075793][ T7970] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200002c0 [ 2287.083759][ T7970] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2287.091724][ T7970] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2287.099698][ T7970] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:37:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) [ 2287.168227][ T7985] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2287.171890][ T7978] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:37:08 executing program 1 (fault-call:0 fault-nth:23): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:08 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74000000]}}}}}}}}, 0x0) 03:37:08 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x7}, 0x0) [ 2287.352240][ T7992] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:37:08 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a000000]}}}}}}}}, 0x0) [ 2287.402083][ T7993] FAULT_INJECTION: forcing a failure. [ 2287.402083][ T7993] name failslab, interval 1, probability 0, space 0, times 0 [ 2287.452016][ T7993] CPU: 0 PID: 7993 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2287.459851][ T7993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2287.469903][ T7993] Call Trace: [ 2287.473206][ T7993] dump_stack+0x172/0x1f0 [ 2287.477551][ T7993] should_fail.cold+0xa/0x15 [ 2287.482142][ T7993] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2287.487949][ T7993] ? ___might_sleep+0x163/0x280 [ 2287.492808][ T7993] __should_failslab+0x121/0x190 [ 2287.497832][ T7993] should_failslab+0x9/0x14 [ 2287.502339][ T7993] kmem_cache_alloc+0x2b2/0x6f0 [ 2287.507195][ T7993] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 2287.512997][ T7993] ? lock_downgrade+0x880/0x880 [ 2287.517851][ T7993] skb_clone+0x150/0x3b0 [ 2287.522094][ T7993] netlink_broadcast_filtered+0x870/0xb20 [ 2287.527819][ T7993] netlink_broadcast+0x3a/0x50 [ 2287.532581][ T7993] kobject_uevent_env+0xa94/0x1030 [ 2287.537873][ T7993] kobject_uevent+0x20/0x26 [ 2287.542377][ T7993] lo_ioctl+0x112b/0x2150 [ 2287.546712][ T7993] ? lo_rw_aio+0x1120/0x1120 [ 2287.551308][ T7993] blkdev_ioctl+0x6f2/0x1d10 [ 2287.557113][ T7993] ? blkpg_ioctl+0xa90/0xa90 [ 2287.561702][ T7993] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2287.567535][ T7993] ? __fget+0x35a/0x550 [ 2287.571694][ T7993] block_ioctl+0xee/0x130 [ 2287.576021][ T7993] ? blkdev_fallocate+0x410/0x410 [ 2287.581043][ T7993] do_vfs_ioctl+0xd6e/0x1390 [ 2287.585639][ T7993] ? ioctl_preallocate+0x210/0x210 [ 2287.590754][ T7993] ? __fget+0x381/0x550 [ 2287.594913][ T7993] ? ksys_dup3+0x3e0/0x3e0 [ 2287.599330][ T7993] ? do_sys_open+0x31d/0x5d0 [ 2287.603922][ T7993] ? tomoyo_file_ioctl+0x23/0x30 [ 2287.608865][ T7993] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2287.615102][ T7993] ? security_file_ioctl+0x93/0xc0 [ 2287.620213][ T7993] ksys_ioctl+0xab/0xd0 [ 2287.624379][ T7993] __x64_sys_ioctl+0x73/0xb0 [ 2287.628967][ T7993] do_syscall_64+0x103/0x610 [ 2287.633559][ T7993] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2287.639450][ T7993] RIP: 0033:0x458a97 [ 2287.643339][ T7993] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2287.662937][ T7993] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2287.671344][ T7993] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458a97 [ 2287.679307][ T7993] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2287.687273][ T7993] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2287.695236][ T7993] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 03:37:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:08 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0xa}, 0x0) 03:37:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='rei\x92erfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) [ 2287.703204][ T7993] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 [ 2287.742396][ T8002] net_ratelimit: 30 callbacks suppressed [ 2287.742405][ T8002] dccp_v6_rcv: dropped packet with invalid checksum [ 2287.759286][ T8003] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2287.771404][ T8002] dccp_v6_rcv: dropped packet with invalid checksum 03:37:08 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0xc}, 0x0) 03:37:08 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800e0000]}}}}}}}}, 0x0) [ 2287.819116][ T7993] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 [ 2287.839099][ T7999] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2287.839099][ T7999] [ 2287.879595][ T8010] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2287.885987][ T8017] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:37:09 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0xe}, 0x0) 03:37:09 executing program 1 (fault-call:0 fault-nth:24): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2287.934434][ T8019] dccp_v6_rcv: dropped packet with invalid checksum [ 2287.942253][ T8019] dccp_v6_rcv: dropped packet with invalid checksum [ 2288.086219][ T8025] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2288.123567][ T8026] FAULT_INJECTION: forcing a failure. [ 2288.123567][ T8026] name failslab, interval 1, probability 0, space 0, times 0 [ 2288.137455][ T8026] CPU: 0 PID: 8026 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2288.145279][ T8026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2288.155519][ T8026] Call Trace: [ 2288.158822][ T8026] dump_stack+0x172/0x1f0 [ 2288.163169][ T8026] should_fail.cold+0xa/0x15 [ 2288.167802][ T8026] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2288.173616][ T8026] ? ___might_sleep+0x163/0x280 [ 2288.178477][ T8026] __should_failslab+0x121/0x190 [ 2288.183425][ T8026] should_failslab+0x9/0x14 [ 2288.187930][ T8026] kmem_cache_alloc+0x2b2/0x6f0 [ 2288.192794][ T8026] ? __fget+0x381/0x550 [ 2288.196955][ T8026] getname_flags+0xd6/0x5b0 [ 2288.201462][ T8026] do_mkdirat+0xa0/0x2a0 [ 2288.205790][ T8026] ? __ia32_sys_mknod+0xb0/0xb0 [ 2288.210639][ T8026] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2288.216098][ T8026] ? do_syscall_64+0x26/0x610 [ 2288.220784][ T8026] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2288.226846][ T8026] ? do_syscall_64+0x26/0x610 [ 2288.231529][ T8026] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2288.236825][ T8026] __x64_sys_mkdir+0x5c/0x80 [ 2288.241511][ T8026] do_syscall_64+0x103/0x610 [ 2288.246107][ T8026] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2288.252004][ T8026] RIP: 0033:0x458047 [ 2288.255897][ T8026] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2288.275505][ T8026] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 03:37:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:09 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80350000]}}}}}}}}, 0x0) 03:37:09 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0xf}, 0x0) [ 2288.283925][ T8026] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458047 [ 2288.291895][ T8026] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200002c0 [ 2288.299866][ T8026] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2288.307837][ T8026] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2288.315808][ T8026] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:37:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2288.360435][ T8031] dccp_v6_rcv: dropped packet with invalid checksum [ 2288.380366][ T8031] dccp_v6_rcv: dropped packet with invalid checksum 03:37:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reis\nrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:09 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81000000]}}}}}}}}, 0x0) [ 2288.403140][ T8033] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:37:09 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x10}, 0x0) 03:37:09 executing program 1 (fault-call:0 fault-nth:25): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2288.483713][ T8035] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2288.483713][ T8035] 03:37:09 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x48}, 0x0) [ 2288.551177][ T8048] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2288.574340][ T8053] dccp_v6_rcv: dropped packet with invalid checksum [ 2288.583925][ T8037] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:37:09 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff]}}}}}}}}, 0x0) [ 2288.628305][ T8053] dccp_v6_rcv: dropped packet with invalid checksum [ 2288.630459][ T8054] FAULT_INJECTION: forcing a failure. [ 2288.630459][ T8054] name failslab, interval 1, probability 0, space 0, times 0 [ 2288.650594][ T8057] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2288.695099][ T8054] CPU: 0 PID: 8054 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2288.702931][ T8054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2288.712990][ T8054] Call Trace: [ 2288.716291][ T8054] dump_stack+0x172/0x1f0 [ 2288.720636][ T8054] should_fail.cold+0xa/0x15 [ 2288.725232][ T8054] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2288.731046][ T8054] ? ___might_sleep+0x163/0x280 [ 2288.735910][ T8054] __should_failslab+0x121/0x190 [ 2288.740848][ T8054] should_failslab+0x9/0x14 [ 2288.745433][ T8054] __kmalloc+0x2dc/0x740 [ 2288.749675][ T8054] ? __lock_acquire+0x548/0x3fb0 [ 2288.754615][ T8054] ? ext4_find_extent+0x76e/0x9d0 [ 2288.759642][ T8054] ext4_find_extent+0x76e/0x9d0 [ 2288.764499][ T8054] ext4_ext_map_blocks+0x1c3/0x5260 [ 2288.769702][ T8054] ? ext4_ext_release+0x10/0x10 [ 2288.774560][ T8054] ? __lock_acquire+0x548/0x3fb0 [ 2288.779505][ T8054] ? lock_acquire+0x16f/0x3f0 [ 2288.784178][ T8054] ? ext4_map_blocks+0x3fd/0x18e0 [ 2288.789211][ T8054] ext4_map_blocks+0xec7/0x18e0 [ 2288.794063][ T8054] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2288.799363][ T8054] ? ext4_issue_zeroout+0x190/0x190 [ 2288.804560][ T8054] ? _raw_spin_unlock_irq+0x5e/0x90 [ 2288.809757][ T8054] ? finish_task_switch+0x146/0x780 [ 2288.814951][ T8054] ? finish_task_switch+0x118/0x780 [ 2288.820144][ T8054] ? __switch_to_asm+0x34/0x70 [ 2288.824917][ T8054] ext4_getblk+0xc4/0x510 [ 2288.829243][ T8054] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2288.834528][ T8054] ? ext4_iomap_begin+0xfe0/0xfe0 [ 2288.839555][ T8054] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2288.845019][ T8054] ext4_bread+0x8f/0x230 [ 2288.849264][ T8054] ? ext4_getblk+0x510/0x510 [ 2288.853882][ T8054] ext4_append+0x155/0x370 [ 2288.858306][ T8054] ext4_mkdir+0x61b/0xdf0 [ 2288.862657][ T8054] ? ext4_init_dot_dotdot+0x520/0x520 [ 2288.868028][ T8054] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2288.874266][ T8054] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2288.880505][ T8054] ? security_inode_permission+0xd5/0x110 [ 2288.886226][ T8054] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2288.892468][ T8054] ? security_inode_mkdir+0xee/0x120 [ 2288.897767][ T8054] vfs_mkdir+0x433/0x690 [ 2288.902012][ T8054] do_mkdirat+0x234/0x2a0 [ 2288.906348][ T8054] ? __ia32_sys_mknod+0xb0/0xb0 [ 2288.911285][ T8054] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2288.916743][ T8054] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2288.922831][ T8054] ? do_syscall_64+0x26/0x610 [ 2288.927519][ T8054] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2288.932803][ T8054] __x64_sys_mkdir+0x5c/0x80 [ 2288.937395][ T8054] do_syscall_64+0x103/0x610 [ 2288.941986][ T8054] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2288.947872][ T8054] RIP: 0033:0x458047 [ 2288.951765][ T8054] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2288.971367][ T8054] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2288.979773][ T8054] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458047 [ 2288.987745][ T8054] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200002c0 03:37:10 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x4c}, 0x0) [ 2288.995714][ T8054] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2289.003685][ T8054] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2289.011656][ T8054] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:37:10 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x60}, 0x0) [ 2289.090635][ T8054] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 [ 2289.110995][ T8070] dccp_v6_rcv: dropped packet with invalid checksum [ 2289.117929][ T8061] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2289.117929][ T8061] [ 2289.133269][ T8070] dccp_v6_rcv: dropped packet with invalid checksum [ 2289.204739][ T8064] REISERFS warning (device loop4): reiserfs_fill_super: Cannot allocate commit workqueue 03:37:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:10 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88470000]}}}}}}}}, 0x0) 03:37:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reis%rfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:10 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x68}, 0x0) 03:37:10 executing program 1 (fault-call:0 fault-nth:26): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:10 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88480000]}}}}}}}}, 0x0) 03:37:10 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x6c}, 0x0) [ 2289.445844][ T8085] FAULT_INJECTION: forcing a failure. [ 2289.445844][ T8085] name failslab, interval 1, probability 0, space 0, times 0 [ 2289.460457][ T8082] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2289.460457][ T8082] [ 2289.476330][ T8085] CPU: 0 PID: 8085 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2289.484154][ T8085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2289.494202][ T8085] Call Trace: [ 2289.494226][ T8085] dump_stack+0x172/0x1f0 [ 2289.494248][ T8085] should_fail.cold+0xa/0x15 [ 2289.494270][ T8085] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2289.506441][ T8085] ? ___might_sleep+0x163/0x280 [ 2289.517068][ T8085] __should_failslab+0x121/0x190 [ 2289.522001][ T8085] should_failslab+0x9/0x14 [ 2289.522025][ T8085] __kmalloc+0x2dc/0x740 [ 2289.522047][ T8085] ? ext4_find_extent+0x76e/0x9d0 [ 2289.535859][ T8085] ext4_find_extent+0x76e/0x9d0 [ 2289.540716][ T8085] ext4_ext_map_blocks+0x1c3/0x5260 [ 2289.540739][ T8085] ? ext4_ext_release+0x10/0x10 [ 2289.540766][ T8085] ? lock_acquire+0x16f/0x3f0 [ 2289.556640][ T8085] ? ext4_map_blocks+0x3fd/0x18e0 [ 2289.561683][ T8085] ext4_map_blocks+0xec7/0x18e0 [ 2289.566548][ T8085] ? ext4_issue_zeroout+0x190/0x190 [ 2289.571759][ T8085] ? kasan_check_write+0x14/0x20 [ 2289.576700][ T8085] ? __brelse+0x95/0xb0 [ 2289.580866][ T8085] ext4_getblk+0xc4/0x510 [ 2289.585205][ T8085] ? ext4_iomap_begin+0xfe0/0xfe0 [ 2289.590321][ T8085] ? ext4_free_inode+0x1450/0x1450 [ 2289.595448][ T8085] ext4_bread+0x8f/0x230 [ 2289.599699][ T8085] ? ext4_getblk+0x510/0x510 [ 2289.604308][ T8085] ext4_append+0x155/0x370 [ 2289.608730][ T8085] ext4_mkdir+0x61b/0xdf0 [ 2289.613064][ T8085] ? ext4_init_dot_dotdot+0x520/0x520 [ 2289.618442][ T8085] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2289.624679][ T8085] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2289.630923][ T8085] ? security_inode_permission+0xd5/0x110 [ 2289.636658][ T8085] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2289.642897][ T8085] ? security_inode_mkdir+0xee/0x120 [ 2289.648182][ T8085] vfs_mkdir+0x433/0x690 [ 2289.652433][ T8085] do_mkdirat+0x234/0x2a0 [ 2289.656762][ T8085] ? __ia32_sys_mknod+0xb0/0xb0 [ 2289.662392][ T8085] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2289.667851][ T8085] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2289.673915][ T8085] ? do_syscall_64+0x26/0x610 [ 2289.678599][ T8085] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2289.683969][ T8085] __x64_sys_mkdir+0x5c/0x80 [ 2289.688566][ T8085] do_syscall_64+0x103/0x610 [ 2289.693243][ T8085] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2289.699152][ T8085] RIP: 0033:0x458047 [ 2289.703043][ T8085] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2289.722649][ T8085] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2289.731057][ T8085] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458047 [ 2289.739024][ T8085] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200002c0 03:37:10 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x74}, 0x0) 03:37:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reis\x92rfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) [ 2289.746987][ T8085] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2289.754963][ T8085] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2289.762940][ T8085] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:37:10 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88640000]}}}}}}}}, 0x0) [ 2289.811233][ T8089] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2289.822219][ T8085] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 03:37:10 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x7a}, 0x0) 03:37:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:11 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff]}}}}}}}}, 0x0) 03:37:11 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88caffff]}}}}}}}}, 0x0) [ 2290.066015][ T8212] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2290.108837][ T8220] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2290.108837][ T8220] 03:37:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:11 executing program 1 (fault-call:0 fault-nth:27): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:11 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0xf0}, 0x0) 03:37:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reise\nfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:11 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x89060000]}}}}}}}}, 0x0) 03:37:11 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff]}}}}}}}}, 0x0) 03:37:11 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x300}, 0x0) [ 2290.316824][ T8230] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2290.316824][ T8230] [ 2290.342896][ T8232] FAULT_INJECTION: forcing a failure. [ 2290.342896][ T8232] name failslab, interval 1, probability 0, space 0, times 0 [ 2290.355688][ T8232] CPU: 0 PID: 8232 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2290.363489][ T8232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2290.373581][ T8232] Call Trace: [ 2290.376879][ T8232] dump_stack+0x172/0x1f0 [ 2290.381215][ T8232] should_fail.cold+0xa/0x15 [ 2290.388288][ T8232] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2290.394099][ T8232] ? __es_tree_search.isra.0+0x1bf/0x230 [ 2290.399743][ T8232] __should_failslab+0x121/0x190 [ 2290.404685][ T8232] should_failslab+0x9/0x14 [ 2290.409188][ T8232] kmem_cache_alloc+0x47/0x6f0 [ 2290.413960][ T8232] ? ext4_es_scan+0x730/0x730 [ 2290.418731][ T8232] ? do_raw_write_lock+0x124/0x290 [ 2290.423846][ T8232] __es_insert_extent+0x2cc/0xf20 [ 2290.428873][ T8232] ext4_es_insert_extent+0x2b7/0xa40 [ 2290.434247][ T8232] ? ext4_es_scan_clu+0x50/0x50 [ 2290.439129][ T8232] ? rcu_read_lock_sched_held+0x110/0x130 [ 2290.444846][ T8232] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2290.451084][ T8232] ? ext4_es_find_extent_range+0xff/0x600 [ 2290.456817][ T8232] ext4_ext_put_gap_in_cache+0xfe/0x150 [ 2290.462457][ T8232] ? ext4_rereserve_cluster+0x240/0x240 [ 2290.468087][ T8232] ? ext4_find_extent+0x76e/0x9d0 [ 2290.473124][ T8232] ? ext4_find_extent+0x6a6/0x9d0 [ 2290.478167][ T8232] ext4_ext_map_blocks+0x20a8/0x5260 [ 2290.483459][ T8232] ? ext4_ext_release+0x10/0x10 [ 2290.488326][ T8232] ? lock_acquire+0x16f/0x3f0 [ 2290.493003][ T8232] ? ext4_map_blocks+0x3fd/0x18e0 [ 2290.498037][ T8232] ext4_map_blocks+0xec7/0x18e0 [ 2290.502897][ T8232] ? ext4_issue_zeroout+0x190/0x190 [ 2290.508108][ T8232] ? kasan_check_write+0x14/0x20 [ 2290.513044][ T8232] ? __brelse+0x95/0xb0 [ 2290.517212][ T8232] ext4_getblk+0xc4/0x510 [ 2290.521540][ T8232] ? ext4_iomap_begin+0xfe0/0xfe0 [ 2290.526568][ T8232] ? ext4_free_inode+0x1450/0x1450 [ 2290.531680][ T8232] ext4_bread+0x8f/0x230 [ 2290.535920][ T8232] ? ext4_getblk+0x510/0x510 [ 2290.540525][ T8232] ext4_append+0x155/0x370 [ 2290.544962][ T8232] ext4_mkdir+0x61b/0xdf0 [ 2290.549299][ T8232] ? ext4_init_dot_dotdot+0x520/0x520 [ 2290.554666][ T8232] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2290.560901][ T8232] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2290.567150][ T8232] ? security_inode_permission+0xd5/0x110 [ 2290.572866][ T8232] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2290.579101][ T8232] ? security_inode_mkdir+0xee/0x120 [ 2290.584388][ T8232] vfs_mkdir+0x433/0x690 [ 2290.588631][ T8232] do_mkdirat+0x234/0x2a0 [ 2290.593055][ T8232] ? __ia32_sys_mknod+0xb0/0xb0 [ 2290.597901][ T8232] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2290.603364][ T8232] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2290.609452][ T8232] ? do_syscall_64+0x26/0x610 [ 2290.614133][ T8232] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2290.619421][ T8232] __x64_sys_mkdir+0x5c/0x80 [ 2290.624050][ T8232] do_syscall_64+0x103/0x610 [ 2290.628642][ T8232] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2290.634527][ T8232] RIP: 0033:0x458047 [ 2290.638423][ T8232] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2290.658021][ T8232] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2290.666438][ T8232] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458047 [ 2290.674420][ T8232] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200002c0 [ 2290.682382][ T8232] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2290.690461][ T8232] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2290.698429][ T8232] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:37:11 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff]}}}}}}}}, 0x0) 03:37:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:11 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x500}, 0x0) [ 2290.793705][ T8232] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 03:37:11 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffa888]}}}}}}}}, 0x0) [ 2290.882517][ T8244] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:37:12 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x600}, 0x0) [ 2291.125113][ T8257] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2291.125113][ T8257] [ 2291.139326][ T8260] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:37:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:12 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffca88]}}}}}}}}, 0x0) 03:37:12 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x700}, 0x0) 03:37:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reise%fs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:12 executing program 1 (fault-call:0 fault-nth:28): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2291.320311][ T8273] FAULT_INJECTION: forcing a failure. [ 2291.320311][ T8273] name failslab, interval 1, probability 0, space 0, times 0 [ 2291.330601][ T8271] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2291.330601][ T8271] [ 2291.341740][ T8273] CPU: 1 PID: 8273 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2291.354076][ T8273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2291.364137][ T8273] Call Trace: [ 2291.367439][ T8273] dump_stack+0x172/0x1f0 [ 2291.371800][ T8273] should_fail.cold+0xa/0x15 [ 2291.376400][ T8273] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2291.382223][ T8273] ? ___might_sleep+0x163/0x280 [ 2291.387090][ T8273] __should_failslab+0x121/0x190 [ 2291.392040][ T8273] should_failslab+0x9/0x14 [ 2291.396547][ T8273] kmem_cache_alloc+0x2b2/0x6f0 [ 2291.401396][ T8273] ? rcu_read_lock_sched_held+0x110/0x130 [ 2291.407114][ T8273] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2291.413350][ T8273] ? __mark_inode_dirty+0x241/0x1290 [ 2291.418644][ T8273] ext4_mb_new_blocks+0x5a0/0x3c20 [ 2291.423756][ T8273] ? mark_held_locks+0xa4/0xf0 [ 2291.428519][ T8273] ? ext4_find_extent+0x76e/0x9d0 [ 2291.433560][ T8273] ext4_ext_map_blocks+0x2b8a/0x5260 [ 2291.438934][ T8273] ? ext4_ext_release+0x10/0x10 [ 2291.443780][ T8273] ? find_held_lock+0x35/0x130 [ 2291.448575][ T8273] ext4_map_blocks+0x8c5/0x18e0 [ 2291.453431][ T8273] ? ext4_issue_zeroout+0x190/0x190 [ 2291.458647][ T8273] ? kasan_check_write+0x14/0x20 [ 2291.463589][ T8273] ? __brelse+0x95/0xb0 [ 2291.467748][ T8273] ext4_getblk+0xc4/0x510 [ 2291.472082][ T8273] ? ext4_iomap_begin+0xfe0/0xfe0 [ 2291.477118][ T8273] ? ext4_free_inode+0x1450/0x1450 [ 2291.482231][ T8273] ext4_bread+0x8f/0x230 [ 2291.486469][ T8273] ? ext4_getblk+0x510/0x510 [ 2291.491069][ T8273] ext4_append+0x155/0x370 [ 2291.495490][ T8273] ext4_mkdir+0x61b/0xdf0 [ 2291.499833][ T8273] ? ext4_init_dot_dotdot+0x520/0x520 [ 2291.505214][ T8273] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2291.511452][ T8273] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 03:37:12 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffdd86]}}}}}}}}, 0x0) [ 2291.517694][ T8273] ? security_inode_permission+0xd5/0x110 [ 2291.523413][ T8273] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2291.529659][ T8273] ? security_inode_mkdir+0xee/0x120 [ 2291.534947][ T8273] vfs_mkdir+0x433/0x690 [ 2291.539192][ T8273] do_mkdirat+0x234/0x2a0 [ 2291.543616][ T8273] ? __ia32_sys_mknod+0xb0/0xb0 [ 2291.548477][ T8273] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2291.555656][ T8273] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2291.555671][ T8273] ? do_syscall_64+0x26/0x610 [ 2291.555684][ T8273] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2291.555701][ T8273] __x64_sys_mkdir+0x5c/0x80 [ 2291.555716][ T8273] do_syscall_64+0x103/0x610 [ 2291.555733][ T8273] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2291.555743][ T8273] RIP: 0033:0x458047 [ 2291.555761][ T8273] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2291.566555][ T8273] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 03:37:12 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0xa00}, 0x0) [ 2291.618715][ T8273] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458047 [ 2291.626685][ T8273] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200002c0 [ 2291.634650][ T8273] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2291.642705][ T8273] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2291.650673][ T8273] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:37:12 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff000]}}}}}}}}, 0x0) [ 2291.708191][ T8286] validate_nla: 10 callbacks suppressed [ 2291.708200][ T8286] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2291.722754][ T8279] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:37:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:12 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0xc00}, 0x0) 03:37:12 executing program 1 (fault-call:0 fault-nth:29): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:12 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8d]}}}}}}}}, 0x0) [ 2291.916840][ T8293] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2291.923035][ T8302] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2292.001419][ T8303] FAULT_INJECTION: forcing a failure. [ 2292.001419][ T8303] name failslab, interval 1, probability 0, space 0, times 0 [ 2292.021589][ T8296] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2292.021589][ T8296] [ 2292.021818][ T8303] CPU: 0 PID: 8303 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 03:37:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:13 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5]}}}}}}}}, 0x0) 03:37:13 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0xe00}, 0x0) 03:37:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reise\x92fs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) [ 2292.042696][ T8303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2292.052760][ T8303] Call Trace: [ 2292.056078][ T8303] dump_stack+0x172/0x1f0 [ 2292.060418][ T8303] should_fail.cold+0xa/0x15 [ 2292.065020][ T8303] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2292.070861][ T8303] ? ___might_sleep+0x163/0x280 [ 2292.075720][ T8303] __should_failslab+0x121/0x190 [ 2292.080871][ T8303] should_failslab+0x9/0x14 [ 2292.085388][ T8303] __kmalloc+0x2dc/0x740 [ 2292.089634][ T8303] ? mark_held_locks+0xa4/0xf0 [ 2292.094399][ T8303] ? kfree+0x173/0x230 [ 2292.098468][ T8303] ? ext4_find_extent+0x76e/0x9d0 [ 2292.103496][ T8303] ext4_find_extent+0x76e/0x9d0 [ 2292.108610][ T8303] ext4_ext_map_blocks+0x1c3/0x5260 [ 2292.113821][ T8303] ? ext4_ext_release+0x10/0x10 [ 2292.118667][ T8303] ? find_held_lock+0x35/0x130 [ 2292.123439][ T8303] ? lock_acquire+0x16f/0x3f0 [ 2292.128114][ T8303] ? ext4_map_blocks+0x85d/0x18e0 [ 2292.133149][ T8303] ext4_map_blocks+0x8c5/0x18e0 [ 2292.138003][ T8303] ? ext4_issue_zeroout+0x190/0x190 [ 2292.143551][ T8303] ? kasan_check_write+0x14/0x20 [ 2292.148485][ T8303] ? __brelse+0x95/0xb0 [ 2292.152651][ T8303] ext4_getblk+0xc4/0x510 [ 2292.156981][ T8303] ? ext4_iomap_begin+0xfe0/0xfe0 [ 2292.162011][ T8303] ? ext4_free_inode+0x1450/0x1450 [ 2292.167160][ T8303] ext4_bread+0x8f/0x230 [ 2292.171404][ T8303] ? ext4_getblk+0x510/0x510 [ 2292.176001][ T8303] ext4_append+0x155/0x370 [ 2292.180419][ T8303] ext4_mkdir+0x61b/0xdf0 [ 2292.184760][ T8303] ? ext4_init_dot_dotdot+0x520/0x520 [ 2292.190139][ T8303] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2292.196385][ T8303] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2292.202636][ T8303] ? security_inode_permission+0xd5/0x110 [ 2292.208378][ T8303] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2292.214619][ T8303] ? security_inode_mkdir+0xee/0x120 [ 2292.219902][ T8303] vfs_mkdir+0x433/0x690 [ 2292.224150][ T8303] do_mkdirat+0x234/0x2a0 [ 2292.228482][ T8303] ? __ia32_sys_mknod+0xb0/0xb0 [ 2292.233418][ T8303] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2292.238877][ T8303] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2292.244939][ T8303] ? do_syscall_64+0x26/0x610 [ 2292.249617][ T8303] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2292.254905][ T8303] __x64_sys_mkdir+0x5c/0x80 [ 2292.259496][ T8303] do_syscall_64+0x103/0x610 [ 2292.264091][ T8303] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2292.269976][ T8303] RIP: 0033:0x458047 [ 2292.273866][ T8303] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2292.293474][ T8303] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2292.301887][ T8303] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458047 [ 2292.309853][ T8303] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200002c0 [ 2292.317820][ T8303] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2292.325804][ T8303] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2292.333781][ T8303] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:37:13 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffffffffff]}}}}}}}}, 0x0) 03:37:13 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0xf00}, 0x0) [ 2292.384187][ T8310] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:37:13 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}}}}}}, 0x0) 03:37:13 executing program 1 (fault-call:0 fault-nth:30): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2292.575530][ T8321] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2292.583889][ T8314] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2292.583889][ T8314] [ 2292.631328][ T8318] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:37:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:13 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}}}}}}}, 0x0) 03:37:13 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x2000}, 0x0) [ 2292.794833][ T8335] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2292.803621][ T8336] net_ratelimit: 32 callbacks suppressed [ 2292.803629][ T8336] dccp_v6_rcv: dropped packet with invalid checksum 03:37:13 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x34ec}, 0x0) [ 2292.839868][ T8337] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2292.840720][ T8336] dccp_v6_rcv: dropped packet with invalid checksum [ 2292.930591][ T8341] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:37:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:14 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}}}}}}}}, 0x0) 03:37:14 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x4000}, 0x0) [ 2292.997176][ T8329] FAULT_INJECTION: forcing a failure. [ 2292.997176][ T8329] name failslab, interval 1, probability 0, space 0, times 0 [ 2293.016213][ T8329] CPU: 1 PID: 8329 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2293.024140][ T8329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2293.034211][ T8329] Call Trace: [ 2293.037518][ T8329] dump_stack+0x172/0x1f0 [ 2293.041934][ T8329] should_fail.cold+0xa/0x15 [ 2293.046632][ T8329] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2293.052444][ T8329] ? ___might_sleep+0x163/0x280 [ 2293.057306][ T8329] __should_failslab+0x121/0x190 [ 2293.062247][ T8329] should_failslab+0x9/0x14 [ 2293.066748][ T8329] __kmalloc_track_caller+0x2d8/0x740 [ 2293.072158][ T8329] ? mntput+0x74/0xa0 [ 2293.074961][ T8344] dccp_v6_rcv: dropped packet with invalid checksum [ 2293.076135][ T8329] ? strndup_user+0x77/0xd0 [ 2293.076151][ T8329] memdup_user+0x26/0xb0 [ 2293.076168][ T8329] strndup_user+0x77/0xd0 [ 2293.092190][ T8344] dccp_v6_rcv: dropped packet with invalid checksum [ 2293.095773][ T8329] ksys_mount+0x3c/0x150 [ 2293.095789][ T8329] __x64_sys_mount+0xbe/0x150 [ 2293.095805][ T8329] do_syscall_64+0x103/0x610 [ 2293.095826][ T8329] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2293.121735][ T8329] RIP: 0033:0x45b69a [ 2293.125628][ T8329] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 03:37:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiser\ns\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:14 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}}}}}}}}, 0x0) [ 2293.145322][ T8329] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2293.153735][ T8329] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2293.161711][ T8329] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2293.169679][ T8329] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2293.177829][ T8329] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2293.186073][ T8329] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:37:14 executing program 1 (fault-call:0 fault-nth:31): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2293.412311][ T8353] dccp_v6_rcv: dropped packet with invalid checksum [ 2293.429486][ T8352] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:37:14 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x4800}, 0x0) [ 2293.464776][ T8353] dccp_v6_rcv: dropped packet with invalid checksum [ 2293.465359][ T8350] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2293.523809][ T8361] FAULT_INJECTION: forcing a failure. [ 2293.523809][ T8361] name failslab, interval 1, probability 0, space 0, times 0 [ 2293.542670][ T8356] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2293.542670][ T8356] [ 2293.544803][ T8361] CPU: 0 PID: 8361 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2293.565351][ T8361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2293.575405][ T8361] Call Trace: [ 2293.578709][ T8361] dump_stack+0x172/0x1f0 [ 2293.583044][ T8361] should_fail.cold+0xa/0x15 [ 2293.587647][ T8361] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2293.593465][ T8361] ? ___might_sleep+0x163/0x280 [ 2293.598321][ T8361] __should_failslab+0x121/0x190 [ 2293.603255][ T8361] should_failslab+0x9/0x14 [ 2293.607846][ T8361] __kmalloc_track_caller+0x2d8/0x740 [ 2293.613219][ T8361] ? mntput+0x74/0xa0 [ 2293.617206][ T8361] ? strndup_user+0x77/0xd0 [ 2293.621708][ T8361] memdup_user+0x26/0xb0 [ 2293.625949][ T8361] strndup_user+0x77/0xd0 [ 2293.630285][ T8361] ksys_mount+0x3c/0x150 [ 2293.634534][ T8361] __x64_sys_mount+0xbe/0x150 [ 2293.639217][ T8361] do_syscall_64+0x103/0x610 [ 2293.643812][ T8361] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2293.649787][ T8361] RIP: 0033:0x45b69a [ 2293.653684][ T8361] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 03:37:14 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}}}}}}}}, 0x0) [ 2293.673288][ T8361] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2293.681702][ T8361] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2293.689674][ T8361] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2293.697641][ T8361] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2293.705616][ T8361] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2293.713585][ T8361] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 [ 2293.747566][ T8366] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:37:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:14 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x4c00}, 0x0) 03:37:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiser%s\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\xff', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:14 executing program 1 (fault-call:0 fault-nth:32): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2293.871195][ T8370] dccp_v6_rcv: dropped packet with invalid checksum [ 2293.895545][ T8370] dccp_v6_rcv: dropped packet with invalid checksum 03:37:15 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}}}}}}}}, 0x0) [ 2293.927456][ T8377] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:37:15 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x5865}, 0x0) [ 2294.006770][ T8382] FAULT_INJECTION: forcing a failure. [ 2294.006770][ T8382] name failslab, interval 1, probability 0, space 0, times 0 [ 2294.037183][ T8382] CPU: 0 PID: 8382 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2294.045031][ T8382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2294.055093][ T8382] Call Trace: [ 2294.058395][ T8382] dump_stack+0x172/0x1f0 [ 2294.062728][ T8382] should_fail.cold+0xa/0x15 [ 2294.067326][ T8382] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2294.073152][ T8382] ? ___might_sleep+0x163/0x280 [ 2294.078010][ T8382] __should_failslab+0x121/0x190 [ 2294.082967][ T8382] should_failslab+0x9/0x14 [ 2294.087560][ T8382] __kmalloc_track_caller+0x2d8/0x740 [ 2294.092936][ T8382] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2294.099218][ T8382] ? strndup_user+0x77/0xd0 [ 2294.103720][ T8382] memdup_user+0x26/0xb0 [ 2294.107962][ T8382] strndup_user+0x77/0xd0 [ 2294.112287][ T8382] ksys_mount+0x7b/0x150 [ 2294.116526][ T8382] __x64_sys_mount+0xbe/0x150 [ 2294.121210][ T8382] do_syscall_64+0x103/0x610 [ 2294.125801][ T8382] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2294.131691][ T8382] RIP: 0033:0x45b69a [ 2294.135581][ T8382] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2294.155183][ T8382] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2294.163589][ T8382] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2294.171558][ T8382] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2294.179525][ T8382] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2294.187492][ T8382] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2294.195461][ T8382] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:37:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiser.s\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) [ 2294.210030][ T8389] dccp_v6_rcv: dropped packet with invalid checksum [ 2294.232993][ T8389] dccp_v6_rcv: dropped packet with invalid checksum [ 2294.249744][ T8392] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:37:15 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}}}}}}}}, 0x0) [ 2294.258224][ T8384] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2294.258224][ T8384] 03:37:15 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x6000}, 0x0) 03:37:15 executing program 1 (fault-call:0 fault-nth:33): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:15 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}}}}}}}}, 0x0) [ 2294.458780][ T8404] FAULT_INJECTION: forcing a failure. [ 2294.458780][ T8404] name failslab, interval 1, probability 0, space 0, times 0 [ 2294.471776][ T8404] CPU: 0 PID: 8404 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2294.479598][ T8404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2294.489649][ T8404] Call Trace: [ 2294.492951][ T8404] dump_stack+0x172/0x1f0 [ 2294.497285][ T8404] should_fail.cold+0xa/0x15 [ 2294.501882][ T8404] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2294.507690][ T8404] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2294.513405][ T8404] ? __es_tree_search.isra.0+0x1bf/0x230 [ 2294.519041][ T8404] __should_failslab+0x121/0x190 [ 2294.523980][ T8404] should_failslab+0x9/0x14 [ 2294.528481][ T8404] kmem_cache_alloc+0x47/0x6f0 [ 2294.533329][ T8404] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2294.539062][ T8404] ? ext4_es_can_be_merged+0x1a3/0x2a0 [ 2294.544527][ T8404] ? ext4_es_scan+0x730/0x730 [ 2294.549200][ T8404] ? do_raw_write_lock+0x124/0x290 [ 2294.554312][ T8404] __es_insert_extent+0x2cc/0xf20 [ 2294.559343][ T8404] ext4_es_insert_extent+0x2b7/0xa40 [ 2294.564629][ T8404] ? ext4_es_scan_clu+0x50/0x50 [ 2294.569499][ T8404] ext4_map_blocks+0xb87/0x18e0 [ 2294.574355][ T8404] ? ext4_issue_zeroout+0x190/0x190 [ 2294.579595][ T8404] ? kasan_check_write+0x14/0x20 [ 2294.584526][ T8404] ? __brelse+0x95/0xb0 [ 2294.588692][ T8404] ext4_getblk+0xc4/0x510 [ 2294.593025][ T8404] ? ext4_iomap_begin+0xfe0/0xfe0 [ 2294.598053][ T8404] ? ext4_free_inode+0x1450/0x1450 [ 2294.603168][ T8404] ext4_bread+0x8f/0x230 [ 2294.607406][ T8404] ? ext4_getblk+0x510/0x510 [ 2294.612003][ T8404] ext4_append+0x155/0x370 [ 2294.616423][ T8404] ext4_mkdir+0x61b/0xdf0 [ 2294.620761][ T8404] ? ext4_init_dot_dotdot+0x520/0x520 [ 2294.626127][ T8404] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2294.632368][ T8404] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2294.638616][ T8404] ? security_inode_permission+0xd5/0x110 [ 2294.644335][ T8404] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2294.650576][ T8404] ? security_inode_mkdir+0xee/0x120 [ 2294.655950][ T8404] vfs_mkdir+0x433/0x690 [ 2294.660216][ T8404] do_mkdirat+0x234/0x2a0 [ 2294.664546][ T8404] ? __ia32_sys_mknod+0xb0/0xb0 [ 2294.669397][ T8404] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2294.674942][ T8404] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2294.681000][ T8404] ? do_syscall_64+0x26/0x610 [ 2294.685673][ T8404] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2294.690960][ T8404] __x64_sys_mkdir+0x5c/0x80 [ 2294.695548][ T8404] do_syscall_64+0x103/0x610 [ 2294.700143][ T8404] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2294.706028][ T8404] RIP: 0033:0x458047 [ 2294.709919][ T8404] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2294.729691][ T8404] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2294.738182][ T8404] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458047 [ 2294.746149][ T8404] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200002c0 [ 2294.754114][ T8404] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2294.762078][ T8404] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2294.770044][ T8404] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:37:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:15 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x6558}, 0x0) 03:37:15 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x806000000000000]}}}}}}}}, 0x0) 03:37:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiser/s\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:15 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000]}}}}}}}}, 0x0) 03:37:15 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x6800}, 0x0) [ 2294.865981][ T8404] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 [ 2294.879280][ T8417] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:37:15 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x6c00}, 0x0) [ 2294.942670][ T8426] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2294.942670][ T8426] 03:37:16 executing program 1 (fault-call:0 fault-nth:34): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:16 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000]}}}}}}}}, 0x0) 03:37:16 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x7400}, 0x0) 03:37:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiser\x92s\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) [ 2295.177830][ T8440] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2295.177830][ T8440] [ 2295.193331][ T8439] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2295.206112][ T8450] FAULT_INJECTION: forcing a failure. [ 2295.206112][ T8450] name failslab, interval 1, probability 0, space 0, times 0 [ 2295.218928][ T8450] CPU: 1 PID: 8450 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2295.226736][ T8450] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2295.236789][ T8450] Call Trace: [ 2295.236816][ T8450] dump_stack+0x172/0x1f0 [ 2295.236836][ T8450] should_fail.cold+0xa/0x15 [ 2295.236853][ T8450] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2295.236871][ T8450] ? ___might_sleep+0x163/0x280 [ 2295.236889][ T8450] __should_failslab+0x121/0x190 [ 2295.236907][ T8450] should_failslab+0x9/0x14 [ 2295.244512][ T8450] kmem_cache_alloc+0x2b2/0x6f0 [ 2295.254870][ T8450] ? __schedule+0x81b/0x1cc0 [ 2295.254885][ T8450] ? find_held_lock+0x35/0x130 [ 2295.254905][ T8450] getname_flags+0xd6/0x5b0 [ 2295.254917][ T8450] ? retint_kernel+0x2d/0x2d [ 2295.254932][ T8450] user_path_at_empty+0x2f/0x50 [ 2295.254948][ T8450] do_mount+0x150/0x2c40 [ 2295.254964][ T8450] ? retint_kernel+0x2d/0x2d [ 2295.254979][ T8450] ? copy_mount_string+0x40/0x40 [ 2295.254996][ T8450] ? copy_mount_options+0x1d0/0x3a0 [ 2295.264756][ T8450] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2295.264770][ T8450] ? copy_mount_options+0x280/0x3a0 [ 2295.264786][ T8450] ksys_mount+0xdb/0x150 [ 2295.264801][ T8450] __x64_sys_mount+0xbe/0x150 [ 2295.264819][ T8450] do_syscall_64+0x103/0x610 [ 2295.264839][ T8450] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2295.274158][ T8450] RIP: 0033:0x45b69a [ 2295.274173][ T8450] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2295.274181][ T8450] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2295.274200][ T8450] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2295.316298][ T8450] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2295.316307][ T8450] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2295.316315][ T8450] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2295.316324][ T8450] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:37:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:16 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2100000000000000]}}}}}}}}, 0x0) 03:37:16 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x7a00}, 0x0) 03:37:16 executing program 1 (fault-call:0 fault-nth:35): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:16 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2800000000000000]}}}}}}}}, 0x0) 03:37:16 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x8100}, 0x0) [ 2295.711813][ T8461] FAULT_INJECTION: forcing a failure. [ 2295.711813][ T8461] name failslab, interval 1, probability 0, space 0, times 0 [ 2295.730997][ T8461] CPU: 1 PID: 8461 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2295.738828][ T8461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2295.748903][ T8461] Call Trace: [ 2295.752229][ T8461] dump_stack+0x172/0x1f0 [ 2295.756569][ T8461] should_fail.cold+0xa/0x15 [ 2295.761163][ T8461] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2295.766982][ T8461] ? ___might_sleep+0x163/0x280 [ 2295.771848][ T8461] __should_failslab+0x121/0x190 [ 2295.776791][ T8461] should_failslab+0x9/0x14 [ 2295.781387][ T8461] kmem_cache_alloc_trace+0x2d1/0x760 [ 2295.786765][ T8461] alloc_fs_context+0x5a/0x640 [ 2295.791543][ T8461] fs_context_for_mount+0x25/0x30 [ 2295.796572][ T8461] do_mount+0x13d7/0x2c40 [ 2295.800915][ T8461] ? copy_mount_string+0x40/0x40 [ 2295.805853][ T8461] ? _copy_from_user+0xdd/0x150 [ 2295.810708][ T8461] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2295.816954][ T8461] ? copy_mount_options+0x280/0x3a0 [ 2295.822157][ T8461] ksys_mount+0xdb/0x150 [ 2295.826401][ T8461] __x64_sys_mount+0xbe/0x150 [ 2295.831079][ T8461] do_syscall_64+0x103/0x610 [ 2295.835672][ T8461] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2295.841556][ T8461] RIP: 0033:0x45b69a [ 2295.845446][ T8461] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2295.865051][ T8461] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2295.873553][ T8461] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2295.881610][ T8461] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2295.889578][ T8461] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2295.897643][ T8461] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2295.905622][ T8461] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:37:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserf\n\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:17 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}}}}}}}}, 0x0) 03:37:17 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0xec34}, 0x0) [ 2296.032611][ T8464] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:37:17 executing program 1 (fault-call:0 fault-nth:36): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2296.086294][ T8472] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2296.086294][ T8472] 03:37:17 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305000000000000]}}}}}}}}, 0x0) [ 2296.247945][ T8490] FAULT_INJECTION: forcing a failure. [ 2296.247945][ T8490] name failslab, interval 1, probability 0, space 0, times 0 [ 2296.284679][ T8490] CPU: 0 PID: 8490 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 03:37:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:17 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0xf000}, 0x0) 03:37:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:17 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800000000000000]}}}}}}}}, 0x0) [ 2296.292917][ T8490] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2296.302978][ T8490] Call Trace: [ 2296.306286][ T8490] dump_stack+0x172/0x1f0 [ 2296.310636][ T8490] should_fail.cold+0xa/0x15 [ 2296.315236][ T8490] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2296.321056][ T8490] ? ___might_sleep+0x163/0x280 [ 2296.325919][ T8490] __should_failslab+0x121/0x190 [ 2296.330874][ T8490] should_failslab+0x9/0x14 [ 2296.335398][ T8490] kmem_cache_alloc+0x2b2/0x6f0 [ 2296.340273][ T8490] ? cache_grow_end+0xa4/0x190 [ 2296.345131][ T8490] ? kasan_check_write+0x14/0x20 [ 2296.350079][ T8490] getname_flags+0xd6/0x5b0 [ 2296.354584][ T8490] user_path_at_empty+0x2f/0x50 [ 2296.359447][ T8490] do_mount+0x150/0x2c40 [ 2296.363699][ T8490] ? copy_mount_options+0x5c/0x3a0 [ 2296.368817][ T8490] ? copy_mount_string+0x40/0x40 [ 2296.373770][ T8490] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2296.380005][ T8490] ? copy_mount_options+0x280/0x3a0 [ 2296.385198][ T8490] ksys_mount+0xdb/0x150 [ 2296.391988][ T8490] __x64_sys_mount+0xbe/0x150 [ 2296.396671][ T8490] do_syscall_64+0x103/0x610 [ 2296.401292][ T8490] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2296.407188][ T8490] RIP: 0033:0x45b69a [ 2296.411080][ T8490] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2296.430770][ T8490] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2296.439266][ T8490] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2296.447237][ T8490] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2296.455207][ T8490] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2296.463171][ T8490] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2296.471135][ T8490] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:37:17 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00000000000000]}}}}}}}}, 0x0) 03:37:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserf#\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:17 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0xfeff}, 0x0) 03:37:17 executing program 1 (fault-call:0 fault-nth:37): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2296.592771][ T8502] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2296.592771][ T8502] [ 2296.606866][ T8501] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:37:17 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5800000000000000]}}}}}}}}, 0x0) [ 2296.682892][ T8515] FAULT_INJECTION: forcing a failure. [ 2296.682892][ T8515] name failslab, interval 1, probability 0, space 0, times 0 [ 2296.715672][ T8515] CPU: 1 PID: 8515 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2296.723528][ T8515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2296.733588][ T8515] Call Trace: [ 2296.733617][ T8515] dump_stack+0x172/0x1f0 [ 2296.733638][ T8515] should_fail.cold+0xa/0x15 [ 2296.733658][ T8515] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2296.733679][ T8515] ? ___might_sleep+0x163/0x280 [ 2296.751638][ T8515] __should_failslab+0x121/0x190 [ 2296.761417][ T8515] should_failslab+0x9/0x14 [ 2296.765926][ T8515] kmem_cache_alloc_trace+0x2d1/0x760 [ 2296.771296][ T8515] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 2296.777104][ T8515] ? rcu_read_lock_sched_held+0x110/0x130 [ 2296.782836][ T8515] ? kmem_cache_alloc_trace+0x354/0x760 [ 2296.788393][ T8515] legacy_init_fs_context+0x48/0xe0 [ 2296.793590][ T8515] ? generic_parse_monolithic+0x200/0x200 [ 2296.799478][ T8515] alloc_fs_context+0x365/0x640 [ 2296.804425][ T8515] fs_context_for_mount+0x25/0x30 [ 2296.809458][ T8515] do_mount+0x13d7/0x2c40 [ 2296.813795][ T8515] ? copy_mount_string+0x40/0x40 [ 2296.818751][ T8515] ? copy_mount_options+0x1ea/0x3a0 [ 2296.823950][ T8515] ? __sanitizer_cov_trace_pc+0x3b/0x50 03:37:17 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0xff0f}, 0x0) [ 2296.829507][ T8515] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2296.835753][ T8515] ? copy_mount_options+0x280/0x3a0 [ 2296.840955][ T8515] ksys_mount+0xdb/0x150 [ 2296.845198][ T8515] __x64_sys_mount+0xbe/0x150 [ 2296.849914][ T8515] do_syscall_64+0x103/0x610 [ 2296.854506][ T8515] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2296.860486][ T8515] RIP: 0033:0x45b69a [ 2296.864562][ T8515] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2296.884171][ T8515] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2296.892589][ T8515] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2296.900565][ T8515] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2296.908543][ T8515] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2296.916513][ T8515] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2296.924481][ T8515] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:37:18 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000000000000]}}}}}}}}, 0x0) [ 2296.986537][ T8522] validate_nla: 10 callbacks suppressed [ 2296.986547][ T8522] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:37:18 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0xfffe}, 0x0) [ 2297.090854][ T8527] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2297.090854][ T8527] [ 2297.114722][ T8523] REISERFS warning (device loop4): reiserfs_fill_super: Cannot allocate commit workqueue [ 2297.127100][ T8532] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:37:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserf%\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:18 executing program 1 (fault-call:0 fault-nth:38): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:18 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800000000000000]}}}}}}}}, 0x0) 03:37:18 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x30000}, 0x0) 03:37:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:18 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00000000000000]}}}}}}}}, 0x0) [ 2297.275454][ T8538] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2297.294012][ T8534] FAULT_INJECTION: forcing a failure. [ 2297.294012][ T8534] name failslab, interval 1, probability 0, space 0, times 0 03:37:18 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x34000}, 0x0) [ 2297.322234][ T8534] CPU: 1 PID: 8534 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2297.330072][ T8534] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2297.330078][ T8534] Call Trace: [ 2297.330106][ T8534] dump_stack+0x172/0x1f0 [ 2297.330129][ T8534] should_fail.cold+0xa/0x15 [ 2297.352618][ T8534] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2297.358433][ T8534] ? ___might_sleep+0x163/0x280 [ 2297.363301][ T8534] __should_failslab+0x121/0x190 [ 2297.368257][ T8534] should_failslab+0x9/0x14 [ 2297.372774][ T8534] kmem_cache_alloc_trace+0x2d1/0x760 [ 2297.378150][ T8534] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 2297.384050][ T8534] ? rcu_read_lock_sched_held+0x110/0x130 [ 2297.389796][ T8534] ? kmem_cache_alloc_trace+0x354/0x760 [ 2297.395358][ T8534] legacy_init_fs_context+0x48/0xe0 [ 2297.403068][ T8534] ? generic_parse_monolithic+0x200/0x200 [ 2297.412282][ T8534] alloc_fs_context+0x365/0x640 [ 2297.417311][ T8534] fs_context_for_mount+0x25/0x30 [ 2297.422344][ T8534] do_mount+0x13d7/0x2c40 [ 2297.426677][ T8534] ? copy_mount_string+0x40/0x40 [ 2297.431610][ T8534] ? _copy_from_user+0xdd/0x150 [ 2297.436487][ T8534] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2297.442724][ T8534] ? copy_mount_options+0x280/0x3a0 [ 2297.447923][ T8534] ksys_mount+0xdb/0x150 [ 2297.452166][ T8534] __x64_sys_mount+0xbe/0x150 [ 2297.456845][ T8534] do_syscall_64+0x103/0x610 [ 2297.461524][ T8534] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2297.467520][ T8534] RIP: 0033:0x45b69a [ 2297.471501][ T8534] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2297.491106][ T8534] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2297.499516][ T8534] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2297.507485][ T8534] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2297.515540][ T8534] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2297.523509][ T8534] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2297.531474][ T8534] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:37:18 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400000000000000]}}}}}}}}, 0x0) 03:37:18 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x40000}, 0x0) [ 2297.614194][ T8548] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:37:18 executing program 1 (fault-call:0 fault-nth:39): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2297.698374][ T8547] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2297.722468][ T8553] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2297.722468][ T8553] 03:37:18 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00000000000000]}}}}}}}}, 0x0) [ 2297.758214][ T8562] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2297.841434][ T8564] FAULT_INJECTION: forcing a failure. [ 2297.841434][ T8564] name failslab, interval 1, probability 0, space 0, times 0 [ 2297.858927][ T8568] net_ratelimit: 32 callbacks suppressed [ 2297.858935][ T8568] dccp_v6_rcv: dropped packet with invalid checksum [ 2297.870848][ T8564] CPU: 1 PID: 8564 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2297.877855][ T8568] dccp_v6_rcv: dropped packet with invalid checksum [ 2297.879012][ T8564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2297.879018][ T8564] Call Trace: [ 2297.879045][ T8564] dump_stack+0x172/0x1f0 [ 2297.879070][ T8564] should_fail.cold+0xa/0x15 [ 2297.879089][ T8564] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2297.913837][ T8564] ? ___might_sleep+0x163/0x280 [ 2297.918699][ T8564] __should_failslab+0x121/0x190 [ 2297.923639][ T8564] should_failslab+0x9/0x14 [ 2297.928146][ T8564] kmem_cache_alloc_trace+0x2d1/0x760 [ 2297.933518][ T8564] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 2297.939329][ T8564] ? rcu_read_lock_sched_held+0x110/0x130 [ 2297.945055][ T8564] ? kmem_cache_alloc_trace+0x354/0x760 [ 2297.950704][ T8564] legacy_init_fs_context+0x48/0xe0 [ 2297.955900][ T8564] ? generic_parse_monolithic+0x200/0x200 [ 2297.961613][ T8564] alloc_fs_context+0x365/0x640 [ 2297.966476][ T8564] fs_context_for_mount+0x25/0x30 [ 2297.971497][ T8564] do_mount+0x13d7/0x2c40 [ 2297.975831][ T8564] ? copy_mount_string+0x40/0x40 [ 2297.980865][ T8564] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2297.987102][ T8564] ? copy_mount_options+0x280/0x3a0 [ 2297.992316][ T8564] ksys_mount+0xdb/0x150 [ 2297.996564][ T8564] __x64_sys_mount+0xbe/0x150 [ 2298.001247][ T8564] do_syscall_64+0x103/0x610 [ 2298.005851][ T8564] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2298.011738][ T8564] RIP: 0033:0x45b69a [ 2298.015632][ T8564] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2298.035234][ T8564] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2298.043650][ T8564] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2298.051622][ T8564] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2298.059599][ T8564] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2298.067574][ T8564] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2298.075542][ T8564] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:37:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserf*\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:19 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x400300}, 0x0) 03:37:19 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800e000000000000]}}}}}}}}, 0x0) 03:37:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:19 executing program 1 (fault-call:0 fault-nth:40): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2298.174923][ T8569] REISERFS warning (device loop0): reiserfs_fill_super: Cannot allocate commit workqueue 03:37:19 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0xf0ffff}, 0x0) [ 2298.261371][ T8574] dccp_v6_rcv: dropped packet with invalid checksum [ 2298.269522][ T8581] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2298.282702][ T8574] dccp_v6_rcv: dropped packet with invalid checksum [ 2298.290494][ T8576] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2298.315354][ T8580] FAULT_INJECTION: forcing a failure. [ 2298.315354][ T8580] name failslab, interval 1, probability 0, space 0, times 0 [ 2298.328960][ T8580] CPU: 0 PID: 8580 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2298.336783][ T8580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2298.346837][ T8580] Call Trace: [ 2298.346867][ T8580] dump_stack+0x172/0x1f0 [ 2298.346890][ T8580] should_fail.cold+0xa/0x15 [ 2298.346908][ T8580] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2298.346926][ T8580] ? ___might_sleep+0x163/0x280 [ 2298.346947][ T8580] __should_failslab+0x121/0x190 [ 2298.354542][ T8580] should_failslab+0x9/0x14 [ 2298.379196][ T8580] __kmalloc+0x2dc/0x740 [ 2298.383445][ T8580] ? __list_lru_init+0xd1/0x6e0 [ 2298.383464][ T8580] __list_lru_init+0xd1/0x6e0 [ 2298.383486][ T8580] alloc_super+0x762/0x890 [ 2298.398831][ T8580] ? test_single_super+0x10/0x10 [ 2298.403786][ T8580] sget_userns+0xf1/0x560 [ 2298.408201][ T8580] ? kill_litter_super+0x60/0x60 03:37:19 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8035000000000000]}}}}}}}}, 0x0) [ 2298.408219][ T8580] ? test_single_super+0x10/0x10 [ 2298.408232][ T8580] ? kill_litter_super+0x60/0x60 [ 2298.408253][ T8580] sget+0x10c/0x150 [ 2298.408272][ T8580] mount_bdev+0xff/0x3c0 [ 2298.408287][ T8580] ? finish_unfinished+0x1120/0x1120 [ 2298.408305][ T8580] get_super_block+0x35/0x40 [ 2298.418153][ T8580] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2298.418169][ T8580] legacy_get_tree+0xf2/0x200 [ 2298.418188][ T8580] vfs_get_tree+0x123/0x450 [ 2298.418206][ T8580] do_mount+0x1436/0x2c40 [ 2298.418229][ T8580] ? copy_mount_string+0x40/0x40 03:37:19 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x1000000}, 0x0) 03:37:19 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100000000000000]}}}}}}}}, 0x0) [ 2298.426948][ T8580] ? _copy_from_user+0xdd/0x150 [ 2298.426968][ T8580] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2298.426982][ T8580] ? copy_mount_options+0x280/0x3a0 [ 2298.427001][ T8580] ksys_mount+0xdb/0x150 [ 2298.427016][ T8580] __x64_sys_mount+0xbe/0x150 [ 2298.427036][ T8580] do_syscall_64+0x103/0x610 [ 2298.436533][ T8580] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2298.436544][ T8580] RIP: 0033:0x45b69a [ 2298.436558][ T8580] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2298.436567][ T8580] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2298.436581][ T8580] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2298.436590][ T8580] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2298.436598][ T8580] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2298.436607][ T8580] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2298.436615][ T8580] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 [ 2298.446450][ T8591] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2298.461892][ T8593] dccp_v6_rcv: dropped packet with invalid checksum [ 2298.471173][ T8593] dccp_v6_rcv: dropped packet with invalid checksum 03:37:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserf+\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:19 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x2000000}, 0x0) [ 2298.686378][ T8598] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2298.694960][ T8589] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2298.694960][ T8589] [ 2298.725117][ T8600] dccp_v6_rcv: dropped packet with invalid checksum [ 2298.765825][ T8600] dccp_v6_rcv: dropped packet with invalid checksum [ 2298.776241][ T8599] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2298.815837][ T8607] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2298.875268][ T8609] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2298.875268][ T8609] 03:37:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:20 executing program 1 (fault-call:0 fault-nth:41): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:20 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}}}}}}}}, 0x0) 03:37:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x3000000}, 0x0) 03:37:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x4000000}, 0x0) [ 2299.081968][ T8616] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2299.090617][ T8617] dccp_v6_rcv: dropped packet with invalid checksum [ 2299.098693][ T8617] dccp_v6_rcv: dropped packet with invalid checksum 03:37:20 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8847000000000000]}}}}}}}}, 0x0) 03:37:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserf-\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) [ 2299.175397][ T8613] FAULT_INJECTION: forcing a failure. [ 2299.175397][ T8613] name failslab, interval 1, probability 0, space 0, times 0 [ 2299.195396][ T8613] CPU: 0 PID: 8613 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2299.203235][ T8613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2299.213381][ T8613] Call Trace: [ 2299.216707][ T8613] dump_stack+0x172/0x1f0 [ 2299.216730][ T8613] should_fail.cold+0xa/0x15 [ 2299.216750][ T8613] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2299.216772][ T8613] ? ___might_sleep+0x163/0x280 [ 2299.225663][ T8613] __should_failslab+0x121/0x190 [ 2299.225681][ T8613] should_failslab+0x9/0x14 [ 2299.225699][ T8613] __kmalloc_track_caller+0x2d8/0x740 [ 2299.225720][ T8613] ? vfs_parse_fs_string+0xe8/0x170 [ 2299.225738][ T8613] kmemdup_nul+0x31/0xa0 [ 2299.225753][ T8613] vfs_parse_fs_string+0xe8/0x170 [ 2299.225766][ T8613] ? vfs_parse_fs_param+0x510/0x510 [ 2299.225789][ T8613] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2299.236680][ T8613] ? alloc_fs_context+0x3bb/0x640 [ 2299.236704][ T8613] do_mount+0x6e9/0x2c40 [ 2299.236725][ T8613] ? copy_mount_string+0x40/0x40 [ 2299.236740][ T8613] ? _copy_from_user+0xdd/0x150 [ 2299.236758][ T8613] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2299.236770][ T8613] ? copy_mount_options+0x280/0x3a0 [ 2299.236793][ T8613] ksys_mount+0xdb/0x150 [ 2299.246224][ T8613] __x64_sys_mount+0xbe/0x150 [ 2299.246245][ T8613] do_syscall_64+0x103/0x610 03:37:20 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8848000000000000]}}}}}}}}, 0x0) 03:37:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x5000000}, 0x0) [ 2299.246265][ T8613] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2299.246278][ T8613] RIP: 0033:0x45b69a [ 2299.246293][ T8613] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2299.246299][ T8613] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2299.246313][ T8613] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2299.246321][ T8613] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2299.246328][ T8613] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2299.246341][ T8613] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2299.256870][ T8613] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 [ 2299.376127][ T8620] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:37:20 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8864000000000000]}}}}}}}}, 0x0) 03:37:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x6000000}, 0x0) [ 2299.585605][ T8633] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2299.585605][ T8633] [ 2299.624266][ T8642] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:37:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:20 executing program 1 (fault-call:0 fault-nth:42): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:20 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff00000000]}}}}}}}}, 0x0) 03:37:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x7000000}, 0x0) 03:37:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserf.\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\xff', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:20 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88caffff00000000]}}}}}}}}, 0x0) 03:37:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0xa000000}, 0x0) [ 2299.876699][ T8656] FAULT_INJECTION: forcing a failure. [ 2299.876699][ T8656] name failslab, interval 1, probability 0, space 0, times 0 [ 2299.928120][ T8656] CPU: 1 PID: 8656 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2299.936303][ T8656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2299.946361][ T8656] Call Trace: [ 2299.949664][ T8656] dump_stack+0x172/0x1f0 [ 2299.954009][ T8656] should_fail.cold+0xa/0x15 [ 2299.958612][ T8656] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2299.964441][ T8656] ? ___might_sleep+0x163/0x280 [ 2299.969303][ T8656] __should_failslab+0x121/0x190 [ 2299.974246][ T8656] should_failslab+0x9/0x14 [ 2299.978756][ T8656] kmem_cache_alloc_trace+0x2d1/0x760 [ 2299.984130][ T8656] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 2299.984147][ T8656] ? rcu_read_lock_sched_held+0x110/0x130 [ 2299.984166][ T8656] ? kmem_cache_alloc_trace+0x354/0x760 [ 2299.984187][ T8656] legacy_init_fs_context+0x48/0xe0 [ 2299.984201][ T8656] ? generic_parse_monolithic+0x200/0x200 [ 2299.984215][ T8656] alloc_fs_context+0x365/0x640 [ 2299.984235][ T8656] fs_context_for_mount+0x25/0x30 [ 2300.006431][ T8656] do_mount+0x13d7/0x2c40 [ 2300.006454][ T8656] ? copy_mount_string+0x40/0x40 [ 2300.006479][ T8656] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2300.006493][ T8656] ? copy_mount_options+0x280/0x3a0 [ 2300.006511][ T8656] ksys_mount+0xdb/0x150 [ 2300.006528][ T8656] __x64_sys_mount+0xbe/0x150 [ 2300.006545][ T8656] do_syscall_64+0x103/0x610 [ 2300.006563][ T8656] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2300.006573][ T8656] RIP: 0033:0x45b69a [ 2300.006586][ T8656] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2300.006594][ T8656] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2300.006608][ T8656] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2300.006615][ T8656] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2300.006628][ T8656] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2300.118133][ T8656] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 03:37:21 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0xc000000}, 0x0) 03:37:21 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8906000000000000]}}}}}}}}, 0x0) [ 2300.126118][ T8656] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 [ 2300.145237][ T8665] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2300.145237][ T8665] 03:37:21 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0xe000000}, 0x0) 03:37:21 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff00000000]}}}}}}}}, 0x0) [ 2300.431655][ T8687] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2300.431655][ T8687] 03:37:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:21 executing program 1 (fault-call:0 fault-nth:43): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserf0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:21 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}}}}}}}}, 0x0) 03:37:21 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0xf000000}, 0x0) 03:37:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\xff', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:21 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff000]}}}}}}}}, 0x0) 03:37:21 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x10000000}, 0x0) [ 2300.732569][ T8697] FAULT_INJECTION: forcing a failure. [ 2300.732569][ T8697] name failslab, interval 1, probability 0, space 0, times 0 [ 2300.770528][ T8697] CPU: 0 PID: 8697 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 03:37:21 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x2}}}}}}}}, 0x0) [ 2300.778361][ T8697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2300.788507][ T8697] Call Trace: [ 2300.791808][ T8697] dump_stack+0x172/0x1f0 [ 2300.796237][ T8697] should_fail.cold+0xa/0x15 [ 2300.800841][ T8697] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2300.806663][ T8697] ? ___might_sleep+0x163/0x280 [ 2300.811527][ T8697] __should_failslab+0x121/0x190 [ 2300.816461][ T8697] should_failslab+0x9/0x14 [ 2300.820966][ T8697] __kmalloc+0x2dc/0x740 [ 2300.825213][ T8697] ? __list_lru_init+0xd1/0x6e0 [ 2300.830247][ T8697] __list_lru_init+0xd1/0x6e0 [ 2300.834927][ T8697] alloc_super+0x762/0x890 [ 2300.839338][ T8697] ? test_single_super+0x10/0x10 [ 2300.844272][ T8697] sget_userns+0xf1/0x560 [ 2300.848606][ T8697] ? kill_litter_super+0x60/0x60 [ 2300.853541][ T8697] ? test_single_super+0x10/0x10 [ 2300.858478][ T8697] ? kill_litter_super+0x60/0x60 [ 2300.863414][ T8697] sget+0x10c/0x150 [ 2300.867223][ T8697] mount_bdev+0xff/0x3c0 [ 2300.871462][ T8697] ? finish_unfinished+0x1120/0x1120 [ 2300.876750][ T8697] get_super_block+0x35/0x40 [ 2300.881341][ T8697] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2300.886359][ T8697] legacy_get_tree+0xf2/0x200 [ 2300.891042][ T8697] vfs_get_tree+0x123/0x450 [ 2300.895547][ T8697] do_mount+0x1436/0x2c40 [ 2300.899891][ T8697] ? copy_mount_string+0x40/0x40 [ 2300.904825][ T8697] ? _copy_from_user+0xdd/0x150 [ 2300.909684][ T8697] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2300.915918][ T8697] ? copy_mount_options+0x280/0x3a0 [ 2300.921206][ T8697] ksys_mount+0xdb/0x150 [ 2300.925449][ T8697] __x64_sys_mount+0xbe/0x150 [ 2300.930218][ T8697] do_syscall_64+0x103/0x610 [ 2300.934809][ T8697] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2300.940699][ T8697] RIP: 0033:0x45b69a [ 2300.944599][ T8697] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2300.964200][ T8697] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2300.972661][ T8697] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a 03:37:22 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x20000000}, 0x0) [ 2300.980630][ T8697] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2300.988596][ T8697] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2300.996573][ T8697] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2301.004639][ T8697] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:37:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfK\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:22 executing program 1 (fault-call:0 fault-nth:44): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2301.180474][ T8709] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2301.180474][ T8709] 03:37:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:22 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x40000000}, 0x0) 03:37:22 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x3}}}}}}}}, 0x0) 03:37:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\xff', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:22 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x4}}}}}}}}, 0x0) [ 2301.387209][ T8726] FAULT_INJECTION: forcing a failure. [ 2301.387209][ T8726] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2301.400446][ T8726] CPU: 0 PID: 8726 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2301.408256][ T8726] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2301.418316][ T8726] Call Trace: [ 2301.421626][ T8726] dump_stack+0x172/0x1f0 [ 2301.425969][ T8726] should_fail.cold+0xa/0x15 [ 2301.430581][ T8726] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2301.436402][ T8726] ? __lock_acquire+0x548/0x3fb0 [ 2301.436422][ T8726] ? blkdev_get+0x5a4/0x990 [ 2301.436446][ T8726] should_fail_alloc_page+0x50/0x60 [ 2301.445849][ T8726] __alloc_pages_nodemask+0x1a1/0x7e0 [ 2301.445868][ T8726] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 2301.445882][ T8726] ? find_held_lock+0x35/0x130 [ 2301.445909][ T8726] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2301.445931][ T8726] cache_grow_begin+0x9c/0x860 [ 2301.477577][ T8726] ? alloc_super+0x55/0x890 03:37:22 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x5}}}}}}}}, 0x0) [ 2301.482088][ T8726] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2301.488427][ T8726] kmem_cache_alloc_trace+0x67f/0x760 [ 2301.493797][ T8726] ? kasan_check_write+0x14/0x20 [ 2301.498750][ T8726] alloc_super+0x55/0x890 [ 2301.503088][ T8726] ? kasan_check_read+0x11/0x20 [ 2301.507941][ T8726] ? test_single_super+0x10/0x10 [ 2301.507959][ T8726] sget_userns+0xf1/0x560 [ 2301.507980][ T8726] ? kill_litter_super+0x60/0x60 [ 2301.507997][ T8726] ? test_single_super+0x10/0x10 [ 2301.517253][ T8726] ? kill_litter_super+0x60/0x60 [ 2301.517268][ T8726] sget+0x10c/0x150 03:37:22 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x6}}}}}}}}, 0x0) [ 2301.517292][ T8726] mount_bdev+0xff/0x3c0 [ 2301.517311][ T8726] ? finish_unfinished+0x1120/0x1120 [ 2301.545381][ T8726] get_super_block+0x35/0x40 [ 2301.549989][ T8726] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2301.556142][ T8726] legacy_get_tree+0xf2/0x200 [ 2301.560835][ T8726] vfs_get_tree+0x123/0x450 [ 2301.565372][ T8726] do_mount+0x1436/0x2c40 [ 2301.569711][ T8726] ? copy_mount_string+0x40/0x40 [ 2301.574678][ T8726] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2301.580922][ T8726] ? copy_mount_options+0x280/0x3a0 [ 2301.586123][ T8726] ksys_mount+0xdb/0x150 [ 2301.590378][ T8726] __x64_sys_mount+0xbe/0x150 [ 2301.595066][ T8726] do_syscall_64+0x103/0x610 [ 2301.599676][ T8726] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2301.605571][ T8726] RIP: 0033:0x45b69a [ 2301.609550][ T8726] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2301.629160][ T8726] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 03:37:22 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x7}}}}}}}}, 0x0) [ 2301.637585][ T8726] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2301.645563][ T8726] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2301.653536][ T8726] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2301.653545][ T8726] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2301.653553][ T8726] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:37:22 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x48000000}, 0x0) [ 2301.700411][ T8726] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 03:37:22 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x8}}}}}}}}, 0x0) 03:37:22 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x4c000000}, 0x0) [ 2301.792670][ T8745] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2301.792670][ T8745] 03:37:22 executing program 1 (fault-call:0 fault-nth:45): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2301.999834][ T8759] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2301.999834][ T8759] [ 2302.020085][ T8765] FAULT_INJECTION: forcing a failure. [ 2302.020085][ T8765] name failslab, interval 1, probability 0, space 0, times 0 [ 2302.034724][ T8765] CPU: 0 PID: 8765 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2302.042555][ T8765] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2302.052603][ T8765] Call Trace: [ 2302.055910][ T8765] dump_stack+0x172/0x1f0 [ 2302.060257][ T8765] should_fail.cold+0xa/0x15 [ 2302.064861][ T8765] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2302.070669][ T8765] ? ___might_sleep+0x163/0x280 [ 2302.075522][ T8765] __should_failslab+0x121/0x190 [ 2302.080460][ T8765] should_failslab+0x9/0x14 [ 2302.084963][ T8765] __kmalloc+0x2dc/0x740 [ 2302.089212][ T8765] ? lockdep_init_map+0x1be/0x6d0 [ 2302.094231][ T8765] ? prealloc_shrinker+0xa6/0x350 [ 2302.099255][ T8765] prealloc_shrinker+0xa6/0x350 [ 2302.104106][ T8765] alloc_super+0x710/0x890 [ 2302.108518][ T8765] ? test_single_super+0x10/0x10 [ 2302.113453][ T8765] sget_userns+0xf1/0x560 [ 2302.117775][ T8765] ? kill_litter_super+0x60/0x60 [ 2302.122709][ T8765] ? test_single_super+0x10/0x10 [ 2302.127640][ T8765] ? kill_litter_super+0x60/0x60 [ 2302.132573][ T8765] sget+0x10c/0x150 [ 2302.136384][ T8765] mount_bdev+0xff/0x3c0 [ 2302.140626][ T8765] ? finish_unfinished+0x1120/0x1120 [ 2302.145932][ T8765] get_super_block+0x35/0x40 [ 2302.150518][ T8765] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2302.155536][ T8765] legacy_get_tree+0xf2/0x200 [ 2302.160221][ T8765] vfs_get_tree+0x123/0x450 [ 2302.164900][ T8765] do_mount+0x1436/0x2c40 [ 2302.169241][ T8765] ? copy_mount_string+0x40/0x40 [ 2302.174187][ T8765] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2302.180425][ T8765] ? copy_mount_options+0x280/0x3a0 [ 2302.185624][ T8765] ksys_mount+0xdb/0x150 [ 2302.189868][ T8765] __x64_sys_mount+0xbe/0x150 [ 2302.194631][ T8765] do_syscall_64+0x103/0x610 [ 2302.199221][ T8765] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2302.205105][ T8765] RIP: 0033:0x45b69a [ 2302.208998][ T8765] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2302.228683][ T8765] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2302.237202][ T8765] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2302.245179][ T8765] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2302.253144][ T8765] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2302.261118][ T8765] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2302.269084][ T8765] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:37:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfX\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:23 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0xd}}}}}}}}, 0x0) 03:37:23 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x60000000}, 0x0) 03:37:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:23 executing program 1 (fault-call:0 fault-nth:46): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:23 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x21}}}}}}}}, 0x0) [ 2302.496072][ T8775] validate_nla: 14 callbacks suppressed [ 2302.496082][ T8775] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2302.548358][ T8777] FAULT_INJECTION: forcing a failure. [ 2302.548358][ T8777] name failslab, interval 1, probability 0, space 0, times 0 [ 2302.582682][ T8777] CPU: 1 PID: 8777 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2302.590517][ T8777] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2302.600577][ T8777] Call Trace: [ 2302.601343][ T8780] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2302.601343][ T8780] [ 2302.603888][ T8777] dump_stack+0x172/0x1f0 [ 2302.603912][ T8777] should_fail.cold+0xa/0x15 [ 2302.603936][ T8777] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2302.631988][ T8777] ? ___might_sleep+0x163/0x280 [ 2302.636856][ T8777] __should_failslab+0x121/0x190 [ 2302.641813][ T8777] should_failslab+0x9/0x14 [ 2302.646324][ T8777] __kmalloc+0x2dc/0x740 [ 2302.650571][ T8777] ? __list_lru_init+0xd1/0x6e0 [ 2302.655425][ T8777] __list_lru_init+0xd1/0x6e0 [ 2302.660107][ T8777] alloc_super+0x762/0x890 [ 2302.664520][ T8777] ? test_single_super+0x10/0x10 [ 2302.669468][ T8777] sget_userns+0xf1/0x560 [ 2302.673894][ T8777] ? kill_litter_super+0x60/0x60 [ 2302.678829][ T8777] ? test_single_super+0x10/0x10 [ 2302.683759][ T8777] ? kill_litter_super+0x60/0x60 [ 2302.688703][ T8777] sget+0x10c/0x150 [ 2302.692516][ T8777] mount_bdev+0xff/0x3c0 [ 2302.696761][ T8777] ? finish_unfinished+0x1120/0x1120 [ 2302.702058][ T8777] get_super_block+0x35/0x40 [ 2302.706650][ T8777] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2302.711758][ T8777] legacy_get_tree+0xf2/0x200 [ 2302.716435][ T8777] vfs_get_tree+0x123/0x450 [ 2302.720938][ T8777] do_mount+0x1436/0x2c40 [ 2302.725469][ T8777] ? copy_mount_string+0x40/0x40 [ 2302.730405][ T8777] ? _copy_from_user+0xdd/0x150 [ 2302.735270][ T8777] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2302.741518][ T8777] ? copy_mount_options+0x280/0x3a0 [ 2302.746728][ T8777] ksys_mount+0xdb/0x150 [ 2302.750980][ T8777] __x64_sys_mount+0xbe/0x150 [ 2302.755675][ T8777] do_syscall_64+0x103/0x610 [ 2302.760294][ T8777] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2302.766198][ T8777] RIP: 0033:0x45b69a [ 2302.770184][ T8777] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2302.789818][ T8777] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 03:37:23 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x28}}}}}}}}, 0x0) 03:37:23 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x65580000}, 0x0) [ 2302.798242][ T8777] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2302.806216][ T8777] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2302.814182][ T8777] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2302.822161][ T8777] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2302.830156][ T8777] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 [ 2302.843268][ T8774] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:37:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfa\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:24 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x68000000}, 0x0) [ 2302.886605][ T8791] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2302.908470][ T8793] net_ratelimit: 36 callbacks suppressed [ 2302.908477][ T8793] dccp_v6_rcv: dropped packet with invalid checksum 03:37:24 executing program 1 (fault-call:0 fault-nth:47): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2302.964245][ T8793] dccp_v6_rcv: dropped packet with invalid checksum [ 2303.031444][ T8798] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2303.056772][ T8795] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2303.056772][ T8795] [ 2303.091886][ T8804] FAULT_INJECTION: forcing a failure. [ 2303.091886][ T8804] name failslab, interval 1, probability 0, space 0, times 0 [ 2303.115857][ T8804] CPU: 1 PID: 8804 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2303.123687][ T8804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2303.133739][ T8804] Call Trace: [ 2303.133766][ T8804] dump_stack+0x172/0x1f0 [ 2303.133788][ T8804] should_fail.cold+0xa/0x15 [ 2303.133804][ T8804] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2303.133826][ T8804] ? ___might_sleep+0x163/0x280 [ 2303.156807][ T8804] __should_failslab+0x121/0x190 [ 2303.161764][ T8804] should_failslab+0x9/0x14 [ 2303.166307][ T8804] kmem_cache_alloc_node_trace+0x270/0x720 [ 2303.172122][ T8804] __kmalloc_node+0x3d/0x70 [ 2303.176711][ T8804] kvmalloc_node+0x68/0x100 [ 2303.181215][ T8804] __list_lru_init+0x4a6/0x6e0 [ 2303.185985][ T8804] alloc_super+0x762/0x890 [ 2303.190403][ T8804] ? test_single_super+0x10/0x10 [ 2303.195343][ T8804] sget_userns+0xf1/0x560 [ 2303.199670][ T8804] ? kill_litter_super+0x60/0x60 [ 2303.204618][ T8804] ? test_single_super+0x10/0x10 [ 2303.209551][ T8804] ? kill_litter_super+0x60/0x60 [ 2303.214583][ T8804] sget+0x10c/0x150 [ 2303.218400][ T8804] mount_bdev+0xff/0x3c0 [ 2303.222646][ T8804] ? finish_unfinished+0x1120/0x1120 [ 2303.227940][ T8804] get_super_block+0x35/0x40 [ 2303.232540][ T8804] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2303.237564][ T8804] legacy_get_tree+0xf2/0x200 [ 2303.242250][ T8804] vfs_get_tree+0x123/0x450 [ 2303.246756][ T8804] do_mount+0x1436/0x2c40 [ 2303.251091][ T8804] ? copy_mount_string+0x40/0x40 [ 2303.256038][ T8804] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2303.262290][ T8804] ? copy_mount_options+0x280/0x3a0 [ 2303.267499][ T8804] ksys_mount+0xdb/0x150 [ 2303.271743][ T8804] __x64_sys_mount+0xbe/0x150 [ 2303.276422][ T8804] do_syscall_64+0x103/0x610 [ 2303.281014][ T8804] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2303.286899][ T8804] RIP: 0033:0x45b69a [ 2303.290879][ T8804] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2303.310480][ T8804] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2303.320084][ T8804] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2303.328141][ T8804] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2303.336109][ T8804] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2303.344086][ T8804] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2303.352142][ T8804] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 [ 2303.374891][ T8800] REISERFS warning (device loop4): reiserfs_fill_super: Cannot allocate commit workqueue 03:37:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:24 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x48}}}}}}}}, 0x0) 03:37:24 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x6c000000}, 0x0) 03:37:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfb\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) [ 2303.581274][ T8811] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2303.581847][ T8813] dccp_v6_rcv: dropped packet with invalid checksum [ 2303.597876][ T8813] dccp_v6_rcv: dropped packet with invalid checksum 03:37:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:24 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x4c}}}}}}}}, 0x0) 03:37:24 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x74000000}, 0x0) 03:37:24 executing program 1 (fault-call:0 fault-nth:48): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2303.755949][ T8824] dccp_v6_rcv: dropped packet with invalid checksum [ 2303.770623][ T8826] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2303.775566][ T8824] dccp_v6_rcv: dropped packet with invalid checksum 03:37:24 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x58}}}}}}}}, 0x0) [ 2303.799327][ T8819] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2303.799327][ T8819] [ 2303.824289][ T8825] FAULT_INJECTION: forcing a failure. [ 2303.824289][ T8825] name failslab, interval 1, probability 0, space 0, times 0 [ 2303.865915][ T8825] CPU: 0 PID: 8825 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2303.873836][ T8825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2303.883897][ T8825] Call Trace: [ 2303.887205][ T8825] dump_stack+0x172/0x1f0 [ 2303.891645][ T8825] should_fail.cold+0xa/0x15 [ 2303.896240][ T8825] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2303.902057][ T8825] ? ___might_sleep+0x163/0x280 [ 2303.906914][ T8825] __should_failslab+0x121/0x190 [ 2303.911849][ T8825] should_failslab+0x9/0x14 [ 2303.916359][ T8825] kmem_cache_alloc_trace+0x2d1/0x760 [ 2303.921733][ T8825] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2303.927560][ T8825] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2303.933665][ T8825] __list_lru_init+0x3cf/0x6e0 [ 2303.938433][ T8825] alloc_super+0x762/0x890 [ 2303.942861][ T8825] ? test_single_super+0x10/0x10 [ 2303.947803][ T8825] sget_userns+0xf1/0x560 [ 2303.952130][ T8825] ? kill_litter_super+0x60/0x60 [ 2303.957076][ T8825] ? test_single_super+0x10/0x10 [ 2303.962009][ T8825] ? kill_litter_super+0x60/0x60 [ 2303.966950][ T8825] sget+0x10c/0x150 [ 2303.970768][ T8825] mount_bdev+0xff/0x3c0 [ 2303.975009][ T8825] ? finish_unfinished+0x1120/0x1120 [ 2303.980303][ T8825] get_super_block+0x35/0x40 [ 2303.984898][ T8825] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2303.989922][ T8825] legacy_get_tree+0xf2/0x200 [ 2303.994603][ T8825] vfs_get_tree+0x123/0x450 [ 2303.999117][ T8825] do_mount+0x1436/0x2c40 [ 2304.003450][ T8825] ? copy_mount_string+0x40/0x40 [ 2304.008396][ T8825] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2304.014630][ T8825] ? copy_mount_options+0x280/0x3a0 [ 2304.019829][ T8825] ksys_mount+0xdb/0x150 [ 2304.024100][ T8825] __x64_sys_mount+0xbe/0x150 [ 2304.028785][ T8825] do_syscall_64+0x103/0x610 [ 2304.033467][ T8825] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2304.039356][ T8825] RIP: 0033:0x45b69a [ 2304.043251][ T8825] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 03:37:25 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x7a000000}, 0x0) [ 2304.062850][ T8825] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2304.071343][ T8825] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2304.079314][ T8825] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2304.087306][ T8825] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2304.095360][ T8825] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2304.103330][ T8825] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 [ 2304.111992][ T8836] dccp_v6_rcv: dropped packet with invalid checksum [ 2304.130408][ T8836] dccp_v6_rcv: dropped packet with invalid checksum 03:37:25 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x60}}}}}}}}, 0x0) 03:37:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfc\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) [ 2304.167708][ T8833] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2304.234747][ T8841] dccp_v6_rcv: dropped packet with invalid checksum [ 2304.239674][ T8840] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2304.258165][ T8841] dccp_v6_rcv: dropped packet with invalid checksum [ 2304.311935][ T8844] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2304.311935][ T8844] [ 2304.349538][ T8846] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:37:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:25 executing program 1 (fault-call:0 fault-nth:49): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:25 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x68}}}}}}}}, 0x0) 03:37:25 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x81000000}, 0x0) 03:37:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:25 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x88a8ffff}, 0x0) 03:37:25 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x6c}}}}}}}}, 0x0) 03:37:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfd\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) [ 2304.492476][ T8858] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:37:25 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x9effffff}, 0x0) [ 2304.641029][ T8863] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2304.685317][ T8860] FAULT_INJECTION: forcing a failure. [ 2304.685317][ T8860] name failslab, interval 1, probability 0, space 0, times 0 [ 2304.747606][ T8860] CPU: 1 PID: 8860 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2304.755462][ T8860] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2304.755468][ T8860] Call Trace: [ 2304.755492][ T8860] dump_stack+0x172/0x1f0 [ 2304.755512][ T8860] should_fail.cold+0xa/0x15 [ 2304.755534][ T8860] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2304.765791][ T8868] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2304.765791][ T8868] [ 2304.768887][ T8860] ? ___might_sleep+0x163/0x280 [ 2304.768904][ T8860] __should_failslab+0x121/0x190 [ 2304.768923][ T8860] should_failslab+0x9/0x14 [ 2304.797072][ T8860] kmem_cache_alloc_trace+0x2d1/0x760 [ 2304.797099][ T8860] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2304.797117][ T8860] __list_lru_init+0x3cf/0x6e0 [ 2304.797135][ T8860] alloc_super+0x762/0x890 [ 2304.797150][ T8860] ? test_single_super+0x10/0x10 [ 2304.797167][ T8860] sget_userns+0xf1/0x560 [ 2304.834814][ T8873] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2304.836626][ T8860] ? kill_litter_super+0x60/0x60 [ 2304.836644][ T8860] ? test_single_super+0x10/0x10 [ 2304.836656][ T8860] ? kill_litter_super+0x60/0x60 [ 2304.836673][ T8860] sget+0x10c/0x150 [ 2304.869981][ T8860] mount_bdev+0xff/0x3c0 [ 2304.874230][ T8860] ? finish_unfinished+0x1120/0x1120 [ 2304.879529][ T8860] get_super_block+0x35/0x40 [ 2304.884125][ T8860] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2304.889156][ T8860] legacy_get_tree+0xf2/0x200 [ 2304.893849][ T8860] vfs_get_tree+0x123/0x450 [ 2304.898353][ T8860] do_mount+0x1436/0x2c40 [ 2304.902696][ T8860] ? copy_mount_string+0x40/0x40 [ 2304.907640][ T8860] ? _copy_from_user+0xdd/0x150 [ 2304.912510][ T8860] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2304.918747][ T8860] ? copy_mount_options+0x280/0x3a0 [ 2304.923947][ T8860] ksys_mount+0xdb/0x150 [ 2304.928190][ T8860] __x64_sys_mount+0xbe/0x150 [ 2304.932873][ T8860] do_syscall_64+0x103/0x610 [ 2304.937469][ T8860] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2304.943359][ T8860] RIP: 0033:0x45b69a [ 2304.947254][ T8860] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2304.966946][ T8860] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2304.975447][ T8860] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2304.983502][ T8860] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 03:37:26 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0xec340000}, 0x0) [ 2304.991469][ T8860] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2304.999441][ T8860] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2305.007406][ T8860] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:37:26 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x74}}}}}}}}, 0x0) 03:37:26 executing program 1 (fault-call:0 fault-nth:50): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2305.124106][ T8982] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2305.247235][ T8985] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2305.247235][ T8985] [ 2305.271740][ T8989] FAULT_INJECTION: forcing a failure. [ 2305.271740][ T8989] name failslab, interval 1, probability 0, space 0, times 0 [ 2305.285374][ T8988] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2305.300352][ T8989] CPU: 1 PID: 8989 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2305.308179][ T8989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2305.318322][ T8989] Call Trace: [ 2305.321630][ T8989] dump_stack+0x172/0x1f0 [ 2305.325983][ T8989] should_fail.cold+0xa/0x15 [ 2305.330576][ T8989] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2305.336389][ T8989] ? ___might_sleep+0x163/0x280 [ 2305.341244][ T8989] __should_failslab+0x121/0x190 [ 2305.346178][ T8989] should_failslab+0x9/0x14 [ 2305.350682][ T8989] kmem_cache_alloc_trace+0x2d1/0x760 [ 2305.356053][ T8989] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2305.361869][ T8989] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2305.367500][ T8989] __list_lru_init+0x3cf/0x6e0 [ 2305.372267][ T8989] alloc_super+0x762/0x890 [ 2305.376682][ T8989] ? test_single_super+0x10/0x10 [ 2305.381616][ T8989] sget_userns+0xf1/0x560 [ 2305.385951][ T8989] ? kill_litter_super+0x60/0x60 [ 2305.390887][ T8989] ? test_single_super+0x10/0x10 [ 2305.395819][ T8989] ? kill_litter_super+0x60/0x60 [ 2305.400760][ T8989] sget+0x10c/0x150 [ 2305.404567][ T8989] mount_bdev+0xff/0x3c0 [ 2305.408807][ T8989] ? finish_unfinished+0x1120/0x1120 [ 2305.414090][ T8989] get_super_block+0x35/0x40 [ 2305.418682][ T8989] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2305.423699][ T8989] legacy_get_tree+0xf2/0x200 [ 2305.428375][ T8989] vfs_get_tree+0x123/0x450 [ 2305.432891][ T8989] do_mount+0x1436/0x2c40 [ 2305.437226][ T8989] ? copy_mount_string+0x40/0x40 [ 2305.442160][ T8989] ? _copy_from_user+0xdd/0x150 [ 2305.447079][ T8989] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2305.453318][ T8989] ? copy_mount_options+0x280/0x3a0 [ 2305.458514][ T8989] ksys_mount+0xdb/0x150 [ 2305.462755][ T8989] __x64_sys_mount+0xbe/0x150 [ 2305.467432][ T8989] do_syscall_64+0x103/0x610 [ 2305.472026][ T8989] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2305.477907][ T8989] RIP: 0033:0x45b69a [ 2305.481798][ T8989] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2305.501399][ T8989] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2305.509808][ T8989] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2305.517784][ T8989] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2305.525749][ T8989] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2305.533715][ T8989] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2305.541678][ T8989] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:37:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:26 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x7a}}}}}}}}, 0x0) 03:37:26 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0xf0ffffff}, 0x0) 03:37:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfh\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) [ 2305.657184][ T8997] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:37:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\xf9', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:26 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0xf0}}}}}}}}, 0x0) 03:37:26 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0xfeff0000}, 0x0) 03:37:26 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x300}}}}}}}}, 0x0) 03:37:26 executing program 1 (fault-call:0 fault-nth:51): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:26 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0xff0f0000}, 0x0) 03:37:27 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x500}}}}}}}}, 0x0) 03:37:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfi\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) [ 2305.984813][ T9013] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2305.984813][ T9013] [ 2306.005441][ T9023] FAULT_INJECTION: forcing a failure. [ 2306.005441][ T9023] name failslab, interval 1, probability 0, space 0, times 0 [ 2306.023114][ T9023] CPU: 0 PID: 9023 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2306.030934][ T9023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2306.030940][ T9023] Call Trace: [ 2306.030965][ T9023] dump_stack+0x172/0x1f0 [ 2306.030987][ T9023] should_fail.cold+0xa/0x15 [ 2306.031006][ T9023] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2306.031029][ T9023] ? ___might_sleep+0x163/0x280 [ 2306.053258][ T9023] __should_failslab+0x121/0x190 [ 2306.053276][ T9023] should_failslab+0x9/0x14 [ 2306.053293][ T9023] kmem_cache_alloc_trace+0x2d1/0x760 [ 2306.053312][ T9023] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2306.053335][ T9023] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2306.063954][ T9023] __list_lru_init+0x3cf/0x6e0 [ 2306.063974][ T9023] alloc_super+0x762/0x890 [ 2306.063991][ T9023] ? test_single_super+0x10/0x10 [ 2306.064007][ T9023] sget_userns+0xf1/0x560 [ 2306.064020][ T9023] ? kill_litter_super+0x60/0x60 [ 2306.064033][ T9023] ? test_single_super+0x10/0x10 [ 2306.064049][ T9023] ? kill_litter_super+0x60/0x60 [ 2306.073449][ T9023] sget+0x10c/0x150 [ 2306.073470][ T9023] mount_bdev+0xff/0x3c0 [ 2306.073487][ T9023] ? finish_unfinished+0x1120/0x1120 [ 2306.073506][ T9023] get_super_block+0x35/0x40 [ 2306.073520][ T9023] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2306.073536][ T9023] legacy_get_tree+0xf2/0x200 [ 2306.084685][ T9023] vfs_get_tree+0x123/0x450 [ 2306.084704][ T9023] do_mount+0x1436/0x2c40 [ 2306.084726][ T9023] ? copy_mount_string+0x40/0x40 [ 2306.084750][ T9023] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2306.084762][ T9023] ? copy_mount_options+0x280/0x3a0 [ 2306.084778][ T9023] ksys_mount+0xdb/0x150 [ 2306.084793][ T9023] __x64_sys_mount+0xbe/0x150 [ 2306.084813][ T9023] do_syscall_64+0x103/0x610 [ 2306.095168][ T9023] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2306.095180][ T9023] RIP: 0033:0x45b69a [ 2306.095195][ T9023] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2306.095203][ T9023] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2306.095217][ T9023] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2306.095226][ T9023] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2306.095234][ T9023] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2306.095241][ T9023] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2306.095248][ T9023] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 [ 2306.503164][ T9013] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2306.503164][ T9013] 03:37:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:27 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0xffffa888}, 0x0) 03:37:27 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x543}}}}}}}}, 0x0) 03:37:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x7f', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:27 executing program 1 (fault-call:0 fault-nth:52): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfk\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:27 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0xfffff000}, 0x0) 03:37:27 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x600}}}}}}}}, 0x0) [ 2306.777845][ T9047] FAULT_INJECTION: forcing a failure. [ 2306.777845][ T9047] name failslab, interval 1, probability 0, space 0, times 0 [ 2306.833824][ T9047] CPU: 0 PID: 9047 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2306.841669][ T9047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2306.851720][ T9047] Call Trace: [ 2306.851747][ T9047] dump_stack+0x172/0x1f0 [ 2306.851767][ T9047] should_fail.cold+0xa/0x15 [ 2306.851791][ T9047] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2306.851809][ T9047] ? ___might_sleep+0x163/0x280 [ 2306.851827][ T9047] __should_failslab+0x121/0x190 [ 2306.851846][ T9047] should_failslab+0x9/0x14 [ 2306.884072][ T9047] kmem_cache_alloc_trace+0x2d1/0x760 [ 2306.889446][ T9047] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2306.895259][ T9047] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2306.900900][ T9047] __list_lru_init+0x3cf/0x6e0 [ 2306.905673][ T9047] alloc_super+0x762/0x890 [ 2306.910096][ T9047] ? test_single_super+0x10/0x10 [ 2306.915038][ T9047] sget_userns+0xf1/0x560 [ 2306.919367][ T9047] ? kill_litter_super+0x60/0x60 [ 2306.924316][ T9047] ? test_single_super+0x10/0x10 [ 2306.929252][ T9047] ? kill_litter_super+0x60/0x60 [ 2306.934276][ T9047] sget+0x10c/0x150 [ 2306.938091][ T9047] mount_bdev+0xff/0x3c0 [ 2306.942344][ T9047] ? finish_unfinished+0x1120/0x1120 [ 2306.947651][ T9047] get_super_block+0x35/0x40 [ 2306.952239][ T9047] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2306.957274][ T9047] legacy_get_tree+0xf2/0x200 [ 2306.961954][ T9047] vfs_get_tree+0x123/0x450 [ 2306.961972][ T9047] do_mount+0x1436/0x2c40 [ 2306.961994][ T9047] ? copy_mount_string+0x40/0x40 [ 2306.962016][ T9047] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 03:37:28 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0xffffff7f}, 0x0) [ 2306.981969][ T9047] ? copy_mount_options+0x280/0x3a0 [ 2306.987263][ T9047] ksys_mount+0xdb/0x150 [ 2306.987280][ T9047] __x64_sys_mount+0xbe/0x150 [ 2306.987300][ T9047] do_syscall_64+0x103/0x610 [ 2307.000770][ T9047] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2307.000786][ T9047] RIP: 0033:0x45b69a [ 2307.010636][ T9047] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 03:37:28 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x608}}}}}}}}, 0x0) 03:37:28 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0xffffff9e}, 0x0) [ 2307.030247][ T9047] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2307.030261][ T9047] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2307.030270][ T9047] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2307.030279][ T9047] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2307.030288][ T9047] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2307.030295][ T9047] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:37:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x8c', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2307.195386][ T9057] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2307.195386][ T9057] [ 2307.421807][ T9176] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2307.421807][ T9176] 03:37:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\xff', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:28 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x689}}}}}}}}, 0x0) 03:37:28 executing program 1 (fault-call:0 fault-nth:53): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:28 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0xfffffff0}, 0x0) 03:37:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfl\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\xf5', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:28 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x700}}}}}}}}, 0x0) [ 2307.599816][ T9191] validate_nla: 5 callbacks suppressed [ 2307.599826][ T9191] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:37:28 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x3000000000000}, 0x0) [ 2307.680163][ T9189] FAULT_INJECTION: forcing a failure. [ 2307.680163][ T9189] name failslab, interval 1, probability 0, space 0, times 0 [ 2307.721977][ T9189] CPU: 1 PID: 9189 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2307.729900][ T9189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2307.739964][ T9189] Call Trace: [ 2307.743287][ T9189] dump_stack+0x172/0x1f0 [ 2307.747638][ T9189] should_fail.cold+0xa/0x15 [ 2307.752233][ T9189] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2307.758057][ T9189] ? ___might_sleep+0x163/0x280 [ 2307.762915][ T9189] __should_failslab+0x121/0x190 [ 2307.767857][ T9189] should_failslab+0x9/0x14 [ 2307.772358][ T9189] kmem_cache_alloc_trace+0x2d1/0x760 [ 2307.777730][ T9189] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2307.783541][ T9189] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2307.789175][ T9189] __list_lru_init+0x3cf/0x6e0 [ 2307.794035][ T9189] alloc_super+0x762/0x890 [ 2307.798453][ T9189] ? test_single_super+0x10/0x10 [ 2307.803561][ T9189] sget_userns+0xf1/0x560 [ 2307.807890][ T9189] ? kill_litter_super+0x60/0x60 [ 2307.812852][ T9189] ? test_single_super+0x10/0x10 [ 2307.817783][ T9189] ? kill_litter_super+0x60/0x60 [ 2307.822720][ T9189] sget+0x10c/0x150 [ 2307.826616][ T9189] mount_bdev+0xff/0x3c0 [ 2307.830868][ T9189] ? finish_unfinished+0x1120/0x1120 [ 2307.836152][ T9189] get_super_block+0x35/0x40 [ 2307.840743][ T9189] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2307.846034][ T9189] legacy_get_tree+0xf2/0x200 [ 2307.850707][ T9189] vfs_get_tree+0x123/0x450 [ 2307.855211][ T9189] do_mount+0x1436/0x2c40 [ 2307.859543][ T9189] ? copy_mount_string+0x40/0x40 [ 2307.864485][ T9189] ? _copy_from_user+0xdd/0x150 [ 2307.869338][ T9189] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2307.875573][ T9189] ? copy_mount_options+0x280/0x3a0 [ 2307.880770][ T9189] ksys_mount+0xdb/0x150 [ 2307.885014][ T9189] __x64_sys_mount+0xbe/0x150 [ 2307.889696][ T9189] do_syscall_64+0x103/0x610 [ 2307.894290][ T9189] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2307.900179][ T9189] RIP: 0033:0x45b69a [ 2307.904074][ T9189] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2307.923669][ T9189] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2307.932078][ T9189] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2307.940046][ T9189] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2307.948013][ T9189] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2307.955978][ T9189] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2307.963945][ T9189] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:37:29 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x4000000000000}, 0x0) 03:37:29 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x806}}}}}}}}, 0x0) [ 2307.973882][ T9200] net_ratelimit: 22 callbacks suppressed [ 2307.973890][ T9200] dccp_v6_rcv: dropped packet with invalid checksum [ 2308.005682][ T9200] dccp_v6_rcv: dropped packet with invalid checksum [ 2308.013060][ T9203] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:37:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfo\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:29 executing program 1 (fault-call:0 fault-nth:54): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2308.113331][ T9212] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2308.129141][ T9214] dccp_v6_rcv: dropped packet with invalid checksum [ 2308.142355][ T9214] dccp_v6_rcv: dropped packet with invalid checksum 03:37:29 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x40030000000000}, 0x0) 03:37:29 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0xd00}}}}}}}}, 0x0) 03:37:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\xf6', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfp\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) [ 2308.313909][ T9221] FAULT_INJECTION: forcing a failure. [ 2308.313909][ T9221] name failslab, interval 1, probability 0, space 0, times 0 [ 2308.374536][ T9221] CPU: 0 PID: 9221 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2308.382386][ T9221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2308.395051][ T9221] Call Trace: [ 2308.398367][ T9221] dump_stack+0x172/0x1f0 [ 2308.402735][ T9221] should_fail.cold+0xa/0x15 [ 2308.407343][ T9221] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2308.413257][ T9221] ? ___might_sleep+0x163/0x280 [ 2308.418213][ T9221] __should_failslab+0x121/0x190 [ 2308.423152][ T9221] should_failslab+0x9/0x14 [ 2308.423170][ T9221] kmem_cache_alloc_trace+0x2d1/0x760 [ 2308.423189][ T9221] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2308.423213][ T9221] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2308.423238][ T9221] __list_lru_init+0x3cf/0x6e0 [ 2308.433086][ T9221] alloc_super+0x762/0x890 [ 2308.433103][ T9221] ? test_single_super+0x10/0x10 [ 2308.433119][ T9221] sget_userns+0xf1/0x560 [ 2308.433142][ T9221] ? kill_litter_super+0x60/0x60 [ 2308.444559][ T9221] ? test_single_super+0x10/0x10 [ 2308.453705][ T9221] ? kill_litter_super+0x60/0x60 [ 2308.453720][ T9221] sget+0x10c/0x150 [ 2308.453738][ T9221] mount_bdev+0xff/0x3c0 [ 2308.453755][ T9221] ? finish_unfinished+0x1120/0x1120 [ 2308.453773][ T9221] get_super_block+0x35/0x40 [ 2308.453790][ T9221] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2308.472878][ T9221] legacy_get_tree+0xf2/0x200 [ 2308.472898][ T9221] vfs_get_tree+0x123/0x450 [ 2308.472916][ T9221] do_mount+0x1436/0x2c40 [ 2308.472937][ T9221] ? copy_mount_string+0x40/0x40 [ 2308.472959][ T9221] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2308.472977][ T9221] ? copy_mount_options+0x280/0x3a0 [ 2308.486004][ T9221] ksys_mount+0xdb/0x150 [ 2308.486021][ T9221] __x64_sys_mount+0xbe/0x150 [ 2308.486041][ T9221] do_syscall_64+0x103/0x610 [ 2308.486063][ T9221] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2308.486074][ T9221] RIP: 0033:0x45b69a [ 2308.486089][ T9221] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2308.486097][ T9221] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2308.486109][ T9221] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2308.486118][ T9221] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2308.486126][ T9221] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2308.486133][ T9221] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2308.486141][ T9221] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:37:29 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0xf0ffffffffffff}, 0x0) 03:37:29 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0xe80}}}}}}}}, 0x0) [ 2308.494752][ T9235] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2308.551165][ T9232] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2308.551165][ T9232] [ 2308.563170][ T9237] dccp_v6_rcv: dropped packet with invalid checksum [ 2308.658697][ T9237] dccp_v6_rcv: dropped packet with invalid checksum 03:37:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserft\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) [ 2308.785400][ T9243] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2308.817135][ T9245] dccp_v6_rcv: dropped packet with invalid checksum 03:37:29 executing program 1 (fault-call:0 fault-nth:55): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:29 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x100000000000000}, 0x0) 03:37:29 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x2000}}}}}}}}, 0x0) [ 2308.845674][ T9245] dccp_v6_rcv: dropped packet with invalid checksum [ 2308.874317][ T9246] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2308.874317][ T9246] 03:37:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:30 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x200000000000000}, 0x0) [ 2308.944230][ T9258] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2308.969601][ T9254] FAULT_INJECTION: forcing a failure. [ 2308.969601][ T9254] name failslab, interval 1, probability 0, space 0, times 0 [ 2308.976946][ T9261] dccp_v6_rcv: dropped packet with invalid checksum [ 2308.993950][ T9261] dccp_v6_rcv: dropped packet with invalid checksum [ 2309.014760][ T9254] CPU: 0 PID: 9254 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2309.022599][ T9254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2309.032660][ T9254] Call Trace: [ 2309.035967][ T9254] dump_stack+0x172/0x1f0 [ 2309.040305][ T9254] should_fail.cold+0xa/0x15 [ 2309.044908][ T9254] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2309.050733][ T9254] ? ___might_sleep+0x163/0x280 [ 2309.055596][ T9254] __should_failslab+0x121/0x190 [ 2309.060543][ T9254] should_failslab+0x9/0x14 [ 2309.065050][ T9254] kmem_cache_alloc_node_trace+0x270/0x720 [ 2309.070941][ T9254] ? kmem_cache_alloc_trace+0x354/0x760 [ 2309.076487][ T9254] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2309.082297][ T9254] __kmalloc_node+0x3d/0x70 [ 2309.086810][ T9254] kvmalloc_node+0x68/0x100 [ 2309.091323][ T9254] __list_lru_init+0x4a6/0x6e0 [ 2309.096096][ T9254] alloc_super+0x762/0x890 [ 2309.100512][ T9254] ? test_single_super+0x10/0x10 [ 2309.105454][ T9254] sget_userns+0xf1/0x560 [ 2309.109780][ T9254] ? kill_litter_super+0x60/0x60 [ 2309.114717][ T9254] ? test_single_super+0x10/0x10 [ 2309.119657][ T9254] ? kill_litter_super+0x60/0x60 [ 2309.124607][ T9254] sget+0x10c/0x150 [ 2309.128432][ T9254] mount_bdev+0xff/0x3c0 [ 2309.132677][ T9254] ? finish_unfinished+0x1120/0x1120 [ 2309.137970][ T9254] get_super_block+0x35/0x40 [ 2309.142558][ T9254] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2309.147594][ T9254] legacy_get_tree+0xf2/0x200 [ 2309.152272][ T9254] vfs_get_tree+0x123/0x450 [ 2309.156795][ T9254] do_mount+0x1436/0x2c40 [ 2309.161134][ T9254] ? copy_mount_string+0x40/0x40 [ 2309.166073][ T9254] ? _copy_from_user+0xdd/0x150 [ 2309.170925][ T9254] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2309.177165][ T9254] ? copy_mount_options+0x280/0x3a0 [ 2309.182364][ T9254] ksys_mount+0xdb/0x150 [ 2309.186613][ T9254] __x64_sys_mount+0xbe/0x150 [ 2309.191291][ T9254] do_syscall_64+0x103/0x610 [ 2309.195893][ T9254] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2309.201779][ T9254] RIP: 0033:0x45b69a [ 2309.205670][ T9254] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2309.225272][ T9254] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2309.233694][ T9254] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a 03:37:30 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x2100}}}}}}}}, 0x0) 03:37:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) [ 2309.241678][ T9254] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2309.249652][ T9254] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2309.257626][ T9254] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2309.265597][ T9254] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:37:30 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x300000000000000}, 0x0) [ 2309.303944][ T9263] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:37:30 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x2800}}}}}}}}, 0x0) 03:37:30 executing program 1 (fault-call:0 fault-nth:56): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:30 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x400000000000000}, 0x0) [ 2309.519794][ T9275] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:37:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfu\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:30 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x3580}}}}}}}}, 0x0) [ 2309.581185][ T9270] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2309.592162][ T9276] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2309.592162][ T9276] [ 2309.640547][ T9285] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2309.666198][ T9282] FAULT_INJECTION: forcing a failure. [ 2309.666198][ T9282] name failslab, interval 1, probability 0, space 0, times 0 [ 2309.686200][ T9282] CPU: 1 PID: 9282 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2309.694039][ T9282] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2309.704281][ T9282] Call Trace: [ 2309.707583][ T9282] dump_stack+0x172/0x1f0 [ 2309.711948][ T9282] should_fail.cold+0xa/0x15 [ 2309.716537][ T9282] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2309.722345][ T9282] ? ___might_sleep+0x163/0x280 [ 2309.727199][ T9282] __should_failslab+0x121/0x190 [ 2309.732135][ T9282] should_failslab+0x9/0x14 [ 2309.736644][ T9282] kmem_cache_alloc_trace+0x2d1/0x760 [ 2309.742017][ T9282] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2309.748005][ T9282] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2309.753642][ T9282] __list_lru_init+0x3cf/0x6e0 [ 2309.758496][ T9282] alloc_super+0x762/0x890 [ 2309.762918][ T9282] ? test_single_super+0x10/0x10 [ 2309.768202][ T9282] sget_userns+0xf1/0x560 [ 2309.772535][ T9282] ? kill_litter_super+0x60/0x60 [ 2309.777470][ T9282] ? test_single_super+0x10/0x10 [ 2309.782489][ T9282] ? kill_litter_super+0x60/0x60 [ 2309.787421][ T9282] sget+0x10c/0x150 [ 2309.791320][ T9282] mount_bdev+0xff/0x3c0 [ 2309.795561][ T9282] ? finish_unfinished+0x1120/0x1120 [ 2309.800934][ T9282] get_super_block+0x35/0x40 [ 2309.805615][ T9282] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2309.810656][ T9282] legacy_get_tree+0xf2/0x200 [ 2309.815336][ T9282] vfs_get_tree+0x123/0x450 [ 2309.819840][ T9282] do_mount+0x1436/0x2c40 [ 2309.824173][ T9282] ? copy_mount_string+0x40/0x40 [ 2309.829107][ T9282] ? _copy_from_user+0xdd/0x150 [ 2309.833964][ T9282] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2309.840205][ T9282] ? copy_mount_options+0x280/0x3a0 [ 2309.845406][ T9282] ksys_mount+0xdb/0x150 [ 2309.849648][ T9282] __x64_sys_mount+0xbe/0x150 [ 2309.854325][ T9282] do_syscall_64+0x103/0x610 [ 2309.858921][ T9282] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2309.864896][ T9282] RIP: 0033:0x45b69a [ 2309.868788][ T9282] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 03:37:30 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x500000000000000}, 0x0) [ 2309.888487][ T9282] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2309.896897][ T9282] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2309.904874][ T9282] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2309.912839][ T9282] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2309.920807][ T9282] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2309.928860][ T9282] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:37:31 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x4000}}}}}}}}, 0x0) [ 2310.007339][ T9290] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2310.063902][ T9292] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2310.063902][ T9292] [ 2310.105190][ T9297] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:37:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\xbc', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:31 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x600000000000000}, 0x0) 03:37:31 executing program 1 (fault-call:0 fault-nth:57): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:31 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x4305}}}}}}}}, 0x0) 03:37:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfx\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:31 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x700000000000000}, 0x0) 03:37:31 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x4788}}}}}}}}, 0x0) [ 2310.398864][ T9307] FAULT_INJECTION: forcing a failure. [ 2310.398864][ T9307] name failslab, interval 1, probability 0, space 0, times 0 [ 2310.470829][ T9307] CPU: 1 PID: 9307 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2310.478667][ T9307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2310.488722][ T9307] Call Trace: [ 2310.492022][ T9307] dump_stack+0x172/0x1f0 [ 2310.496363][ T9307] should_fail.cold+0xa/0x15 [ 2310.500963][ T9307] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2310.506771][ T9307] ? ___might_sleep+0x163/0x280 [ 2310.511632][ T9307] __should_failslab+0x121/0x190 [ 2310.516570][ T9307] should_failslab+0x9/0x14 [ 2310.521076][ T9307] kmem_cache_alloc_node_trace+0x270/0x720 [ 2310.526887][ T9307] ? kmem_cache_alloc_trace+0x354/0x760 [ 2310.532441][ T9307] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2310.538254][ T9307] __kmalloc_node+0x3d/0x70 [ 2310.542758][ T9307] kvmalloc_node+0x68/0x100 [ 2310.547262][ T9307] __list_lru_init+0x4a6/0x6e0 [ 2310.552303][ T9307] alloc_super+0x762/0x890 [ 2310.556726][ T9307] ? test_single_super+0x10/0x10 [ 2310.561839][ T9307] sget_userns+0xf1/0x560 [ 2310.566176][ T9307] ? kill_litter_super+0x60/0x60 [ 2310.571118][ T9307] ? test_single_super+0x10/0x10 [ 2310.576047][ T9307] ? kill_litter_super+0x60/0x60 [ 2310.580982][ T9307] sget+0x10c/0x150 [ 2310.584813][ T9307] mount_bdev+0xff/0x3c0 [ 2310.589067][ T9307] ? finish_unfinished+0x1120/0x1120 [ 2310.594361][ T9307] get_super_block+0x35/0x40 [ 2310.598970][ T9307] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2310.603991][ T9307] legacy_get_tree+0xf2/0x200 [ 2310.608669][ T9307] vfs_get_tree+0x123/0x450 [ 2310.613170][ T9307] do_mount+0x1436/0x2c40 [ 2310.617510][ T9307] ? copy_mount_string+0x40/0x40 [ 2310.622451][ T9307] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2310.628688][ T9307] ? copy_mount_options+0x280/0x3a0 [ 2310.633889][ T9307] ksys_mount+0xdb/0x150 [ 2310.638138][ T9307] __x64_sys_mount+0xbe/0x150 [ 2310.642851][ T9307] do_syscall_64+0x103/0x610 [ 2310.647445][ T9307] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2310.653342][ T9307] RIP: 0033:0x45b69a [ 2310.657235][ T9307] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2310.676837][ T9307] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2310.685249][ T9307] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2310.693227][ T9307] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2310.701202][ T9307] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2310.709181][ T9307] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 03:37:31 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x4800}}}}}}}}, 0x0) [ 2310.717149][ T9307] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:37:31 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0xa00000000000000}, 0x0) 03:37:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfy\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:31 executing program 1 (fault-call:0 fault-nth:58): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2310.865554][ T9320] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2310.865554][ T9320] 03:37:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:32 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0xc00000000000000}, 0x0) 03:37:32 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x4888}}}}}}}}, 0x0) 03:37:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:32 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0xe00000000000000}, 0x0) 03:37:32 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x4c00}}}}}}}}, 0x0) 03:37:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfz\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) [ 2311.155470][ T9342] FAULT_INJECTION: forcing a failure. [ 2311.155470][ T9342] name failslab, interval 1, probability 0, space 0, times 0 [ 2311.189680][ T9342] CPU: 0 PID: 9342 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2311.197514][ T9342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2311.197520][ T9342] Call Trace: [ 2311.197543][ T9342] dump_stack+0x172/0x1f0 [ 2311.197562][ T9342] should_fail.cold+0xa/0x15 [ 2311.197582][ T9342] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2311.225732][ T9342] ? ___might_sleep+0x163/0x280 [ 2311.230596][ T9342] __should_failslab+0x121/0x190 [ 2311.235540][ T9342] should_failslab+0x9/0x14 [ 2311.235558][ T9342] kmem_cache_alloc_trace+0x2d1/0x760 [ 2311.235577][ T9342] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 03:37:32 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x5800}}}}}}}}, 0x0) [ 2311.235599][ T9342] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2311.235614][ T9342] __list_lru_init+0x3cf/0x6e0 [ 2311.235633][ T9342] alloc_super+0x762/0x890 [ 2311.235647][ T9342] ? test_single_super+0x10/0x10 [ 2311.235659][ T9342] sget_userns+0xf1/0x560 [ 2311.235671][ T9342] ? kill_litter_super+0x60/0x60 [ 2311.235686][ T9342] ? test_single_super+0x10/0x10 [ 2311.235701][ T9342] ? kill_litter_super+0x60/0x60 [ 2311.251361][ T9342] sget+0x10c/0x150 [ 2311.294071][ T9342] mount_bdev+0xff/0x3c0 [ 2311.298411][ T9342] ? finish_unfinished+0x1120/0x1120 03:37:32 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0xf00000000000000}, 0x0) [ 2311.298433][ T9342] get_super_block+0x35/0x40 [ 2311.298448][ T9342] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2311.298465][ T9342] legacy_get_tree+0xf2/0x200 [ 2311.318322][ T9342] vfs_get_tree+0x123/0x450 [ 2311.318341][ T9342] do_mount+0x1436/0x2c40 [ 2311.318365][ T9342] ? copy_mount_string+0x40/0x40 [ 2311.332161][ T9342] ? copy_mount_options+0x1ea/0x3a0 [ 2311.337368][ T9342] ? copy_mount_options+0x1f0/0x3a0 [ 2311.342622][ T9342] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2311.342635][ T9342] ? copy_mount_options+0x280/0x3a0 [ 2311.342653][ T9342] ksys_mount+0xdb/0x150 [ 2311.342669][ T9342] __x64_sys_mount+0xbe/0x150 [ 2311.342688][ T9342] do_syscall_64+0x103/0x610 [ 2311.342708][ T9342] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2311.373596][ T9342] RIP: 0033:0x45b69a [ 2311.377528][ T9342] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2311.397136][ T9342] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2311.397151][ T9342] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2311.397161][ T9342] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2311.397170][ T9342] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2311.397179][ T9342] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2311.397188][ T9342] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:37:32 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x6000}}}}}}}}, 0x0) 03:37:32 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x1000000000000000}, 0x0) [ 2311.423637][ T9350] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2311.423637][ T9350] [ 2311.540970][ T9363] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:37:32 executing program 1 (fault-call:0 fault-nth:59): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2311.712037][ T9378] FAULT_INJECTION: forcing a failure. [ 2311.712037][ T9378] name failslab, interval 1, probability 0, space 0, times 0 [ 2311.715218][ T9376] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2311.730275][ T9378] CPU: 1 PID: 9378 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2311.742870][ T9378] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2311.753024][ T9378] Call Trace: [ 2311.756329][ T9378] dump_stack+0x172/0x1f0 [ 2311.760671][ T9378] should_fail.cold+0xa/0x15 [ 2311.765273][ T9378] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2311.771091][ T9378] ? ___might_sleep+0x163/0x280 [ 2311.775961][ T9378] __should_failslab+0x121/0x190 [ 2311.780897][ T9378] should_failslab+0x9/0x14 [ 2311.785406][ T9378] kmem_cache_alloc_trace+0x2d1/0x760 [ 2311.790780][ T9378] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2311.796595][ T9378] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2311.802226][ T9378] __list_lru_init+0x3cf/0x6e0 [ 2311.806990][ T9378] alloc_super+0x762/0x890 [ 2311.811417][ T9378] ? test_single_super+0x10/0x10 [ 2311.816349][ T9378] sget_userns+0xf1/0x560 [ 2311.820674][ T9378] ? kill_litter_super+0x60/0x60 [ 2311.825622][ T9378] ? test_single_super+0x10/0x10 [ 2311.830551][ T9378] ? kill_litter_super+0x60/0x60 [ 2311.835483][ T9378] sget+0x10c/0x150 [ 2311.839290][ T9378] mount_bdev+0xff/0x3c0 [ 2311.843532][ T9378] ? finish_unfinished+0x1120/0x1120 [ 2311.848823][ T9378] get_super_block+0x35/0x40 [ 2311.853417][ T9378] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2311.858437][ T9378] legacy_get_tree+0xf2/0x200 [ 2311.863117][ T9378] vfs_get_tree+0x123/0x450 [ 2311.867623][ T9378] do_mount+0x1436/0x2c40 [ 2311.871963][ T9378] ? copy_mount_string+0x40/0x40 [ 2311.876909][ T9378] ? _copy_from_user+0xdd/0x150 [ 2311.881758][ T9378] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2311.887995][ T9378] ? copy_mount_options+0x280/0x3a0 [ 2311.893197][ T9378] ksys_mount+0xdb/0x150 [ 2311.899617][ T9378] __x64_sys_mount+0xbe/0x150 [ 2311.906385][ T9378] do_syscall_64+0x103/0x610 [ 2311.911259][ T9378] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2311.917144][ T9378] RIP: 0033:0x45b69a [ 2311.921037][ T9378] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2311.940641][ T9378] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2311.949225][ T9378] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2311.957193][ T9378] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2311.965160][ T9378] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2311.973386][ T9378] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2311.981355][ T9378] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:37:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:33 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x6488}}}}}}}}, 0x0) 03:37:33 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x2000000000000000}, 0x0) 03:37:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserf\x92\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:33 executing program 1 (fault-call:0 fault-nth:60): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:33 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x4000000000000000}, 0x0) 03:37:33 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x6800}}}}}}}}, 0x0) [ 2312.325348][ T9390] FAULT_INJECTION: forcing a failure. [ 2312.325348][ T9390] name failslab, interval 1, probability 0, space 0, times 0 [ 2312.354504][ T9387] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2312.354504][ T9387] [ 2312.377991][ T9390] CPU: 1 PID: 9390 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2312.387583][ T9390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2312.397642][ T9390] Call Trace: [ 2312.401417][ T9390] dump_stack+0x172/0x1f0 [ 2312.410629][ T9390] should_fail.cold+0xa/0x15 [ 2312.415224][ T9390] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2312.421071][ T9390] ? ___might_sleep+0x163/0x280 [ 2312.425927][ T9390] __should_failslab+0x121/0x190 [ 2312.430952][ T9390] should_failslab+0x9/0x14 [ 2312.435458][ T9390] kmem_cache_alloc_trace+0x2d1/0x760 [ 2312.440831][ T9390] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2312.446727][ T9390] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2312.452445][ T9390] __list_lru_init+0x3cf/0x6e0 [ 2312.457386][ T9390] alloc_super+0x762/0x890 [ 2312.461809][ T9390] ? test_single_super+0x10/0x10 [ 2312.466766][ T9390] sget_userns+0xf1/0x560 [ 2312.471181][ T9390] ? kill_litter_super+0x60/0x60 [ 2312.476118][ T9390] ? test_single_super+0x10/0x10 [ 2312.481058][ T9390] ? kill_litter_super+0x60/0x60 [ 2312.485991][ T9390] sget+0x10c/0x150 [ 2312.489812][ T9390] mount_bdev+0xff/0x3c0 [ 2312.494063][ T9390] ? finish_unfinished+0x1120/0x1120 [ 2312.499349][ T9390] get_super_block+0x35/0x40 [ 2312.503935][ T9390] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2312.508953][ T9390] legacy_get_tree+0xf2/0x200 [ 2312.513632][ T9390] vfs_get_tree+0x123/0x450 [ 2312.518136][ T9390] do_mount+0x1436/0x2c40 [ 2312.522487][ T9390] ? copy_mount_string+0x40/0x40 [ 2312.527421][ T9390] ? _copy_from_user+0xdd/0x150 [ 2312.532973][ T9390] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2312.539207][ T9390] ? copy_mount_options+0x280/0x3a0 [ 2312.544445][ T9390] ksys_mount+0xdb/0x150 [ 2312.548690][ T9390] __x64_sys_mount+0xbe/0x150 [ 2312.553846][ T9390] do_syscall_64+0x103/0x610 [ 2312.558438][ T9390] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2312.564326][ T9390] RIP: 0033:0x45b69a [ 2312.568218][ T9390] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2312.587815][ T9390] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2312.596224][ T9390] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2312.604191][ T9390] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2312.612201][ T9390] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2312.620167][ T9390] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 03:37:33 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x4800000000000000}, 0x0) 03:37:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x02', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) [ 2312.628134][ T9390] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 [ 2312.669434][ T9396] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:37:33 executing program 1 (fault-call:0 fault-nth:61): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:33 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x6c00}}}}}}}}, 0x0) [ 2312.728770][ T9409] validate_nla: 9 callbacks suppressed [ 2312.728781][ T9409] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2312.836262][ T9417] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2312.857871][ T9411] REISERFS warning (device loop0): reiserfs_fill_super: Cannot allocate commit workqueue [ 2312.891038][ T9421] FAULT_INJECTION: forcing a failure. [ 2312.891038][ T9421] name failslab, interval 1, probability 0, space 0, times 0 [ 2312.920716][ T9421] CPU: 1 PID: 9421 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2312.928552][ T9421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2312.938611][ T9421] Call Trace: [ 2312.938638][ T9421] dump_stack+0x172/0x1f0 [ 2312.938657][ T9421] should_fail.cold+0xa/0x15 [ 2312.938674][ T9421] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2312.938695][ T9421] ? ___might_sleep+0x163/0x280 [ 2312.961500][ T9421] __should_failslab+0x121/0x190 [ 2312.966437][ T9421] should_failslab+0x9/0x14 [ 2312.970940][ T9421] kmem_cache_alloc_trace+0x2d1/0x760 [ 2312.976327][ T9421] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2312.982142][ T9421] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2312.987775][ T9421] __list_lru_init+0x3cf/0x6e0 [ 2312.992541][ T9421] alloc_super+0x762/0x890 [ 2312.996952][ T9421] ? test_single_super+0x10/0x10 [ 2313.001898][ T9421] sget_userns+0xf1/0x560 [ 2313.006224][ T9421] ? kill_litter_super+0x60/0x60 [ 2313.011159][ T9421] ? test_single_super+0x10/0x10 [ 2313.016099][ T9421] ? kill_litter_super+0x60/0x60 [ 2313.021039][ T9421] sget+0x10c/0x150 [ 2313.024850][ T9421] mount_bdev+0xff/0x3c0 [ 2313.029088][ T9421] ? finish_unfinished+0x1120/0x1120 [ 2313.034383][ T9421] get_super_block+0x35/0x40 [ 2313.038979][ T9421] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2313.044005][ T9421] legacy_get_tree+0xf2/0x200 [ 2313.048679][ T9421] vfs_get_tree+0x123/0x450 [ 2313.053353][ T9421] do_mount+0x1436/0x2c40 [ 2313.057682][ T9421] ? copy_mount_string+0x40/0x40 [ 2313.062618][ T9421] ? copy_mount_options+0x1fb/0x3a0 [ 2313.067811][ T9421] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2313.074309][ T9421] ? copy_mount_options+0x280/0x3a0 [ 2313.079509][ T9421] ksys_mount+0xdb/0x150 [ 2313.083778][ T9421] __x64_sys_mount+0xbe/0x150 [ 2313.088541][ T9421] do_syscall_64+0x103/0x610 [ 2313.093134][ T9421] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2313.099018][ T9421] RIP: 0033:0x45b69a [ 2313.102912][ T9421] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2313.122507][ T9421] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2313.130914][ T9421] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2313.138875][ T9421] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2313.146836][ T9421] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2313.154805][ T9421] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2313.162885][ T9421] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:37:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:34 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x4c00000000000000}, 0x0) 03:37:34 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x7400}}}}}}}}, 0x0) 03:37:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x03', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:34 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x6000000000000000}, 0x0) 03:37:34 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x7a00}}}}}}}}, 0x0) [ 2313.264722][ T9429] net_ratelimit: 27 callbacks suppressed [ 2313.264730][ T9429] dccp_v6_rcv: dropped packet with invalid checksum [ 2313.275857][ T9430] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2313.301362][ T9429] dccp_v6_rcv: dropped packet with invalid checksum 03:37:34 executing program 1 (fault-call:0 fault-nth:62): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2313.514964][ T9440] dccp_v6_rcv: dropped packet with invalid checksum [ 2313.522326][ T9439] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2313.537429][ T9440] dccp_v6_rcv: dropped packet with invalid checksum 03:37:34 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x6558000000000000}, 0x0) 03:37:34 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x800e}}}}}}}}, 0x0) [ 2313.564354][ T9432] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2313.611217][ T9437] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2313.611217][ T9437] [ 2313.650181][ T9451] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:37:34 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x6800000000000000}, 0x0) [ 2313.678724][ T9448] FAULT_INJECTION: forcing a failure. [ 2313.678724][ T9448] name failslab, interval 1, probability 0, space 0, times 0 [ 2313.705525][ T9448] CPU: 1 PID: 9448 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2313.713374][ T9448] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2313.723457][ T9448] Call Trace: [ 2313.726750][ T9448] dump_stack+0x172/0x1f0 [ 2313.731068][ T9448] should_fail.cold+0xa/0x15 [ 2313.735652][ T9448] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2313.741445][ T9448] ? ___might_sleep+0x163/0x280 [ 2313.746284][ T9448] __should_failslab+0x121/0x190 [ 2313.751216][ T9448] should_failslab+0x9/0x14 [ 2313.755705][ T9448] kmem_cache_alloc_trace+0x2d1/0x760 [ 2313.761070][ T9448] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2313.766862][ T9448] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2313.772480][ T9448] __list_lru_init+0x3cf/0x6e0 [ 2313.777230][ T9448] alloc_super+0x762/0x890 [ 2313.781627][ T9448] ? test_single_super+0x10/0x10 [ 2313.786544][ T9448] sget_userns+0xf1/0x560 [ 2313.790855][ T9448] ? kill_litter_super+0x60/0x60 [ 2313.795776][ T9448] ? test_single_super+0x10/0x10 [ 2313.800691][ T9448] ? kill_litter_super+0x60/0x60 [ 2313.805619][ T9448] sget+0x10c/0x150 [ 2313.809411][ T9448] mount_bdev+0xff/0x3c0 [ 2313.813641][ T9448] ? finish_unfinished+0x1120/0x1120 [ 2313.818914][ T9448] get_super_block+0x35/0x40 [ 2313.823487][ T9448] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2313.828587][ T9448] legacy_get_tree+0xf2/0x200 [ 2313.833421][ T9448] vfs_get_tree+0x123/0x450 [ 2313.837915][ T9448] do_mount+0x1436/0x2c40 [ 2313.842313][ T9448] ? retint_kernel+0x2d/0x2d [ 2313.846889][ T9448] ? copy_mount_string+0x40/0x40 [ 2313.851815][ T9448] ? copy_mount_options+0x208/0x3a0 [ 2313.856998][ T9448] ? __sanitizer_cov_trace_pc+0x50/0x50 [ 2313.862533][ T9448] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2313.868754][ T9448] ? copy_mount_options+0x280/0x3a0 [ 2313.873936][ T9448] ksys_mount+0xdb/0x150 [ 2313.878161][ T9448] __x64_sys_mount+0xbe/0x150 [ 2313.882824][ T9448] do_syscall_64+0x103/0x610 [ 2313.887401][ T9448] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2313.893272][ T9448] RIP: 0033:0x45b69a [ 2313.897152][ T9448] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2313.916737][ T9448] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2313.925129][ T9448] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2313.933079][ T9448] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2313.941050][ T9448] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2313.949003][ T9448] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2313.956956][ T9448] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 [ 2313.967268][ T9453] dccp_v6_rcv: dropped packet with invalid checksum 03:37:35 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x8035}}}}}}}}, 0x0) [ 2313.983263][ T9453] dccp_v6_rcv: dropped packet with invalid checksum [ 2314.092510][ T9456] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2314.148978][ T9464] dccp_v6_rcv: dropped packet with invalid checksum [ 2314.155586][ T9457] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2314.156129][ T9458] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2314.156129][ T9458] [ 2314.191696][ T9464] dccp_v6_rcv: dropped packet with invalid checksum 03:37:35 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x6c00000000000000}, 0x0) 03:37:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x04', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:35 executing program 1 (fault-call:0 fault-nth:63): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\xff', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:35 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x8100}}}}}}}}, 0x0) 03:37:35 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x7400000000000000}, 0x0) [ 2314.332910][ T9468] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2314.393431][ T9475] dccp_v6_rcv: dropped packet with invalid checksum [ 2314.414431][ T9475] dccp_v6_rcv: dropped packet with invalid checksum [ 2314.430284][ T9470] FAULT_INJECTION: forcing a failure. [ 2314.430284][ T9470] name failslab, interval 1, probability 0, space 0, times 0 [ 2314.451574][ T9479] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2314.459942][ T9470] CPU: 1 PID: 9470 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2314.467766][ T9470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2314.467771][ T9470] Call Trace: [ 2314.467797][ T9470] dump_stack+0x172/0x1f0 [ 2314.467817][ T9470] should_fail.cold+0xa/0x15 [ 2314.467836][ T9470] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2314.467862][ T9470] ? ___might_sleep+0x163/0x280 [ 2314.467882][ T9470] __should_failslab+0x121/0x190 [ 2314.467895][ T9470] should_failslab+0x9/0x14 [ 2314.467915][ T9470] __kmalloc+0x2dc/0x740 [ 2314.514411][ T9470] ? __list_lru_init+0xd1/0x6e0 [ 2314.519271][ T9470] __list_lru_init+0xd1/0x6e0 [ 2314.523958][ T9470] alloc_super+0x78d/0x890 [ 2314.528377][ T9470] ? test_single_super+0x10/0x10 [ 2314.533326][ T9470] sget_userns+0xf1/0x560 [ 2314.537654][ T9470] ? kill_litter_super+0x60/0x60 [ 2314.542623][ T9470] ? test_single_super+0x10/0x10 [ 2314.547570][ T9470] ? kill_litter_super+0x60/0x60 [ 2314.552974][ T9470] sget+0x10c/0x150 [ 2314.556784][ T9470] mount_bdev+0xff/0x3c0 [ 2314.561027][ T9470] ? finish_unfinished+0x1120/0x1120 [ 2314.566323][ T9470] get_super_block+0x35/0x40 [ 2314.570912][ T9470] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2314.575935][ T9470] legacy_get_tree+0xf2/0x200 [ 2314.580616][ T9470] vfs_get_tree+0x123/0x450 [ 2314.585120][ T9470] do_mount+0x1436/0x2c40 [ 2314.589454][ T9470] ? copy_mount_string+0x40/0x40 [ 2314.594393][ T9470] ? _copy_from_user+0xdd/0x150 [ 2314.599245][ T9470] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2314.605484][ T9470] ? copy_mount_options+0x280/0x3a0 [ 2314.610683][ T9470] ksys_mount+0xdb/0x150 [ 2314.614926][ T9470] __x64_sys_mount+0xbe/0x150 [ 2314.619694][ T9470] do_syscall_64+0x103/0x610 [ 2314.624289][ T9470] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2314.630177][ T9470] RIP: 0033:0x45b69a 03:37:35 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x8847}}}}}}}}, 0x0) [ 2314.634069][ T9470] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2314.653683][ T9470] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2314.662097][ T9470] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2314.670076][ T9470] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2314.678042][ T9470] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2314.686008][ T9470] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2314.693975][ T9470] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:37:35 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x7a00000000000000}, 0x0) [ 2314.750412][ T9476] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:37:35 executing program 1 (fault-call:0 fault-nth:64): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x05', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:35 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x8848}}}}}}}}, 0x0) 03:37:35 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x8100000000000000}, 0x0) [ 2314.831586][ T9492] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2314.934715][ T9499] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:37:36 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x8864}}}}}}}}, 0x0) 03:37:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\xff', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) [ 2314.980614][ T9498] FAULT_INJECTION: forcing a failure. [ 2314.980614][ T9498] name failslab, interval 1, probability 0, space 0, times 0 [ 2315.004399][ T9503] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2315.025289][ T9498] CPU: 1 PID: 9498 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2315.033135][ T9498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2315.043191][ T9498] Call Trace: [ 2315.046494][ T9498] dump_stack+0x172/0x1f0 [ 2315.050837][ T9498] should_fail.cold+0xa/0x15 [ 2315.055431][ T9498] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2315.061247][ T9498] ? ___might_sleep+0x163/0x280 [ 2315.066229][ T9498] __should_failslab+0x121/0x190 [ 2315.071178][ T9498] should_failslab+0x9/0x14 [ 2315.075680][ T9498] kmem_cache_alloc_trace+0x2d1/0x760 [ 2315.081067][ T9498] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2315.086880][ T9498] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2315.092600][ T9498] __list_lru_init+0x3cf/0x6e0 [ 2315.097365][ T9498] alloc_super+0x762/0x890 [ 2315.101799][ T9498] ? test_single_super+0x10/0x10 [ 2315.106736][ T9498] sget_userns+0xf1/0x560 [ 2315.111074][ T9498] ? kill_litter_super+0x60/0x60 [ 2315.116097][ T9498] ? test_single_super+0x10/0x10 [ 2315.121029][ T9498] ? kill_litter_super+0x60/0x60 [ 2315.125961][ T9498] sget+0x10c/0x150 [ 2315.129771][ T9498] mount_bdev+0xff/0x3c0 [ 2315.134024][ T9498] ? finish_unfinished+0x1120/0x1120 [ 2315.139314][ T9498] get_super_block+0x35/0x40 [ 2315.143901][ T9498] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2315.148922][ T9498] legacy_get_tree+0xf2/0x200 [ 2315.153596][ T9498] vfs_get_tree+0x123/0x450 [ 2315.158101][ T9498] do_mount+0x1436/0x2c40 [ 2315.162439][ T9498] ? copy_mount_string+0x40/0x40 [ 2315.167374][ T9498] ? _copy_from_user+0xdd/0x150 [ 2315.172250][ T9498] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2315.178512][ T9498] ? copy_mount_options+0x280/0x3a0 [ 2315.183707][ T9498] ksys_mount+0xdb/0x150 [ 2315.187950][ T9498] __x64_sys_mount+0xbe/0x150 [ 2315.192636][ T9498] do_syscall_64+0x103/0x610 [ 2315.197227][ T9498] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2315.203206][ T9498] RIP: 0033:0x45b69a [ 2315.207096][ T9498] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 03:37:36 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x88a8ffff00000000}, 0x0) [ 2315.226692][ T9498] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2315.235099][ T9498] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2315.243065][ T9498] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2315.251119][ T9498] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2315.259088][ T9498] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2315.267053][ T9498] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 [ 2315.342256][ T9513] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:37:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:36 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x8906}}}}}}}}, 0x0) 03:37:36 executing program 1 (fault-call:0 fault-nth:65): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:36 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x9effffff00000000}, 0x0) 03:37:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x06', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:36 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0xec34000000000000}, 0x0) 03:37:36 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0xf000}}}}}}}}, 0x0) [ 2315.625497][ T9518] FAULT_INJECTION: forcing a failure. [ 2315.625497][ T9518] name failslab, interval 1, probability 0, space 0, times 0 [ 2315.676303][ T9518] CPU: 1 PID: 9518 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2315.684244][ T9518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2315.694305][ T9518] Call Trace: [ 2315.697603][ T9518] dump_stack+0x172/0x1f0 [ 2315.701936][ T9518] should_fail.cold+0xa/0x15 [ 2315.706532][ T9518] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2315.712340][ T9518] ? ___might_sleep+0x163/0x280 [ 2315.717188][ T9518] __should_failslab+0x121/0x190 [ 2315.722122][ T9518] should_failslab+0x9/0x14 [ 2315.726624][ T9518] kmem_cache_alloc_trace+0x2d1/0x760 [ 2315.732032][ T9518] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2315.737857][ T9518] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2315.743491][ T9518] __list_lru_init+0x3cf/0x6e0 [ 2315.748263][ T9518] alloc_super+0x762/0x890 [ 2315.752687][ T9518] ? test_single_super+0x10/0x10 [ 2315.757629][ T9518] sget_userns+0xf1/0x560 [ 2315.761953][ T9518] ? kill_litter_super+0x60/0x60 [ 2315.766889][ T9518] ? test_single_super+0x10/0x10 [ 2315.771821][ T9518] ? kill_litter_super+0x60/0x60 [ 2315.776759][ T9518] sget+0x10c/0x150 [ 2315.780569][ T9518] mount_bdev+0xff/0x3c0 [ 2315.784807][ T9518] ? finish_unfinished+0x1120/0x1120 [ 2315.790095][ T9518] get_super_block+0x35/0x40 [ 2315.794691][ T9518] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2315.799712][ T9518] legacy_get_tree+0xf2/0x200 [ 2315.804398][ T9518] vfs_get_tree+0x123/0x450 [ 2315.808900][ T9518] do_mount+0x1436/0x2c40 [ 2315.813232][ T9518] ? copy_mount_string+0x40/0x40 [ 2315.818260][ T9518] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2315.824499][ T9518] ? copy_mount_options+0x280/0x3a0 [ 2315.829694][ T9518] ksys_mount+0xdb/0x150 [ 2315.833950][ T9518] __x64_sys_mount+0xbe/0x150 [ 2315.838625][ T9518] do_syscall_64+0x103/0x610 [ 2315.843216][ T9518] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2315.849100][ T9518] RIP: 0033:0x45b69a [ 2315.852989][ T9518] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2315.872670][ T9518] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2315.881082][ T9518] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2315.889047][ T9518] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2315.897014][ T9518] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2315.905070][ T9518] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2315.913035][ T9518] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:37:37 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0xf0ffffff00000000}, 0x0) 03:37:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:37 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0xf0ffff}}}}}}}}, 0x0) [ 2316.025310][ T9531] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:37:37 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0xfeff000000000000}, 0x0) 03:37:37 executing program 1 (fault-call:0 fault-nth:66): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2316.249124][ T9553] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2316.270139][ T9546] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2316.270139][ T9546] [ 2316.314269][ T9559] FAULT_INJECTION: forcing a failure. [ 2316.314269][ T9559] name failslab, interval 1, probability 0, space 0, times 0 [ 2316.335281][ T9559] CPU: 1 PID: 9559 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2316.343230][ T9559] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2316.353374][ T9559] Call Trace: [ 2316.356699][ T9559] dump_stack+0x172/0x1f0 [ 2316.361142][ T9559] should_fail.cold+0xa/0x15 [ 2316.365734][ T9559] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2316.371559][ T9559] ? ___might_sleep+0x163/0x280 [ 2316.376411][ T9559] __should_failslab+0x121/0x190 [ 2316.381371][ T9559] should_failslab+0x9/0x14 [ 2316.387652][ T9559] kmem_cache_alloc_trace+0x2d1/0x760 [ 2316.393033][ T9559] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2316.398843][ T9559] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2316.404481][ T9559] __list_lru_init+0x3cf/0x6e0 [ 2316.409270][ T9559] alloc_super+0x762/0x890 [ 2316.413689][ T9559] ? test_single_super+0x10/0x10 [ 2316.418624][ T9559] sget_userns+0xf1/0x560 [ 2316.422960][ T9559] ? kill_litter_super+0x60/0x60 [ 2316.427901][ T9559] ? test_single_super+0x10/0x10 [ 2316.432830][ T9559] ? kill_litter_super+0x60/0x60 [ 2316.437764][ T9559] sget+0x10c/0x150 [ 2316.441576][ T9559] mount_bdev+0xff/0x3c0 [ 2316.445814][ T9559] ? finish_unfinished+0x1120/0x1120 [ 2316.451101][ T9559] get_super_block+0x35/0x40 [ 2316.455702][ T9559] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2316.460731][ T9559] legacy_get_tree+0xf2/0x200 [ 2316.465409][ T9559] vfs_get_tree+0x123/0x450 [ 2316.469918][ T9559] do_mount+0x1436/0x2c40 [ 2316.474250][ T9559] ? copy_mount_string+0x40/0x40 [ 2316.479193][ T9559] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2316.485426][ T9559] ? copy_mount_options+0x280/0x3a0 [ 2316.490718][ T9559] ksys_mount+0xdb/0x150 [ 2316.494959][ T9559] __x64_sys_mount+0xbe/0x150 [ 2316.499639][ T9559] do_syscall_64+0x103/0x610 [ 2316.504237][ T9559] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2316.510120][ T9559] RIP: 0033:0x45b69a [ 2316.514011][ T9559] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2316.533628][ T9559] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2316.542055][ T9559] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2316.550023][ T9559] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2316.558437][ T9559] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2316.566406][ T9559] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2316.574406][ T9559] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:37:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:37 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0xff0f000000000000}, 0x0) 03:37:37 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x1000000}}}}}}}}, 0x0) 03:37:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\a', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:37 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0xffffff7f00000000}, 0x0) 03:37:37 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x2000000}}}}}}}}, 0x0) 03:37:37 executing program 1 (fault-call:0 fault-nth:67): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2316.821363][ T9568] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2316.821363][ T9568] 03:37:37 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x3000000}}}}}}}}, 0x0) [ 2316.901089][ T9584] FAULT_INJECTION: forcing a failure. [ 2316.901089][ T9584] name failslab, interval 1, probability 0, space 0, times 0 [ 2316.907710][ T9575] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2316.964671][ T9584] CPU: 0 PID: 9584 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2316.972513][ T9584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2316.982607][ T9584] Call Trace: [ 2316.985921][ T9584] dump_stack+0x172/0x1f0 [ 2316.990262][ T9584] should_fail.cold+0xa/0x15 [ 2316.994852][ T9584] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2317.000665][ T9584] ? ___might_sleep+0x163/0x280 [ 2317.005522][ T9584] __should_failslab+0x121/0x190 [ 2317.010460][ T9584] should_failslab+0x9/0x14 [ 2317.014962][ T9584] kmem_cache_alloc_trace+0x2d1/0x760 [ 2317.020342][ T9584] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2317.026160][ T9584] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2317.031795][ T9584] __list_lru_init+0x3cf/0x6e0 [ 2317.036652][ T9584] alloc_super+0x762/0x890 [ 2317.041068][ T9584] ? test_single_super+0x10/0x10 [ 2317.046007][ T9584] sget_userns+0xf1/0x560 [ 2317.050337][ T9584] ? kill_litter_super+0x60/0x60 [ 2317.055270][ T9584] ? test_single_super+0x10/0x10 [ 2317.060198][ T9584] ? kill_litter_super+0x60/0x60 [ 2317.065131][ T9584] sget+0x10c/0x150 [ 2317.068939][ T9584] mount_bdev+0xff/0x3c0 [ 2317.073178][ T9584] ? finish_unfinished+0x1120/0x1120 [ 2317.078461][ T9584] get_super_block+0x35/0x40 [ 2317.083047][ T9584] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2317.088070][ T9584] legacy_get_tree+0xf2/0x200 [ 2317.092757][ T9584] vfs_get_tree+0x123/0x450 [ 2317.097267][ T9584] do_mount+0x1436/0x2c40 [ 2317.101599][ T9584] ? copy_mount_string+0x40/0x40 [ 2317.106552][ T9584] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2317.112793][ T9584] ? copy_mount_options+0x280/0x3a0 [ 2317.118000][ T9584] ksys_mount+0xdb/0x150 [ 2317.122250][ T9584] __x64_sys_mount+0xbe/0x150 [ 2317.126927][ T9584] do_syscall_64+0x103/0x610 [ 2317.131521][ T9584] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2317.137411][ T9584] RIP: 0033:0x45b69a [ 2317.141302][ T9584] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2317.161073][ T9584] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2317.169482][ T9584] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2317.177450][ T9584] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2317.185421][ T9584] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2317.193390][ T9584] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2317.201355][ T9584] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:37:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:38 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0xfffffffffffff000}, 0x0) 03:37:38 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x4000000}}}}}}}}, 0x0) 03:37:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\b', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) [ 2317.438187][ T9593] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2317.488952][ T9600] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2317.488952][ T9600] 03:37:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:38 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x2}, 0x0) 03:37:38 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x5000000}}}}}}}}, 0x0) 03:37:38 executing program 1 (fault-call:0 fault-nth:68): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\n', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:38 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x3}, 0x0) 03:37:38 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x6000000}}}}}}}}, 0x0) 03:37:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\xff', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) [ 2317.769113][ T9612] FAULT_INJECTION: forcing a failure. [ 2317.769113][ T9612] name failslab, interval 1, probability 0, space 0, times 0 [ 2317.803774][ T9612] CPU: 1 PID: 9612 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2317.811608][ T9612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2317.821670][ T9612] Call Trace: [ 2317.824977][ T9612] dump_stack+0x172/0x1f0 [ 2317.825230][ T9617] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2317.829315][ T9612] should_fail.cold+0xa/0x15 [ 2317.829340][ T9612] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2317.829363][ T9612] ? ___might_sleep+0x163/0x280 [ 2317.854898][ T9612] __should_failslab+0x121/0x190 [ 2317.859841][ T9612] should_failslab+0x9/0x14 [ 2317.864449][ T9612] __kmalloc+0x2dc/0x740 [ 2317.868704][ T9612] ? __list_lru_init+0xd1/0x6e0 [ 2317.873654][ T9612] __list_lru_init+0xd1/0x6e0 [ 2317.878339][ T9612] alloc_super+0x78d/0x890 [ 2317.882753][ T9612] ? test_single_super+0x10/0x10 [ 2317.887687][ T9612] sget_userns+0xf1/0x560 [ 2317.892015][ T9612] ? kill_litter_super+0x60/0x60 [ 2317.896975][ T9612] ? test_single_super+0x10/0x10 [ 2317.901907][ T9612] ? kill_litter_super+0x60/0x60 [ 2317.906847][ T9612] sget+0x10c/0x150 [ 2317.910665][ T9612] mount_bdev+0xff/0x3c0 [ 2317.914905][ T9612] ? finish_unfinished+0x1120/0x1120 [ 2317.920190][ T9612] get_super_block+0x35/0x40 [ 2317.924779][ T9612] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2317.929796][ T9612] legacy_get_tree+0xf2/0x200 [ 2317.934475][ T9612] vfs_get_tree+0x123/0x450 [ 2317.938982][ T9612] do_mount+0x1436/0x2c40 [ 2317.943318][ T9612] ? copy_mount_string+0x40/0x40 [ 2317.948265][ T9612] ? _copy_from_user+0xdd/0x150 [ 2317.953116][ T9612] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2317.959351][ T9612] ? copy_mount_options+0x280/0x3a0 [ 2317.964554][ T9612] ksys_mount+0xdb/0x150 [ 2317.968792][ T9612] __x64_sys_mount+0xbe/0x150 [ 2317.973477][ T9612] do_syscall_64+0x103/0x610 [ 2317.978072][ T9612] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2317.983982][ T9612] RIP: 0033:0x45b69a [ 2317.987873][ T9612] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2318.007473][ T9612] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 03:37:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x4}, 0x0) [ 2318.015912][ T9612] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2318.023888][ T9612] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2318.031854][ T9612] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2318.039819][ T9612] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2318.047787][ T9612] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:37:39 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x7000000}}}}}}}}, 0x0) 03:37:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x5}, 0x0) 03:37:39 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x8000000}}}}}}}}, 0x0) 03:37:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:39 executing program 1 (fault-call:0 fault-nth:69): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x6}, 0x0) 03:37:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x18', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x7}, 0x0) 03:37:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:39 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x8060000}}}}}}}}, 0x0) [ 2318.346757][ T9652] net_ratelimit: 26 callbacks suppressed [ 2318.346765][ T9652] dccp_v6_rcv: dropped packet with invalid checksum [ 2318.372529][ T9652] dccp_v6_rcv: dropped packet with invalid checksum 03:37:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0xa}, 0x0) [ 2318.513401][ T9653] FAULT_INJECTION: forcing a failure. [ 2318.513401][ T9653] name failslab, interval 1, probability 0, space 0, times 0 [ 2318.531240][ T9655] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2318.581219][ T9653] CPU: 1 PID: 9653 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2318.589067][ T9653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2318.589074][ T9653] Call Trace: [ 2318.589098][ T9653] dump_stack+0x172/0x1f0 [ 2318.589121][ T9653] should_fail.cold+0xa/0x15 [ 2318.611393][ T9653] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2318.617203][ T9653] ? ___might_sleep+0x163/0x280 [ 2318.617221][ T9653] __should_failslab+0x121/0x190 [ 2318.617239][ T9653] should_failslab+0x9/0x14 [ 2318.631491][ T9653] kmem_cache_alloc_trace+0x2d1/0x760 [ 2318.631511][ T9653] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2318.631531][ T9653] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2318.631549][ T9653] __list_lru_init+0x3cf/0x6e0 [ 2318.642689][ T9653] alloc_super+0x78d/0x890 [ 2318.642705][ T9653] ? test_single_super+0x10/0x10 [ 2318.642720][ T9653] sget_userns+0xf1/0x560 [ 2318.642736][ T9653] ? kill_litter_super+0x60/0x60 [ 2318.671645][ T9653] ? test_single_super+0x10/0x10 [ 2318.676577][ T9653] ? kill_litter_super+0x60/0x60 [ 2318.681515][ T9653] sget+0x10c/0x150 [ 2318.685328][ T9653] mount_bdev+0xff/0x3c0 [ 2318.689579][ T9653] ? finish_unfinished+0x1120/0x1120 [ 2318.694867][ T9653] get_super_block+0x35/0x40 [ 2318.699457][ T9653] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2318.704488][ T9653] legacy_get_tree+0xf2/0x200 [ 2318.709169][ T9653] vfs_get_tree+0x123/0x450 [ 2318.713675][ T9653] do_mount+0x1436/0x2c40 [ 2318.718011][ T9653] ? copy_mount_string+0x40/0x40 [ 2318.722957][ T9653] ? _copy_from_user+0xdd/0x150 [ 2318.727897][ T9653] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2318.734218][ T9653] ? copy_mount_options+0x280/0x3a0 [ 2318.739423][ T9653] ksys_mount+0xdb/0x150 [ 2318.743667][ T9653] __x64_sys_mount+0xbe/0x150 [ 2318.748343][ T9653] do_syscall_64+0x103/0x610 [ 2318.752938][ T9653] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2318.758909][ T9653] RIP: 0033:0x45b69a [ 2318.762799][ T9653] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 03:37:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0xc}, 0x0) [ 2318.782398][ T9653] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2318.790808][ T9653] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2318.798798][ T9653] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2318.806775][ T9653] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2318.814744][ T9653] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2318.822714][ T9653] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:37:39 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0xd000000}}}}}}}}, 0x0) 03:37:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0xe}, 0x0) [ 2318.844334][ T9678] dccp_v6_rcv: dropped packet with invalid checksum [ 2318.852043][ T9678] dccp_v6_rcv: dropped packet with invalid checksum [ 2318.852515][ T9670] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2318.852515][ T9670] 03:37:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfsH', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) [ 2318.991367][ T9687] dccp_v6_rcv: dropped packet with invalid checksum 03:37:40 executing program 1 (fault-call:0 fault-nth:70): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:40 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0xf}, 0x0) [ 2319.033189][ T9687] dccp_v6_rcv: dropped packet with invalid checksum [ 2319.066500][ T9691] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2319.066500][ T9691] 03:37:40 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x20000000}}}}}}}}, 0x0) [ 2319.131921][ T9695] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:37:40 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x10}, 0x0) 03:37:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\xf9', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) [ 2319.254191][ T9713] dccp_v6_rcv: dropped packet with invalid checksum [ 2319.276041][ T9708] FAULT_INJECTION: forcing a failure. [ 2319.276041][ T9708] name failslab, interval 1, probability 0, space 0, times 0 [ 2319.295699][ T9713] dccp_v6_rcv: dropped packet with invalid checksum [ 2319.308520][ T9708] CPU: 0 PID: 9708 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2319.316351][ T9708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2319.326416][ T9708] Call Trace: [ 2319.329733][ T9708] dump_stack+0x172/0x1f0 [ 2319.334074][ T9708] should_fail.cold+0xa/0x15 [ 2319.338684][ T9708] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2319.344504][ T9708] ? ___might_sleep+0x163/0x280 [ 2319.349365][ T9708] __should_failslab+0x121/0x190 [ 2319.354304][ T9708] should_failslab+0x9/0x14 [ 2319.358825][ T9708] kmem_cache_alloc_trace+0x2d1/0x760 [ 2319.364291][ T9708] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2319.370109][ T9708] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2319.376805][ T9708] __list_lru_init+0x3cf/0x6e0 [ 2319.381580][ T9708] alloc_super+0x78d/0x890 [ 2319.385999][ T9708] ? test_single_super+0x10/0x10 [ 2319.390938][ T9708] sget_userns+0xf1/0x560 [ 2319.395266][ T9708] ? kill_litter_super+0x60/0x60 [ 2319.400228][ T9708] ? test_single_super+0x10/0x10 [ 2319.414021][ T9708] ? kill_litter_super+0x60/0x60 [ 2319.420183][ T9708] sget+0x10c/0x150 [ 2319.423996][ T9708] mount_bdev+0xff/0x3c0 [ 2319.428244][ T9708] ? finish_unfinished+0x1120/0x1120 [ 2319.433534][ T9708] get_super_block+0x35/0x40 [ 2319.438127][ T9708] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2319.443282][ T9708] legacy_get_tree+0xf2/0x200 [ 2319.448135][ T9708] vfs_get_tree+0x123/0x450 [ 2319.452640][ T9708] do_mount+0x1436/0x2c40 [ 2319.457064][ T9708] ? copy_mount_string+0x40/0x40 [ 2319.462001][ T9708] ? _copy_from_user+0xdd/0x150 [ 2319.466853][ T9708] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2319.473092][ T9708] ? copy_mount_options+0x280/0x3a0 [ 2319.478294][ T9708] ksys_mount+0xdb/0x150 [ 2319.482540][ T9708] __x64_sys_mount+0xbe/0x150 [ 2319.487220][ T9708] do_syscall_64+0x103/0x610 [ 2319.491812][ T9708] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2319.497705][ T9708] RIP: 0033:0x45b69a [ 2319.501607][ T9708] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2319.521296][ T9708] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2319.529712][ T9708] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2319.537870][ T9708] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2319.545843][ T9708] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2319.555239][ T9708] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 03:37:40 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x48}, 0x0) 03:37:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfsL', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) [ 2319.563303][ T9708] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:37:40 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x21000000}}}}}}}}, 0x0) 03:37:40 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x4c}, 0x0) [ 2319.622898][ T9718] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:37:40 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x28000000}}}}}}}}, 0x0) [ 2319.689207][ T9731] dccp_v6_rcv: dropped packet with invalid checksum [ 2319.713060][ T9731] dccp_v6_rcv: dropped packet with invalid checksum 03:37:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:40 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x60}, 0x0) 03:37:41 executing program 1 (fault-call:0 fault-nth:71): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x7f', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs`', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:41 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x40000000}}}}}}}}, 0x0) 03:37:41 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x68}, 0x0) [ 2320.039497][ T9744] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:37:41 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x6c}, 0x0) [ 2320.094241][ T9761] FAULT_INJECTION: forcing a failure. [ 2320.094241][ T9761] name failslab, interval 1, probability 0, space 0, times 0 [ 2320.135589][ T9761] CPU: 1 PID: 9761 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2320.143429][ T9761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2320.153482][ T9761] Call Trace: [ 2320.156783][ T9761] dump_stack+0x172/0x1f0 [ 2320.161124][ T9761] should_fail.cold+0xa/0x15 [ 2320.165718][ T9761] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2320.171528][ T9761] ? ___might_sleep+0x163/0x280 [ 2320.176398][ T9761] __should_failslab+0x121/0x190 [ 2320.181333][ T9761] should_failslab+0x9/0x14 [ 2320.185842][ T9761] kmem_cache_alloc_node_trace+0x270/0x720 [ 2320.191661][ T9761] __kmalloc_node+0x3d/0x70 [ 2320.196161][ T9761] kvmalloc_node+0x68/0x100 [ 2320.200673][ T9761] __list_lru_init+0x4a6/0x6e0 [ 2320.205448][ T9761] alloc_super+0x78d/0x890 [ 2320.209884][ T9761] ? test_single_super+0x10/0x10 [ 2320.214830][ T9761] sget_userns+0xf1/0x560 [ 2320.219155][ T9761] ? kill_litter_super+0x60/0x60 [ 2320.224088][ T9761] ? test_single_super+0x10/0x10 [ 2320.229031][ T9761] ? kill_litter_super+0x60/0x60 [ 2320.233962][ T9761] sget+0x10c/0x150 [ 2320.237775][ T9761] mount_bdev+0xff/0x3c0 [ 2320.242018][ T9761] ? finish_unfinished+0x1120/0x1120 [ 2320.247310][ T9761] get_super_block+0x35/0x40 [ 2320.251907][ T9761] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2320.256931][ T9761] legacy_get_tree+0xf2/0x200 [ 2320.261615][ T9761] vfs_get_tree+0x123/0x450 [ 2320.266119][ T9761] do_mount+0x1436/0x2c40 [ 2320.270463][ T9761] ? copy_mount_string+0x40/0x40 [ 2320.275405][ T9761] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2320.281644][ T9761] ? copy_mount_options+0x280/0x3a0 [ 2320.286848][ T9761] ksys_mount+0xdb/0x150 [ 2320.291091][ T9761] __x64_sys_mount+0xbe/0x150 [ 2320.295769][ T9761] do_syscall_64+0x103/0x610 [ 2320.300369][ T9761] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2320.306253][ T9761] RIP: 0033:0x45b69a [ 2320.310232][ T9761] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 03:37:41 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x43050000}}}}}}}}, 0x0) [ 2320.329837][ T9761] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2320.338341][ T9761] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2320.346308][ T9761] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2320.354281][ T9761] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2320.362270][ T9761] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2320.370238][ T9761] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:37:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x8c', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:41 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x74}, 0x0) 03:37:41 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x48000000}}}}}}}}, 0x0) [ 2320.567218][ T9776] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:37:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:41 executing program 1 (fault-call:0 fault-nth:72): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfsh', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:41 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x7a}, 0x0) 03:37:41 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x4c000000}}}}}}}}, 0x0) [ 2320.859180][ T9788] FAULT_INJECTION: forcing a failure. [ 2320.859180][ T9788] name failslab, interval 1, probability 0, space 0, times 0 [ 2320.890322][ T9788] CPU: 1 PID: 9788 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2320.898165][ T9788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 03:37:41 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0xf0}, 0x0) [ 2320.908227][ T9788] Call Trace: [ 2320.911633][ T9788] dump_stack+0x172/0x1f0 [ 2320.915993][ T9788] should_fail.cold+0xa/0x15 [ 2320.920601][ T9788] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2320.926438][ T9788] ? ___might_sleep+0x163/0x280 [ 2320.931312][ T9788] __should_failslab+0x121/0x190 [ 2320.936267][ T9788] should_failslab+0x9/0x14 [ 2320.940801][ T9788] kmem_cache_alloc_node_trace+0x270/0x720 [ 2320.946617][ T9788] __kmalloc_node+0x3d/0x70 [ 2320.951126][ T9788] kvmalloc_node+0x68/0x100 [ 2320.955632][ T9788] __list_lru_init+0x4a6/0x6e0 [ 2320.960487][ T9788] alloc_super+0x78d/0x890 [ 2320.964907][ T9788] ? test_single_super+0x10/0x10 [ 2320.969844][ T9788] sget_userns+0xf1/0x560 [ 2320.974191][ T9788] ? kill_litter_super+0x60/0x60 [ 2320.979131][ T9788] ? test_single_super+0x10/0x10 [ 2320.984067][ T9788] ? kill_litter_super+0x60/0x60 [ 2320.989173][ T9788] sget+0x10c/0x150 [ 2320.992983][ T9788] mount_bdev+0xff/0x3c0 [ 2320.997229][ T9788] ? finish_unfinished+0x1120/0x1120 [ 2321.002524][ T9788] get_super_block+0x35/0x40 [ 2321.007112][ T9788] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2321.012139][ T9788] legacy_get_tree+0xf2/0x200 [ 2321.016820][ T9788] vfs_get_tree+0x123/0x450 [ 2321.021336][ T9788] do_mount+0x1436/0x2c40 [ 2321.025682][ T9788] ? copy_mount_string+0x40/0x40 [ 2321.030626][ T9788] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2321.036867][ T9788] ? copy_mount_options+0x280/0x3a0 [ 2321.042071][ T9788] ksys_mount+0xdb/0x150 [ 2321.046314][ T9788] __x64_sys_mount+0xbe/0x150 [ 2321.051006][ T9788] do_syscall_64+0x103/0x610 [ 2321.055607][ T9788] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2321.061495][ T9788] RIP: 0033:0x45b69a [ 2321.065389][ T9788] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2321.084996][ T9788] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2321.093413][ T9788] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2321.101385][ T9788] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 03:37:42 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x58000000}}}}}}}}, 0x0) [ 2321.109353][ T9788] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2321.117323][ T9788] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2321.125298][ T9788] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:37:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\xf6', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:42 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x60000000}}}}}}}}, 0x0) 03:37:42 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x300}, 0x0) 03:37:42 executing program 1 (fault-call:0 fault-nth:73): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2321.275059][ T9801] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:37:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfsl', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:42 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x500}, 0x0) 03:37:42 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x68000000}}}}}}}}, 0x0) 03:37:42 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x600}, 0x0) [ 2321.559290][ T9819] FAULT_INJECTION: forcing a failure. [ 2321.559290][ T9819] name failslab, interval 1, probability 0, space 0, times 0 [ 2321.593036][ T9819] CPU: 1 PID: 9819 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2321.600874][ T9819] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2321.610938][ T9819] Call Trace: [ 2321.610963][ T9819] dump_stack+0x172/0x1f0 [ 2321.610983][ T9819] should_fail.cold+0xa/0x15 [ 2321.611007][ T9819] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2321.618721][ T9819] ? ___might_sleep+0x163/0x280 [ 2321.618742][ T9819] __should_failslab+0x121/0x190 [ 2321.618758][ T9819] should_failslab+0x9/0x14 [ 2321.618773][ T9819] kmem_cache_alloc_trace+0x2d1/0x760 [ 2321.618794][ T9819] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2321.654650][ T9819] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2321.660372][ T9819] __list_lru_init+0x3cf/0x6e0 [ 2321.665139][ T9819] alloc_super+0x78d/0x890 [ 2321.669555][ T9819] ? test_single_super+0x10/0x10 [ 2321.674691][ T9819] sget_userns+0xf1/0x560 [ 2321.679017][ T9819] ? kill_litter_super+0x60/0x60 [ 2321.683951][ T9819] ? test_single_super+0x10/0x10 [ 2321.688886][ T9819] ? kill_litter_super+0x60/0x60 [ 2321.693818][ T9819] sget+0x10c/0x150 [ 2321.697631][ T9819] mount_bdev+0xff/0x3c0 [ 2321.701873][ T9819] ? finish_unfinished+0x1120/0x1120 [ 2321.707157][ T9819] get_super_block+0x35/0x40 [ 2321.711741][ T9819] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2321.716762][ T9819] legacy_get_tree+0xf2/0x200 [ 2321.721448][ T9819] vfs_get_tree+0x123/0x450 [ 2321.726125][ T9819] do_mount+0x1436/0x2c40 [ 2321.730456][ T9819] ? copy_mount_string+0x40/0x40 [ 2321.735391][ T9819] ? _copy_from_user+0xdd/0x150 [ 2321.740252][ T9819] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2321.746486][ T9819] ? copy_mount_options+0x280/0x3a0 [ 2321.751682][ T9819] ksys_mount+0xdb/0x150 [ 2321.756035][ T9819] __x64_sys_mount+0xbe/0x150 [ 2321.760712][ T9819] do_syscall_64+0x103/0x610 [ 2321.765307][ T9819] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2321.771193][ T9819] RIP: 0033:0x45b69a [ 2321.775089][ T9819] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2321.794685][ T9819] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 03:37:42 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x6c000000}}}}}}}}, 0x0) [ 2321.803091][ T9819] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2321.811063][ T9819] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2321.819028][ T9819] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2321.826997][ T9819] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2321.834959][ T9819] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:37:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\xfe', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:43 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x700}, 0x0) [ 2321.919713][ T9831] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:37:43 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x74000000}}}}}}}}, 0x0) 03:37:43 executing program 1 (fault-call:0 fault-nth:74): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:43 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0xa00}, 0x0) 03:37:43 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x7a000000}}}}}}}}, 0x0) [ 2322.115347][ T9848] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2322.188265][ T9856] FAULT_INJECTION: forcing a failure. [ 2322.188265][ T9856] name failslab, interval 1, probability 0, space 0, times 0 [ 2322.232762][ T9856] CPU: 0 PID: 9856 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2322.240602][ T9856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2322.250920][ T9856] Call Trace: [ 2322.254228][ T9856] dump_stack+0x172/0x1f0 [ 2322.259101][ T9856] should_fail.cold+0xa/0x15 [ 2322.263712][ T9856] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2322.269545][ T9856] ? ___might_sleep+0x163/0x280 [ 2322.274422][ T9856] __should_failslab+0x121/0x190 [ 2322.279374][ T9856] should_failslab+0x9/0x14 [ 2322.283885][ T9856] kmem_cache_alloc_trace+0x2d1/0x760 [ 2322.289267][ T9856] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2322.295081][ T9856] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2322.300724][ T9856] __list_lru_init+0x3cf/0x6e0 [ 2322.305531][ T9856] alloc_super+0x78d/0x890 [ 2322.309951][ T9856] ? test_single_super+0x10/0x10 [ 2322.315060][ T9856] sget_userns+0xf1/0x560 [ 2322.319385][ T9856] ? kill_litter_super+0x60/0x60 [ 2322.324324][ T9856] ? test_single_super+0x10/0x10 [ 2322.329442][ T9856] ? kill_litter_super+0x60/0x60 [ 2322.334376][ T9856] sget+0x10c/0x150 [ 2322.338193][ T9856] mount_bdev+0xff/0x3c0 [ 2322.342447][ T9856] ? finish_unfinished+0x1120/0x1120 [ 2322.347746][ T9856] get_super_block+0x35/0x40 [ 2322.352337][ T9856] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2322.357363][ T9856] legacy_get_tree+0xf2/0x200 [ 2322.362130][ T9856] vfs_get_tree+0x123/0x450 [ 2322.366641][ T9856] do_mount+0x1436/0x2c40 [ 2322.370984][ T9856] ? copy_mount_string+0x40/0x40 [ 2322.375923][ T9856] ? _copy_from_user+0xdd/0x150 [ 2322.380776][ T9856] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2322.389508][ T9856] ? copy_mount_options+0x280/0x3a0 [ 2322.394715][ T9856] ksys_mount+0xdb/0x150 [ 2322.398963][ T9856] __x64_sys_mount+0xbe/0x150 [ 2322.403646][ T9856] do_syscall_64+0x103/0x610 [ 2322.408240][ T9856] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2322.414134][ T9856] RIP: 0033:0x45b69a 03:37:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfst', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:43 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0xc00}, 0x0) 03:37:43 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0xe00}, 0x0) [ 2322.418070][ T9856] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2322.437680][ T9856] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2322.446092][ T9856] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2322.454069][ T9856] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2322.462046][ T9856] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2322.470019][ T9856] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2322.478004][ T9856] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:37:43 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x800e0000}}}}}}}}, 0x0) 03:37:43 executing program 1 (fault-call:0 fault-nth:75): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:43 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0xf00}, 0x0) 03:37:43 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x80350000}}}}}}}}, 0x0) 03:37:43 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x81000000}}}}}}}}, 0x0) [ 2322.801312][ T9879] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2322.819514][ T9883] FAULT_INJECTION: forcing a failure. [ 2322.819514][ T9883] name failslab, interval 1, probability 0, space 0, times 0 [ 2322.835003][ T9883] CPU: 1 PID: 9883 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 03:37:43 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x2000}, 0x0) [ 2322.842837][ T9883] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2322.852901][ T9883] Call Trace: [ 2322.856309][ T9883] dump_stack+0x172/0x1f0 [ 2322.860654][ T9883] should_fail.cold+0xa/0x15 [ 2322.865276][ T9883] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2322.871087][ T9883] ? ___might_sleep+0x163/0x280 [ 2322.875974][ T9883] __should_failslab+0x121/0x190 [ 2322.880920][ T9883] should_failslab+0x9/0x14 [ 2322.885424][ T9883] kmem_cache_alloc_trace+0x2d1/0x760 [ 2322.890797][ T9883] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2322.896606][ T9883] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2322.902243][ T9883] __list_lru_init+0x3cf/0x6e0 [ 2322.907029][ T9883] alloc_super+0x78d/0x890 [ 2322.911445][ T9883] ? test_single_super+0x10/0x10 [ 2322.916384][ T9883] sget_userns+0xf1/0x560 [ 2322.920708][ T9883] ? kill_litter_super+0x60/0x60 [ 2322.925648][ T9883] ? test_single_super+0x10/0x10 [ 2322.930585][ T9883] ? kill_litter_super+0x60/0x60 [ 2322.935519][ T9883] sget+0x10c/0x150 [ 2322.939335][ T9883] mount_bdev+0xff/0x3c0 [ 2322.943577][ T9883] ? finish_unfinished+0x1120/0x1120 [ 2322.948862][ T9883] get_super_block+0x35/0x40 [ 2322.953452][ T9883] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2322.958470][ T9883] legacy_get_tree+0xf2/0x200 [ 2322.963154][ T9883] vfs_get_tree+0x123/0x450 [ 2322.967662][ T9883] do_mount+0x1436/0x2c40 [ 2322.972010][ T9883] ? copy_mount_string+0x40/0x40 [ 2322.976942][ T9883] ? _copy_from_user+0xdd/0x150 [ 2322.981796][ T9883] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2322.988031][ T9883] ? copy_mount_options+0x280/0x3a0 [ 2322.993235][ T9883] ksys_mount+0xdb/0x150 [ 2322.997478][ T9883] __x64_sys_mount+0xbe/0x150 [ 2323.002168][ T9883] do_syscall_64+0x103/0x610 [ 2323.006760][ T9883] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2323.012648][ T9883] RIP: 0033:0x45b69a [ 2323.016540][ T9883] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2323.036140][ T9883] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2323.044549][ T9883] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2323.052519][ T9883] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2323.060484][ T9883] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2323.068461][ T9883] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2323.076424][ T9883] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:37:44 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x86ddffff}}}}}}}}, 0x0) 03:37:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfsz', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) [ 2323.158868][ T9892] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2323.158868][ T9892] [ 2323.285286][ T9900] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2323.352918][ T9905] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2323.352918][ T9905] 03:37:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:44 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x34ec}, 0x0) 03:37:44 executing program 1 (fault-call:0 fault-nth:76): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:44 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x88470000}}}}}}}}, 0x0) [ 2323.451336][ T9916] net_ratelimit: 30 callbacks suppressed [ 2323.451344][ T9916] dccp_v6_rcv: dropped packet with invalid checksum 03:37:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfsL', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:44 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x4000}, 0x0) [ 2323.498881][ T9916] dccp_v6_rcv: dropped packet with invalid checksum [ 2323.530125][ T9917] FAULT_INJECTION: forcing a failure. [ 2323.530125][ T9917] name failslab, interval 1, probability 0, space 0, times 0 [ 2323.572929][ T9917] CPU: 0 PID: 9917 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2323.581290][ T9917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2323.591357][ T9917] Call Trace: [ 2323.594666][ T9917] dump_stack+0x172/0x1f0 [ 2323.599012][ T9917] should_fail.cold+0xa/0x15 [ 2323.603698][ T9917] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2323.609512][ T9917] ? ___might_sleep+0x163/0x280 [ 2323.614363][ T9917] __should_failslab+0x121/0x190 03:37:44 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x88480000}}}}}}}}, 0x0) 03:37:44 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x4800}, 0x0) [ 2323.619302][ T9917] should_failslab+0x9/0x14 [ 2323.623804][ T9917] kmem_cache_alloc_trace+0x2d1/0x760 [ 2323.629176][ T9917] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2323.634991][ T9917] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2323.640622][ T9917] __list_lru_init+0x3cf/0x6e0 [ 2323.645390][ T9917] alloc_super+0x78d/0x890 [ 2323.649811][ T9917] ? test_single_super+0x10/0x10 [ 2323.654753][ T9917] sget_userns+0xf1/0x560 [ 2323.659079][ T9917] ? kill_litter_super+0x60/0x60 [ 2323.664015][ T9917] ? test_single_super+0x10/0x10 [ 2323.668972][ T9917] ? kill_litter_super+0x60/0x60 [ 2323.673922][ T9917] sget+0x10c/0x150 [ 2323.677734][ T9917] mount_bdev+0xff/0x3c0 [ 2323.677756][ T9917] ? finish_unfinished+0x1120/0x1120 [ 2323.687244][ T9917] get_super_block+0x35/0x40 [ 2323.687257][ T9917] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2323.687269][ T9917] legacy_get_tree+0xf2/0x200 [ 2323.687285][ T9917] vfs_get_tree+0x123/0x450 [ 2323.687300][ T9917] do_mount+0x1436/0x2c40 [ 2323.687320][ T9917] ? retint_kernel+0x2d/0x2d [ 2323.687339][ T9917] ? copy_mount_string+0x40/0x40 [ 2323.687350][ T9917] ? copy_mount_options+0x208/0x3a0 [ 2323.687367][ T9917] ? __sanitizer_cov_trace_pc+0x50/0x50 [ 2323.687388][ T9917] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2323.737140][ T9917] ? copy_mount_options+0x280/0x3a0 [ 2323.742359][ T9917] ksys_mount+0xdb/0x150 [ 2323.746612][ T9917] __x64_sys_mount+0xbe/0x150 [ 2323.751301][ T9917] do_syscall_64+0x103/0x610 [ 2323.755902][ T9917] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2323.755913][ T9917] RIP: 0033:0x45b69a [ 2323.755929][ T9917] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2323.755937][ T9917] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2323.755950][ T9917] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2323.755958][ T9917] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2323.755967][ T9917] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2323.755975][ T9917] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2323.755983][ T9917] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 [ 2323.855744][ T9921] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2323.867682][ T9935] dccp_v6_rcv: dropped packet with invalid checksum 03:37:44 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x88640000}}}}}}}}, 0x0) 03:37:44 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x4c00}, 0x0) [ 2323.885767][ T9935] dccp_v6_rcv: dropped packet with invalid checksum [ 2323.943755][ T9928] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2323.943755][ T9928] 03:37:45 executing program 1 (fault-call:0 fault-nth:77): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2324.008170][ T9940] dccp_v6_rcv: dropped packet with invalid checksum [ 2324.026953][ T9940] dccp_v6_rcv: dropped packet with invalid checksum [ 2324.037824][ T9941] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2324.057329][ T9949] FAULT_INJECTION: forcing a failure. [ 2324.057329][ T9949] name failslab, interval 1, probability 0, space 0, times 0 [ 2324.070254][ T9949] CPU: 0 PID: 9949 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2324.078069][ T9949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2324.088133][ T9949] Call Trace: [ 2324.088158][ T9949] dump_stack+0x172/0x1f0 [ 2324.088178][ T9949] should_fail.cold+0xa/0x15 [ 2324.088195][ T9949] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2324.088216][ T9949] ? ___might_sleep+0x163/0x280 [ 2324.106179][ T9949] __should_failslab+0x121/0x190 [ 2324.106194][ T9949] should_failslab+0x9/0x14 [ 2324.106209][ T9949] kmem_cache_alloc_trace+0x2d1/0x760 [ 2324.106227][ T9949] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2324.106247][ T9949] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2324.106265][ T9949] __list_lru_init+0x3cf/0x6e0 [ 2324.142020][ T9949] alloc_super+0x78d/0x890 [ 2324.146438][ T9949] ? test_single_super+0x10/0x10 [ 2324.151378][ T9949] sget_userns+0xf1/0x560 [ 2324.155705][ T9949] ? kill_litter_super+0x60/0x60 [ 2324.160640][ T9949] ? test_single_super+0x10/0x10 [ 2324.165570][ T9949] ? kill_litter_super+0x60/0x60 [ 2324.170499][ T9949] sget+0x10c/0x150 [ 2324.174400][ T9949] mount_bdev+0xff/0x3c0 [ 2324.178641][ T9949] ? finish_unfinished+0x1120/0x1120 [ 2324.183926][ T9949] get_super_block+0x35/0x40 [ 2324.188512][ T9949] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2324.193530][ T9949] legacy_get_tree+0xf2/0x200 [ 2324.198205][ T9949] vfs_get_tree+0x123/0x450 [ 2324.202708][ T9949] do_mount+0x1436/0x2c40 [ 2324.207048][ T9949] ? copy_mount_string+0x40/0x40 [ 2324.212349][ T9949] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2324.218589][ T9949] ? copy_mount_options+0x280/0x3a0 [ 2324.223788][ T9949] ksys_mount+0xdb/0x150 [ 2324.228035][ T9949] __x64_sys_mount+0xbe/0x150 [ 2324.232710][ T9949] do_syscall_64+0x103/0x610 [ 2324.237302][ T9949] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2324.243186][ T9949] RIP: 0033:0x45b69a [ 2324.247081][ T9949] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2324.266696][ T9949] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2324.275111][ T9949] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2324.283078][ T9949] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2324.291045][ T9949] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2324.299021][ T9949] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2324.307077][ T9949] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:37:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:45 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x5865}, 0x0) 03:37:45 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x88a8ffff}}}}}}}}, 0x0) 03:37:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:45 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x6000}, 0x0) [ 2324.541610][ T9954] dccp_v6_rcv: dropped packet with invalid checksum [ 2324.566844][ T9954] dccp_v6_rcv: dropped packet with invalid checksum [ 2324.689857][ T9957] REISERFS warning (device loop3): super-6505 reiserfs_getopt: head of option "jdev" is only correct [ 2324.689857][ T9957] [ 2324.715422][ T9956] REISERFS warning (device loop0): reiserfs_fill_super: Cannot allocate commit workqueue [ 2324.725974][ T9965] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:37:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:45 executing program 1 (fault-call:0 fault-nth:78): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:45 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x88caffff}}}}}}}}, 0x0) 03:37:45 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x6558}, 0x0) 03:37:45 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x6800}, 0x0) 03:37:45 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x89060000}}}}}}}}, 0x0) [ 2324.826114][ T9974] dccp_v6_rcv: dropped packet with invalid checksum [ 2324.840517][ T9974] dccp_v6_rcv: dropped packet with invalid checksum 03:37:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) [ 2324.917087][ T9972] FAULT_INJECTION: forcing a failure. [ 2324.917087][ T9972] name failslab, interval 1, probability 0, space 0, times 0 [ 2324.976292][ T9978] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2325.002096][ T9972] CPU: 0 PID: 9972 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2325.009941][ T9972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2325.010881][ T9981] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2325.010881][ T9981] [ 2325.019997][ T9972] Call Trace: [ 2325.020028][ T9972] dump_stack+0x172/0x1f0 [ 2325.020047][ T9972] should_fail.cold+0xa/0x15 [ 2325.020066][ T9972] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2325.020086][ T9972] ? ___might_sleep+0x163/0x280 [ 2325.020105][ T9972] __should_failslab+0x121/0x190 [ 2325.020120][ T9972] should_failslab+0x9/0x14 [ 2325.020140][ T9972] kmem_cache_alloc_trace+0x2d1/0x760 [ 2325.071045][ T9972] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2325.076968][ T9972] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2325.082619][ T9972] __list_lru_init+0x3cf/0x6e0 [ 2325.087399][ T9972] alloc_super+0x78d/0x890 [ 2325.091824][ T9972] ? test_single_super+0x10/0x10 [ 2325.096761][ T9972] sget_userns+0xf1/0x560 [ 2325.101086][ T9972] ? kill_litter_super+0x60/0x60 [ 2325.106021][ T9972] ? test_single_super+0x10/0x10 [ 2325.110961][ T9972] ? kill_litter_super+0x60/0x60 [ 2325.115903][ T9972] sget+0x10c/0x150 [ 2325.119720][ T9972] mount_bdev+0xff/0x3c0 [ 2325.123965][ T9972] ? finish_unfinished+0x1120/0x1120 [ 2325.129253][ T9972] get_super_block+0x35/0x40 [ 2325.133842][ T9972] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2325.138875][ T9972] legacy_get_tree+0xf2/0x200 [ 2325.143555][ T9972] vfs_get_tree+0x123/0x450 [ 2325.148072][ T9972] do_mount+0x1436/0x2c40 [ 2325.152413][ T9972] ? copy_mount_string+0x40/0x40 [ 2325.157352][ T9972] ? _copy_from_user+0xdd/0x150 [ 2325.162212][ T9972] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2325.168467][ T9972] ? copy_mount_options+0x280/0x3a0 [ 2325.173672][ T9972] ksys_mount+0xdb/0x150 [ 2325.177929][ T9972] __x64_sys_mount+0xbe/0x150 [ 2325.182609][ T9972] do_syscall_64+0x103/0x610 [ 2325.187212][ T9972] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2325.193098][ T9972] RIP: 0033:0x45b69a [ 2325.196994][ T9972] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2325.216607][ T9972] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2325.225036][ T9972] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2325.233098][ T9972] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2325.241069][ T9972] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2325.249036][ T9972] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2325.257017][ T9972] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 [ 2325.274047][ T9988] REISERFS warning (device loop3): super-6505 reiserfs_getopt: head of option "jdev" is only correct [ 2325.274047][ T9988] 03:37:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:46 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x8dffffff}}}}}}}}, 0x0) 03:37:46 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x6c00}, 0x0) 03:37:46 executing program 1 (fault-call:0 fault-nth:79): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:46 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x7400}, 0x0) [ 2325.527030][ T9996] FAULT_INJECTION: forcing a failure. [ 2325.527030][ T9996] name failslab, interval 1, probability 0, space 0, times 0 [ 2325.545787][ T9996] CPU: 0 PID: 9996 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2325.554916][ T9996] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2325.554923][ T9996] Call Trace: [ 2325.554949][ T9996] dump_stack+0x172/0x1f0 [ 2325.554970][ T9996] should_fail.cold+0xa/0x15 03:37:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:46 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0xf5ffffff}}}}}}}}, 0x0) [ 2325.554988][ T9996] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2325.555006][ T9996] ? ___might_sleep+0x163/0x280 [ 2325.555026][ T9996] __should_failslab+0x121/0x190 [ 2325.555039][ T9996] should_failslab+0x9/0x14 [ 2325.555054][ T9996] kmem_cache_alloc_node_trace+0x270/0x720 [ 2325.555067][ T9996] ? kmem_cache_alloc_trace+0x354/0x760 [ 2325.555088][ T9996] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2325.592857][ T9996] __kmalloc_node+0x3d/0x70 [ 2325.592875][ T9996] kvmalloc_node+0x68/0x100 03:37:46 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0xffffa888}}}}}}}}, 0x0) [ 2325.592900][ T9996] __list_lru_init+0x4a6/0x6e0 [ 2325.592919][ T9996] alloc_super+0x78d/0x890 [ 2325.632806][ T9996] ? test_single_super+0x10/0x10 [ 2325.637756][ T9996] sget_userns+0xf1/0x560 [ 2325.642100][ T9996] ? kill_litter_super+0x60/0x60 [ 2325.647050][ T9996] ? test_single_super+0x10/0x10 [ 2325.651989][ T9996] ? kill_litter_super+0x60/0x60 [ 2325.656934][ T9996] sget+0x10c/0x150 [ 2325.660752][ T9996] mount_bdev+0xff/0x3c0 [ 2325.665002][ T9996] ? finish_unfinished+0x1120/0x1120 [ 2325.670298][ T9996] get_super_block+0x35/0x40 [ 2325.674898][ T9996] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2325.679928][ T9996] legacy_get_tree+0xf2/0x200 [ 2325.684609][ T9996] vfs_get_tree+0x123/0x450 [ 2325.684628][ T9996] do_mount+0x1436/0x2c40 [ 2325.684649][ T9996] ? copy_mount_string+0x40/0x40 [ 2325.684665][ T9996] ? _copy_from_user+0xdd/0x150 [ 2325.684682][ T9996] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2325.684694][ T9996] ? copy_mount_options+0x280/0x3a0 [ 2325.684709][ T9996] ksys_mount+0xdb/0x150 [ 2325.684725][ T9996] __x64_sys_mount+0xbe/0x150 03:37:46 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x7a00}, 0x0) [ 2325.684743][ T9996] do_syscall_64+0x103/0x610 [ 2325.684761][ T9996] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2325.684776][ T9996] RIP: 0033:0x45b69a [ 2325.693578][ T9996] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2325.693587][ T9996] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2325.693601][ T9996] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2325.693610][ T9996] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2325.693620][ T9996] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2325.693628][ T9996] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2325.693637][ T9996] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 [ 2325.760507][T10009] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:37:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:46 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0xffffca88}}}}}}}}, 0x0) 03:37:46 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x8100}, 0x0) [ 2326.025211][T10004] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2326.036260][T10082] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2326.036260][T10082] [ 2326.081434][T10120] REISERFS warning (device loop3): super-6505 reiserfs_getopt: head of option "jdev" is only correct [ 2326.081434][T10120] 03:37:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:47 executing program 1 (fault-call:0 fault-nth:80): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:47 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0xffffdd86}}}}}}}}, 0x0) 03:37:47 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0xec34}, 0x0) 03:37:47 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0xfffff000}}}}}}}}, 0x0) [ 2326.315365][T10131] FAULT_INJECTION: forcing a failure. [ 2326.315365][T10131] name failslab, interval 1, probability 0, space 0, times 0 [ 2326.336121][T10131] CPU: 0 PID: 10131 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2326.344049][T10131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2326.354119][T10131] Call Trace: [ 2326.357424][T10131] dump_stack+0x172/0x1f0 [ 2326.361764][T10131] should_fail.cold+0xa/0x15 [ 2326.366357][T10131] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2326.372162][T10131] ? ___might_sleep+0x163/0x280 [ 2326.372185][T10131] __should_failslab+0x121/0x190 [ 2326.372206][T10131] should_failslab+0x9/0x14 [ 2326.382047][T10131] kmem_cache_alloc_node_trace+0x270/0x720 [ 2326.382064][T10131] ? kmem_cache_alloc_trace+0x354/0x760 [ 2326.382086][T10131] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2326.382105][T10131] __kmalloc_node+0x3d/0x70 [ 2326.409624][T10131] kvmalloc_node+0x68/0x100 [ 2326.414130][T10131] __list_lru_init+0x4a6/0x6e0 [ 2326.418901][T10131] alloc_super+0x78d/0x890 [ 2326.423314][T10131] ? test_single_super+0x10/0x10 [ 2326.428250][T10131] sget_userns+0xf1/0x560 [ 2326.432924][T10131] ? kill_litter_super+0x60/0x60 [ 2326.437863][T10131] ? test_single_super+0x10/0x10 [ 2326.443057][T10131] ? kill_litter_super+0x60/0x60 [ 2326.447997][T10131] sget+0x10c/0x150 [ 2326.451814][T10131] mount_bdev+0xff/0x3c0 [ 2326.456098][T10131] ? finish_unfinished+0x1120/0x1120 [ 2326.461384][T10131] get_super_block+0x35/0x40 [ 2326.466144][T10131] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2326.471167][T10131] legacy_get_tree+0xf2/0x200 [ 2326.475846][T10131] vfs_get_tree+0x123/0x450 [ 2326.480349][T10131] do_mount+0x1436/0x2c40 [ 2326.484683][T10131] ? copy_mount_string+0x40/0x40 [ 2326.489623][T10131] ? __sanitizer_cov_trace_const_cmp2+0x20/0x20 [ 2326.495863][T10131] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2326.502186][T10131] ? copy_mount_options+0x280/0x3a0 [ 2326.507386][T10131] ksys_mount+0xdb/0x150 [ 2326.511628][T10131] __x64_sys_mount+0xbe/0x150 [ 2326.516315][T10131] do_syscall_64+0x103/0x610 [ 2326.520996][T10131] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2326.527057][T10131] RIP: 0033:0x45b69a [ 2326.530957][T10131] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2326.551086][T10131] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2326.559496][T10131] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2326.567460][T10131] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2326.575430][T10131] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2326.583423][T10131] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2326.583432][T10131] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 [ 2326.654853][T10082] REISERFS warning (device loop0): reiserfs_fill_super: Cannot allocate commit workqueue 03:37:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:47 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0xf000}, 0x0) 03:37:47 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0xffffff8d}}}}}}}}, 0x0) 03:37:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:47 executing program 1 (fault-call:0 fault-nth:81): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2326.733809][T10140] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:37:47 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0xfffffff5}}}}}}}}, 0x0) 03:37:47 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0xfeff}, 0x0) [ 2326.910223][T10152] FAULT_INJECTION: forcing a failure. [ 2326.910223][T10152] name failslab, interval 1, probability 0, space 0, times 0 [ 2326.925249][T10150] REISERFS warning (device loop3): super-6505 reiserfs_getopt: head of option "jdev" is only correct [ 2326.925249][T10150] [ 2326.956733][T10163] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2326.957417][T10152] CPU: 1 PID: 10152 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2326.974982][T10152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2326.974988][T10152] Call Trace: [ 2326.975017][T10152] dump_stack+0x172/0x1f0 [ 2326.975037][T10152] should_fail.cold+0xa/0x15 [ 2326.975058][T10152] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2326.992696][T10152] ? ___might_sleep+0x163/0x280 [ 2326.992716][T10152] __should_failslab+0x121/0x190 [ 2326.992734][T10152] should_failslab+0x9/0x14 [ 2327.017567][T10152] kmem_cache_alloc_trace+0x2d1/0x760 [ 2327.022946][T10152] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2327.028768][T10152] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2327.034406][T10152] __list_lru_init+0x3cf/0x6e0 [ 2327.039610][T10152] alloc_super+0x78d/0x890 [ 2327.044029][T10152] ? test_single_super+0x10/0x10 [ 2327.049060][T10152] sget_userns+0xf1/0x560 [ 2327.053391][T10152] ? kill_litter_super+0x60/0x60 [ 2327.058414][T10152] ? test_single_super+0x10/0x10 [ 2327.063347][T10152] ? kill_litter_super+0x60/0x60 [ 2327.068282][T10152] sget+0x10c/0x150 [ 2327.072112][T10152] mount_bdev+0xff/0x3c0 [ 2327.076359][T10152] ? finish_unfinished+0x1120/0x1120 [ 2327.081734][T10152] get_super_block+0x35/0x40 [ 2327.086330][T10152] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2327.091349][T10152] legacy_get_tree+0xf2/0x200 [ 2327.096026][T10152] vfs_get_tree+0x123/0x450 [ 2327.100533][T10152] do_mount+0x1436/0x2c40 [ 2327.104868][T10152] ? copy_mount_string+0x40/0x40 [ 2327.109802][T10152] ? _copy_from_user+0xdd/0x150 [ 2327.114657][T10152] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2327.120895][T10152] ? copy_mount_options+0x280/0x3a0 [ 2327.126108][T10152] ksys_mount+0xdb/0x150 [ 2327.130353][T10152] __x64_sys_mount+0xbe/0x150 [ 2327.135035][T10152] do_syscall_64+0x103/0x610 [ 2327.139635][T10152] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2327.145528][T10152] RIP: 0033:0x45b69a [ 2327.149427][T10152] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2327.169022][T10152] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2327.177438][T10152] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2327.185404][T10152] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2327.193367][T10152] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2327.201333][T10152] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2327.209302][T10152] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 [ 2327.218154][T10158] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2327.218154][T10158] 03:37:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:48 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0xff0f}, 0x0) 03:37:48 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0xf0ffffffffffff}}}}}}}}, 0x0) 03:37:48 executing program 1 (fault-call:0 fault-nth:82): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) [ 2327.422565][T10172] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2327.422565][T10172] [ 2327.453063][T10179] REISERFS warning (device loop3): super-6505 reiserfs_getopt: head of option "jdev" is only correct [ 2327.453063][T10179] [ 2327.475943][T10183] FAULT_INJECTION: forcing a failure. [ 2327.475943][T10183] name failslab, interval 1, probability 0, space 0, times 0 [ 2327.485268][T10177] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2327.495409][T10183] CPU: 0 PID: 10183 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2327.506787][T10183] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2327.516854][T10183] Call Trace: [ 2327.520159][T10183] dump_stack+0x172/0x1f0 [ 2327.524501][T10183] should_fail.cold+0xa/0x15 [ 2327.529099][T10183] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2327.534910][T10183] ? ___might_sleep+0x163/0x280 [ 2327.539761][T10183] __should_failslab+0x121/0x190 [ 2327.544704][T10183] should_failslab+0x9/0x14 [ 2327.549232][T10183] kmem_cache_alloc_trace+0x2d1/0x760 [ 2327.555981][T10183] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2327.561797][T10183] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2327.567434][T10183] __list_lru_init+0x3cf/0x6e0 [ 2327.572208][T10183] alloc_super+0x78d/0x890 [ 2327.576629][T10183] ? test_single_super+0x10/0x10 [ 2327.581568][T10183] sget_userns+0xf1/0x560 [ 2327.585896][T10183] ? kill_litter_super+0x60/0x60 [ 2327.590831][T10183] ? test_single_super+0x10/0x10 [ 2327.595762][T10183] ? kill_litter_super+0x60/0x60 [ 2327.600695][T10183] sget+0x10c/0x150 [ 2327.604511][T10183] mount_bdev+0xff/0x3c0 [ 2327.608754][T10183] ? finish_unfinished+0x1120/0x1120 [ 2327.614040][T10183] get_super_block+0x35/0x40 [ 2327.618942][T10183] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2327.623966][T10183] legacy_get_tree+0xf2/0x200 [ 2327.628650][T10183] vfs_get_tree+0x123/0x450 [ 2327.633154][T10183] do_mount+0x1436/0x2c40 [ 2327.637483][T10183] ? copy_mount_string+0x40/0x40 [ 2327.642605][T10183] ? _copy_from_user+0xdd/0x150 [ 2327.647457][T10183] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2327.654217][T10183] ? copy_mount_options+0x280/0x3a0 [ 2327.659596][T10183] ksys_mount+0xdb/0x150 [ 2327.663841][T10183] __x64_sys_mount+0xbe/0x150 [ 2327.668521][T10183] do_syscall_64+0x103/0x610 [ 2327.673112][T10183] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2327.678999][T10183] RIP: 0033:0x45b69a [ 2327.682892][T10183] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2327.702489][T10183] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2327.710897][T10183] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2327.718954][T10183] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2327.726924][T10183] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2327.734891][T10183] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2327.742855][T10183] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:37:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:48 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0xfffe}, 0x0) 03:37:48 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x100000000000000}}}}}}}}, 0x0) 03:37:48 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x200000000000000}}}}}}}}, 0x0) 03:37:48 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x30000}, 0x0) 03:37:49 executing program 1 (fault-call:0 fault-nth:83): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:49 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x34000}, 0x0) [ 2327.972961][T10191] REISERFS warning (device loop3): super-6505 reiserfs_getopt: head of option "jdev" is only correct [ 2327.972961][T10191] [ 2327.986611][T10200] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2327.986611][T10200] [ 2328.000766][T10193] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:37:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:49 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x300000000000000}}}}}}}}, 0x0) 03:37:49 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x40000}, 0x0) 03:37:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs ', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) [ 2328.166560][T10206] FAULT_INJECTION: forcing a failure. [ 2328.166560][T10206] name failslab, interval 1, probability 0, space 0, times 0 [ 2328.200453][T10206] CPU: 0 PID: 10206 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2328.208375][T10206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2328.208388][T10206] Call Trace: [ 2328.221744][T10206] dump_stack+0x172/0x1f0 [ 2328.226085][T10206] should_fail.cold+0xa/0x15 [ 2328.230691][T10206] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2328.236516][T10206] ? ___might_sleep+0x163/0x280 [ 2328.236532][T10206] __should_failslab+0x121/0x190 [ 2328.236546][T10206] should_failslab+0x9/0x14 [ 2328.236562][T10206] kmem_cache_alloc_trace+0x2d1/0x760 [ 2328.236576][T10206] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2328.236596][T10206] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2328.267604][T10206] __list_lru_init+0x3cf/0x6e0 [ 2328.272375][T10206] alloc_super+0x78d/0x890 [ 2328.276803][T10206] ? test_single_super+0x10/0x10 [ 2328.281750][T10206] sget_userns+0xf1/0x560 [ 2328.286081][T10206] ? kill_litter_super+0x60/0x60 [ 2328.291021][T10206] ? test_single_super+0x10/0x10 [ 2328.295957][T10206] ? kill_litter_super+0x60/0x60 [ 2328.300906][T10206] sget+0x10c/0x150 [ 2328.304726][T10206] mount_bdev+0xff/0x3c0 [ 2328.308991][T10206] ? finish_unfinished+0x1120/0x1120 [ 2328.314278][T10206] get_super_block+0x35/0x40 [ 2328.318867][T10206] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2328.323884][T10206] legacy_get_tree+0xf2/0x200 [ 2328.328563][T10206] vfs_get_tree+0x123/0x450 [ 2328.333062][T10206] do_mount+0x1436/0x2c40 [ 2328.337394][T10206] ? copy_mount_string+0x40/0x40 [ 2328.342330][T10206] ? copy_mount_options+0x198/0x3a0 [ 2328.347537][T10206] ? __sanitizer_cov_trace_pc+0x44/0x50 [ 2328.353088][T10206] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2328.359330][T10206] ? copy_mount_options+0x280/0x3a0 [ 2328.364529][T10206] ksys_mount+0xdb/0x150 [ 2328.368773][T10206] __x64_sys_mount+0xbe/0x150 [ 2328.373446][T10206] do_syscall_64+0x103/0x610 [ 2328.378038][T10206] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2328.386465][T10206] RIP: 0033:0x45b69a [ 2328.390361][T10206] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 03:37:49 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x400300}, 0x0) [ 2328.409957][T10206] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2328.418362][T10206] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2328.426327][T10206] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2328.434380][T10206] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2328.442346][T10206] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2328.450307][T10206] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 [ 2328.640255][T10219] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2328.640255][T10219] [ 2328.654320][T10220] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:37:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:49 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x400000000000000}}}}}}}}, 0x0) 03:37:49 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0xf0ffff}, 0x0) 03:37:49 executing program 1 (fault-call:0 fault-nth:84): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:49 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x1000000}, 0x0) 03:37:49 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x500000000000000}}}}}}}}, 0x0) [ 2328.861444][T10234] net_ratelimit: 26 callbacks suppressed [ 2328.861453][T10234] dccp_v6_rcv: dropped packet with invalid checksum [ 2328.885822][T10234] dccp_v6_rcv: dropped packet with invalid checksum 03:37:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) [ 2328.921725][T10233] FAULT_INJECTION: forcing a failure. [ 2328.921725][T10233] name failslab, interval 1, probability 0, space 0, times 0 [ 2328.940903][T10233] CPU: 0 PID: 10233 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2328.948822][T10233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2328.958956][T10233] Call Trace: [ 2328.962254][T10233] dump_stack+0x172/0x1f0 [ 2328.966600][T10233] should_fail.cold+0xa/0x15 [ 2328.971201][T10233] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2328.977013][T10233] ? ___might_sleep+0x163/0x280 [ 2328.981871][T10233] __should_failslab+0x121/0x190 [ 2328.986818][T10233] should_failslab+0x9/0x14 [ 2328.991339][T10233] kmem_cache_alloc_trace+0x2d1/0x760 [ 2328.996710][T10233] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2329.002519][T10233] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2329.008154][T10233] __list_lru_init+0x3cf/0x6e0 [ 2329.012921][T10233] alloc_super+0x78d/0x890 [ 2329.017341][T10233] ? test_single_super+0x10/0x10 [ 2329.022275][T10233] sget_userns+0xf1/0x560 [ 2329.026620][T10233] ? kill_litter_super+0x60/0x60 [ 2329.031556][T10233] ? test_single_super+0x10/0x10 [ 2329.036499][T10233] ? kill_litter_super+0x60/0x60 [ 2329.041434][T10233] sget+0x10c/0x150 [ 2329.045244][T10233] mount_bdev+0xff/0x3c0 [ 2329.049486][T10233] ? finish_unfinished+0x1120/0x1120 [ 2329.054775][T10233] get_super_block+0x35/0x40 [ 2329.059452][T10233] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2329.064473][T10233] legacy_get_tree+0xf2/0x200 [ 2329.069239][T10233] vfs_get_tree+0x123/0x450 [ 2329.073739][T10233] do_mount+0x1436/0x2c40 [ 2329.078074][T10233] ? copy_mount_string+0x40/0x40 [ 2329.083026][T10233] ? _copy_from_user+0xdd/0x150 [ 2329.087888][T10233] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2329.094125][T10233] ? copy_mount_options+0x280/0x3a0 [ 2329.099322][T10233] ksys_mount+0xdb/0x150 [ 2329.103581][T10233] __x64_sys_mount+0xbe/0x150 [ 2329.108259][T10233] do_syscall_64+0x103/0x610 [ 2329.112855][T10233] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2329.118753][T10233] RIP: 0033:0x45b69a [ 2329.122645][T10233] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2329.142248][T10233] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2329.150660][T10233] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2329.158631][T10233] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2329.166612][T10233] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2329.174869][T10233] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2329.182838][T10233] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 [ 2329.220311][T10240] dccp_v6_rcv: dropped packet with invalid checksum [ 2329.243616][T10240] dccp_v6_rcv: dropped packet with invalid checksum 03:37:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:50 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x2000000}, 0x0) 03:37:50 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x600000000000000}}}}}}}}, 0x0) 03:37:50 executing program 1 (fault-call:0 fault-nth:85): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2329.331631][T10243] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2329.331631][T10243] [ 2329.364735][T10247] REISERFS warning (device loop3): super-6505 reiserfs_getopt: head of option "jdev" is only correct [ 2329.364735][T10247] 03:37:50 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x3000000}, 0x0) [ 2329.382779][T10254] dccp_v6_rcv: dropped packet with invalid checksum [ 2329.407712][T10254] dccp_v6_rcv: dropped packet with invalid checksum [ 2329.422778][T10255] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2329.454940][T10260] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2329.454940][T10260] [ 2329.491199][T10259] FAULT_INJECTION: forcing a failure. [ 2329.491199][T10259] name failslab, interval 1, probability 0, space 0, times 0 [ 2329.524163][T10259] CPU: 1 PID: 10259 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2329.532094][T10259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2329.542149][T10259] Call Trace: [ 2329.545481][T10259] dump_stack+0x172/0x1f0 [ 2329.551296][T10259] should_fail.cold+0xa/0x15 [ 2329.555928][T10259] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2329.561738][T10259] ? ___might_sleep+0x163/0x280 [ 2329.566600][T10259] __should_failslab+0x121/0x190 [ 2329.571550][T10259] should_failslab+0x9/0x14 [ 2329.576167][T10259] kmem_cache_alloc_trace+0x2d1/0x760 [ 2329.583549][T10259] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2329.589553][T10259] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2329.595188][T10259] __list_lru_init+0x3cf/0x6e0 [ 2329.599960][T10259] alloc_super+0x78d/0x890 [ 2329.604374][T10259] ? test_single_super+0x10/0x10 [ 2329.609313][T10259] sget_userns+0xf1/0x560 [ 2329.613638][T10259] ? kill_litter_super+0x60/0x60 [ 2329.618581][T10259] ? test_single_super+0x10/0x10 [ 2329.623526][T10259] ? kill_litter_super+0x60/0x60 [ 2329.628475][T10259] sget+0x10c/0x150 [ 2329.632291][T10259] mount_bdev+0xff/0x3c0 [ 2329.636625][T10259] ? finish_unfinished+0x1120/0x1120 [ 2329.641931][T10259] get_super_block+0x35/0x40 [ 2329.646516][T10259] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2329.651552][T10259] legacy_get_tree+0xf2/0x200 [ 2329.656229][T10259] vfs_get_tree+0x123/0x450 [ 2329.660736][T10259] do_mount+0x1436/0x2c40 [ 2329.665068][T10259] ? copy_mount_string+0x40/0x40 [ 2329.670022][T10259] ? __sanitizer_cov_trace_const_cmp8+0xf/0x20 [ 2329.676174][T10259] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2329.682497][T10259] ? copy_mount_options+0x280/0x3a0 [ 2329.687706][T10259] ksys_mount+0xdb/0x150 [ 2329.691945][T10259] __x64_sys_mount+0xbe/0x150 [ 2329.696623][T10259] do_syscall_64+0x103/0x610 [ 2329.701215][T10259] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2329.707099][T10259] RIP: 0033:0x45b69a [ 2329.710992][T10259] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2329.730594][T10259] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2329.739347][T10259] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2329.747318][T10259] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2329.755292][T10259] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2329.763258][T10259] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2329.771266][T10259] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 [ 2329.816605][T10267] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:37:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:50 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x700000000000000}}}}}}}}, 0x0) 03:37:50 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x4000000}, 0x0) 03:37:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:51 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x5000000}, 0x0) [ 2329.954128][T10275] dccp_v6_rcv: dropped packet with invalid checksum [ 2329.964529][T10275] dccp_v6_rcv: dropped packet with invalid checksum 03:37:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:51 executing program 1 (fault-call:0 fault-nth:86): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:51 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x800000000000000}}}}}}}}, 0x0) 03:37:51 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x6000000}, 0x0) [ 2330.077600][T10273] REISERFS warning (device loop3): super-6505 reiserfs_getopt: head of option "jdev" is only correct [ 2330.077600][T10273] [ 2330.140448][T10288] dccp_v6_rcv: dropped packet with invalid checksum [ 2330.148244][T10286] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2330.161767][T10288] dccp_v6_rcv: dropped packet with invalid checksum [ 2330.164180][T10290] FAULT_INJECTION: forcing a failure. [ 2330.164180][T10290] name failslab, interval 1, probability 0, space 0, times 0 [ 2330.171129][T10279] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2330.171129][T10279] [ 2330.195358][T10290] CPU: 1 PID: 10290 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2330.203267][T10290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2330.213324][T10290] Call Trace: [ 2330.216637][T10290] dump_stack+0x172/0x1f0 [ 2330.220991][T10290] should_fail.cold+0xa/0x15 [ 2330.225591][T10290] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2330.231415][T10290] ? ___might_sleep+0x163/0x280 [ 2330.236283][T10290] __should_failslab+0x121/0x190 [ 2330.241223][T10290] should_failslab+0x9/0x14 [ 2330.245733][T10290] kmem_cache_alloc_trace+0x2d1/0x760 [ 2330.251102][T10290] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2330.256912][T10290] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2330.262560][T10290] __list_lru_init+0x3cf/0x6e0 [ 2330.267341][T10290] alloc_super+0x78d/0x890 [ 2330.271766][T10290] ? test_single_super+0x10/0x10 [ 2330.276708][T10290] sget_userns+0xf1/0x560 [ 2330.281037][T10290] ? kill_litter_super+0x60/0x60 [ 2330.285983][T10290] ? test_single_super+0x10/0x10 [ 2330.290919][T10290] ? kill_litter_super+0x60/0x60 [ 2330.295862][T10290] sget+0x10c/0x150 [ 2330.299675][T10290] mount_bdev+0xff/0x3c0 [ 2330.303921][T10290] ? finish_unfinished+0x1120/0x1120 [ 2330.309208][T10290] get_super_block+0x35/0x40 [ 2330.313802][T10290] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2330.318828][T10290] legacy_get_tree+0xf2/0x200 [ 2330.323517][T10290] vfs_get_tree+0x123/0x450 [ 2330.328024][T10290] do_mount+0x1436/0x2c40 [ 2330.332367][T10290] ? copy_mount_string+0x40/0x40 [ 2330.337304][T10290] ? _copy_from_user+0xdd/0x150 [ 2330.342158][T10290] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2330.348398][T10290] ? copy_mount_options+0x280/0x3a0 [ 2330.353603][T10290] ksys_mount+0xdb/0x150 [ 2330.357846][T10290] __x64_sys_mount+0xbe/0x150 [ 2330.362526][T10290] do_syscall_64+0x103/0x610 [ 2330.367121][T10290] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2330.373009][T10290] RIP: 0033:0x45b69a [ 2330.376899][T10290] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2330.398249][T10290] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2330.406697][T10290] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2330.414666][T10290] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2330.422636][T10290] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2330.430607][T10290] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 03:37:51 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x806000000000000}}}}}}}}, 0x0) 03:37:51 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x7000000}, 0x0) [ 2330.438577][T10290] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:37:51 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0xd00000000000000}}}}}}}}, 0x0) [ 2330.634888][T10396] REISERFS warning (device loop3): reiserfs_fill_super: Cannot allocate commit workqueue [ 2330.635314][T10402] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2330.655405][T10404] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2330.655405][T10404] 03:37:51 executing program 1 (fault-call:0 fault-nth:87): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:51 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0xa000000}, 0x0) 03:37:51 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x2000000000000000}}}}}}}}, 0x0) 03:37:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x10', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:51 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x2100000000000000}}}}}}}}, 0x0) 03:37:51 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0xc000000}, 0x0) [ 2331.007823][T10415] FAULT_INJECTION: forcing a failure. [ 2331.007823][T10415] name failslab, interval 1, probability 0, space 0, times 0 [ 2331.043205][T10415] CPU: 0 PID: 10415 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2331.051134][T10415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2331.061453][T10415] Call Trace: [ 2331.061481][T10415] dump_stack+0x172/0x1f0 [ 2331.061501][T10415] should_fail.cold+0xa/0x15 [ 2331.061523][T10415] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2331.069150][T10415] ? ___might_sleep+0x163/0x280 [ 2331.084550][T10415] __should_failslab+0x121/0x190 [ 2331.089501][T10415] should_failslab+0x9/0x14 [ 2331.094017][T10415] kmem_cache_alloc_trace+0x2d1/0x760 [ 2331.099388][T10415] ? trace_hardirqs_on+0x67/0x230 [ 2331.104442][T10415] ? kasan_check_read+0x11/0x20 [ 2331.109305][T10415] alloc_workqueue+0x866/0xf00 [ 2331.114071][T10415] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2331.119892][T10415] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 2331.125623][T10415] ? lockdep_init_map+0x1be/0x6d0 [ 2331.130654][T10415] ? debug_mutex_init+0x2d/0x60 [ 2331.135558][T10415] reiserfs_fill_super+0x369/0x2ea0 [ 2331.140773][T10415] ? finish_unfinished+0x1120/0x1120 [ 2331.146062][T10415] ? snprintf+0xbb/0xf0 [ 2331.150223][T10415] ? vsprintf+0x40/0x40 [ 2331.154381][T10415] ? wait_for_completion+0x440/0x440 [ 2331.159672][T10415] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2331.165392][T10415] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2331.171728][T10415] mount_bdev+0x307/0x3c0 [ 2331.176059][T10415] ? finish_unfinished+0x1120/0x1120 [ 2331.181349][T10415] get_super_block+0x35/0x40 [ 2331.185952][T10415] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2331.190974][T10415] legacy_get_tree+0xf2/0x200 [ 2331.195650][T10415] vfs_get_tree+0x123/0x450 [ 2331.200162][T10415] do_mount+0x1436/0x2c40 [ 2331.204496][T10415] ? copy_mount_string+0x40/0x40 [ 2331.209432][T10415] ? _copy_from_user+0xdd/0x150 [ 2331.214383][T10415] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2331.220629][T10415] ? copy_mount_options+0x280/0x3a0 [ 2331.225831][T10415] ksys_mount+0xdb/0x150 [ 2331.230072][T10415] __x64_sys_mount+0xbe/0x150 [ 2331.234757][T10415] do_syscall_64+0x103/0x610 [ 2331.239354][T10415] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2331.245252][T10415] RIP: 0033:0x45b69a [ 2331.249144][T10415] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2331.268746][T10415] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2331.277241][T10415] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2331.285333][T10415] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2331.293301][T10415] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2331.301269][T10415] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 03:37:52 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0xe000000}, 0x0) 03:37:52 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x2800000000000000}}}}}}}}, 0x0) [ 2331.309237][T10415] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 [ 2331.332245][T10426] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2331.332245][T10426] [ 2331.346450][T10422] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:37:52 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x4000000000000000}}}}}}}}, 0x0) 03:37:52 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0xf000000}, 0x0) [ 2331.369496][T10415] REISERFS warning (device loop1): reiserfs_fill_super: Cannot allocate commit workqueue 03:37:52 executing program 1 (fault-call:0 fault-nth:88): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:52 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x4305000000000000}}}}}}}}, 0x0) 03:37:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) [ 2331.663081][T10445] FAULT_INJECTION: forcing a failure. [ 2331.663081][T10445] name failslab, interval 1, probability 0, space 0, times 0 [ 2331.694892][T10445] CPU: 0 PID: 10445 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2331.703079][T10445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2331.712016][T10450] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2331.713129][T10445] Call Trace: [ 2331.713156][T10445] dump_stack+0x172/0x1f0 [ 2331.713177][T10445] should_fail.cold+0xa/0x15 [ 2331.713197][T10445] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2331.741498][T10445] ? ___might_sleep+0x163/0x280 [ 2331.746372][T10445] __should_failslab+0x121/0x190 [ 2331.751316][T10445] should_failslab+0x9/0x14 [ 2331.755921][T10445] kmem_cache_alloc_trace+0x2d1/0x760 [ 2331.761310][T10445] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2331.776003][T10445] __list_lru_init+0x3cf/0x6e0 [ 2331.780784][T10445] alloc_super+0x78d/0x890 [ 2331.785291][T10445] ? test_single_super+0x10/0x10 [ 2331.790225][T10445] sget_userns+0xf1/0x560 [ 2331.794645][T10445] ? kill_litter_super+0x60/0x60 [ 2331.799582][T10445] ? test_single_super+0x10/0x10 [ 2331.804518][T10445] ? kill_litter_super+0x60/0x60 [ 2331.809454][T10445] sget+0x10c/0x150 [ 2331.813264][T10445] mount_bdev+0xff/0x3c0 [ 2331.817506][T10445] ? finish_unfinished+0x1120/0x1120 [ 2331.822794][T10445] get_super_block+0x35/0x40 [ 2331.827383][T10445] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2331.832406][T10445] legacy_get_tree+0xf2/0x200 [ 2331.837176][T10445] vfs_get_tree+0x123/0x450 [ 2331.841695][T10445] do_mount+0x1436/0x2c40 [ 2331.846043][T10445] ? copy_mount_string+0x40/0x40 [ 2331.850990][T10445] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2331.851005][T10445] ? copy_mount_options+0x280/0x3a0 [ 2331.851021][T10445] ksys_mount+0xdb/0x150 [ 2331.851038][T10445] __x64_sys_mount+0xbe/0x150 [ 2331.862457][T10445] do_syscall_64+0x103/0x610 [ 2331.862479][T10445] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2331.862490][T10445] RIP: 0033:0x45b69a [ 2331.862509][T10445] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2331.881820][T10445] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2331.881834][T10445] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2331.881842][T10445] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2331.881851][T10445] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2331.881860][T10445] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2331.881868][T10445] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 [ 2331.885876][T10456] REISERFS warning (device loop3): super-6505 reiserfs_getopt: head of option "jdev" is only correct [ 2331.885876][T10456] [ 2331.997998][T10449] REISERFS warning (device loop0): reiserfs_fill_super: Cannot allocate commit workqueue [ 2332.037427][T10459] REISERFS warning (device loop3): super-6505 reiserfs_getopt: head of option "jdev" is only correct [ 2332.037427][T10459] 03:37:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:53 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x10000000}, 0x0) 03:37:53 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x4800000000000000}}}}}}}}, 0x0) 03:37:53 executing program 1 (fault-call:0 fault-nth:89): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:53 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x4c00000000000000}}}}}}}}, 0x0) 03:37:53 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x20000000}, 0x0) 03:37:53 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x5800000000000000}}}}}}}}, 0x0) 03:37:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:53 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x40000000}, 0x0) [ 2332.272132][T10467] FAULT_INJECTION: forcing a failure. [ 2332.272132][T10467] name failslab, interval 1, probability 0, space 0, times 0 [ 2332.304388][T10469] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:37:53 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x6000000000000000}}}}}}}}, 0x0) [ 2332.344832][T10467] CPU: 0 PID: 10467 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2332.352766][T10467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2332.362831][T10467] Call Trace: [ 2332.366142][T10467] dump_stack+0x172/0x1f0 [ 2332.370489][T10467] should_fail.cold+0xa/0x15 [ 2332.375082][T10467] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2332.380902][T10467] ? ___might_sleep+0x163/0x280 [ 2332.388312][T10467] __should_failslab+0x121/0x190 [ 2332.393257][T10467] should_failslab+0x9/0x14 [ 2332.397990][T10467] __kmalloc_track_caller+0x2d8/0x740 [ 2332.408769][T10467] ? pointer+0xa30/0xa30 [ 2332.413014][T10467] ? set_precision+0x180/0x180 [ 2332.417781][T10467] ? kasprintf+0xbb/0xf0 [ 2332.422026][T10467] kvasprintf+0xc8/0x170 [ 2332.426271][T10467] ? bust_spinlocks+0xe0/0xe0 [ 2332.430961][T10467] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2332.436684][T10467] ? find_next_bit+0x107/0x130 [ 2332.441452][T10467] kasprintf+0xbb/0xf0 [ 2332.445528][T10467] ? kvasprintf_const+0x190/0x190 [ 2332.450574][T10467] ? kasan_check_read+0x11/0x20 [ 2332.455517][T10467] alloc_workqueue+0x471/0xf00 [ 2332.460289][T10467] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2332.466101][T10467] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 2332.471910][T10467] ? lockdep_init_map+0x1be/0x6d0 [ 2332.476936][T10467] ? debug_mutex_init+0x2d/0x60 [ 2332.481796][T10467] reiserfs_fill_super+0x369/0x2ea0 [ 2332.487013][T10467] ? finish_unfinished+0x1120/0x1120 [ 2332.492316][T10467] ? snprintf+0xbb/0xf0 [ 2332.496497][T10467] ? vsprintf+0x40/0x40 [ 2332.500666][T10467] ? wait_for_completion+0x440/0x440 [ 2332.505986][T10467] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2332.511708][T10467] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2332.517959][T10467] mount_bdev+0x307/0x3c0 [ 2332.522297][T10467] ? finish_unfinished+0x1120/0x1120 [ 2332.527588][T10467] get_super_block+0x35/0x40 [ 2332.532174][T10467] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2332.537197][T10467] legacy_get_tree+0xf2/0x200 [ 2332.541874][T10467] vfs_get_tree+0x123/0x450 [ 2332.546379][T10467] do_mount+0x1436/0x2c40 [ 2332.550736][T10467] ? copy_mount_string+0x40/0x40 [ 2332.555678][T10467] ? _copy_from_user+0xdd/0x150 [ 2332.555698][T10467] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2332.555715][T10467] ? copy_mount_options+0x280/0x3a0 [ 2332.566779][T10467] ksys_mount+0xdb/0x150 [ 2332.566798][T10467] __x64_sys_mount+0xbe/0x150 [ 2332.566817][T10467] do_syscall_64+0x103/0x610 [ 2332.566838][T10467] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2332.591345][T10467] RIP: 0033:0x45b69a [ 2332.591361][T10467] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2332.591369][T10467] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2332.591381][T10467] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2332.591394][T10467] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 03:37:53 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x48000000}, 0x0) [ 2332.614954][T10467] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2332.614963][T10467] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2332.614972][T10467] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 [ 2332.670134][T10485] REISERFS warning (device loop3): super-6505 reiserfs_getopt: head of option "jdev" is only correct [ 2332.670134][T10485] [ 2332.683548][T10480] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2332.683548][T10480] [ 2332.698177][T10467] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 [ 2332.910284][T10484] REISERFS warning (device loop3): super-6505 reiserfs_getopt: head of option "jdev" is only correct [ 2332.910284][T10484] [ 2332.928714][T10497] REISERFS warning (device loop0): reiserfs_fill_super: Cannot allocate commit workqueue 03:37:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:54 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x6800000000000000}}}}}}}}, 0x0) 03:37:54 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x4c000000}, 0x0) 03:37:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:54 executing program 1 (fault-call:0 fault-nth:90): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:54 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x6c00000000000000}}}}}}}}, 0x0) 03:37:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:54 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x60000000}, 0x0) [ 2333.162294][T10507] FAULT_INJECTION: forcing a failure. [ 2333.162294][T10507] name failslab, interval 1, probability 0, space 0, times 0 [ 2333.175707][T10507] CPU: 0 PID: 10507 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2333.183604][T10507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2333.183610][T10507] Call Trace: [ 2333.183635][T10507] dump_stack+0x172/0x1f0 [ 2333.183659][T10507] should_fail.cold+0xa/0x15 [ 2333.205901][T10507] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2333.211709][T10507] ? ___might_sleep+0x163/0x280 [ 2333.216563][T10507] __should_failslab+0x121/0x190 [ 2333.221500][T10507] should_failslab+0x9/0x14 [ 2333.226088][T10507] kmem_cache_alloc_trace+0x2d1/0x760 [ 2333.231459][T10507] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2333.237627][T10507] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2333.243275][T10507] __list_lru_init+0x3cf/0x6e0 [ 2333.248058][T10507] alloc_super+0x78d/0x890 [ 2333.252489][T10507] ? test_single_super+0x10/0x10 [ 2333.257436][T10507] sget_userns+0xf1/0x560 03:37:54 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x7400000000000000}}}}}}}}, 0x0) [ 2333.261766][T10507] ? kill_litter_super+0x60/0x60 [ 2333.266713][T10507] ? test_single_super+0x10/0x10 [ 2333.271646][T10507] ? kill_litter_super+0x60/0x60 [ 2333.276589][T10507] sget+0x10c/0x150 [ 2333.280395][T10507] mount_bdev+0xff/0x3c0 [ 2333.284638][T10507] ? finish_unfinished+0x1120/0x1120 [ 2333.289926][T10507] get_super_block+0x35/0x40 [ 2333.294523][T10507] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2333.299548][T10507] legacy_get_tree+0xf2/0x200 [ 2333.304231][T10507] vfs_get_tree+0x123/0x450 [ 2333.305158][T10508] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2333.308736][T10507] do_mount+0x1436/0x2c40 [ 2333.308757][T10507] ? copy_mount_string+0x40/0x40 [ 2333.308779][T10507] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2333.334729][T10507] ? copy_mount_options+0x280/0x3a0 [ 2333.339928][T10507] ksys_mount+0xdb/0x150 [ 2333.344191][T10507] __x64_sys_mount+0xbe/0x150 [ 2333.348890][T10507] do_syscall_64+0x103/0x610 [ 2333.353496][T10507] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2333.359378][T10507] RIP: 0033:0x45b69a [ 2333.363266][T10507] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2333.382867][T10507] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2333.391290][T10507] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2333.399259][T10507] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2333.407231][T10507] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2333.415206][T10507] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2333.423172][T10507] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:37:54 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x65580000}, 0x0) 03:37:54 executing program 1 (fault-call:0 fault-nth:91): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:54 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x7a00000000000000}}}}}}}}, 0x0) [ 2333.543924][T10517] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2333.543924][T10517] [ 2333.562346][T10519] REISERFS warning (device loop3): super-6505 reiserfs_getopt: head of option "jdev" is only correct [ 2333.562346][T10519] [ 2333.592781][T10531] FAULT_INJECTION: forcing a failure. [ 2333.592781][T10531] name failslab, interval 1, probability 0, space 0, times 0 [ 2333.606066][T10529] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2333.644867][T10531] CPU: 1 PID: 10531 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2333.652787][T10531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2333.662843][T10531] Call Trace: [ 2333.666146][T10531] dump_stack+0x172/0x1f0 [ 2333.670495][T10531] should_fail.cold+0xa/0x15 [ 2333.675098][T10531] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2333.680910][T10531] ? ___might_sleep+0x163/0x280 [ 2333.685773][T10531] __should_failslab+0x121/0x190 [ 2333.690713][T10531] should_failslab+0x9/0x14 [ 2333.695237][T10531] kmem_cache_alloc_trace+0x2d1/0x760 [ 2333.700619][T10531] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2333.706433][T10531] __memcg_init_list_lru_node+0x8a/0x1e0 [ 2333.712067][T10531] __list_lru_init+0x3cf/0x6e0 [ 2333.716845][T10531] alloc_super+0x78d/0x890 [ 2333.721266][T10531] ? test_single_super+0x10/0x10 [ 2333.726217][T10531] sget_userns+0xf1/0x560 [ 2333.730546][T10531] ? kill_litter_super+0x60/0x60 [ 2333.735483][T10531] ? test_single_super+0x10/0x10 [ 2333.740424][T10531] ? kill_litter_super+0x60/0x60 [ 2333.745384][T10531] sget+0x10c/0x150 [ 2333.749202][T10531] mount_bdev+0xff/0x3c0 [ 2333.753441][T10531] ? finish_unfinished+0x1120/0x1120 [ 2333.758828][T10531] get_super_block+0x35/0x40 [ 2333.763421][T10531] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2333.768444][T10531] legacy_get_tree+0xf2/0x200 [ 2333.773121][T10531] vfs_get_tree+0x123/0x450 [ 2333.777625][T10531] do_mount+0x1436/0x2c40 [ 2333.781962][T10531] ? copy_mount_string+0x40/0x40 [ 2333.786907][T10531] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2333.793156][T10531] ? copy_mount_options+0x280/0x3a0 [ 2333.798367][T10531] ksys_mount+0xdb/0x150 [ 2333.802620][T10531] __x64_sys_mount+0xbe/0x150 [ 2333.807299][T10531] do_syscall_64+0x103/0x610 [ 2333.811893][T10531] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2333.817782][T10531] RIP: 0033:0x45b69a [ 2333.821673][T10531] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2333.841276][T10531] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2333.849786][T10531] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2333.857760][T10531] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2333.865728][T10531] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2333.873692][T10531] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2333.881666][T10531] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 [ 2334.068194][T10538] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2334.068194][T10538] 03:37:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:55 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x68000000}, 0x0) 03:37:55 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x800e000000000000}}}}}}}}, 0x0) 03:37:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:55 executing program 1 (fault-call:0 fault-nth:92): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2334.238827][T10545] FAULT_INJECTION: forcing a failure. [ 2334.238827][T10545] name failslab, interval 1, probability 0, space 0, times 0 [ 2334.254098][T10551] net_ratelimit: 30 callbacks suppressed [ 2334.254107][T10551] dccp_v6_rcv: dropped packet with invalid checksum [ 2334.255051][T10545] CPU: 1 PID: 10545 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2334.274259][T10545] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2334.284318][T10545] Call Trace: [ 2334.287634][T10545] dump_stack+0x172/0x1f0 [ 2334.291967][T10545] should_fail.cold+0xa/0x15 [ 2334.296560][T10545] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2334.302373][T10545] ? ___might_sleep+0x163/0x280 [ 2334.307236][T10545] __should_failslab+0x121/0x190 [ 2334.312177][T10545] should_failslab+0x9/0x14 [ 2334.316765][T10545] kmem_cache_alloc_node_trace+0x270/0x720 [ 2334.322573][T10545] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2334.328130][T10545] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 2334.333965][T10545] alloc_worker+0x47/0x1c0 [ 2334.338380][T10545] init_rescuer.part.0+0x1f/0x190 [ 2334.343409][T10545] alloc_workqueue+0x669/0xf00 [ 2334.348189][T10545] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2334.354010][T10545] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 2334.359752][T10545] ? lockdep_init_map+0x1be/0x6d0 [ 2334.364782][T10545] ? debug_mutex_init+0x2d/0x60 [ 2334.369729][T10545] reiserfs_fill_super+0x369/0x2ea0 [ 2334.374934][T10545] ? finish_unfinished+0x1120/0x1120 [ 2334.380228][T10545] ? snprintf+0xbb/0xf0 [ 2334.386030][T10545] ? vsprintf+0x40/0x40 [ 2334.390194][T10545] ? wait_for_completion+0x440/0x440 [ 2334.395480][T10545] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2334.401205][T10545] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2334.413094][T10545] mount_bdev+0x307/0x3c0 [ 2334.418042][T10545] ? finish_unfinished+0x1120/0x1120 [ 2334.423331][T10545] get_super_block+0x35/0x40 [ 2334.427921][T10545] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2334.432943][T10545] legacy_get_tree+0xf2/0x200 [ 2334.437625][T10545] vfs_get_tree+0x123/0x450 [ 2334.442140][T10545] do_mount+0x1436/0x2c40 [ 2334.446476][T10545] ? copy_mount_string+0x40/0x40 [ 2334.451416][T10545] ? _copy_from_user+0xdd/0x150 [ 2334.456271][T10545] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2334.462521][T10545] ? copy_mount_options+0x280/0x3a0 [ 2334.467722][T10545] ksys_mount+0xdb/0x150 [ 2334.471966][T10545] __x64_sys_mount+0xbe/0x150 [ 2334.476649][T10545] do_syscall_64+0x103/0x610 [ 2334.481242][T10545] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2334.487139][T10545] RIP: 0033:0x45b69a [ 2334.491030][T10545] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2334.510627][T10545] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2334.519040][T10545] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2334.527100][T10545] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2334.535082][T10545] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2334.543056][T10545] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2334.551582][T10545] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 [ 2334.563134][T10551] dccp_v6_rcv: dropped packet with invalid checksum 03:37:55 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x8035000000000000}}}}}}}}, 0x0) 03:37:55 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x6c000000}, 0x0) [ 2334.595343][T10549] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2334.606039][T10548] REISERFS warning (device loop3): super-6505 reiserfs_getopt: head of option "jdev" is only correct [ 2334.606039][T10548] [ 2334.607399][T10555] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2334.607399][T10555] [ 2334.656375][T10545] REISERFS warning (device loop1): reiserfs_fill_super: Cannot allocate commit workqueue [ 2334.683515][T10562] dccp_v6_rcv: dropped packet with invalid checksum 03:37:55 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x74000000}, 0x0) [ 2334.704046][T10562] dccp_v6_rcv: dropped packet with invalid checksum 03:37:55 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x8100000000000000}}}}}}}}, 0x0) 03:37:55 executing program 1 (fault-call:0 fault-nth:93): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2334.901740][T10564] REISERFS warning (device loop3): super-6505 reiserfs_getopt: head of option "jdev" is only correct [ 2334.901740][T10564] [ 2334.911792][T10567] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2334.911792][T10567] 03:37:56 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x7a000000}, 0x0) [ 2334.962548][T10576] dccp_v6_rcv: dropped packet with invalid checksum [ 2334.964751][T10569] REISERFS warning (device loop4): reiserfs_fill_super: Cannot allocate commit workqueue [ 2334.984211][T10576] dccp_v6_rcv: dropped packet with invalid checksum 03:37:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:56 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x86ddffff00000000}}}}}}}}, 0x0) 03:37:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2335.093485][T10578] FAULT_INJECTION: forcing a failure. [ 2335.093485][T10578] name failslab, interval 1, probability 0, space 0, times 0 [ 2335.113374][T10578] CPU: 1 PID: 10578 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2335.121395][T10578] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2335.131626][T10578] Call Trace: [ 2335.134925][T10578] dump_stack+0x172/0x1f0 [ 2335.139262][T10578] should_fail.cold+0xa/0x15 [ 2335.143851][T10578] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2335.149657][T10578] ? ___might_sleep+0x163/0x280 [ 2335.154510][T10578] __should_failslab+0x121/0x190 [ 2335.159444][T10578] should_failslab+0x9/0x14 [ 2335.163944][T10578] kmem_cache_alloc_trace+0x2d1/0x760 [ 2335.169311][T10578] ? trace_hardirqs_on+0x67/0x230 [ 2335.174326][T10578] ? kasan_check_read+0x11/0x20 [ 2335.179183][T10578] alloc_workqueue+0x866/0xf00 [ 2335.183941][T10578] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2335.189747][T10578] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 2335.195472][T10578] ? lockdep_init_map+0x1be/0x6d0 [ 2335.200490][T10578] ? debug_mutex_init+0x2d/0x60 [ 2335.205344][T10578] reiserfs_fill_super+0x369/0x2ea0 [ 2335.210543][T10578] ? finish_unfinished+0x1120/0x1120 [ 2335.215835][T10578] ? snprintf+0xbb/0xf0 [ 2335.219989][T10578] ? vsprintf+0x40/0x40 [ 2335.224144][T10578] ? wait_for_completion+0x440/0x440 [ 2335.229426][T10578] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2335.235148][T10578] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2335.241383][T10578] mount_bdev+0x307/0x3c0 [ 2335.245709][T10578] ? finish_unfinished+0x1120/0x1120 [ 2335.250990][T10578] get_super_block+0x35/0x40 [ 2335.255578][T10578] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2335.260596][T10578] legacy_get_tree+0xf2/0x200 [ 2335.265272][T10578] vfs_get_tree+0x123/0x450 [ 2335.269772][T10578] do_mount+0x1436/0x2c40 [ 2335.274105][T10578] ? copy_mount_string+0x40/0x40 [ 2335.279054][T10578] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2335.285299][T10578] ? copy_mount_options+0x280/0x3a0 [ 2335.290494][T10578] ksys_mount+0xdb/0x150 [ 2335.294736][T10578] __x64_sys_mount+0xbe/0x150 [ 2335.299423][T10578] do_syscall_64+0x103/0x610 [ 2335.304015][T10578] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2335.309907][T10578] RIP: 0033:0x45b69a [ 2335.313797][T10578] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2335.333481][T10578] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2335.341885][T10578] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2335.349850][T10578] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2335.357833][T10578] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2335.366580][T10578] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2335.374631][T10578] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 [ 2335.386325][T10578] REISERFS warning (device loop1): reiserfs_fill_super: Cannot allocate commit workqueue 03:37:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x01', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:56 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x81000000}, 0x0) 03:37:56 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x8847000000000000}}}}}}}}, 0x0) [ 2335.435321][T10583] dccp_v6_rcv: dropped packet with invalid checksum [ 2335.450396][T10583] dccp_v6_rcv: dropped packet with invalid checksum 03:37:56 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x88a8ffff}, 0x0) 03:37:56 executing program 1 (fault-call:0 fault-nth:94): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2335.623602][T10592] dccp_v6_rcv: dropped packet with invalid checksum [ 2335.658492][T10592] dccp_v6_rcv: dropped packet with invalid checksum 03:37:56 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x9effffff}, 0x0) [ 2335.683798][T10596] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2335.683798][T10596] [ 2335.704035][T10602] FAULT_INJECTION: forcing a failure. [ 2335.704035][T10602] name failslab, interval 1, probability 0, space 0, times 0 [ 2335.723326][T10590] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:37:56 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x8848000000000000}}}}}}}}, 0x0) 03:37:56 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0xec340000}, 0x0) [ 2335.749929][T10602] CPU: 0 PID: 10602 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2335.757867][T10602] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2335.772365][T10602] Call Trace: [ 2335.775684][T10602] dump_stack+0x172/0x1f0 [ 2335.780041][T10602] should_fail.cold+0xa/0x15 [ 2335.784650][T10602] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2335.790473][T10602] ? ___might_sleep+0x163/0x280 [ 2335.795333][T10602] __should_failslab+0x121/0x190 [ 2335.800276][T10602] should_failslab+0x9/0x14 [ 2335.804784][T10602] __kmalloc_track_caller+0x2d8/0x740 [ 2335.810156][T10602] ? pointer+0xa30/0xa30 [ 2335.814392][T10602] ? set_precision+0x180/0x180 [ 2335.819177][T10602] ? kasprintf+0xbb/0xf0 [ 2335.823419][T10602] kvasprintf+0xc8/0x170 [ 2335.827658][T10602] ? bust_spinlocks+0xe0/0xe0 [ 2335.832345][T10602] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2335.838063][T10602] ? find_next_bit+0x107/0x130 [ 2335.842831][T10602] kasprintf+0xbb/0xf0 [ 2335.846897][T10602] ? kvasprintf_const+0x190/0x190 [ 2335.851930][T10602] ? kasan_check_read+0x11/0x20 [ 2335.856792][T10602] alloc_workqueue+0x471/0xf00 [ 2335.861551][T10602] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2335.867365][T10602] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 2335.873086][T10602] ? lockdep_init_map+0x1be/0x6d0 [ 2335.878107][T10602] ? debug_mutex_init+0x2d/0x60 [ 2335.882966][T10602] reiserfs_fill_super+0x369/0x2ea0 [ 2335.888180][T10602] ? finish_unfinished+0x1120/0x1120 [ 2335.893468][T10602] ? snprintf+0xbb/0xf0 [ 2335.897638][T10602] ? vsprintf+0x40/0x40 [ 2335.901889][T10602] ? wait_for_completion+0x440/0x440 [ 2335.907173][T10602] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2335.912903][T10602] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2335.919232][T10602] mount_bdev+0x307/0x3c0 [ 2335.923566][T10602] ? finish_unfinished+0x1120/0x1120 [ 2335.928851][T10602] get_super_block+0x35/0x40 [ 2335.933440][T10602] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2335.938458][T10602] legacy_get_tree+0xf2/0x200 [ 2335.943133][T10602] vfs_get_tree+0x123/0x450 [ 2335.947719][T10602] do_mount+0x1436/0x2c40 [ 2335.952050][T10602] ? copy_mount_string+0x40/0x40 [ 2335.957003][T10602] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2335.963256][T10602] ? copy_mount_options+0x280/0x3a0 [ 2335.968453][T10602] ksys_mount+0xdb/0x150 [ 2335.972695][T10602] __x64_sys_mount+0xbe/0x150 [ 2335.977375][T10602] do_syscall_64+0x103/0x610 [ 2335.981969][T10602] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2335.987861][T10602] RIP: 0033:0x45b69a [ 2335.991749][T10602] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2336.011357][T10602] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2336.019765][T10602] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2336.027733][T10602] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2336.035698][T10602] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2336.043666][T10602] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2336.051635][T10602] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 [ 2336.087417][T10602] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 03:37:57 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0xf0ffffff}, 0x0) [ 2336.375114][T10618] REISERFS warning (device loop0): reiserfs_fill_super: Cannot allocate commit workqueue 03:37:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:57 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x8864000000000000}}}}}}}}, 0x0) 03:37:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:57 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0xfeff0000}, 0x0) 03:37:57 executing program 1 (fault-call:0 fault-nth:95): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:57 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0xff0f0000}, 0x0) 03:37:57 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x88a8ffff00000000}}}}}}}}, 0x0) [ 2336.546727][T10626] FAULT_INJECTION: forcing a failure. [ 2336.546727][T10626] name failslab, interval 1, probability 0, space 0, times 0 [ 2336.560246][T10626] CPU: 0 PID: 10626 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2336.568154][T10626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2336.578214][T10626] Call Trace: [ 2336.581521][T10626] dump_stack+0x172/0x1f0 [ 2336.585858][T10626] should_fail.cold+0xa/0x15 [ 2336.585879][T10626] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2336.585901][T10626] ? ___might_sleep+0x163/0x280 [ 2336.585920][T10626] __should_failslab+0x121/0x190 [ 2336.585944][T10626] should_failslab+0x9/0x14 [ 2336.585961][T10626] kmem_cache_alloc_node_trace+0x270/0x720 [ 2336.585977][T10626] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2336.585992][T10626] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2336.586014][T10626] alloc_worker+0x47/0x1c0 [ 2336.586029][T10626] init_rescuer.part.0+0x1f/0x190 [ 2336.586048][T10626] alloc_workqueue+0x669/0xf00 [ 2336.606169][T10626] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2336.606202][T10626] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 2336.606222][T10626] ? lockdep_init_map+0x1be/0x6d0 [ 2336.606236][T10626] ? debug_mutex_init+0x2d/0x60 [ 2336.606258][T10626] reiserfs_fill_super+0x369/0x2ea0 [ 2336.606278][T10626] ? finish_unfinished+0x1120/0x1120 [ 2336.606299][T10626] ? snprintf+0xbb/0xf0 [ 2336.606314][T10626] ? vsprintf+0x40/0x40 [ 2336.606334][T10626] ? wait_for_completion+0x440/0x440 [ 2336.627941][T10626] ? __sanitizer_cov_trace_cmp4+0x16/0x20 03:37:57 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0xffffa888}, 0x0) 03:37:57 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x88caffff00000000}}}}}}}}, 0x0) [ 2336.627962][T10626] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2336.627982][T10626] mount_bdev+0x307/0x3c0 [ 2336.628004][T10626] ? finish_unfinished+0x1120/0x1120 [ 2336.638809][T10626] get_super_block+0x35/0x40 [ 2336.638825][T10626] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2336.638846][T10626] legacy_get_tree+0xf2/0x200 [ 2336.655184][T10626] vfs_get_tree+0x123/0x450 [ 2336.655205][T10626] do_mount+0x1436/0x2c40 [ 2336.655224][T10626] ? copy_mount_string+0x40/0x40 [ 2336.655246][T10626] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2336.655257][T10626] ? copy_mount_options+0x280/0x3a0 [ 2336.655274][T10626] ksys_mount+0xdb/0x150 [ 2336.655288][T10626] __x64_sys_mount+0xbe/0x150 [ 2336.655308][T10626] do_syscall_64+0x103/0x610 [ 2336.685553][T10627] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2336.689148][T10626] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2336.689165][T10626] RIP: 0033:0x45b69a 03:37:57 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0xfffff000}, 0x0) [ 2336.724898][T10626] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2336.724907][T10626] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2336.724932][T10626] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2336.724941][T10626] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2336.724948][T10626] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2336.724955][T10626] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 03:37:57 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0xffffff7f}, 0x0) [ 2336.724963][T10626] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 [ 2336.725342][T10628] REISERFS warning (device loop3): super-6505 reiserfs_getopt: head of option "jdev" is only correct [ 2336.725342][T10628] [ 2336.805866][T10635] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2336.805866][T10635] [ 2336.885266][T10626] REISERFS warning (device loop1): reiserfs_fill_super: Cannot allocate commit workqueue [ 2337.105137][T10653] REISERFS warning (device loop3): super-6505 reiserfs_getopt: head of option "jdev" is only correct [ 2337.105137][T10653] [ 2337.107819][T10655] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2337.107819][T10655] 03:37:58 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x8906000000000000}}}}}}}}, 0x0) 03:37:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0xffffff9e}, 0x0) 03:37:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:58 executing program 1 (fault-call:0 fault-nth:96): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) 03:37:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x6c, './file0'}}]}) 03:37:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@errors_continue='errors=continue'}]}) 03:37:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0xfffffff0}, 0x0) 03:37:58 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x8dffffff00000000}}}}}}}}, 0x0) [ 2337.399678][T10665] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 03:37:58 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0xf5ffffff00000000}}}}}}}}, 0x0) 03:37:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x3000000000000}, 0x0) [ 2337.454725][T10669] REISERFS warning (device loop3): super-6505 reiserfs_getopt: head of option "jdev" is only correct [ 2337.454725][T10669] [ 2337.470816][T10664] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 [ 2337.538698][T10681] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2337.562295][T10664] FAULT_INJECTION: forcing a failure. [ 2337.562295][T10664] name failslab, interval 1, probability 0, space 0, times 0 03:37:58 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [], {0x41, 0x3, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0xfffffffffffff000}}}}}}}}, 0x0) [ 2337.589351][T10679] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2337.589351][T10679] [ 2337.610156][T10664] CPU: 0 PID: 10664 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2337.618073][T10664] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2337.628142][T10664] Call Trace: [ 2337.631445][T10664] dump_stack+0x172/0x1f0 [ 2337.635787][T10664] should_fail.cold+0xa/0x15 [ 2337.640377][T10664] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2337.646188][T10664] ? ___might_sleep+0x163/0x280 [ 2337.651041][T10664] __should_failslab+0x121/0x190 [ 2337.655975][T10664] should_failslab+0x9/0x14 [ 2337.660474][T10664] kmem_cache_alloc_trace+0x2d1/0x760 [ 2337.665864][T10664] kobject_uevent_env+0x2fb/0x1030 [ 2337.670986][T10664] kobject_uevent+0x20/0x26 [ 2337.675487][T10664] __loop_clr_fd+0x4ee/0xd60 [ 2337.680076][T10664] lo_ioctl+0x210/0x2150 [ 2337.684320][T10664] ? tomoyo_domain+0xc5/0x160 [ 2337.689004][T10664] ? lo_rw_aio+0x1120/0x1120 [ 2337.693596][T10664] blkdev_ioctl+0x6f2/0x1d10 [ 2337.698183][T10664] ? blkpg_ioctl+0xa90/0xa90 [ 2337.702776][T10664] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2337.708590][T10664] ? __fget+0x35a/0x550 [ 2337.712748][T10664] block_ioctl+0xee/0x130 [ 2337.717072][T10664] ? blkdev_fallocate+0x410/0x410 [ 2337.722136][T10664] do_vfs_ioctl+0xd6e/0x1390 [ 2337.726728][T10664] ? ioctl_preallocate+0x210/0x210 [ 2337.731842][T10664] ? __fget+0x381/0x550 [ 2337.736009][T10664] ? ksys_dup3+0x3e0/0x3e0 [ 2337.740422][T10664] ? kfree+0x173/0x230 [ 2337.744488][T10664] ? kfree+0x173/0x230 [ 2337.748562][T10664] ? tomoyo_file_ioctl+0x23/0x30 [ 2337.753498][T10664] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2337.759747][T10664] ? security_file_ioctl+0x93/0xc0 [ 2337.764878][T10664] ksys_ioctl+0xab/0xd0 [ 2337.769045][T10664] __x64_sys_ioctl+0x73/0xb0 [ 2337.773640][T10664] do_syscall_64+0x103/0x610 [ 2337.778239][T10664] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2337.784123][T10664] RIP: 0033:0x458a97 [ 2337.788018][T10664] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2337.807615][T10664] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2337.816028][T10664] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 0000000000458a97 [ 2337.823997][T10664] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 2337.831966][T10664] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 03:37:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x4000000000000}, 0x0) 03:37:58 executing program 1 (fault-call:0 fault-nth:97): syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2337.839942][T10664] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2337.847911][T10664] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 03:37:59 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x40030000000000}, 0x0) 03:37:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@jdev={'jdev', 0x3d, './file0'}, 0x6c}]}) [ 2338.095258][T10696] FAULT_INJECTION: forcing a failure. [ 2338.095258][T10696] name failslab, interval 1, probability 0, space 0, times 0 [ 2338.108035][T10700] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2338.108035][T10700] [ 2338.135056][T10696] CPU: 1 PID: 10696 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2338.142971][T10696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2338.153107][T10696] Call Trace: [ 2338.156410][T10696] dump_stack+0x172/0x1f0 [ 2338.160750][T10696] should_fail.cold+0xa/0x15 [ 2338.165351][T10696] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2338.171163][T10696] ? ___might_sleep+0x163/0x280 [ 2338.176111][T10696] __should_failslab+0x121/0x190 [ 2338.181054][T10696] should_failslab+0x9/0x14 [ 2338.185561][T10696] __kmalloc_track_caller+0x2d8/0x740 [ 2338.190937][T10696] ? lockdep_init_map+0x1be/0x6d0 [ 2338.195961][T10696] ? reiserfs_fill_super+0xb1d/0x2ea0 [ 2338.201351][T10696] kstrdup+0x3a/0x70 [ 2338.205256][T10696] reiserfs_fill_super+0xb1d/0x2ea0 [ 2338.210464][T10696] ? finish_unfinished+0x1120/0x1120 [ 2338.215755][T10696] ? snprintf+0xbb/0xf0 [ 2338.219920][T10696] ? vsprintf+0x40/0x40 [ 2338.224081][T10696] ? wait_for_completion+0x440/0x440 [ 2338.229368][T10696] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2338.235094][T10696] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2338.241351][T10696] mount_bdev+0x307/0x3c0 [ 2338.245677][T10696] ? finish_unfinished+0x1120/0x1120 [ 2338.250967][T10696] get_super_block+0x35/0x40 [ 2338.255557][T10696] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2338.260578][T10696] legacy_get_tree+0xf2/0x200 [ 2338.265253][T10696] vfs_get_tree+0x123/0x450 [ 2338.269756][T10696] do_mount+0x1436/0x2c40 [ 2338.274095][T10696] ? copy_mount_string+0x40/0x40 [ 2338.279027][T10696] ? _copy_from_user+0xdd/0x150 [ 2338.283878][T10696] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2338.290114][T10696] ? copy_mount_options+0x280/0x3a0 [ 2338.295319][T10696] ksys_mount+0xdb/0x150 [ 2338.299566][T10696] __x64_sys_mount+0xbe/0x150 [ 2338.304248][T10696] do_syscall_64+0x103/0x610 [ 2338.308840][T10696] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2338.314730][T10696] RIP: 0033:0x45b69a [ 2338.318621][T10696] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2338.338227][T10696] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2338.346634][T10696] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2338.354608][T10696] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2338.362575][T10696] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2338.370548][T10696] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2338.378515][T10696] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 [ 2338.392135][T10696] REISERFS warning (device loop1): reiserfs_fill_super: Cannot allocate memory for journal device name [ 2338.403508][T10696] ------------[ cut here ]------------ [ 2338.404353][T10705] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2338.408966][T10696] kernel BUG at fs/reiserfs/lock.c:44! [ 2338.409071][T10696] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 2338.409085][T10696] CPU: 1 PID: 10696 Comm: syz-executor.1 Not tainted 5.1.0-rc6 #79 [ 2338.409091][T10696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2338.409116][T10696] RIP: 0010:reiserfs_write_unlock+0xeb/0x110 [ 2338.454792][T10696] Code: 5d c3 e8 98 fb 85 ff 48 8d 7b 28 48 c7 83 a8 00 00 00 00 00 00 00 e8 b4 1d 25 05 e8 7f fb 85 ff 5b 41 5c 5d c3 e8 75 fb 85 ff <0f> 0b e8 5e 11 be ff eb a1 e8 77 11 be ff e9 33 ff ff ff e8 6d 11 [ 2338.474388][T10696] RSP: 0018:ffff888091f57aa8 EFLAGS: 00010246 [ 2338.480449][T10696] RAX: 0000000000040000 RBX: ffff888086304d80 RCX: ffffc90008010000 [ 2338.488411][T10696] RDX: 0000000000040000 RSI: ffffffff81ea917b RDI: ffff888086304e28 [ 2338.496373][T10696] RBP: ffff888091f57ab8 R08: 0000000000000065 R09: ffffed1015d25011 [ 2338.504345][T10696] R10: ffffed1015d25010 R11: ffff8880ae928087 R12: 00000000ffffffea [ 2338.512312][T10696] R13: ffff888057ccc900 R14: ffff888091f57c58 R15: ffff888086304d80 [ 2338.520278][T10696] FS: 00007f9f903e2700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2338.529316][T10696] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2338.535889][T10696] CR2: 000000000070d158 CR3: 000000008dd37000 CR4: 00000000001406e0 [ 2338.543855][T10696] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2338.552270][T10696] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2338.560228][T10696] Call Trace: [ 2338.563517][T10696] reiserfs_fill_super+0x2b43/0x2ea0 [ 2338.568816][T10696] ? finish_unfinished+0x1120/0x1120 [ 2338.574104][T10696] ? snprintf+0xbb/0xf0 [ 2338.578252][T10696] ? vsprintf+0x40/0x40 [ 2338.582413][T10696] ? wait_for_completion+0x440/0x440 [ 2338.587692][T10696] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2338.593411][T10696] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2338.599644][T10696] mount_bdev+0x307/0x3c0 [ 2338.603968][T10696] ? finish_unfinished+0x1120/0x1120 [ 2338.609250][T10696] get_super_block+0x35/0x40 [ 2338.613833][T10696] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 2338.618850][T10696] legacy_get_tree+0xf2/0x200 [ 2338.623523][T10696] vfs_get_tree+0x123/0x450 [ 2338.628111][T10696] do_mount+0x1436/0x2c40 [ 2338.632437][T10696] ? copy_mount_string+0x40/0x40 [ 2338.637364][T10696] ? _copy_from_user+0xdd/0x150 [ 2338.642217][T10696] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2338.648446][T10696] ? copy_mount_options+0x280/0x3a0 [ 2338.653639][T10696] ksys_mount+0xdb/0x150 [ 2338.657875][T10696] __x64_sys_mount+0xbe/0x150 [ 2338.662546][T10696] do_syscall_64+0x103/0x610 [ 2338.667131][T10696] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2338.673010][T10696] RIP: 0033:0x45b69a [ 2338.676897][T10696] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2338.696491][T10696] RSP: 002b:00007f9f903e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2338.704896][T10696] RAX: ffffffffffffffda RBX: 00007f9f903e1b40 RCX: 000000000045b69a [ 2338.712860][T10696] RDX: 00007f9f903e1ae0 RSI: 00000000200002c0 RDI: 00007f9f903e1b00 [ 2338.720830][T10696] RBP: 0000000000000000 R08: 00007f9f903e1b40 R09: 00007f9f903e1ae0 [ 2338.728792][T10696] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2338.736763][T10696] R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003 [ 2338.744731][T10696] Modules linked in: [ 2338.748780][T10696] ---[ end trace b38a85052d4516b8 ]--- [ 2338.754270][T10696] RIP: 0010:reiserfs_write_unlock+0xeb/0x110 [ 2338.760295][T10696] Code: 5d c3 e8 98 fb 85 ff 48 8d 7b 28 48 c7 83 a8 00 00 00 00 00 00 00 e8 b4 1d 25 05 e8 7f fb 85 ff 5b 41 5c 5d c3 e8 75 fb 85 ff <0f> 0b e8 5e 11 be ff eb a1 e8 77 11 be ff e9 33 ff ff ff e8 6d 11 [ 2338.779945][T10696] RSP: 0018:ffff888091f57aa8 EFLAGS: 00010246 [ 2338.786036][T10696] RAX: 0000000000040000 RBX: ffff888086304d80 RCX: ffffc90008010000 [ 2338.794014][T10696] RDX: 0000000000040000 RSI: ffffffff81ea917b RDI: ffff888086304e28 [ 2338.802039][T10696] RBP: ffff888091f57ab8 R08: 0000000000000065 R09: ffffed1015d25011 [ 2338.810133][T10696] R10: ffffed1015d25010 R11: ffff8880ae928087 R12: 00000000ffffffea [ 2338.818154][T10696] R13: ffff888057ccc900 R14: ffff888091f57c58 R15: ffff888086304d80 [ 2338.826163][T10696] FS: 00007f9f903e2700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2338.835129][T10696] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2338.841737][T10696] CR2: 000000000070d158 CR3: 000000008dd37000 CR4: 00000000001406e0 [ 2338.849760][T10696] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2338.857836][T10696] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2338.865847][T10696] Kernel panic - not syncing: Fatal exception [ 2338.872894][T10696] Kernel Offset: disabled [ 2338.877210][T10696] Rebooting in 86400 seconds..