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"], 0x1}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x2001, 0x1) 23:14:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5421, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:08 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_0\x00', 0x21}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') syz_open_pts(r0, 0x0) getdents(r1, &(0x7f0000000040)=""/46, 0x2e) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair(0x0, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) poll(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) 23:14:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\xf0', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 269.448208][ T26] audit: type=1800 audit(1549322048.301:45): pid=11198 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16826 res=0 23:14:08 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_0\x00', 0x21}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') syz_open_pts(r0, 0x0) getdents(r1, &(0x7f0000000040)=""/46, 0x2e) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) poll(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) [ 269.529903][ T26] audit: type=1804 audit(1549322048.351:46): pid=11237 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir544910227/syzkaller.YhQhXB/76/file0" dev="sda1" ino=16826 res=1 23:14:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:08 executing program 3: socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:14:08 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_0\x00', 0x21}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') syz_open_pts(r0, 0x0) getdents(r1, &(0x7f0000000040)=""/46, 0x2e) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair(0x0, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) poll(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) 23:14:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5422, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 269.683852][ T26] audit: type=1800 audit(1549322048.351:47): pid=11237 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16826 res=0 23:14:08 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") socket$xdp(0x2c, 0x3, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x84000, 0x0) close(r2) 23:14:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:08 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_0\x00', 0x21}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') syz_open_pts(r0, 0x0) getdents(r1, &(0x7f0000000040)=""/46, 0x2e) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair(0x0, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) poll(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) 23:14:08 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket$rxrpc(0x21, 0x2, 0x400000000000002) sendto$rxrpc(r2, &(0x7f0000000240)="6a42e66cb3a4356f28ca2525c27f82fad2c49ed42cbdc63d74320dc3073d17e0b41a9e10a2b276a53473100a7fba98fe3b27c3c1d31bbebdcddd70c906be25094b05924877909ac7b2b7da35a03156b0b2a1c6d52eb00ee2ed55e3fc8ad04d20f8ff585cd23e2355c0bb8c423489ec25a2b4d5392713c292cd98a3bbc9401a574311e762864b3c9dccee33f662718f76769feff5620998d6342b7d63a36312b69b99a06186c0aa49039a9492e603312864084acfc9f1ff68db4562deebecba47e9da627d76abc68a848e7fd8474a5a6b2bdb2cc40ff3a555c9579fffc75676bf1c6b2392", 0xe4, 0x40000, &(0x7f0000000080)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e22, 0x5, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1}}, 0x24) bind$rxrpc(r2, &(0x7f0000000000)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @initdev}}, 0x24) io_setup(0x8, &(0x7f0000000100)=0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) write$P9_RLERRORu(r4, &(0x7f00000003c0)=ANY=[@ANYBLOB="ff"], 0x1) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f00000000c0)=0x1, 0x4) io_submit(r3, 0x1, &(0x7f0000000600)=[&(0x7f0000000200)={0xfffffffffffffdef, 0x0, 0x0, 0x8, 0x0, r1, 0x0}]) setsockopt$inet6_MCAST_MSFILTER(r4, 0x29, 0x30, &(0x7f0000000400)={0x7fff, {{0xa, 0x4e23, 0xfffffffffffffffe, @dev={0xfe, 0x80, [], 0xa}, 0x5}}, 0x0, 0x2, [{{0xa, 0x4e21, 0xffffffff, @dev={0xfe, 0x80, [], 0x1a}, 0x200}}, {{0xa, 0x4e21, 0x8, @remote, 0x800}}]}, 0x190) 23:14:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5423, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:08 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8910, &(0x7f00000000c0)={'veth1_to_bond\x00', 0x0}) close(r2) close(r1) 23:14:09 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_0\x00', 0x21}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') syz_open_pts(r0, 0x0) getdents(r1, &(0x7f0000000040)=""/46, 0x2e) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair(0x1, 0x0, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) poll(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) 23:14:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:09 executing program 3: socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:14:09 executing program 0: futex(&(0x7f0000000080), 0x5, 0x0, 0x0, &(0x7f0000000280), 0x5000000) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x40000, 0x0) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000180)={'netdevsim0\x00', 0x2}) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$setstatus(r1, 0x4, 0x467ff) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r3, 0x84, 0x4, &(0x7f00000001c0), &(0x7f00000000c0)=0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0xfffffffffffffc01, 0x0) 23:14:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:09 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x8000009) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) capget(&(0x7f00000001c0)={0x0, r2}, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) r5 = dup(r4) fsync(r1) ioctl$ASHMEM_SET_PROT_MASK(r5, 0x40087705, &(0x7f0000000540)={0x8}) fcntl$lock(r0, 0x7, &(0x7f0000000340)={0x800000001, 0x0, 0x5, 0xffffffff80000000, r2}) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000000c0)='syzkaller1\x00', 0xfffffffffffffdb5) io_setup(0x20, &(0x7f0000000300)=0x0) io_cancel(r6, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x8, 0x423, r5, &(0x7f00000005c0)="f2f42245d196f91a48f2b821d3442e277a43f0ca0ad8ed1b65a81f934bc9a4fdca52f744ec264514eba836b2ca9b2e580d83a0ab4e20c5f62b71ca27af042df6ea32e6c5c9369755e64b56aec0188ec11bcea89595863c737ff8c0f248ad0d9201ff46962f0087fc1990817fdbaf8c2d3ca9a833872d38e2a9005b2e2903904e622869", 0x83, 0xf, 0x0, 0x0, r5}, 0x0) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000400)={'veth1_to_team\x00', 0x200}) setsockopt$inet6_tcp_int(r5, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r4, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r7 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r7, 0x2007fff) sendfile(r5, r7, 0x0, 0x8000fffffffe) 23:14:09 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_0\x00', 0x21}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') syz_open_pts(r0, 0x0) getdents(r1, &(0x7f0000000040)=""/46, 0x2e) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair(0x1, 0x0, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) poll(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) 23:14:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5450, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:09 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000004c0)='ext2\x00L\x86\x14\xf9\xfc/\x8b\xe7\xffl4?(g\x84OK\xcc\x1eM\xfc\xa4\xf8\x1d\x88\xd2\x89\xaf\xd2\r\xc6+\x88#P\xa2F#\r\xaa\xba\xb4A\x84\xac\xde\xf9*\xe5\x05\xf5N\b\x8b\xe2\x91P\x92a\f\x8f+\x80w\xda\xb8\xf7#i\x00,z\xfe\xfe\x81\xd2x\x83uAh\x94tQ\xc9s9\xf3\x9d\xaf\xcen\v\x19\x1eZ\xcf\xdc\xd8h\x9co\x02=\xae{|\x12\x9ep\xd5\x94\xba\xa6*@\xa3\xd6\xdf\x10\xa3\xb09\xa3K\xe2\xcfP\x01\xcb\xe7\xfc&\xb6\x1c\x90\xb3L\x9bf\xf1\xeb\xad\xea(\xdb:\n\xc2\xbd\xbd&\xc99\x9d\x84\rm\x91\xfc9\x86\xce_\x83V\a?@\fQ\xcd\xf7\x93\xe7Q\x04\xabS0xffffffffffffffff}) poll(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) [ 270.471738][T11576] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 23:14:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5451, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:09 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x1) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0xfffffffffffffffd) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r0, 0x3, 0xe0ff, 0xfff9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000000c0)=0x6) 23:14:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:09 executing program 3: socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:14:09 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_0\x00', 0x21}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') syz_open_pts(r0, 0x0) getdents(r1, &(0x7f0000000040)=""/46, 0x2e) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair(0x1, 0x5, 0x0, 0x0) poll(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) 23:14:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:09 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x8000009) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) capget(&(0x7f00000001c0)={0x0, r2}, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) r5 = dup(r4) fsync(r1) ioctl$ASHMEM_SET_PROT_MASK(r5, 0x40087705, &(0x7f0000000540)={0x8}) fcntl$lock(r0, 0x7, &(0x7f0000000340)={0x800000001, 0x0, 0x5, 0xffffffff80000000, r2}) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000000c0)='syzkaller1\x00', 0xfffffffffffffdb5) io_setup(0x20, &(0x7f0000000300)=0x0) io_cancel(r6, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x8, 0x423, r5, &(0x7f00000005c0)="f2f42245d196f91a48f2b821d3442e277a43f0ca0ad8ed1b65a81f934bc9a4fdca52f744ec264514eba836b2ca9b2e580d83a0ab4e20c5f62b71ca27af042df6ea32e6c5c9369755e64b56aec0188ec11bcea89595863c737ff8c0f248ad0d9201ff46962f0087fc1990817fdbaf8c2d3ca9a833872d38e2a9005b2e2903904e622869", 0x83, 0xf, 0x0, 0x0, r5}, 0x0) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000400)={'veth1_to_team\x00', 0x200}) setsockopt$inet6_tcp_int(r5, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r4, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r7 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r7, 0x2007fff) sendfile(r5, r7, 0x0, 0x8000fffffffe) 23:14:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0 ', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:09 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, 0x0, 0x0) 23:14:09 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_0\x00', 0x21}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') syz_open_pts(r0, 0x0) getdents(r1, &(0x7f0000000040)=""/46, 0x2e) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair(0x1, 0x5, 0x0, 0x0) poll(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) 23:14:09 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_0\x00', 0x21}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') syz_open_pts(r0, 0x0) getdents(r1, &(0x7f0000000040)=""/46, 0x2e) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair(0x1, 0x5, 0x0, 0x0) poll(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) 23:14:10 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_0\x00', 0x21}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') syz_open_pts(r0, 0x0) getdents(r1, &(0x7f0000000040)=""/46, 0x2e) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair(0x1, 0x5, 0x0, 0x0) poll(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) 23:14:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5460, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:10 executing program 3: socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:14:10 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_0\x00', 0x21}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') syz_open_pts(r0, 0x0) getdents(r1, &(0x7f0000000040)=""/46, 0x2e) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)) poll(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) 23:14:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:10 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x8000009) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) capget(&(0x7f00000001c0)={0x0, r2}, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) r5 = dup(r4) fsync(r1) ioctl$ASHMEM_SET_PROT_MASK(r5, 0x40087705, &(0x7f0000000540)={0x8}) fcntl$lock(r0, 0x7, &(0x7f0000000340)={0x800000001, 0x0, 0x5, 0xffffffff80000000, r2}) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000000c0)='syzkaller1\x00', 0xfffffffffffffdb5) io_setup(0x20, &(0x7f0000000300)=0x0) io_cancel(r6, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x8, 0x423, r5, &(0x7f00000005c0)="f2f42245d196f91a48f2b821d3442e277a43f0ca0ad8ed1b65a81f934bc9a4fdca52f744ec264514eba836b2ca9b2e580d83a0ab4e20c5f62b71ca27af042df6ea32e6c5c9369755e64b56aec0188ec11bcea89595863c737ff8c0f248ad0d9201ff46962f0087fc1990817fdbaf8c2d3ca9a833872d38e2a9005b2e2903904e622869", 0x83, 0xf, 0x0, 0x0, r5}, 0x0) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000400)={'veth1_to_team\x00', 0x200}) setsockopt$inet6_tcp_int(r5, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r4, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r7 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r7, 0x2007fff) sendfile(r5, r7, 0x0, 0x8000fffffffe) 23:14:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x10', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x54a0, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:10 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_0\x00', 0x21}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') syz_open_pts(r0, 0x0) getdents(r1, &(0x7f0000000040)=""/46, 0x2e) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)) poll(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) 23:14:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:10 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_0\x00', 0x21}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') syz_open_pts(r0, 0x0) getdents(r1, &(0x7f0000000040)=""/46, 0x2e) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)) poll(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) 23:14:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x54a1, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:11 executing program 3: socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:14:11 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_0\x00', 0x21}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') syz_open_pts(r0, 0x0) getdents(r1, &(0x7f0000000040)=""/46, 0x2e) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) poll(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, 0x0) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) 23:14:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) rt_sigpending(&(0x7f00000000c0), 0x8) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000001031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) sched_getaffinity(r1, 0x8, &(0x7f0000000080)) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) 23:14:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:14:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x54a2, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x5452, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:14:11 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_0\x00', 0x21}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') syz_open_pts(r0, 0x0) getdents(r1, &(0x7f0000000040)=""/46, 0x2e) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) poll(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, 0x0) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) 23:14:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\xc0', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x5452, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:14:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x54a3, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:12 executing program 3: socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:14:12 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_0\x00', 0x21}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') syz_open_pts(r0, 0x0) getdents(r1, &(0x7f0000000040)=""/46, 0x2e) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) poll(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, 0x0) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) 23:14:12 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000780)={0x30}, 0x30) 23:14:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x5452, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:14:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40045402, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:14:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\xff', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:12 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x3310, 0x0) 23:14:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) r2 = dup2(r0, r1) open$dir(0x0, 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) write$P9_RVERSION(r2, 0x0, 0x0) 23:14:12 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x5452, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:14:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40049409, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:12 executing program 3: socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000340), 0x10000014c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:14:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x0f', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") socketpair$unix(0x1, 0x200000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) close(r1) socket$rxrpc(0x21, 0x2, 0xa) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r1, 0x0, 0x8, 0x0) close(r1) vmsplice(r3, &(0x7f0000000080)=[{&(0x7f0000000100)="fc", 0x1}], 0x1, 0x0) 23:14:12 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x5452, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:14:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x4020940d, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:12 executing program 4: mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents(r0, &(0x7f0000000040)=""/124, 0x24) 23:14:13 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x5452, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:14:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\xfe', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:13 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x8, 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB='\x00 ']], 0x0, 0x0, 0x0}) 23:14:13 executing program 3: socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000340), 0x10000014c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:14:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bc070") r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'veth1_to_bridge\x00'}) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="000000000c000000000000000800010007667100c649bba059ab562b32ab4575514800020000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000"], 0x1}}, 0x0) 23:14:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345402, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 274.338959][T12913] binder: 12912:12913 unknown command 536871488 23:14:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:13 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x5452, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) [ 274.383419][T12913] binder: 12912:12913 ioctl c0306201 20000440 returned -22 23:14:13 executing program 3: socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000340), 0x10000014c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 274.437038][T12924] binder_alloc: binder_alloc_mmap_handler: 12912 20001000-20004000 already mapped failed -16 23:14:13 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x109, 0x0, 0x0, {}, [@IFLA_IFALIAS={0x14, 0x14, 'bcsf0\x00'}, @IFLA_GROUP={0x8}]}, 0x3c}}, 0x0) 23:14:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 274.480705][T12913] binder: BINDER_SET_CONTEXT_MGR already set [ 274.504532][T12913] binder: 12912:12913 ioctl 40046207 0 returned -16 23:14:13 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x5452, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:14:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345403, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:13 executing program 3: socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000000c0)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 274.605711][T12995] binder: 12912:12995 unknown command 536871488 [ 274.640834][T13004] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 274.681602][T12995] binder: 12912:12995 ioctl c0306201 20000440 returned -22 23:14:13 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) getpid() sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)=@newlink={0x58, 0x10, 0x109, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_PHYS_PORT_ID={0x18, 0x22, "55d3ec18823736367ec91b8c417fdac87d1079"}, @IFLA_EVENT={0x8, 0x2c, 0x10001}, @IFLA_GROUP={0x8}, @IFLA_CARRIER_CHANGES={0x8, 0x23, 0x8000}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x4}]}, 0x58}}, 0x0) 23:14:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:13 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x5452, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:14:13 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'veth0\x00', 0x201a}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0\x00\x00\x00\x00\x00\b\x00', 0x0}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000180)={r3, 0x1, 0x6, @local}, 0x10) dup2(r4, r1) 23:14:13 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x5452, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:14:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 274.885309][T13092] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:14:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345404, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 274.969439][T13165] device veth0 entered promiscuous mode 23:14:13 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x5452, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) [ 275.035221][T13172] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 275.086403][T13162] device veth0 left promiscuous mode 23:14:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:13 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:14:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345405, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 275.223391][T13284] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 275.309181][T13284] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:14:14 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x1000000000003ff, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000280)={0x9}) 23:14:14 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x5452, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:14:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345406, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:14 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:14:14 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:14:14 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:14:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:14:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 275.635729][T13407] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:14:14 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:14:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:14:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345407, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 275.874879][T13531] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:14:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:14:14 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:14:14 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 276.118585][T13652] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:14:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:14:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\xff', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345408, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:15 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:14:15 executing program 3: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x10000014c) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x8200) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:14:15 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:14:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\xff', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:14:15 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:14:15 executing program 3: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x10000014c) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x8200) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:14:15 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:14:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345409, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:14:15 executing program 3: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x10000014c) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x8200) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:14:15 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:14:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:14:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:15 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) 23:14:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:14:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x4034540a, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:15 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000340), 0x10000014c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:14:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:16 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:14:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:14:16 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:14:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x4034540b, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c12") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:14:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:16 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) 23:14:16 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:14:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x4034540c, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:16 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000340), 0x10000014c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:14:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c12") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:14:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c12") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:14:17 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:14:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x4034540d, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:14:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 278.266327][T14313] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 23:14:17 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) 23:14:17 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:14:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:14:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x4034540e, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:17 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000340), 0x10000014c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:14:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) [ 278.899594][T14440] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 23:14:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:17 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:14:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a0") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:14:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345411, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a0") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) [ 279.126014][T14563] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 23:14:18 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) tkill(r0, 0x16) 23:14:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a0") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:14:18 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 23:14:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345412, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:18 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, 0x0, 0x0) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:14:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 279.785785][T14682] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 23:14:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:14:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x4034542f, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:18 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 23:14:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) [ 280.085880][T14863] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 23:14:21 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) tkill(r0, 0x16) 23:14:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:14:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40485404, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:21 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 23:14:21 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, 0x0, 0x0) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:14:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x5452, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) [ 282.899021][T14930] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 23:14:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\xff', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:21 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x400}], 0x0, 0x0) 23:14:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x5452, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:14:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40505412, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 283.135083][T15053] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 23:14:24 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) tkill(r0, 0x16) 23:14:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x5452, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:14:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\xff', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:24 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x400}], 0x0, 0x0) 23:14:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x80045400, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:24 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, 0x0, 0x0) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:14:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, 0x0) 23:14:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\xff', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 285.942641][T15173] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 23:14:24 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x400}], 0x0, 0x0) 23:14:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x80605414, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, 0x0) 23:14:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\xff', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 286.165868][T15298] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 23:14:27 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') dup2(r1, r2) tkill(r0, 0x16) 23:14:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, 0x0) 23:14:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x80e85411, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:27 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240), 0x0, 0x400}], 0x0, 0x0) 23:14:27 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\xff', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:27 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(0x0, 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:14:27 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\xff', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x0, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) [ 288.995260][T15417] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 23:14:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0xc0045878, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:28 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') dup2(r1, r2) tkill(r0, 0x16) 23:14:28 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240), 0x0, 0x400}], 0x0, 0x0) 23:14:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x0, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:14:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x0, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) [ 289.353536][T15597] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 23:14:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0xc0045878, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:28 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(0x0, 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:14:28 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') dup2(r1, r2) tkill(r0, 0x16) 23:14:28 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240), 0x0, 0x400}], 0x0, 0x0) 23:14:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:14:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0xc0145401, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 289.716430][T15787] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 23:14:28 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:14:28 executing program 0: 23:14:28 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000", 0x1d, 0x400}], 0x0, 0x0) 23:14:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\xf9', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:28 executing program 0: 23:14:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0xc0189436, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 289.944469][T15866] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 23:14:29 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(0x0, 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:14:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:29 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000", 0x1d, 0x400}], 0x0, 0x0) 23:14:29 executing program 0: 23:14:29 executing program 0: 23:14:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0xc020660b, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 290.189738][T16020] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 23:14:29 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:14:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x7f', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:29 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000", 0x1d, 0x400}], 0x0, 0x0) 23:14:29 executing program 0: 23:14:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0xc0505405, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:29 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:14:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x8c', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:29 executing program 0: [ 290.704046][T16154] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 23:14:29 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdb", 0x2c, 0x400}], 0x0, 0x0) 23:14:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0xc0f85403, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\xf4', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:29 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x3314, 0x0) [ 290.998849][T16279] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 23:14:30 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:14:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\xf5', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:30 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdb", 0x2c, 0x400}], 0x0, 0x0) 23:14:30 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0}, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000140)={0x20, 0x200, 0x4000}, 0x10) r1 = syz_open_procfs(r0, &(0x7f00000001c0)='net/softnet_stat\x00') ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000200)={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x20}}, {0x306, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x8, {0x2, 0x4e24, @multicast2}, 'bond0\x00'}) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') ioctl$RTC_IRQP_READ(r2, 0x8008700b, &(0x7f0000000280)) preadv(r2, &(0x7f0000000700), 0x31f, 0x10400003) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e21, @multicast2}, 0x10) syz_genetlink_get_family_id$team(0x0) 23:14:30 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:14:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x2, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\xf6', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 291.556356][T16399] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 23:14:30 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdb", 0x2c, 0x400}], 0x0, 0x0) 23:14:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\xfb', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x3, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:30 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@nodots='nodots'}, {@fat=@fmask={'fmask'}}], [{@smackfsroot={'smackfsroot', 0x3d, 'L#[mime_typewlan1ppp0'}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}]}) [ 291.790549][T16521] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 23:14:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 291.881676][T16534] FAT-fs (loop0): Unrecognized mount option "smackfsroot=L#[mime_typewlan1ppp0" or missing value [ 291.968977][T16634] FAT-fs (loop0): Unrecognized mount option "smackfsroot=L#[mime_typewlan1ppp0" or missing value 23:14:31 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:14:31 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe", 0x33, 0x400}], 0x0, 0x0) 23:14:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x9, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:31 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x1) 23:14:31 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:14:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 292.440004][T16654] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 23:14:31 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe", 0x33, 0x400}], 0x0, 0x0) 23:14:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x12, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:31 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x1) 23:14:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 292.611789][T16773] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 23:14:31 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe", 0x33, 0x400}], 0x0, 0x0) [ 292.851971][T16894] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 23:14:34 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:14:34 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 23:14:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x63, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:34 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:14:34 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ff", 0x37, 0x400}], 0x0, 0x0) 23:14:34 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 295.492468][T16908] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 23:14:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\xff', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:34 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ff", 0x37, 0x400}], 0x0, 0x0) 23:14:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x2, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:34 executing program 0 (fault-call:3 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) [ 295.759533][T17038] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 295.770455][T17042] FAULT_INJECTION: forcing a failure. [ 295.770455][T17042] name failslab, interval 1, probability 0, space 0, times 0 [ 295.795596][T17042] CPU: 0 PID: 17042 Comm: syz-executor0 Not tainted 5.0.0-rc4-next-20190201 #25 [ 295.804635][T17042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 295.804643][T17042] Call Trace: [ 295.804669][T17042] dump_stack+0x172/0x1f0 [ 295.804699][T17042] should_fail.cold+0xa/0x15 [ 295.804725][T17042] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 295.804744][T17042] ? lock_downgrade+0x880/0x880 [ 295.804766][T17042] ? ___might_sleep+0x163/0x280 [ 295.804802][T17042] __should_failslab+0x121/0x190 [ 295.818140][T17042] should_failslab+0x9/0x14 [ 295.818157][T17042] kmem_cache_alloc+0x2be/0x710 [ 295.818177][T17042] ? lock_downgrade+0x880/0x880 [ 295.861585][T17042] fasync_helper+0x40/0xb2 [ 295.866051][T17042] ? snd_timer_global_register+0xc0/0xc0 [ 295.871682][T17042] snd_timer_user_fasync+0x54/0x70 [ 295.876786][T17042] do_vfs_ioctl+0xb8e/0x1390 [ 295.881369][T17042] ? ioctl_preallocate+0x210/0x210 [ 295.886475][T17042] ? __fget+0x367/0x540 [ 295.890614][T17042] ? ksys_dup3+0x3e0/0x3e0 [ 295.895009][T17042] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 295.901232][T17042] ? fput+0x128/0x1a0 [ 295.905200][T17042] ? security_file_ioctl+0x93/0xc0 [ 295.910290][T17042] ksys_ioctl+0xab/0xd0 [ 295.914425][T17042] __x64_sys_ioctl+0x73/0xb0 [ 295.919003][T17042] do_syscall_64+0x103/0x610 [ 295.923580][T17042] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 295.929447][T17042] RIP: 0033:0x457e39 [ 295.933320][T17042] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 295.952902][T17042] RSP: 002b:00007fdf23937c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 295.961293][T17042] RAX: ffffffffffffffda RBX: 00007fdf23937c90 RCX: 0000000000457e39 [ 295.969247][T17042] RDX: 0000000020000080 RSI: 0000000000005452 RDI: 0000000000000004 [ 295.977195][T17042] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 295.985142][T17042] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdf239386d4 [ 295.993092][T17042] R13: 00000000004cad70 R14: 00000000004d44f0 R15: 0000000000000005 23:14:37 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:14:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:37 executing program 0 (fault-call:3 fault-nth:1): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:14:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x3, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:37 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ff", 0x37, 0x400}], 0x0, 0x0) 23:14:37 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 298.508782][T17150] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 23:14:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:37 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53", 0x39, 0x400}], 0x0, 0x0) 23:14:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:14:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x4, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x2, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) [ 298.677676][T17257] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 23:14:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x5, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:40 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53", 0x39, 0x400}], 0x0, 0x0) 23:14:40 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:14:40 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:14:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5421, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:14:40 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5450, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:14:40 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\xff', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 301.588806][T17405] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 23:14:40 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53", 0x39, 0x400}], 0x0, 0x0) 23:14:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x6, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:40 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5451, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) [ 301.781389][T17531] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 23:14:40 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a}], 0x0, 0x0) 23:14:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5460, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) [ 301.991080][T17561] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 23:14:43 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:14:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x7, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40049409, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:14:43 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a}], 0x0, 0x0) 23:14:43 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x10, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:14:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 304.659566][T17670] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 23:14:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x4020940d, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:14:43 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a}], 0x0, 0x0) 23:14:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0xa, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0xc0045878, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) [ 304.945359][T17794] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 23:14:46 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:14:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:46 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x10, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:14:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x10, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0xc0045878, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:14:46 executing program 4 (fault-call:0 fault-nth:0): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 307.724213][T17914] FAULT_INJECTION: forcing a failure. [ 307.724213][T17914] name failslab, interval 1, probability 0, space 0, times 0 [ 307.774367][T17914] CPU: 0 PID: 17914 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 307.783439][T17914] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.793498][T17914] Call Trace: [ 307.796801][T17914] dump_stack+0x172/0x1f0 [ 307.796829][T17914] should_fail.cold+0xa/0x15 [ 307.796851][T17914] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 307.796877][T17914] ? lock_downgrade+0x880/0x880 [ 307.805765][T17914] ? ___might_sleep+0x163/0x280 [ 307.805786][T17914] __should_failslab+0x121/0x190 [ 307.805805][T17914] should_failslab+0x9/0x14 [ 307.805820][T17914] __kmalloc+0x2dc/0x740 [ 307.805843][T17914] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 307.841163][T17914] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 307.841181][T17914] ? strnlen_user+0x1f0/0x280 [ 307.841216][T17914] ? __x64_sys_memfd_create+0x13c/0x470 [ 307.857629][T17914] __x64_sys_memfd_create+0x13c/0x470 [ 307.857647][T17914] ? memfd_fcntl+0x1550/0x1550 [ 307.857664][T17914] ? do_syscall_64+0x26/0x610 [ 307.857680][T17914] ? lockdep_hardirqs_on+0x418/0x5d0 [ 307.857736][T17914] ? trace_hardirqs_on+0x67/0x230 [ 307.882756][T17914] do_syscall_64+0x103/0x610 [ 307.887353][T17914] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 307.893251][T17914] RIP: 0033:0x457e39 [ 307.897150][T17914] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 307.916752][T17914] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 23:14:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0xc0189436, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:14:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0xc020660b, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:14:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20000, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) [ 307.925168][T17914] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000457e39 [ 307.933142][T17914] RDX: 0000000020000058 RSI: 0000000000000000 RDI: 00000000004bce47 [ 307.941113][T17914] RBP: 000000000073bf00 R08: 0000000020000058 R09: 00000000fbad8001 [ 307.949087][T17914] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007f77e26b76d4 [ 307.957061][T17914] R13: 00000000004c65f7 R14: 00000000004dba08 R15: 0000000000000003 23:14:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) syz_open_dev$radio(&(0x7f00000002c0)='/dev/radio#\x00', 0x3, 0x2) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x3}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000200)={0x0, @multicast2}, &(0x7f0000000240)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'vlan0\x00', r2}) clock_nanosleep(0x2, 0x0, &(0x7f00000001c0), 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000000c0)={{{@in6=@initdev, @in=@local}}, {{}, 0x0, @in6}}, &(0x7f0000000000)=0xe8) 23:14:49 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:14:49 executing program 4 (fault-call:0 fault-nth:1): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:14:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x48, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:49 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000000)=0x54) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:14:49 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x10, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 310.759492][T18069] FAULT_INJECTION: forcing a failure. [ 310.759492][T18069] name failslab, interval 1, probability 0, space 0, times 0 [ 310.799070][T18069] CPU: 1 PID: 18069 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 310.808112][T18069] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 310.818170][T18069] Call Trace: [ 310.821488][T18069] dump_stack+0x172/0x1f0 [ 310.825842][T18069] should_fail.cold+0xa/0x15 [ 310.830439][T18069] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 310.836249][T18069] ? lock_downgrade+0x880/0x880 [ 310.841111][T18069] ? ___might_sleep+0x163/0x280 [ 310.845972][T18069] __should_failslab+0x121/0x190 [ 310.850924][T18069] should_failslab+0x9/0x14 [ 310.855435][T18069] kmem_cache_alloc+0x2be/0x710 [ 310.860292][T18069] ? __alloc_fd+0x430/0x530 [ 310.864815][T18069] ? shmem_destroy_callback+0xc0/0xc0 [ 310.870186][T18069] shmem_alloc_inode+0x1c/0x50 [ 310.874981][T18069] alloc_inode+0x66/0x190 [ 310.879305][T18069] new_inode_pseudo+0x19/0xf0 [ 310.883973][T18069] new_inode+0x1f/0x40 [ 310.888046][T18069] shmem_get_inode+0x84/0x780 [ 310.892721][T18069] __shmem_file_setup.part.0+0x7e/0x2b0 [ 310.898250][T18069] shmem_file_setup+0x66/0x90 [ 310.902906][T18069] __x64_sys_memfd_create+0x2a2/0x470 [ 310.908272][T18069] ? memfd_fcntl+0x1550/0x1550 [ 310.913045][T18069] ? do_syscall_64+0x26/0x610 [ 310.917751][T18069] ? lockdep_hardirqs_on+0x418/0x5d0 [ 310.923049][T18069] ? trace_hardirqs_on+0x67/0x230 [ 310.928082][T18069] do_syscall_64+0x103/0x610 [ 310.932680][T18069] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 310.938576][T18069] RIP: 0033:0x457e39 23:14:49 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x3, &(0x7f0000000200)="00000000000000bdb5027c323bd24972184ad200000000") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xff, 0x101000) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r2, &(0x7f00000003c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x41044102}, 0xc, &(0x7f0000000340)={&(0x7f00000005c0)=ANY=[@ANYPTR, @ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRESOCT=r2, @ANYRES16=r3], @ANYRESDEC=r2, @ANYRES32=r3, @ANYRES64=r1, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64=&(0x7f0000000500)=ANY=[@ANYPTR, @ANYPTR64, @ANYPTR, @ANYRESDEC=r0], @ANYRES16=r3, @ANYRES32, @ANYPTR64=&(0x7f0000000140)=ANY=[@ANYBLOB="2f0b9c6776c40f6724b9489ef18adb6c80465410553301d8f2e284d3e1e82fdc71fcaae8a0d266341a4eac82c5c51766f6c9b29acb58d2070c5d84b1caceb2f02493df5f1d84a26cee5989feeff639353d1148b1d5aee082a0de1176f55ffd6d9ee2be108d695676f0182c12574bfdbc768043691565e1", @ANYRESDEC=r1]]], 0x6}}, 0x4000) [ 310.942475][T18069] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 310.962085][T18069] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 310.970498][T18069] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000457e39 [ 310.978469][T18069] RDX: 0000000020000058 RSI: 0000000000000000 RDI: 00000000004bce47 [ 310.986458][T18069] RBP: 000000000073bf00 R08: 0000000020000058 R09: 00000000fbad8001 [ 310.994429][T18069] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007f77e26b76d4 [ 311.002400][T18069] R13: 00000000004c65f7 R14: 00000000004dba08 R15: 0000000000000003 23:14:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x4c, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:49 executing program 4 (fault-call:0 fault-nth:2): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:14:49 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:50 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 311.177978][T18235] FAULT_INJECTION: forcing a failure. [ 311.177978][T18235] name failslab, interval 1, probability 0, space 0, times 0 [ 311.240079][T18235] CPU: 0 PID: 18235 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 311.249130][T18235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 311.259190][T18235] Call Trace: [ 311.262498][T18235] dump_stack+0x172/0x1f0 [ 311.266844][T18235] should_fail.cold+0xa/0x15 [ 311.271451][T18235] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 311.277265][T18235] ? lock_downgrade+0x880/0x880 [ 311.282129][T18235] ? ___might_sleep+0x163/0x280 [ 311.286984][T18235] __should_failslab+0x121/0x190 [ 311.291922][T18235] should_failslab+0x9/0x14 [ 311.291939][T18235] kmem_cache_alloc+0x2be/0x710 [ 311.291952][T18235] ? current_time+0x6b/0x140 [ 311.292030][T18235] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 311.292051][T18235] ? lockdep_hardirqs_on+0x418/0x5d0 [ 311.301377][T18235] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 311.301401][T18235] ? timespec64_trunc+0xf0/0x180 [ 311.301427][T18235] __d_alloc+0x2e/0x8c0 [ 311.301455][T18235] d_alloc_pseudo+0x1e/0x30 [ 311.311819][T18235] alloc_file_pseudo+0xe2/0x280 [ 311.311838][T18235] ? alloc_file+0x4d0/0x4d0 [ 311.311855][T18235] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 311.311882][T18235] __shmem_file_setup.part.0+0x108/0x2b0 [ 311.311904][T18235] shmem_file_setup+0x66/0x90 [ 311.362804][T18235] __x64_sys_memfd_create+0x2a2/0x470 [ 311.368181][T18235] ? memfd_fcntl+0x1550/0x1550 [ 311.372956][T18235] ? do_syscall_64+0x26/0x610 [ 311.377642][T18235] ? lockdep_hardirqs_on+0x418/0x5d0 [ 311.382935][T18235] ? trace_hardirqs_on+0x67/0x230 [ 311.387970][T18235] do_syscall_64+0x103/0x610 [ 311.392572][T18235] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 311.398463][T18235] RIP: 0033:0x457e39 [ 311.402364][T18235] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 311.422046][T18235] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 311.430457][T18235] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000457e39 [ 311.438441][T18235] RDX: 0000000020000058 RSI: 0000000000000000 RDI: 00000000004bce47 [ 311.446423][T18235] RBP: 000000000073bf00 R08: 0000000020000058 R09: 00000000fbad8001 [ 311.454402][T18235] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007f77e26b76d4 [ 311.454418][T18235] R13: 00000000004c65f7 R14: 00000000004dba08 R15: 0000000000000003 23:14:52 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:14:52 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x3, 0x2) bind$pptp(r0, &(0x7f0000000180)={0x18, 0x2, {0x1, @loopback}}, 0x1e) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000200)=[@in={0x2, 0x4e24, @broadcast}], 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) sched_setattr(r2, &(0x7f00000000c0)={0x30, 0x3, 0x1, 0x5, 0xcde, 0x8, 0x8e99, 0x4}, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x399754a0c49b4a6, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x203ff, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) r4 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r4, 0x5452, &(0x7f0000000080)={{0x1, 0x0, 0x8, 0xfffffffffffffffc}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r3, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r5, 0x800, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x3f}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x24048800) 23:14:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x68, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:52 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:14:52 executing program 4 (fault-call:0 fault-nth:3): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 313.832259][T18319] FAULT_INJECTION: forcing a failure. [ 313.832259][T18319] name failslab, interval 1, probability 0, space 0, times 0 [ 313.869572][T18319] CPU: 1 PID: 18319 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 23:14:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1, 0x0, 0x10000000000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) [ 313.878609][T18319] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.888672][T18319] Call Trace: [ 313.891979][T18319] dump_stack+0x172/0x1f0 [ 313.896322][T18319] should_fail.cold+0xa/0x15 [ 313.900931][T18319] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 313.906742][T18319] ? lock_downgrade+0x880/0x880 [ 313.906761][T18319] ? ___might_sleep+0x163/0x280 [ 313.906781][T18319] __should_failslab+0x121/0x190 [ 313.906805][T18319] should_failslab+0x9/0x14 [ 313.925898][T18319] kmem_cache_alloc+0x2be/0x710 [ 313.930765][T18319] __alloc_file+0x27/0x300 [ 313.930786][T18319] alloc_empty_file+0x72/0x170 [ 313.930805][T18319] alloc_file+0x5e/0x4d0 [ 313.930825][T18319] alloc_file_pseudo+0x189/0x280 [ 313.930843][T18319] ? alloc_file+0x4d0/0x4d0 [ 313.930864][T18319] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 313.959884][T18319] __shmem_file_setup.part.0+0x108/0x2b0 [ 313.965548][T18319] shmem_file_setup+0x66/0x90 [ 313.970233][T18319] __x64_sys_memfd_create+0x2a2/0x470 [ 313.975616][T18319] ? memfd_fcntl+0x1550/0x1550 23:14:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) connect(r0, &(0x7f00000001c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha1\x00'}, 0x80) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f00000000c0)="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") ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) [ 313.980399][T18319] ? do_syscall_64+0x26/0x610 [ 313.985087][T18319] ? lockdep_hardirqs_on+0x418/0x5d0 [ 313.990414][T18319] ? trace_hardirqs_on+0x67/0x230 [ 313.995470][T18319] do_syscall_64+0x103/0x610 [ 314.000079][T18319] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 314.005974][T18319] RIP: 0033:0x457e39 [ 314.009904][T18319] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 23:14:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x6c, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 314.029508][T18319] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 314.029524][T18319] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000457e39 [ 314.029533][T18319] RDX: 0000000020000058 RSI: 0000000000000000 RDI: 00000000004bce47 [ 314.029552][T18319] RBP: 000000000073bf00 R08: 0000000020000058 R09: 00000000fbad8001 [ 314.045900][T18319] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007f77e26b76d4 [ 314.045916][T18319] R13: 00000000004c65f7 R14: 00000000004dba08 R15: 0000000000000003 23:14:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:53 executing program 4 (fault-call:0 fault-nth:4): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 314.354266][T18553] FAULT_INJECTION: forcing a failure. [ 314.354266][T18553] name failslab, interval 1, probability 0, space 0, times 0 [ 314.373050][T18553] CPU: 0 PID: 18553 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 314.382124][T18553] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 314.392193][T18553] Call Trace: [ 314.395496][T18553] dump_stack+0x172/0x1f0 [ 314.399809][T18553] should_fail.cold+0xa/0x15 [ 314.404381][T18553] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 314.410198][T18553] ? lock_downgrade+0x880/0x880 [ 314.415075][T18553] ? ___might_sleep+0x163/0x280 [ 314.419923][T18553] __should_failslab+0x121/0x190 [ 314.424857][T18553] should_failslab+0x9/0x14 [ 314.429348][T18553] kmem_cache_alloc+0x2be/0x710 [ 314.434196][T18553] ? __alloc_file+0x27/0x300 [ 314.438786][T18553] ? rcu_read_lock_sched_held+0x110/0x130 [ 314.444495][T18553] ? kmem_cache_alloc+0x341/0x710 [ 314.449513][T18553] security_file_alloc+0x39/0x170 [ 314.454540][T18553] __alloc_file+0xac/0x300 [ 314.458946][T18553] alloc_empty_file+0x72/0x170 [ 314.463692][T18553] alloc_file+0x5e/0x4d0 [ 314.467928][T18553] alloc_file_pseudo+0x189/0x280 [ 314.472856][T18553] ? alloc_file+0x4d0/0x4d0 [ 314.477364][T18553] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 314.483597][T18553] __shmem_file_setup.part.0+0x108/0x2b0 [ 314.489226][T18553] shmem_file_setup+0x66/0x90 [ 314.493919][T18553] __x64_sys_memfd_create+0x2a2/0x470 [ 314.499278][T18553] ? memfd_fcntl+0x1550/0x1550 [ 314.504021][T18553] ? do_syscall_64+0x26/0x610 [ 314.508687][T18553] ? lockdep_hardirqs_on+0x418/0x5d0 [ 314.513971][T18553] ? trace_hardirqs_on+0x67/0x230 [ 314.518994][T18553] do_syscall_64+0x103/0x610 [ 314.523608][T18553] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 314.529488][T18553] RIP: 0033:0x457e39 [ 314.533384][T18553] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 314.553133][T18553] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 314.561556][T18553] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000457e39 [ 314.569525][T18553] RDX: 0000000020000058 RSI: 0000000000000000 RDI: 00000000004bce47 [ 314.577485][T18553] RBP: 000000000073bf00 R08: 0000000020000058 R09: 00000000fbad8001 [ 314.585439][T18553] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007f77e26b76d4 [ 314.593406][T18553] R13: 00000000004c65f7 R14: 00000000004dba08 R15: 0000000000000003 23:14:55 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:14:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0xf}, 0x7}, 0x1c) r2 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:14:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x74, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:55 executing program 4 (fault-call:0 fault-nth:5): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:14:55 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 316.894104][T18565] FAULT_INJECTION: forcing a failure. [ 316.894104][T18565] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 316.919251][T18565] CPU: 1 PID: 18565 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 316.928284][T18565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.938337][T18565] Call Trace: 23:14:55 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000140)={0x14c, r1, 0x100, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0x54, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x74f}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x770f}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xee}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5d}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}, @TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}]}, @TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x14}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xe2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffff}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffff}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0x38, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8080}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3f}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xff}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}]}]}, 0x14c}, 0x1, 0x0, 0x0, 0x44814}, 0x11) r2 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_udp(0xa, 0x2, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r3 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x5452, &(0x7f0000000080)={{}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) [ 316.941640][T18565] dump_stack+0x172/0x1f0 [ 316.945986][T18565] should_fail.cold+0xa/0x15 [ 316.950597][T18565] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 316.956420][T18565] ? ___might_sleep+0x163/0x280 [ 316.961283][T18565] should_fail_alloc_page+0x50/0x60 [ 316.966489][T18565] __alloc_pages_nodemask+0x1a1/0x7e0 [ 316.971872][T18565] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 316.971894][T18565] ? mark_held_locks+0xf0/0xf0 [ 316.971927][T18565] ? __lock_acquire+0x54b/0x4790 [ 316.982431][T18565] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 316.982445][T18565] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 316.982463][T18565] alloc_pages_vma+0xdd/0x540 [ 316.982488][T18565] shmem_alloc_page+0xc0/0x180 [ 317.009301][T18565] ? shmem_swapin+0x1a0/0x1a0 [ 317.013984][T18565] ? lock_downgrade+0x880/0x880 [ 317.018857][T18565] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 317.024583][T18565] ? __vm_enough_memory+0x320/0x5a0 [ 317.029795][T18565] shmem_alloc_and_acct_page+0x165/0x970 [ 317.035439][T18565] shmem_getpage_gfp+0x43b/0x2500 23:14:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000340)="915990d5eddf356e1c78f8a3b711fd70e7af2fe39202737320cbc0e83d8cf38299994c4837c19ca8a6bf65e4fdf3c0f85aea30fb95e5a38191d9f756393fba5c9529c6864ca912a9b46ef4e44aa6722790a6378996d93354b99e286b286435c24321b13f9d4333a00e0b1770bea1f9de3b1fa18e80529b75433db6549992d2add97b") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0xc00, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x7704, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$f2fs(&(0x7f00000000c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0xfc, 0x1, &(0x7f0000000180)=[{&(0x7f0000000140)="278d4ea86cf7a98aad507e93a91e13c863ad506cfa", 0x15, 0x4}], 0x30080, &(0x7f0000000280)={[{@whint_mode_fs='whint_mode=fs-based'}, {@nouser_xattr='nouser_xattr'}, {@prjquota={'prjquota', 0x3d, 'wlan1++em0+wlan0#\xa3'}}, {@background_gc_sync='background_gc=sync'}, {@resgid={'resgid', 0x3d, r3}}], [{@obj_type={'obj_type', 0x3d, '/dev/snd/timer\x00'}}]}) [ 317.040484][T18565] ? shmem_unuse_inode.constprop.0+0xfd0/0xfd0 [ 317.046648][T18565] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 317.052455][T18565] ? current_time+0x6b/0x140 [ 317.057048][T18565] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 317.062863][T18565] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 317.069155][T18565] ? iov_iter_fault_in_readable+0x22c/0x450 [ 317.075060][T18565] shmem_write_begin+0x105/0x1e0 [ 317.080042][T18565] generic_perform_write+0x231/0x530 [ 317.085346][T18565] ? page_endio+0x780/0x780 [ 317.089850][T18565] ? current_time+0x140/0x140 [ 317.094529][T18565] ? lock_acquire+0x16f/0x3f0 [ 317.099212][T18565] __generic_file_write_iter+0x25e/0x630 [ 317.099228][T18565] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 317.099251][T18565] generic_file_write_iter+0x360/0x610 [ 317.099272][T18565] ? __generic_file_write_iter+0x630/0x630 [ 317.099290][T18565] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 317.099305][T18565] ? iov_iter_init+0xea/0x220 [ 317.099326][T18565] __vfs_write+0x613/0x8e0 [ 317.116106][T18565] ? kernel_read+0x120/0x120 [ 317.116138][T18565] ? rcu_read_lock_sched_held+0x110/0x130 [ 317.116154][T18565] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 317.116168][T18565] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 317.116188][T18565] ? __sb_start_write+0x1ac/0x360 [ 317.164217][T18565] vfs_write+0x20c/0x580 [ 317.168476][T18565] ksys_pwrite64+0x183/0x1c0 [ 317.173101][T18565] ? __ia32_sys_pread64+0xf0/0xf0 [ 317.178133][T18565] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 317.183594][T18565] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 317.189060][T18565] ? do_syscall_64+0x26/0x610 [ 317.193742][T18565] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 317.199809][T18565] ? do_syscall_64+0x26/0x610 [ 317.204498][T18565] __x64_sys_pwrite64+0x97/0xf0 [ 317.209362][T18565] do_syscall_64+0x103/0x610 [ 317.213967][T18565] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 317.219852][T18565] RIP: 0033:0x411f87 [ 317.223740][T18565] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 51 17 00 00 c3 48 83 ec 08 e8 c7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 0d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 317.243337][T18565] RSP: 002b:00007f77e26b6a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 317.251740][T18565] RAX: ffffffffffffffda RBX: 0000000020000050 RCX: 0000000000411f87 [ 317.259703][T18565] RDX: 000000000000003a RSI: 0000000020000240 RDI: 0000000000000004 [ 317.267664][T18565] RBP: 0000000000000000 R08: 0000000020000058 R09: 00000000fbad8001 [ 317.275630][T18565] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 317.283593][T18565] R13: 0000000000000001 R14: 00000000004dba08 R15: 0000000000000003 23:14:56 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) [ 317.326976][T18565] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 23:14:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:14:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x7a, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:56 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(0x0, 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:14:56 executing program 4 (fault-call:0 fault-nth:6): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:14:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x95a347c0cf3b4860) ioctl$KVM_GET_MSR_INDEX_LIST(r1, 0xc004ae02, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20ncci\x00', 0x805, 0x0) ioctl$CAPI_GET_ERRCODE(r2, 0x80024321, &(0x7f00000000c0)) r3 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) [ 317.588228][T18709] FAULT_INJECTION: forcing a failure. [ 317.588228][T18709] name failslab, interval 1, probability 0, space 0, times 0 [ 317.628847][T18709] CPU: 0 PID: 18709 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 317.637881][T18709] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.647942][T18709] Call Trace: [ 317.651254][T18709] dump_stack+0x172/0x1f0 [ 317.651280][T18709] should_fail.cold+0xa/0x15 [ 317.651334][T18709] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 317.651374][T18709] ? lock_downgrade+0x880/0x880 [ 317.660262][T18709] ? ___might_sleep+0x163/0x280 [ 317.660283][T18709] __should_failslab+0x121/0x190 [ 317.660301][T18709] should_failslab+0x9/0x14 [ 317.660317][T18709] kmem_cache_alloc+0x2be/0x710 [ 317.660333][T18709] ? lock_downgrade+0x880/0x880 [ 317.660383][T18709] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 317.701778][T18709] ? check_preemption_disabled+0x48/0x290 [ 317.707507][T18709] getname_flags+0xd6/0x5b0 [ 317.712019][T18709] getname+0x1a/0x20 [ 317.715931][T18709] do_sys_open+0x2c9/0x5d0 [ 317.720357][T18709] ? filp_open+0x80/0x80 [ 317.724621][T18709] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 317.730197][T18709] ? do_syscall_64+0x26/0x610 [ 317.734890][T18709] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 317.740955][T18709] ? do_syscall_64+0x26/0x610 [ 317.745640][T18709] __x64_sys_open+0x7e/0xc0 [ 317.750149][T18709] do_syscall_64+0x103/0x610 [ 317.754749][T18709] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 317.760642][T18709] RIP: 0033:0x411f21 [ 317.764541][T18709] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 317.784159][T18709] RSP: 002b:00007f77e26b6a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 317.792618][T18709] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000411f21 [ 317.800594][T18709] RDX: 00007f77e26b6afa RSI: 0000000000000002 RDI: 00007f77e26b6af0 [ 317.808565][T18709] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 317.816537][T18709] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 23:14:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\xff', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) fsetxattr$security_smack_transmute(r1, &(0x7f0000000000)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x2) 23:14:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x300, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 317.824503][T18709] R13: 0000000000000001 R14: 00000000004dba08 R15: 0000000000000003 23:14:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:59 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:14:59 executing program 4 (fault-call:0 fault-nth:7): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:14:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x400) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x4, 0x78402) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:14:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x500, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:59 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(0x0, 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 320.528083][T18945] FAULT_INJECTION: forcing a failure. [ 320.528083][T18945] name failslab, interval 1, probability 0, space 0, times 0 [ 320.560233][T18945] CPU: 1 PID: 18945 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 320.569266][T18945] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.579313][T18945] Call Trace: [ 320.582610][T18945] dump_stack+0x172/0x1f0 [ 320.586954][T18945] should_fail.cold+0xa/0x15 [ 320.591546][T18945] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 320.597349][T18945] ? lock_downgrade+0x880/0x880 [ 320.602213][T18945] ? ___might_sleep+0x163/0x280 [ 320.607089][T18945] __should_failslab+0x121/0x190 [ 320.612022][T18945] should_failslab+0x9/0x14 [ 320.616521][T18945] kmem_cache_alloc+0x2be/0x710 [ 320.621407][T18945] ? __save_stack_trace+0x8a/0xf0 [ 320.626436][T18945] __alloc_file+0x27/0x300 [ 320.630853][T18945] alloc_empty_file+0x72/0x170 [ 320.635612][T18945] path_openat+0xef/0x46e0 [ 320.640021][T18945] ? __lock_acquire+0x54b/0x4790 [ 320.644946][T18945] ? getname+0x1a/0x20 [ 320.649006][T18945] ? do_sys_open+0x2c9/0x5d0 [ 320.653589][T18945] ? __x64_sys_open+0x7e/0xc0 [ 320.658263][T18945] ? do_syscall_64+0x103/0x610 [ 320.663022][T18945] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 320.669090][T18945] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 320.674456][T18945] ? __lock_is_held+0xb6/0x140 [ 320.679214][T18945] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 320.685453][T18945] ? __alloc_fd+0x430/0x530 [ 320.689941][T18945] do_filp_open+0x1a1/0x280 [ 320.694448][T18945] ? may_open_dev+0x100/0x100 [ 320.699124][T18945] ? lock_downgrade+0x880/0x880 [ 320.703973][T18945] ? kasan_check_read+0x11/0x20 [ 320.708867][T18945] ? do_raw_spin_unlock+0x57/0x270 [ 320.713975][T18945] ? _raw_spin_unlock+0x2d/0x50 [ 320.718822][T18945] ? __alloc_fd+0x430/0x530 [ 320.723349][T18945] do_sys_open+0x3fe/0x5d0 [ 320.727784][T18945] ? filp_open+0x80/0x80 [ 320.732538][T18945] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 320.738017][T18945] ? do_syscall_64+0x26/0x610 [ 320.742714][T18945] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 320.748775][T18945] ? do_syscall_64+0x26/0x610 [ 320.753450][T18945] __x64_sys_open+0x7e/0xc0 [ 320.757958][T18945] do_syscall_64+0x103/0x610 [ 320.762545][T18945] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 320.768427][T18945] RIP: 0033:0x411f21 [ 320.772317][T18945] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 320.791920][T18945] RSP: 002b:00007f77e26b6a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 320.800322][T18945] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000411f21 [ 320.808285][T18945] RDX: 00007f77e26b6afa RSI: 0000000000000002 RDI: 00007f77e26b6af0 [ 320.816258][T18945] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 23:14:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x2000, 0x0) ioctl$EVIOCGID(r2, 0x80084502, &(0x7f00000000c0)=""/70) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x2, 0x0, [{0x0, 0x5, 0x6, 0x5, 0x3}, {0x0, 0x0, 0x9, 0x5, 0x5}]}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x100000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) [ 320.824218][T18945] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 320.832176][T18945] R13: 0000000000000001 R14: 00000000004dba08 R15: 0000000000000003 23:14:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x600, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:14:59 executing program 4 (fault-call:0 fault-nth:8): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:14:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:14:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x80000001, 0x40000) write$UHID_SET_REPORT_REPLY(r1, &(0x7f00000000c0)=ANY=[], 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000480)={0x0, 0x27e, 0x20, 0x8, 0xff}, &(0x7f00000004c0)=0x6) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000500)={r2, 0x400, 0x5, 0x10001}, &(0x7f0000000540)=0x10) syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0xffffffffffffff7f, 0x0) r3 = syz_open_dev$sndtimer(&(0x7f0000000200)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@empty, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}}}, &(0x7f00000001c0)=0xe8) ioctl$sock_ifreq(r1, 0x893f, &(0x7f0000000440)={'bridge0\x00', @ifru_addrs=@xdp={0x2c, 0x4, r4, 0x21}}) ioctl$DRM_IOCTL_AGP_INFO(r1, 0x80386433, &(0x7f0000000240)=""/243) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) [ 321.014689][T19071] FAULT_INJECTION: forcing a failure. [ 321.014689][T19071] name failslab, interval 1, probability 0, space 0, times 0 [ 321.065114][T19071] CPU: 1 PID: 19071 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 321.074151][T19071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 321.084223][T19071] Call Trace: [ 321.087524][T19071] dump_stack+0x172/0x1f0 [ 321.091867][T19071] should_fail.cold+0xa/0x15 [ 321.096492][T19071] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 321.102296][T19071] ? lock_downgrade+0x880/0x880 [ 321.107148][T19071] ? ___might_sleep+0x163/0x280 [ 321.112029][T19071] __should_failslab+0x121/0x190 [ 321.116965][T19071] should_failslab+0x9/0x14 [ 321.121465][T19071] kmem_cache_alloc+0x2be/0x710 [ 321.126315][T19071] ? __save_stack_trace+0x8a/0xf0 [ 321.131344][T19071] __alloc_file+0x27/0x300 [ 321.135763][T19071] alloc_empty_file+0x72/0x170 [ 321.140523][T19071] path_openat+0xef/0x46e0 [ 321.144952][T19071] ? __lock_acquire+0x54b/0x4790 [ 321.149932][T19071] ? getname+0x1a/0x20 [ 321.154023][T19071] ? do_sys_open+0x2c9/0x5d0 [ 321.158608][T19071] ? __x64_sys_open+0x7e/0xc0 [ 321.163279][T19071] ? do_syscall_64+0x103/0x610 [ 321.168037][T19071] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 321.174104][T19071] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 321.179466][T19071] ? __lock_is_held+0xb6/0x140 [ 321.184233][T19071] ? __alloc_fd+0x430/0x530 [ 321.188737][T19071] do_filp_open+0x1a1/0x280 [ 321.193233][T19071] ? may_open_dev+0x100/0x100 [ 321.197904][T19071] ? lock_downgrade+0x880/0x880 [ 321.202758][T19071] ? kasan_check_read+0x11/0x20 [ 321.207607][T19071] ? do_raw_spin_unlock+0x57/0x270 [ 321.212713][T19071] ? _raw_spin_unlock+0x2d/0x50 [ 321.217584][T19071] ? __alloc_fd+0x430/0x530 [ 321.222094][T19071] do_sys_open+0x3fe/0x5d0 [ 321.226506][T19071] ? filp_open+0x80/0x80 [ 321.230747][T19071] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 321.236201][T19071] ? do_syscall_64+0x26/0x610 [ 321.240889][T19071] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 321.246948][T19071] ? do_syscall_64+0x26/0x610 [ 321.251622][T19071] __x64_sys_open+0x7e/0xc0 [ 321.256138][T19071] do_syscall_64+0x103/0x610 [ 321.260729][T19071] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 321.266621][T19071] RIP: 0033:0x411f21 [ 321.270510][T19071] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 321.290102][T19071] RSP: 002b:00007f77e26b6a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 321.298517][T19071] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000411f21 [ 321.306478][T19071] RDX: 00007f77e26b6afa RSI: 0000000000000002 RDI: 00007f77e26b6af0 [ 321.314442][T19071] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 321.322413][T19071] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 321.330383][T19071] R13: 0000000000000001 R14: 00000000004dba08 R15: 0000000000000003 23:15:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x700, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:15:02 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:15:02 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\a\\\x00\x03x\xb2\xbf\xbc\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x297ef) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0af51f023c123f3188a070") getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000200)=ANY=[@ANYRES32=0x0, @ANYBLOB="7800000085ae0d34e76d0b17a29e86762c1fdb4f3a50496a4c62f5966b8dfd9dc85abc4c00212846eb7f46eb555cecef76692ce13a730b368ab008aa7c5f7cb75aa359e3e26e49379ae8ae08cdc5e0fb37d80ac00226e75199f4ab23667de6fba0d62c8a6f8e5c403a47fb4bb4d20e00a2827ebb6f8b61b891f666df"], &(0x7f0000000140)=0x80) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000300)=@assoc_value={r3, 0x5}, &(0x7f00000002c0)=0x8) r4 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r4, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) ioctl$PPPIOCGDEBUG(r1, 0x80047441, &(0x7f00000000c0)) fremovexattr(r0, &(0x7f0000000100)=@known='com.apple.system.Security\x00') socket$inet_udplite(0x2, 0x2, 0x88) 23:15:02 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(0x0, 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:15:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:15:02 executing program 4 (fault-call:0 fault-nth:9): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:15:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0xa00, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 323.612691][T19297] FAULT_INJECTION: forcing a failure. [ 323.612691][T19297] name failslab, interval 1, probability 0, space 0, times 0 [ 323.681163][T19297] CPU: 1 PID: 19297 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 323.690233][T19297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 323.700298][T19297] Call Trace: [ 323.703603][T19297] dump_stack+0x172/0x1f0 [ 323.707960][T19297] should_fail.cold+0xa/0x15 [ 323.712604][T19297] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 323.718436][T19297] ? lock_downgrade+0x880/0x880 [ 323.723294][T19297] ? ___might_sleep+0x163/0x280 [ 323.728157][T19297] __should_failslab+0x121/0x190 [ 323.733667][T19297] ? loop_info64_to_compat+0x6d0/0x6d0 [ 323.739137][T19297] should_failslab+0x9/0x14 [ 323.743650][T19297] kmem_cache_alloc_trace+0x2d1/0x760 [ 323.749029][T19297] ? lockdep_init_map+0x10c/0x5b0 [ 323.754069][T19297] ? loop_info64_to_compat+0x6d0/0x6d0 [ 323.759534][T19297] __kthread_create_on_node+0xf2/0x460 [ 323.764998][T19297] ? lock_acquire+0x16f/0x3f0 [ 323.769684][T19297] ? kthread_parkme+0xb0/0xb0 [ 323.774383][T19297] ? mutex_trylock+0x1e0/0x1e0 [ 323.779160][T19297] ? loop_info64_to_compat+0x6d0/0x6d0 [ 323.784628][T19297] kthread_create_on_node+0xbb/0xf0 [ 323.789834][T19297] ? __kthread_create_on_node+0x460/0x460 [ 323.795562][T19297] ? lockdep_init_map+0x10c/0x5b0 [ 323.800593][T19297] ? lockdep_init_map+0x10c/0x5b0 [ 323.805661][T19297] lo_ioctl+0xafb/0x20d0 [ 323.809924][T19297] ? lo_rw_aio+0x1530/0x1530 [ 323.814593][T19297] blkdev_ioctl+0xee8/0x1c40 [ 323.819196][T19297] ? blkpg_ioctl+0xa90/0xa90 [ 323.823793][T19297] ? find_held_lock+0x35/0x130 23:15:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$KVM_IRQ_LINE(r2, 0x4008ae61, &(0x7f0000000100)={0xda, 0x7fff}) setsockopt$CAIFSO_LINK_SELECT(r2, 0x116, 0x7f, &(0x7f00000000c0)=0x3, 0x4) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000140), 0x0) 23:15:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x3f00, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 323.828562][T19297] ? debug_check_no_obj_freed+0x211/0x444 [ 323.834283][T19297] ? kasan_check_write+0x14/0x20 [ 323.839231][T19297] ? __fget+0x340/0x540 [ 323.843388][T19297] ? find_held_lock+0x35/0x130 [ 323.848166][T19297] ? __fget+0x340/0x540 [ 323.852303][T19297] block_ioctl+0xee/0x130 [ 323.856611][T19297] ? blkdev_fallocate+0x410/0x410 [ 323.861621][T19297] do_vfs_ioctl+0xd6e/0x1390 [ 323.866193][T19297] ? ioctl_preallocate+0x210/0x210 [ 323.871281][T19297] ? __fget+0x367/0x540 [ 323.875425][T19297] ? ksys_dup3+0x3e0/0x3e0 [ 323.879836][T19297] ? do_sys_open+0x31d/0x5d0 [ 323.884429][T19297] ? security_file_ioctl+0x93/0xc0 [ 323.889534][T19297] ksys_ioctl+0xab/0xd0 [ 323.893685][T19297] __x64_sys_ioctl+0x73/0xb0 [ 323.898258][T19297] do_syscall_64+0x103/0x610 [ 323.902832][T19297] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 323.908718][T19297] RIP: 0033:0x457ca7 [ 323.912611][T19297] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 23:15:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 323.932192][T19297] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 323.940588][T19297] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000457ca7 [ 323.948567][T19297] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 323.956518][T19297] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 323.964473][T19297] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 323.972439][T19297] R13: 0000000000000001 R14: 00000000004dba08 R15: 0000000000000003 23:15:02 executing program 4 (fault-call:0 fault-nth:10): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:15:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:15:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = socket(0xd, 0x6, 0x9) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x3, 0x1, 0x100000001, 0x3, 0x400}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x3c, &(0x7f0000000100)=[@in={0x2, 0x4e24, @multicast2}, @in={0x2, 0x4e24, @multicast2}, @in6={0xa, 0x4e24, 0xfff, @dev={0xfe, 0x80, [], 0x22}, 0xb513}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f00000001c0)={r2, 0x3, 0xfffffffffffffe89, 0x4, 0x2, 0xce32, 0x81, 0x0, {r3, @in6={{0xa, 0x4e22, 0x3, @rand_addr="77866a44538cd1d9e37780509642ce4d", 0x6}}, 0x9, 0x7, 0xe48, 0x4, 0x1}}, &(0x7f0000000280)=0xb0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) [ 324.132874][T19458] FAULT_INJECTION: forcing a failure. [ 324.132874][T19458] name failslab, interval 1, probability 0, space 0, times 0 [ 324.146241][T19458] CPU: 1 PID: 19458 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 324.155299][T19458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 324.165380][T19458] Call Trace: [ 324.168701][T19458] dump_stack+0x172/0x1f0 [ 324.173054][T19458] should_fail.cold+0xa/0x15 [ 324.177660][T19458] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 324.183472][T19458] ? lock_downgrade+0x880/0x880 [ 324.188334][T19458] ? ___might_sleep+0x163/0x280 [ 324.193194][T19458] __should_failslab+0x121/0x190 [ 324.198146][T19458] ? loop_info64_to_compat+0x6d0/0x6d0 [ 324.203608][T19458] should_failslab+0x9/0x14 [ 324.208141][T19458] kmem_cache_alloc_trace+0x2d1/0x760 [ 324.213525][T19458] ? lockdep_init_map+0x10c/0x5b0 [ 324.218571][T19458] ? loop_info64_to_compat+0x6d0/0x6d0 [ 324.224023][T19458] __kthread_create_on_node+0xf2/0x460 [ 324.229483][T19458] ? lock_acquire+0x16f/0x3f0 [ 324.234156][T19458] ? kthread_parkme+0xb0/0xb0 [ 324.238839][T19458] ? mutex_trylock+0x1e0/0x1e0 [ 324.243593][T19458] ? loop_info64_to_compat+0x6d0/0x6d0 [ 324.249044][T19458] kthread_create_on_node+0xbb/0xf0 [ 324.254232][T19458] ? __kthread_create_on_node+0x460/0x460 [ 324.259952][T19458] ? lockdep_init_map+0x10c/0x5b0 [ 324.264969][T19458] ? lockdep_init_map+0x10c/0x5b0 [ 324.269996][T19458] lo_ioctl+0xafb/0x20d0 [ 324.274233][T19458] ? lo_rw_aio+0x1530/0x1530 [ 324.278816][T19458] blkdev_ioctl+0xee8/0x1c40 [ 324.283407][T19458] ? blkpg_ioctl+0xa90/0xa90 [ 324.287981][T19458] ? find_held_lock+0x35/0x130 [ 324.292727][T19458] ? debug_check_no_obj_freed+0x211/0x444 [ 324.298436][T19458] ? kasan_check_write+0x14/0x20 [ 324.303366][T19458] ? __fget+0x340/0x540 [ 324.307540][T19458] ? find_held_lock+0x35/0x130 [ 324.312285][T19458] ? __fget+0x340/0x540 [ 324.316446][T19458] block_ioctl+0xee/0x130 [ 324.320767][T19458] ? blkdev_fallocate+0x410/0x410 [ 324.325783][T19458] do_vfs_ioctl+0xd6e/0x1390 [ 324.330365][T19458] ? ioctl_preallocate+0x210/0x210 [ 324.335493][T19458] ? __fget+0x367/0x540 [ 324.339647][T19458] ? ksys_dup3+0x3e0/0x3e0 [ 324.344070][T19458] ? do_sys_open+0x31d/0x5d0 [ 324.348664][T19458] ? security_file_ioctl+0x93/0xc0 [ 324.353780][T19458] ksys_ioctl+0xab/0xd0 [ 324.358022][T19458] __x64_sys_ioctl+0x73/0xb0 [ 324.362613][T19458] do_syscall_64+0x103/0x610 [ 324.367203][T19458] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 324.373071][T19458] RIP: 0033:0x457ca7 [ 324.376953][T19458] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 324.396534][T19458] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 324.404939][T19458] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000457ca7 [ 324.412909][T19458] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 324.420885][T19458] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 324.428872][T19458] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 324.436836][T19458] R13: 0000000000000001 R14: 00000000004dba08 R15: 0000000000000003 23:15:05 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(0xffffffffffffffff, 0xa, 0x12) dup2(0xffffffffffffffff, 0xffffffffffffffff) tkill(r0, 0x16) 23:15:05 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:15:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x4000, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:15:05 executing program 4 (fault-call:0 fault-nth:11): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:15:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:15:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1, 0x0, 0xa445}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) [ 326.672822][T19543] FAULT_INJECTION: forcing a failure. [ 326.672822][T19543] name failslab, interval 1, probability 0, space 0, times 0 [ 326.703816][T19543] CPU: 0 PID: 19543 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 326.712878][T19543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.722937][T19543] Call Trace: [ 326.726260][T19543] dump_stack+0x172/0x1f0 [ 326.730612][T19543] should_fail.cold+0xa/0x15 [ 326.735216][T19543] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 326.741027][T19543] ? lock_downgrade+0x880/0x880 [ 326.745886][T19543] ? ___might_sleep+0x163/0x280 [ 326.750740][T19543] __should_failslab+0x121/0x190 [ 326.755685][T19543] should_failslab+0x9/0x14 [ 326.760195][T19543] kmem_cache_alloc+0x2be/0x710 [ 326.765048][T19543] ? __lock_acquire+0x54b/0x4790 [ 326.770050][T19543] __kernfs_new_node+0xef/0x690 [ 326.774899][T19543] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 326.780355][T19543] ? __lock_acquire+0x54b/0x4790 [ 326.785292][T19543] kernfs_new_node+0x99/0x130 [ 326.789963][T19543] kernfs_create_dir_ns+0x52/0x160 [ 326.795100][T19543] internal_create_group+0x7f8/0xc40 [ 326.800379][T19543] ? bd_set_size+0x89/0xb0 [ 326.804808][T19543] ? remove_files.isra.0+0x190/0x190 [ 326.810097][T19543] sysfs_create_group+0x20/0x30 [ 326.814941][T19543] lo_ioctl+0xf8f/0x20d0 [ 326.819180][T19543] ? lo_rw_aio+0x1530/0x1530 [ 326.823764][T19543] blkdev_ioctl+0xee8/0x1c40 [ 326.828334][T19543] ? blkpg_ioctl+0xa90/0xa90 [ 326.832911][T19543] ? find_held_lock+0x35/0x130 [ 326.837672][T19543] ? debug_check_no_obj_freed+0x211/0x444 [ 326.843387][T19543] ? kasan_check_write+0x14/0x20 [ 326.848318][T19543] ? __fget+0x340/0x540 [ 326.852465][T19543] ? find_held_lock+0x35/0x130 [ 326.857219][T19543] ? __fget+0x340/0x540 [ 326.861357][T19543] block_ioctl+0xee/0x130 [ 326.865678][T19543] ? blkdev_fallocate+0x410/0x410 [ 326.870704][T19543] do_vfs_ioctl+0xd6e/0x1390 [ 326.875290][T19543] ? ioctl_preallocate+0x210/0x210 [ 326.880393][T19543] ? __fget+0x367/0x540 [ 326.884576][T19543] ? ksys_dup3+0x3e0/0x3e0 [ 326.889000][T19543] ? do_sys_open+0x31d/0x5d0 [ 326.893601][T19543] ? security_file_ioctl+0x93/0xc0 [ 326.898716][T19543] ksys_ioctl+0xab/0xd0 [ 326.902865][T19543] __x64_sys_ioctl+0x73/0xb0 [ 326.907458][T19543] do_syscall_64+0x103/0x610 [ 326.912045][T19543] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 326.917942][T19543] RIP: 0033:0x457ca7 [ 326.921829][T19543] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 326.941434][T19543] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 326.949838][T19543] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000457ca7 [ 326.957802][T19543] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 326.965755][T19543] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 23:15:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:15:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x4800, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:15:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x280600, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f00000000c0)) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) [ 326.973710][T19543] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 326.981667][T19543] R13: 0000000000000001 R14: 00000000004dba08 R15: 0000000000000003 23:15:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x7ffffffffffff256, &(0x7f0000000040)="0af51f023c123f3188a070") setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f0000000000)={@loopback, @multicast2}, 0x8) r1 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0xc000) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) [ 327.045562][T19543] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:15:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:15:06 executing program 4 (fault-call:0 fault-nth:12): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 327.282712][T19783] FAULT_INJECTION: forcing a failure. [ 327.282712][T19783] name failslab, interval 1, probability 0, space 0, times 0 [ 327.295818][T19783] CPU: 1 PID: 19783 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 327.304830][T19783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.314883][T19783] Call Trace: [ 327.318169][T19783] dump_stack+0x172/0x1f0 [ 327.322502][T19783] should_fail.cold+0xa/0x15 [ 327.327092][T19783] ? kernel_text_address+0x73/0xf0 [ 327.332183][T19783] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 327.338051][T19783] ? unwind_get_return_address+0x61/0xa0 [ 327.343688][T19783] ? __save_stack_trace+0x8a/0xf0 [ 327.348711][T19783] __should_failslab+0x121/0x190 [ 327.353651][T19783] should_failslab+0x9/0x14 [ 327.358135][T19783] kmem_cache_alloc+0x47/0x710 [ 327.362902][T19783] ? save_stack+0xa9/0xd0 [ 327.367231][T19783] ? save_stack+0x45/0xd0 [ 327.371540][T19783] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 327.377326][T19783] ? kasan_slab_alloc+0xf/0x20 [ 327.382090][T19783] radix_tree_node_alloc.constprop.0+0x1eb/0x340 [ 327.388446][T19783] idr_get_free+0x425/0x8d0 [ 327.392943][T19783] idr_alloc_u32+0x19e/0x330 [ 327.397515][T19783] ? __fprop_inc_percpu_max+0x230/0x230 [ 327.403063][T19783] ? __lock_is_held+0xb6/0x140 [ 327.407822][T19783] ? check_preemption_disabled+0x48/0x290 [ 327.413547][T19783] idr_alloc_cyclic+0x132/0x270 [ 327.418377][T19783] ? idr_alloc+0x150/0x150 [ 327.422804][T19783] __kernfs_new_node+0x171/0x690 [ 327.427738][T19783] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 327.433189][T19783] ? __lock_acquire+0x54b/0x4790 [ 327.438119][T19783] kernfs_new_node+0x99/0x130 [ 327.442780][T19783] kernfs_create_dir_ns+0x52/0x160 [ 327.447884][T19783] internal_create_group+0x7f8/0xc40 [ 327.453178][T19783] ? bd_set_size+0x89/0xb0 [ 327.457611][T19783] ? remove_files.isra.0+0x190/0x190 [ 327.462913][T19783] sysfs_create_group+0x20/0x30 [ 327.467778][T19783] lo_ioctl+0xf8f/0x20d0 [ 327.472038][T19783] ? lo_rw_aio+0x1530/0x1530 [ 327.476625][T19783] blkdev_ioctl+0xee8/0x1c40 [ 327.481199][T19783] ? blkpg_ioctl+0xa90/0xa90 [ 327.485768][T19783] ? find_held_lock+0x35/0x130 [ 327.490514][T19783] ? debug_check_no_obj_freed+0x211/0x444 [ 327.496216][T19783] ? kasan_check_write+0x14/0x20 [ 327.501147][T19783] ? __fget+0x340/0x540 [ 327.505308][T19783] ? find_held_lock+0x35/0x130 [ 327.510052][T19783] ? __fget+0x340/0x540 [ 327.514191][T19783] block_ioctl+0xee/0x130 [ 327.518501][T19783] ? blkdev_fallocate+0x410/0x410 [ 327.523504][T19783] do_vfs_ioctl+0xd6e/0x1390 [ 327.528078][T19783] ? ioctl_preallocate+0x210/0x210 [ 327.533170][T19783] ? __fget+0x367/0x540 [ 327.537307][T19783] ? ksys_dup3+0x3e0/0x3e0 [ 327.541712][T19783] ? do_sys_open+0x31d/0x5d0 [ 327.546285][T19783] ? security_file_ioctl+0x93/0xc0 [ 327.551385][T19783] ksys_ioctl+0xab/0xd0 [ 327.555539][T19783] __x64_sys_ioctl+0x73/0xb0 [ 327.560112][T19783] do_syscall_64+0x103/0x610 [ 327.564690][T19783] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 327.570562][T19783] RIP: 0033:0x457ca7 [ 327.574437][T19783] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 327.594022][T19783] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 327.602569][T19783] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000457ca7 [ 327.610522][T19783] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 327.618490][T19783] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 327.626442][T19783] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 327.634394][T19783] R13: 0000000000000001 R14: 00000000004dba08 R15: 0000000000000003 [ 327.670992][T19783] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:15:08 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(0xffffffffffffffff, 0xa, 0x12) dup2(0xffffffffffffffff, 0xffffffffffffffff) tkill(r0, 0x16) 23:15:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x10000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r2, 0x40045731, &(0x7f00000000c0)=0x10001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:15:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x4c00, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:15:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:15:08 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:15:08 executing program 4 (fault-call:0 fault-nth:13): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 329.704743][T19799] FAULT_INJECTION: forcing a failure. [ 329.704743][T19799] name failslab, interval 1, probability 0, space 0, times 0 [ 329.726533][T19799] CPU: 1 PID: 19799 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 329.736022][T19799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.746075][T19799] Call Trace: [ 329.749369][T19799] dump_stack+0x172/0x1f0 [ 329.753713][T19799] should_fail.cold+0xa/0x15 [ 329.758304][T19799] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 329.764108][T19799] ? lock_downgrade+0x880/0x880 [ 329.768961][T19799] ? ___might_sleep+0x163/0x280 [ 329.773807][T19799] __should_failslab+0x121/0x190 [ 329.778746][T19799] should_failslab+0x9/0x14 [ 329.783248][T19799] kmem_cache_alloc+0x2be/0x710 [ 329.788100][T19799] ? find_held_lock+0x35/0x130 [ 329.792863][T19799] ? kernfs_activate+0x192/0x1f0 [ 329.797799][T19799] __kernfs_new_node+0xef/0x690 [ 329.802657][T19799] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 329.808110][T19799] ? lock_downgrade+0x880/0x880 [ 329.812963][T19799] ? kasan_check_write+0x14/0x20 [ 329.817895][T19799] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 329.823442][T19799] ? wait_for_completion+0x440/0x440 [ 329.828731][T19799] kernfs_new_node+0x99/0x130 [ 329.833415][T19799] __kernfs_create_file+0x51/0x340 [ 329.838526][T19799] sysfs_add_file_mode_ns+0x222/0x560 [ 329.843905][T19799] internal_create_group+0x35b/0xc40 [ 329.849202][T19799] ? bd_set_size+0x89/0xb0 [ 329.853622][T19799] ? remove_files.isra.0+0x190/0x190 [ 329.858913][T19799] sysfs_create_group+0x20/0x30 [ 329.863765][T19799] lo_ioctl+0xf8f/0x20d0 [ 329.868007][T19799] ? lo_rw_aio+0x1530/0x1530 [ 329.872597][T19799] blkdev_ioctl+0xee8/0x1c40 [ 329.877187][T19799] ? blkpg_ioctl+0xa90/0xa90 [ 329.881771][T19799] ? find_held_lock+0x35/0x130 [ 329.886530][T19799] ? debug_check_no_obj_freed+0x211/0x444 [ 329.892248][T19799] ? kasan_check_write+0x14/0x20 [ 329.897178][T19799] ? __fget+0x340/0x540 [ 329.901333][T19799] ? find_held_lock+0x35/0x130 [ 329.906096][T19799] ? __fget+0x340/0x540 [ 329.910248][T19799] block_ioctl+0xee/0x130 [ 329.914585][T19799] ? blkdev_fallocate+0x410/0x410 [ 329.919609][T19799] do_vfs_ioctl+0xd6e/0x1390 [ 329.924195][T19799] ? ioctl_preallocate+0x210/0x210 [ 329.929299][T19799] ? __fget+0x367/0x540 [ 329.933453][T19799] ? ksys_dup3+0x3e0/0x3e0 [ 329.937865][T19799] ? do_sys_open+0x31d/0x5d0 [ 329.942459][T19799] ? security_file_ioctl+0x93/0xc0 [ 329.947567][T19799] ksys_ioctl+0xab/0xd0 [ 329.951722][T19799] __x64_sys_ioctl+0x73/0xb0 [ 329.956311][T19799] do_syscall_64+0x103/0x610 [ 329.960903][T19799] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 329.966796][T19799] RIP: 0033:0x457ca7 [ 329.970687][T19799] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 329.990285][T19799] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 23:15:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) r2 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) ioctl$VIDIOC_DQEVENT(r2, 0x80885659, &(0x7f00000000c0)) [ 329.998691][T19799] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000457ca7 [ 330.006665][T19799] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 330.014626][T19799] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 330.022587][T19799] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 330.030551][T19799] R13: 0000000000000001 R14: 00000000004dba08 R15: 0000000000000003 23:15:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 330.071910][T19799] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:15:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x6800, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:15:09 executing program 4 (fault-call:0 fault-nth:14): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:15:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 330.277712][T19925] FAULT_INJECTION: forcing a failure. [ 330.277712][T19925] name failslab, interval 1, probability 0, space 0, times 0 [ 330.294885][T19925] CPU: 1 PID: 19925 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 330.303971][T19925] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 330.314026][T19925] Call Trace: [ 330.317329][T19925] dump_stack+0x172/0x1f0 [ 330.321672][T19925] should_fail.cold+0xa/0x15 23:15:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x6c00, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 330.326254][T19925] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 330.332052][T19925] ? lock_downgrade+0x880/0x880 [ 330.336907][T19925] ? ___might_sleep+0x163/0x280 [ 330.341781][T19925] __should_failslab+0x121/0x190 [ 330.346731][T19925] should_failslab+0x9/0x14 [ 330.351234][T19925] kmem_cache_alloc+0x2be/0x710 [ 330.356078][T19925] ? lock_downgrade+0x880/0x880 [ 330.360912][T19925] ? kasan_check_read+0x11/0x20 [ 330.365747][T19925] __kernfs_new_node+0xef/0x690 [ 330.370590][T19925] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 330.376046][T19925] ? wait_for_completion+0x440/0x440 [ 330.381314][T19925] ? mutex_unlock+0xd/0x10 [ 330.385706][T19925] ? kernfs_activate+0x192/0x1f0 [ 330.390623][T19925] kernfs_new_node+0x99/0x130 [ 330.395298][T19925] __kernfs_create_file+0x51/0x340 [ 330.400398][T19925] sysfs_add_file_mode_ns+0x222/0x560 [ 330.405771][T19925] internal_create_group+0x35b/0xc40 [ 330.411040][T19925] ? bd_set_size+0x89/0xb0 [ 330.415463][T19925] ? remove_files.isra.0+0x190/0x190 [ 330.420737][T19925] sysfs_create_group+0x20/0x30 [ 330.425568][T19925] lo_ioctl+0xf8f/0x20d0 [ 330.429796][T19925] ? lo_rw_aio+0x1530/0x1530 [ 330.434387][T19925] blkdev_ioctl+0xee8/0x1c40 [ 330.438975][T19925] ? blkpg_ioctl+0xa90/0xa90 [ 330.443567][T19925] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 330.449356][T19925] ? rcu_preempt_deferred_qs_irqrestore+0x5b9/0xd20 [ 330.455920][T19925] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 330.461709][T19925] ? lockdep_hardirqs_on+0x418/0x5d0 [ 330.466981][T19925] ? __fget+0x340/0x540 [ 330.471116][T19925] ? find_held_lock+0x35/0x130 [ 330.475861][T19925] ? __fget+0x340/0x540 [ 330.479997][T19925] block_ioctl+0xee/0x130 [ 330.484302][T19925] ? blkdev_fallocate+0x410/0x410 [ 330.489307][T19925] do_vfs_ioctl+0xd6e/0x1390 [ 330.493880][T19925] ? rcu_read_unlock_special+0xf3/0x210 [ 330.499410][T19925] ? ioctl_preallocate+0x210/0x210 [ 330.504502][T19925] ? __fget+0x367/0x540 [ 330.508651][T19925] ? ksys_dup3+0x3e0/0x3e0 [ 330.513055][T19925] ? do_sys_open+0x31d/0x5d0 [ 330.517627][T19925] ? security_file_ioctl+0x93/0xc0 [ 330.522730][T19925] ksys_ioctl+0xab/0xd0 [ 330.526881][T19925] __x64_sys_ioctl+0x73/0xb0 [ 330.531453][T19925] do_syscall_64+0x103/0x610 [ 330.536027][T19925] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 330.541894][T19925] RIP: 0033:0x457ca7 [ 330.545765][T19925] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 330.565376][T19925] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 330.573769][T19925] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000457ca7 [ 330.581720][T19925] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 330.589667][T19925] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 330.597621][T19925] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 330.605585][T19925] R13: 0000000000000001 R14: 00000000004dba08 R15: 0000000000000003 [ 330.632664][T19925] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:15:11 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(0xffffffffffffffff, 0xa, 0x12) dup2(0xffffffffffffffff, 0xffffffffffffffff) tkill(r0, 0x16) 23:15:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x7f', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:15:11 executing program 4 (fault-call:0 fault-nth:15): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:15:11 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:15:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x7400, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:15:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1a, 0x800) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)) 23:15:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x5, 0x44000) bind$bt_rfcomm(r2, &(0x7f00000000c0)={0x1f, {0x100000001, 0x1f, 0x80, 0x247, 0x9af8, 0x474}, 0x1}, 0xa) [ 332.792263][T20159] FAULT_INJECTION: forcing a failure. [ 332.792263][T20159] name failslab, interval 1, probability 0, space 0, times 0 [ 332.816338][T20159] CPU: 1 PID: 20159 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 332.825450][T20159] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 332.835533][T20159] Call Trace: [ 332.838853][T20159] dump_stack+0x172/0x1f0 [ 332.843223][T20159] should_fail.cold+0xa/0x15 [ 332.847837][T20159] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 332.853662][T20159] ? lock_downgrade+0x880/0x880 [ 332.858544][T20159] ? ___might_sleep+0x163/0x280 [ 332.863426][T20159] __should_failslab+0x121/0x190 [ 332.868379][T20159] should_failslab+0x9/0x14 [ 332.872902][T20159] kmem_cache_alloc+0x2be/0x710 [ 332.877749][T20159] ? lock_downgrade+0x880/0x880 [ 332.882597][T20159] ? kasan_check_read+0x11/0x20 [ 332.887464][T20159] __kernfs_new_node+0xef/0x690 [ 332.892308][T20159] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 332.897817][T20159] ? wait_for_completion+0x440/0x440 [ 332.903196][T20159] ? mutex_unlock+0xd/0x10 [ 332.907618][T20159] ? kernfs_activate+0x192/0x1f0 [ 332.912544][T20159] kernfs_new_node+0x99/0x130 [ 332.917212][T20159] __kernfs_create_file+0x51/0x340 [ 332.922402][T20159] sysfs_add_file_mode_ns+0x222/0x560 [ 332.927789][T20159] internal_create_group+0x35b/0xc40 [ 332.933089][T20159] ? bd_set_size+0x89/0xb0 [ 332.937512][T20159] ? remove_files.isra.0+0x190/0x190 [ 332.942795][T20159] sysfs_create_group+0x20/0x30 [ 332.947786][T20159] lo_ioctl+0xf8f/0x20d0 [ 332.952021][T20159] ? lo_rw_aio+0x1530/0x1530 [ 332.956607][T20159] blkdev_ioctl+0xee8/0x1c40 [ 332.961187][T20159] ? blkpg_ioctl+0xa90/0xa90 [ 332.965766][T20159] ? find_held_lock+0x35/0x130 [ 332.970534][T20159] ? debug_check_no_obj_freed+0x211/0x444 [ 332.976265][T20159] ? kasan_check_write+0x14/0x20 [ 332.981194][T20159] ? __fget+0x340/0x540 [ 332.985464][T20159] ? find_held_lock+0x35/0x130 [ 332.990214][T20159] ? __fget+0x340/0x540 [ 332.994368][T20159] block_ioctl+0xee/0x130 [ 332.998719][T20159] ? blkdev_fallocate+0x410/0x410 [ 333.003780][T20159] do_vfs_ioctl+0xd6e/0x1390 [ 333.008361][T20159] ? ioctl_preallocate+0x210/0x210 [ 333.013509][T20159] ? __fget+0x367/0x540 [ 333.017657][T20159] ? ksys_dup3+0x3e0/0x3e0 [ 333.022063][T20159] ? do_sys_open+0x31d/0x5d0 [ 333.026644][T20159] ? security_file_ioctl+0x93/0xc0 [ 333.031741][T20159] ksys_ioctl+0xab/0xd0 [ 333.035949][T20159] __x64_sys_ioctl+0x73/0xb0 [ 333.040617][T20159] do_syscall_64+0x103/0x610 [ 333.045203][T20159] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 333.051090][T20159] RIP: 0033:0x457ca7 [ 333.054976][T20159] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 333.074619][T20159] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 333.083057][T20159] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000457ca7 23:15:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x7a00, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:15:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\xff', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 333.091015][T20159] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 333.098969][T20159] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 333.106931][T20159] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 333.114890][T20159] R13: 0000000000000001 R14: 00000000004dba08 R15: 0000000000000003 [ 333.154725][T20159] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:15:12 executing program 0: socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000340)="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", 0x101, 0x400}], 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r2 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:15:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='u.f\x00', 0xce02, 0x0) 23:15:12 executing program 4 (fault-call:0 fault-nth:16): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 333.360300][T20360] FAULT_INJECTION: forcing a failure. [ 333.360300][T20360] name failslab, interval 1, probability 0, space 0, times 0 [ 333.373243][T20360] CPU: 1 PID: 20360 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 333.382282][T20360] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 333.392339][T20360] Call Trace: [ 333.395663][T20360] dump_stack+0x172/0x1f0 [ 333.400006][T20360] should_fail.cold+0xa/0x15 [ 333.404599][T20360] ? kernel_text_address+0x73/0xf0 [ 333.409719][T20360] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 333.415531][T20360] ? unwind_get_return_address+0x61/0xa0 [ 333.421168][T20360] ? __save_stack_trace+0x8a/0xf0 [ 333.426198][T20360] __should_failslab+0x121/0x190 [ 333.431141][T20360] should_failslab+0x9/0x14 [ 333.435649][T20360] kmem_cache_alloc+0x47/0x710 [ 333.440433][T20360] ? save_stack+0xa9/0xd0 [ 333.444768][T20360] ? save_stack+0x45/0xd0 [ 333.449219][T20360] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 333.455030][T20360] ? kasan_slab_alloc+0xf/0x20 [ 333.459803][T20360] radix_tree_node_alloc.constprop.0+0x1eb/0x340 [ 333.466137][T20360] idr_get_free+0x425/0x8d0 [ 333.470655][T20360] idr_alloc_u32+0x19e/0x330 [ 333.475284][T20360] ? __fprop_inc_percpu_max+0x230/0x230 [ 333.480841][T20360] ? __lock_is_held+0xb6/0x140 [ 333.485607][T20360] ? check_preemption_disabled+0x48/0x290 [ 333.491334][T20360] idr_alloc_cyclic+0x132/0x270 [ 333.496191][T20360] ? idr_alloc+0x150/0x150 [ 333.500622][T20360] __kernfs_new_node+0x171/0x690 [ 333.505567][T20360] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 333.511028][T20360] ? wait_for_completion+0x440/0x440 [ 333.516326][T20360] ? mutex_unlock+0xd/0x10 [ 333.520745][T20360] ? kernfs_activate+0x192/0x1f0 [ 333.525691][T20360] kernfs_new_node+0x99/0x130 [ 333.530381][T20360] __kernfs_create_file+0x51/0x340 [ 333.535529][T20360] sysfs_add_file_mode_ns+0x222/0x560 [ 333.541219][T20360] internal_create_group+0x35b/0xc40 [ 333.546510][T20360] ? bd_set_size+0x89/0xb0 [ 333.550945][T20360] ? remove_files.isra.0+0x190/0x190 [ 333.556249][T20360] sysfs_create_group+0x20/0x30 [ 333.561106][T20360] lo_ioctl+0xf8f/0x20d0 [ 333.565354][T20360] ? lo_rw_aio+0x1530/0x1530 [ 333.569958][T20360] blkdev_ioctl+0xee8/0x1c40 [ 333.574556][T20360] ? blkpg_ioctl+0xa90/0xa90 [ 333.579151][T20360] ? find_held_lock+0x35/0x130 [ 333.583921][T20360] ? debug_check_no_obj_freed+0x211/0x444 [ 333.589651][T20360] ? kasan_check_write+0x14/0x20 [ 333.594592][T20360] ? __fget+0x340/0x540 [ 333.598916][T20360] ? find_held_lock+0x35/0x130 [ 333.603693][T20360] ? __fget+0x340/0x540 [ 333.607853][T20360] block_ioctl+0xee/0x130 [ 333.612188][T20360] ? blkdev_fallocate+0x410/0x410 [ 333.617220][T20360] do_vfs_ioctl+0xd6e/0x1390 [ 333.621816][T20360] ? ioctl_preallocate+0x210/0x210 [ 333.626935][T20360] ? __fget+0x367/0x540 [ 333.631147][T20360] ? ksys_dup3+0x3e0/0x3e0 [ 333.635579][T20360] ? do_sys_open+0x31d/0x5d0 [ 333.640178][T20360] ? security_file_ioctl+0x93/0xc0 [ 333.645296][T20360] ksys_ioctl+0xab/0xd0 [ 333.649463][T20360] __x64_sys_ioctl+0x73/0xb0 [ 333.654063][T20360] do_syscall_64+0x103/0x610 [ 333.658665][T20360] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 333.664559][T20360] RIP: 0033:0x457ca7 [ 333.668473][T20360] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 333.688079][T20360] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 333.696495][T20360] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000457ca7 [ 333.704476][T20360] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 333.712458][T20360] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 333.720453][T20360] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 333.728441][T20360] R13: 0000000000000001 R14: 00000000004dba08 R15: 0000000000000003 [ 333.816072][T20360] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:15:14 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r0, 0x8, 0x0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r0, 0xa, 0x12) dup2(r0, r1) tkill(0x0, 0x16) 23:15:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='u/f\x00', 0xce02, 0x0) 23:15:14 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x0) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:15:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0xfffffffffffffe57) 23:15:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x20000, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:15:14 executing program 4 (fault-call:0 fault-nth:17): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:15:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000000912, &(0x7f00000002c0)="0aa703a070000000000000") recvmmsg(r0, &(0x7f0000003a00)=[{{&(0x7f0000000300)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000380)=""/180, 0xb4}, {&(0x7f0000000440)=""/174, 0xae}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/251, 0xfb}, {&(0x7f0000000280)}], 0x5, &(0x7f0000001680)=""/107, 0x6b}, 0x7}, {{&(0x7f0000001700)=@hci, 0x80, &(0x7f0000001840)=[{&(0x7f0000001780)=""/171, 0xab}], 0x1}, 0x1}, {{&(0x7f0000001880)=@nfc, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001900)=""/120, 0x78}, {&(0x7f0000001980)=""/1, 0x1}, {&(0x7f00000019c0)=""/223, 0xdf}, {&(0x7f0000001ac0)=""/123, 0x7b}], 0x4, &(0x7f0000001b80)=""/214, 0xd6}, 0x3aef6cfc}, {{&(0x7f0000001c80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000002200)=[{&(0x7f0000001d00)=""/135, 0x87}, {&(0x7f0000001dc0)=""/194, 0xc2}, {&(0x7f0000001ec0)=""/196, 0xc4}, {&(0x7f0000001fc0)=""/87, 0x57}, {&(0x7f0000002040)=""/155, 0x9b}, {&(0x7f0000002100)=""/205, 0xcd}], 0x6, &(0x7f0000002280)=""/250, 0xfa}, 0x9}, {{0x0, 0x0, &(0x7f00000025c0)=[{&(0x7f0000002380)=""/122, 0x7a}, {&(0x7f0000002400)=""/21, 0x15}, {&(0x7f0000002440)=""/176, 0xb0}, {&(0x7f0000002500)=""/110, 0x6e}, {&(0x7f0000002580)}], 0x5}, 0xe186}, {{&(0x7f0000002640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}}, 0x80, &(0x7f0000002700)=[{&(0x7f00000026c0)=""/25, 0x19}], 0x1, &(0x7f0000002740)=""/241, 0xf1}, 0x4}, {{&(0x7f0000002840)=@xdp, 0x80, &(0x7f0000003980)=[{&(0x7f00000028c0)=""/4096, 0x1000}, {&(0x7f00000038c0)=""/103, 0x67}, {&(0x7f0000003940)=""/54, 0x36}], 0x3, &(0x7f00000039c0)=""/43, 0x2b}, 0x4}], 0x7, 0x3, &(0x7f0000003bc0)) r2 = syz_genetlink_get_family_id$team(&(0x7f0000003c40)='team\x00') getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000003c80)={@remote, @broadcast, 0x0}, &(0x7f0000003cc0)=0xc) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003e40)={&(0x7f0000003d00)=@can={0x1d, 0x0}, 0x80, &(0x7f0000003e00)=[{&(0x7f0000003d80)=""/45, 0x2d}, {&(0x7f0000003dc0)=""/32, 0x20}], 0x2}, 0x12001) getpeername$packet(0xffffffffffffff9c, &(0x7f0000003e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003ec0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003f00)={{{@in=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000004000)=0xe8) accept4(r0, &(0x7f0000004040)=@can={0x1d, 0x0}, &(0x7f00000040c0)=0x80, 0x80800) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000004100)={'lo\x00', 0x0}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000004140)={0x0, @empty, @dev}, &(0x7f0000004180)=0xc) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000041c0)={0x0, @multicast2, @loopback}, &(0x7f0000004200)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004840)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000004940)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000004b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000004b40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000005240)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000005280)={'vcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000053c0)={'team0\x00', 0x0}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1f, &(0x7f0000005400)={@mcast2, 0x0}, &(0x7f0000005440)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000006780)={'vcan0\x00', 0x0}) accept$packet(0xffffffffffffff9c, &(0x7f00000067c0)={0x11, 0x0, 0x0}, &(0x7f0000006800)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000006840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006880)=0x14, 0x80000) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1f, &(0x7f0000007900)={@rand_addr, 0x0}, &(0x7f0000007940)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007980)={{{@in=@multicast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000007a80)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000008280)={&(0x7f0000003c00)={0x10, 0x0, 0x0, 0x1020}, 0xc, &(0x7f0000008240)={&(0x7f0000007ac0)={0x774, r2, 0x100, 0x70bd2a, 0x25dfdbfd, {}, [{{0x8, 0x1, r3}, {0x288, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r4}}}, {0x64, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x34, 0x4, [{0x9, 0x2, 0x6, 0x2}, {0x33269ba9, 0x10001, 0x7, 0x7f}, {0xfffffffffffffffb, 0x8, 0x3, 0x8001}, {0xc7a7, 0x1, 0x4}, {0x7, 0x7fffffff, 0x6, 0x1ff}, {0x7fff, 0x8, 0x80}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x9ea7}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x8f5f}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r11}}}]}}, {{0x8, 0x1, r12}, {0x120, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r14}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x97}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r15}}}]}}, {{0x8, 0x1, r16}, {0x294, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r17}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x74, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x44, 0x4, [{0x7, 0x3, 0x3, 0x3}, {0x7, 0xff, 0x1, 0x7fff}, {0x9, 0x8, 0x9}, {0x100000001, 0x0, 0xc000, 0x2}, {0x8001, 0x5, 0x23, 0x7}, {0xe72, 0x0, 0xb5, 0x5fc}, {0x9, 0xfffffffffffffff7, 0x1}, {0x4, 0xcd3c, 0x9e, 0x9}]}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r18}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x40, 0x400000000000000, 0xff, 0x5}, {0x5, 0x8, 0x1ff, 0x200}, {0x2, 0xff, 0x2, 0xfffffffffffffffe}, {0x7, 0x7ce, 0xfffffffffffff001, 0x8}, {0x1, 0x4, 0x8, 0x9}, {0x40, 0x25, 0x8, 0xb7}, {0x8, 0xffffffff, 0x5, 0x9}]}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r19}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x683}}}]}}, {{0x8, 0x1, r20}, {0xc0, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x3f}}, {0x8, 0x6, r21}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xbe3}}}]}}]}, 0x774}, 0x1, 0x0, 0x0, 0x20008014}, 0x40000) r22 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) r23 = dup3(r22, r0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e22, @local}}}, &(0x7f0000000000)=0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r23, 0x84, 0x1f, &(0x7f0000000180)={r24, @in={{0x2, 0x4e21, @broadcast}}, 0x9, 0x7fffffff}, &(0x7f0000000240)=0x90) ioctl$SNDRV_TIMER_IOCTL_SELECT(r22, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) [ 335.819596][T20405] FAULT_INJECTION: forcing a failure. [ 335.819596][T20405] name failslab, interval 1, probability 0, space 0, times 0 23:15:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ud.\x00', 0xce02, 0x0) [ 335.875971][T20405] CPU: 1 PID: 20405 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 335.885106][T20405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 335.895177][T20405] Call Trace: [ 335.898491][T20405] dump_stack+0x172/0x1f0 [ 335.902851][T20405] should_fail.cold+0xa/0x15 [ 335.907470][T20405] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 335.913291][T20405] ? lock_downgrade+0x880/0x880 [ 335.918148][T20405] ? ___might_sleep+0x163/0x280 [ 335.923000][T20405] __should_failslab+0x121/0x190 [ 335.927959][T20405] should_failslab+0x9/0x14 [ 335.932473][T20405] kmem_cache_alloc+0x2be/0x710 [ 335.937331][T20405] ? lock_downgrade+0x880/0x880 [ 335.942192][T20405] ? kasan_check_read+0x11/0x20 [ 335.947056][T20405] __kernfs_new_node+0xef/0x690 [ 335.951928][T20405] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 335.957397][T20405] ? wait_for_completion+0x440/0x440 [ 335.962707][T20405] ? mutex_unlock+0xd/0x10 [ 335.967137][T20405] ? kernfs_activate+0x192/0x1f0 [ 335.972088][T20405] kernfs_new_node+0x99/0x130 [ 335.976781][T20405] __kernfs_create_file+0x51/0x340 [ 335.981909][T20405] sysfs_add_file_mode_ns+0x222/0x560 [ 335.987308][T20405] internal_create_group+0x35b/0xc40 [ 335.992603][T20405] ? bd_set_size+0x89/0xb0 [ 335.997037][T20405] ? remove_files.isra.0+0x190/0x190 [ 336.002344][T20405] sysfs_create_group+0x20/0x30 [ 336.007211][T20405] lo_ioctl+0xf8f/0x20d0 [ 336.011476][T20405] ? lo_rw_aio+0x1530/0x1530 [ 336.016083][T20405] blkdev_ioctl+0xee8/0x1c40 [ 336.020686][T20405] ? blkpg_ioctl+0xa90/0xa90 [ 336.025286][T20405] ? find_held_lock+0x35/0x130 [ 336.030067][T20405] ? debug_check_no_obj_freed+0x211/0x444 [ 336.035788][T20405] ? kasan_check_write+0x14/0x20 [ 336.040725][T20405] ? __fget+0x340/0x540 [ 336.044878][T20405] ? find_held_lock+0x35/0x130 [ 336.049646][T20405] ? __fget+0x340/0x540 [ 336.053805][T20405] block_ioctl+0xee/0x130 [ 336.058121][T20405] ? blkdev_fallocate+0x410/0x410 [ 336.063144][T20405] do_vfs_ioctl+0xd6e/0x1390 [ 336.067736][T20405] ? ioctl_preallocate+0x210/0x210 [ 336.072837][T20405] ? __fget+0x367/0x540 [ 336.076999][T20405] ? ksys_dup3+0x3e0/0x3e0 [ 336.081433][T20405] ? do_sys_open+0x31d/0x5d0 [ 336.086030][T20405] ? security_file_ioctl+0x93/0xc0 [ 336.091132][T20405] ksys_ioctl+0xab/0xd0 [ 336.095277][T20405] __x64_sys_ioctl+0x73/0xb0 [ 336.099870][T20405] do_syscall_64+0x103/0x610 [ 336.104464][T20405] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 336.110339][T20405] RIP: 0033:0x457ca7 [ 336.114222][T20405] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 336.133812][T20405] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 336.142214][T20405] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000457ca7 [ 336.150392][T20405] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 336.158437][T20405] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 336.166396][T20405] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 23:15:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x100000, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 336.174375][T20405] R13: 0000000000000001 R14: 00000000004dba08 R15: 0000000000000003 [ 336.190494][T20405] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:15:15 executing program 4 (fault-call:0 fault-nth:18): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:15:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ud/\x00', 0xce02, 0x0) [ 336.364529][T20594] FAULT_INJECTION: forcing a failure. [ 336.364529][T20594] name failslab, interval 1, probability 0, space 0, times 0 [ 336.403076][T20594] CPU: 1 PID: 20594 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 23:15:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x1000000, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 336.412121][T20594] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 336.422183][T20594] Call Trace: [ 336.425492][T20594] dump_stack+0x172/0x1f0 [ 336.429844][T20594] should_fail.cold+0xa/0x15 [ 336.434462][T20594] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 336.440281][T20594] ? lock_downgrade+0x880/0x880 [ 336.445145][T20594] ? ___might_sleep+0x163/0x280 [ 336.450015][T20594] __should_failslab+0x121/0x190 [ 336.454970][T20594] should_failslab+0x9/0x14 [ 336.459495][T20594] kmem_cache_alloc_trace+0x2d1/0x760 [ 336.464874][T20594] kobject_uevent_env+0x2fb/0x1030 [ 336.469994][T20594] kobject_uevent+0x20/0x26 [ 336.474501][T20594] lo_ioctl+0x100b/0x20d0 [ 336.478838][T20594] ? lo_rw_aio+0x1530/0x1530 [ 336.483467][T20594] blkdev_ioctl+0xee8/0x1c40 [ 336.488072][T20594] ? blkpg_ioctl+0xa90/0xa90 [ 336.492672][T20594] ? find_held_lock+0x35/0x130 [ 336.497448][T20594] ? debug_check_no_obj_freed+0x211/0x444 [ 336.503156][T20594] ? kasan_check_write+0x14/0x20 [ 336.508081][T20594] ? __fget+0x340/0x540 [ 336.512228][T20594] ? find_held_lock+0x35/0x130 [ 336.517086][T20594] ? __fget+0x340/0x540 [ 336.521243][T20594] block_ioctl+0xee/0x130 [ 336.525577][T20594] ? blkdev_fallocate+0x410/0x410 [ 336.530603][T20594] do_vfs_ioctl+0xd6e/0x1390 [ 336.535199][T20594] ? ioctl_preallocate+0x210/0x210 [ 336.540311][T20594] ? __fget+0x367/0x540 [ 336.544476][T20594] ? ksys_dup3+0x3e0/0x3e0 [ 336.548898][T20594] ? do_sys_open+0x31d/0x5d0 [ 336.553498][T20594] ? security_file_ioctl+0x93/0xc0 [ 336.558614][T20594] ksys_ioctl+0xab/0xd0 [ 336.562775][T20594] __x64_sys_ioctl+0x73/0xb0 [ 336.567356][T20594] do_syscall_64+0x103/0x610 [ 336.571956][T20594] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 336.577847][T20594] RIP: 0033:0x457ca7 [ 336.581737][T20594] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 336.601349][T20594] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 23:15:15 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r0, 0x8, 0x0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r0, 0xa, 0x12) dup2(r0, r1) tkill(0x0, 0x16) 23:15:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x02', 0xce02, 0x0) [ 336.609768][T20594] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000457ca7 [ 336.617748][T20594] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 336.625730][T20594] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 336.633709][T20594] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 336.641693][T20594] R13: 0000000000000001 R14: 00000000004dba08 R15: 0000000000000003 23:15:15 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x0) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 336.665188][T20594] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:15:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x03', 0xce02, 0x0) 23:15:15 executing program 4 (fault-call:0 fault-nth:19): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:15:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x2000000, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 336.872016][T20764] FAULT_INJECTION: forcing a failure. [ 336.872016][T20764] name failslab, interval 1, probability 0, space 0, times 0 [ 336.885332][T20764] CPU: 1 PID: 20764 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 336.894371][T20764] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 336.904464][T20764] Call Trace: [ 336.907776][T20764] dump_stack+0x172/0x1f0 [ 336.912126][T20764] should_fail.cold+0xa/0x15 [ 336.916734][T20764] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 336.922549][T20764] ? lock_downgrade+0x880/0x880 [ 336.927437][T20764] ? ___might_sleep+0x163/0x280 [ 336.932308][T20764] __should_failslab+0x121/0x190 [ 336.937297][T20764] should_failslab+0x9/0x14 [ 336.941802][T20764] kmem_cache_alloc_trace+0x2d1/0x760 [ 336.947178][T20764] kobject_uevent_env+0x2fb/0x1030 [ 336.952282][T20764] kobject_uevent+0x20/0x26 [ 336.956815][T20764] lo_ioctl+0x100b/0x20d0 [ 336.961153][T20764] ? lo_rw_aio+0x1530/0x1530 [ 336.965745][T20764] blkdev_ioctl+0xee8/0x1c40 [ 336.970323][T20764] ? blkpg_ioctl+0xa90/0xa90 [ 336.974901][T20764] ? find_held_lock+0x35/0x130 [ 336.979663][T20764] ? quarantine_put+0x1a0/0x1c0 [ 336.984530][T20764] ? kasan_check_write+0x14/0x20 [ 336.989472][T20764] ? __fget+0x340/0x540 [ 336.993614][T20764] ? find_held_lock+0x35/0x130 [ 336.998373][T20764] ? __fget+0x340/0x540 [ 337.002564][T20764] block_ioctl+0xee/0x130 [ 337.006893][T20764] ? blkdev_fallocate+0x410/0x410 [ 337.011906][T20764] do_vfs_ioctl+0xd6e/0x1390 [ 337.016531][T20764] ? ioctl_preallocate+0x210/0x210 [ 337.021640][T20764] ? __fget+0x367/0x540 [ 337.025810][T20764] ? ksys_dup3+0x3e0/0x3e0 [ 337.030228][T20764] ? do_sys_open+0x31d/0x5d0 [ 337.034809][T20764] ? security_file_ioctl+0x93/0xc0 [ 337.039919][T20764] ksys_ioctl+0xab/0xd0 [ 337.044092][T20764] __x64_sys_ioctl+0x73/0xb0 [ 337.048696][T20764] do_syscall_64+0x103/0x610 [ 337.053306][T20764] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 337.059211][T20764] RIP: 0033:0x457ca7 [ 337.063112][T20764] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 337.082717][T20764] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 337.091129][T20764] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000457ca7 [ 337.099112][T20764] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 337.107081][T20764] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 337.115051][T20764] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 23:15:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x24fb923, 0x0) ioctl$KDADDIO(r2, 0x4b34, 0x100000001) 23:15:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x04', 0xce02, 0x0) [ 337.123048][T20764] R13: 0000000000000001 R14: 00000000004dba08 R15: 0000000000000003 [ 337.159248][T20764] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:15:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x05', 0xce02, 0x0) 23:15:16 executing program 4 (fault-call:0 fault-nth:20): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:15:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x3000000, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:15:16 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='attr/sockcreate\x00') setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000380)={0x2, 0x7, 0x6, 0x0, 0x4, 0x6, 0x5, 0x7, 0x8, 0x4, 0xffff}, 0xb) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r2 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) [ 337.392994][T20892] FAULT_INJECTION: forcing a failure. [ 337.392994][T20892] name failslab, interval 1, probability 0, space 0, times 0 [ 337.418915][T20892] CPU: 1 PID: 20892 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 337.427957][T20892] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 337.438009][T20892] Call Trace: [ 337.441323][T20892] dump_stack+0x172/0x1f0 [ 337.445660][T20892] should_fail.cold+0xa/0x15 [ 337.450258][T20892] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 337.456075][T20892] ? lock_downgrade+0x880/0x880 [ 337.460945][T20892] ? ___might_sleep+0x163/0x280 [ 337.465809][T20892] __should_failslab+0x121/0x190 [ 337.470759][T20892] should_failslab+0x9/0x14 [ 337.475275][T20892] kmem_cache_alloc_node+0x265/0x710 [ 337.480571][T20892] ? find_held_lock+0x35/0x130 [ 337.485456][T20892] __alloc_skb+0xd5/0x5e0 [ 337.489866][T20892] ? skb_trim+0x190/0x190 [ 337.494214][T20892] ? kasan_check_read+0x11/0x20 [ 337.499082][T20892] alloc_uevent_skb+0x83/0x1e2 [ 337.503860][T20892] kobject_uevent_env+0xa63/0x1030 [ 337.508997][T20892] kobject_uevent+0x20/0x26 [ 337.513523][T20892] lo_ioctl+0x100b/0x20d0 [ 337.517868][T20892] ? lo_rw_aio+0x1530/0x1530 [ 337.522476][T20892] blkdev_ioctl+0xee8/0x1c40 [ 337.527086][T20892] ? blkpg_ioctl+0xa90/0xa90 [ 337.531687][T20892] ? find_held_lock+0x35/0x130 [ 337.536472][T20892] ? debug_check_no_obj_freed+0x211/0x444 23:15:16 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r0, 0x8, 0x0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r0, 0xa, 0x12) dup2(r0, r1) tkill(0x0, 0x16) 23:15:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x06', 0xce02, 0x0) [ 337.542220][T20892] ? kasan_check_write+0x14/0x20 [ 337.547171][T20892] ? __fget+0x340/0x540 [ 337.551337][T20892] ? find_held_lock+0x35/0x130 [ 337.556111][T20892] ? __fget+0x340/0x540 [ 337.560281][T20892] block_ioctl+0xee/0x130 [ 337.564616][T20892] ? blkdev_fallocate+0x410/0x410 [ 337.569654][T20892] do_vfs_ioctl+0xd6e/0x1390 [ 337.574261][T20892] ? ioctl_preallocate+0x210/0x210 [ 337.579382][T20892] ? __fget+0x367/0x540 [ 337.583569][T20892] ? ksys_dup3+0x3e0/0x3e0 [ 337.587999][T20892] ? do_sys_open+0x31d/0x5d0 [ 337.592632][T20892] ? security_file_ioctl+0x93/0xc0 [ 337.597986][T20892] ksys_ioctl+0xab/0xd0 [ 337.602154][T20892] __x64_sys_ioctl+0x73/0xb0 [ 337.606756][T20892] do_syscall_64+0x103/0x610 [ 337.611361][T20892] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 337.617313][T20892] RIP: 0033:0x457ca7 [ 337.621219][T20892] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 337.640827][T20892] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 337.649244][T20892] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000457ca7 [ 337.657223][T20892] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 337.665201][T20892] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 337.673180][T20892] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 337.681296][T20892] R13: 0000000000000001 R14: 00000000004dba08 R15: 0000000000000003 23:15:16 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x0) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:15:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") timer_create(0x0, &(0x7f0000000000)={0x0, 0x37, 0x1}, &(0x7f00000000c0)=0x0) r2 = syz_open_dev$radio(&(0x7f00000002c0)='/dev/radio#\x00', 0x2, 0x2) write$P9_RUNLINKAT(r2, &(0x7f0000000300)={0x7, 0x4d, 0x2}, 0x7) timer_gettime(r1, &(0x7f0000000100)) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x2, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) sendto$unix(r0, &(0x7f0000000180)="93946047486d9914c08278c5ac861da6986b4f8f9bb717a8f7652db8fdf0f341efd5e9dd2a36d8ece982c7ce69ec8319621677595b1421cc5a82718f4b10de0aef09977413fd146639e994b79e422fbeb3fed9c60a8f348c9c1930e5a28822cff0aee1b7eae85b8bccc073de7d0609df666402d7a14990835b8b7dfde90a49f332811a5e944609efe9eed0da06a8a4ba2eb32f529436cca2fbaba4", 0x9b, 0x40, &(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e) [ 337.728942][T20892] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:15:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\a', 0xce02, 0x0) 23:15:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x3, 0x4) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000100)={{0x1, 0x0, 0x5, 0xfffffffffffffffc}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) r2 = perf_event_open(&(0x7f0000000080)={0xd4b5008e7f7fd3c8, 0x70, 0x9, 0x3, 0x1, 0x3, 0x0, 0x7, 0x40010, 0xc, 0x8, 0x9, 0x200, 0xda, 0x6, 0x6, 0x744, 0x9, 0x8001, 0x81, 0x10000, 0x1, 0x8, 0x9, 0x0, 0x98b, 0x5841, 0x1b, 0x400, 0x6, 0x9, 0x5, 0x3, 0x3ff, 0x16, 0x80000001, 0x6, 0x6, 0x0, 0x5c, 0x4, @perf_config_ext={0x2, 0xac6}, 0x0, 0x0, 0x7, 0x8, 0x8, 0x0, 0x4}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x1ff) 23:15:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x4000000, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:15:16 executing program 4 (fault-call:0 fault-nth:21): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:15:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\b', 0xce02, 0x0) [ 338.020994][T21034] FAULT_INJECTION: forcing a failure. [ 338.020994][T21034] name failslab, interval 1, probability 0, space 0, times 0 [ 338.051678][T21034] CPU: 0 PID: 21034 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 338.060785][T21034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 23:15:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x80000, 0x0) 23:15:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x5000000, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 338.070849][T21034] Call Trace: [ 338.074165][T21034] dump_stack+0x172/0x1f0 [ 338.078527][T21034] should_fail.cold+0xa/0x15 [ 338.083150][T21034] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 338.088972][T21034] ? lock_downgrade+0x880/0x880 [ 338.093841][T21034] ? ___might_sleep+0x163/0x280 [ 338.098710][T21034] __should_failslab+0x121/0x190 [ 338.103666][T21034] should_failslab+0x9/0x14 [ 338.108183][T21034] kmem_cache_alloc_node+0x265/0x710 [ 338.113539][T21034] ? find_held_lock+0x35/0x130 [ 338.118300][T21034] __alloc_skb+0xd5/0x5e0 [ 338.122619][T21034] ? skb_trim+0x190/0x190 [ 338.126950][T21034] ? kasan_check_read+0x11/0x20 [ 338.131806][T21034] alloc_uevent_skb+0x83/0x1e2 [ 338.136568][T21034] kobject_uevent_env+0xa63/0x1030 [ 338.141672][T21034] kobject_uevent+0x20/0x26 [ 338.146233][T21034] lo_ioctl+0x100b/0x20d0 [ 338.150609][T21034] ? lo_rw_aio+0x1530/0x1530 [ 338.155191][T21034] blkdev_ioctl+0xee8/0x1c40 [ 338.159781][T21034] ? blkpg_ioctl+0xa90/0xa90 [ 338.164382][T21034] ? find_held_lock+0x35/0x130 [ 338.169188][T21034] ? debug_check_no_obj_freed+0x211/0x444 [ 338.174978][T21034] ? kasan_check_write+0x14/0x20 [ 338.179929][T21034] ? __fget+0x340/0x540 [ 338.184087][T21034] ? find_held_lock+0x35/0x130 [ 338.188906][T21034] ? __fget+0x340/0x540 [ 338.193064][T21034] block_ioctl+0xee/0x130 [ 338.197383][T21034] ? blkdev_fallocate+0x410/0x410 [ 338.202439][T21034] do_vfs_ioctl+0xd6e/0x1390 [ 338.207064][T21034] ? ioctl_preallocate+0x210/0x210 [ 338.212178][T21034] ? __fget+0x367/0x540 [ 338.216327][T21034] ? ksys_dup3+0x3e0/0x3e0 [ 338.220792][T21034] ? do_sys_open+0x31d/0x5d0 [ 338.225399][T21034] ? security_file_ioctl+0x93/0xc0 [ 338.230537][T21034] ksys_ioctl+0xab/0xd0 [ 338.234681][T21034] __x64_sys_ioctl+0x73/0xb0 [ 338.239271][T21034] do_syscall_64+0x103/0x610 [ 338.243906][T21034] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 338.249800][T21034] RIP: 0033:0x457ca7 [ 338.253689][T21034] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 338.273278][T21034] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 338.281674][T21034] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000457ca7 [ 338.289631][T21034] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 338.297694][T21034] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 338.305662][T21034] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 338.313638][T21034] R13: 0000000000000001 R14: 00000000004dba08 R15: 0000000000000003 [ 338.326531][T21034] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:15:17 executing program 4 (fault-call:0 fault-nth:22): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 338.508864][T21192] FAULT_INJECTION: forcing a failure. [ 338.508864][T21192] name failslab, interval 1, probability 0, space 0, times 0 [ 338.522741][T21192] CPU: 1 PID: 21192 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 338.531778][T21192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 338.541839][T21192] Call Trace: [ 338.545158][T21192] dump_stack+0x172/0x1f0 [ 338.549513][T21192] should_fail.cold+0xa/0x15 23:15:17 executing program 5: r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:15:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0) getsockname(r0, &(0x7f00000000c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000000)=0x80) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f00000001c0)=""/4096) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) [ 338.554117][T21192] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 338.559944][T21192] ? lock_downgrade+0x880/0x880 [ 338.564812][T21192] ? ___might_sleep+0x163/0x280 [ 338.569681][T21192] __should_failslab+0x121/0x190 [ 338.574620][T21192] should_failslab+0x9/0x14 [ 338.579128][T21192] kmem_cache_alloc_node_trace+0x270/0x720 [ 338.584953][T21192] ? __alloc_skb+0xd5/0x5e0 [ 338.589479][T21192] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 338.595649][T21192] __kmalloc_node_track_caller+0x3d/0x70 [ 338.601298][T21192] __kmalloc_reserve.isra.0+0x40/0xf0 [ 338.606688][T21192] __alloc_skb+0x10b/0x5e0 [ 338.611122][T21192] ? skb_trim+0x190/0x190 [ 338.615471][T21192] ? kasan_check_read+0x11/0x20 [ 338.620341][T21192] alloc_uevent_skb+0x83/0x1e2 [ 338.625123][T21192] kobject_uevent_env+0xa63/0x1030 [ 338.630262][T21192] kobject_uevent+0x20/0x26 [ 338.634780][T21192] lo_ioctl+0x100b/0x20d0 [ 338.639125][T21192] ? lo_rw_aio+0x1530/0x1530 [ 338.643732][T21192] blkdev_ioctl+0xee8/0x1c40 [ 338.648336][T21192] ? blkpg_ioctl+0xa90/0xa90 [ 338.652942][T21192] ? find_held_lock+0x35/0x130 23:15:17 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:15:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\t', 0xce02, 0x0) 23:15:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x6000000, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:15:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x210000, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r3, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x101}]}, 0x1c}}, 0x4000) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/btrfs-control\x00', 0x20040, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r4, 0xc0045540, &(0x7f0000000200)=0x65) ioctl$SCSI_IOCTL_START_UNIT(r4, 0x5) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) [ 338.657717][T21192] ? debug_check_no_obj_freed+0x211/0x444 [ 338.663465][T21192] ? kasan_check_write+0x14/0x20 [ 338.668456][T21192] ? __fget+0x340/0x540 [ 338.672627][T21192] ? find_held_lock+0x35/0x130 [ 338.677404][T21192] ? __fget+0x340/0x540 [ 338.681613][T21192] block_ioctl+0xee/0x130 [ 338.685960][T21192] ? blkdev_fallocate+0x410/0x410 [ 338.691000][T21192] do_vfs_ioctl+0xd6e/0x1390 [ 338.695616][T21192] ? ioctl_preallocate+0x210/0x210 [ 338.700741][T21192] ? __fget+0x367/0x540 [ 338.704911][T21192] ? ksys_dup3+0x3e0/0x3e0 23:15:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\n', 0xce02, 0x0) [ 338.709352][T21192] ? do_sys_open+0x31d/0x5d0 [ 338.713964][T21192] ? security_file_ioctl+0x93/0xc0 [ 338.719091][T21192] ksys_ioctl+0xab/0xd0 [ 338.723260][T21192] __x64_sys_ioctl+0x73/0xb0 [ 338.727861][T21192] do_syscall_64+0x103/0x610 [ 338.732492][T21192] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 338.738389][T21192] RIP: 0033:0x457ca7 [ 338.742302][T21192] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 338.761907][T21192] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 338.770321][T21192] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000457ca7 [ 338.778277][T21192] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 338.786235][T21192] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 338.794192][T21192] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 338.802158][T21192] R13: 0000000000000001 R14: 00000000004dba08 R15: 0000000000000003 [ 338.833738][T21192] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:15:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nullb0\x00', 0x40001, 0x0) ioctl$BLKSECTGET(r2, 0x1267, &(0x7f0000000180)) r3 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000000)=0x0) rt_tgsigqueueinfo(r3, r4, 0x6, &(0x7f00000000c0)={0x25, 0x4, 0x81d}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:15:17 executing program 5: r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:15:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\f', 0xce02, 0x0) 23:15:17 executing program 4 (fault-call:0 fault-nth:23): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:15:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) ioctl$KDGETMODE(r1, 0x4b3b, &(0x7f0000000340)) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) r2 = semget$private(0x0, 0x3, 0x190) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="030011000000000800b380687ac48b6808da594bc7de1c0dd0c67dde0e7c9c35dd4f6f51074ac4551e54e86b852ecd629ce843040b6864643b7b036debf080c75b0e1d55738ddd84849fdd5888d7d54b69373cbafab89f045d154026b6f193d3cf0c7f07fc20bb3c57d1d9629f9b5d19a61526be08ac034538c54ba26ecc72e820637804ffd6b709f5791253696cd09bc6236779b0f548a21dd55fc4a747ce0db424c04419f4d7512c71be7faa157f61f878e5a0cba8d1000000000000"], 0xbd, 0x1) timer_create(0x7, &(0x7f00000000c0)={0x0, 0x3a, 0x5}, &(0x7f0000000100)=0x0) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-monitor\x00', 0x40100, 0x0) timer_getoverrun(r3) semop(r2, &(0x7f0000000140)=[{0x3, 0x80, 0x1800}, {0x1, 0x0, 0x1800}, {0x2, 0x6, 0x1000}], 0x3) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x0, 0x0) r5 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) setsockopt$inet_sctp6_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f00000002c0)={0x0, 0xffff, 0x80000001, 0x7}, 0x8) 23:15:18 executing program 5: r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:15:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x7000000, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 339.142319][T21400] FAULT_INJECTION: forcing a failure. [ 339.142319][T21400] name failslab, interval 1, probability 0, space 0, times 0 [ 339.170156][T21400] CPU: 0 PID: 21400 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 339.179203][T21400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 339.189268][T21400] Call Trace: [ 339.192576][T21400] dump_stack+0x172/0x1f0 [ 339.196931][T21400] should_fail.cold+0xa/0x15 [ 339.201529][T21400] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 339.207324][T21400] ? lock_downgrade+0x880/0x880 [ 339.212164][T21400] ? ___might_sleep+0x163/0x280 [ 339.217002][T21400] __should_failslab+0x121/0x190 [ 339.221929][T21400] should_failslab+0x9/0x14 [ 339.226443][T21400] kmem_cache_alloc+0x2be/0x710 [ 339.231285][T21400] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 339.237076][T21400] ? lock_downgrade+0x880/0x880 [ 339.241922][T21400] skb_clone+0x150/0x3b0 [ 339.246222][T21400] netlink_broadcast_filtered+0x870/0xb20 [ 339.251938][T21400] netlink_broadcast+0x3a/0x50 [ 339.256696][T21400] kobject_uevent_env+0xa94/0x1030 [ 339.261810][T21400] kobject_uevent+0x20/0x26 [ 339.266306][T21400] lo_ioctl+0x100b/0x20d0 [ 339.270668][T21400] ? lo_rw_aio+0x1530/0x1530 [ 339.275286][T21400] blkdev_ioctl+0xee8/0x1c40 [ 339.279866][T21400] ? blkpg_ioctl+0xa90/0xa90 [ 339.284461][T21400] ? find_held_lock+0x35/0x130 [ 339.289212][T21400] ? debug_check_no_obj_freed+0x211/0x444 [ 339.294921][T21400] ? kasan_check_write+0x14/0x20 [ 339.299860][T21400] ? __fget+0x340/0x540 [ 339.304047][T21400] ? find_held_lock+0x35/0x130 [ 339.308809][T21400] ? __fget+0x340/0x540 [ 339.312967][T21400] block_ioctl+0xee/0x130 [ 339.317321][T21400] ? blkdev_fallocate+0x410/0x410 [ 339.322344][T21400] do_vfs_ioctl+0xd6e/0x1390 [ 339.326939][T21400] ? ioctl_preallocate+0x210/0x210 [ 339.332070][T21400] ? __fget+0x367/0x540 [ 339.336251][T21400] ? ksys_dup3+0x3e0/0x3e0 [ 339.340692][T21400] ? do_sys_open+0x31d/0x5d0 [ 339.345274][T21400] ? security_file_ioctl+0x93/0xc0 [ 339.350372][T21400] ksys_ioctl+0xab/0xd0 [ 339.354557][T21400] __x64_sys_ioctl+0x73/0xb0 [ 339.359140][T21400] do_syscall_64+0x103/0x610 [ 339.363723][T21400] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 339.369602][T21400] RIP: 0033:0x457ca7 [ 339.373498][T21400] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 339.393085][T21400] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 339.401482][T21400] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000457ca7 [ 339.409457][T21400] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 339.417431][T21400] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 339.425438][T21400] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 339.433484][T21400] R13: 0000000000000001 R14: 00000000004dba08 R15: 0000000000000003 [ 339.461535][T21400] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:15:18 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:15:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x0e', 0xce02, 0x0) 23:15:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") modify_ldt$read(0x0, &(0x7f00000000c0)=""/111, 0x6f) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000000)={{0x1, 0x0, 0xfffffffffffffffd, 0x2, 0x14bfe467}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:15:18 executing program 4 (fault-call:0 fault-nth:24): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:15:18 executing program 5: mknod(0x0, 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:15:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0xa000000, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 339.761459][T21519] FAULT_INJECTION: forcing a failure. [ 339.761459][T21519] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 339.774704][T21519] CPU: 1 PID: 21519 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 339.783731][T21519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 339.793797][T21519] Call Trace: [ 339.797105][T21519] dump_stack+0x172/0x1f0 [ 339.801487][T21519] should_fail.cold+0xa/0x15 [ 339.806094][T21519] ? lo_ioctl+0x188/0x20d0 [ 339.806115][T21519] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 339.806142][T21519] should_fail_alloc_page+0x50/0x60 [ 339.806157][T21519] __alloc_pages_nodemask+0x1a1/0x7e0 [ 339.806183][T21519] ? debug_check_no_obj_freed+0x211/0x444 [ 339.821606][T21519] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 339.821622][T21519] ? find_held_lock+0x35/0x130 [ 339.821655][T21519] cache_grow_begin+0x9c/0x850 [ 339.821671][T21519] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 339.821687][T21519] ? check_preemption_disabled+0x48/0x290 [ 339.821707][T21519] kmem_cache_alloc+0x645/0x710 [ 339.821722][T21519] ? __fget+0x367/0x540 [ 339.821743][T21519] getname_flags+0xd6/0x5b0 [ 339.821760][T21519] do_mkdirat+0xa0/0x2a0 [ 339.821776][T21519] ? __ia32_sys_mknod+0xb0/0xb0 [ 339.821799][T21519] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 339.888060][T21519] ? do_syscall_64+0x26/0x610 [ 339.892756][T21519] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 339.898833][T21519] ? do_syscall_64+0x26/0x610 [ 339.903527][T21519] ? lockdep_hardirqs_on+0x418/0x5d0 [ 339.908826][T21519] __x64_sys_mkdir+0x5c/0x80 [ 339.913444][T21519] do_syscall_64+0x103/0x610 [ 339.918058][T21519] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 339.923961][T21519] RIP: 0033:0x457257 [ 339.927868][T21519] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 339.947480][T21519] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 23:15:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x3f000000, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:15:18 executing program 5: mknod(0x0, 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) [ 339.955904][T21519] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000457257 [ 339.963887][T21519] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000000 [ 339.963896][T21519] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 339.963906][T21519] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 339.963915][T21519] R13: 0000000000000001 R14: 00000000004dba08 R15: 0000000000000003 [ 340.005561][T21519] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:15:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) r2 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r2, 0x40405515, &(0x7f00000000c0)={0x1, 0x6, 0x0, 0xffffffffffff29f9, 'syz1\x00', 0x1ff}) 23:15:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x10', 0xce02, 0x0) 23:15:19 executing program 5: mknod(0x0, 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:15:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x40000000, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:15:19 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:15:19 executing program 4 (fault-call:0 fault-nth:25): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:15:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c1270dd01003f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x86000, 0x0) ioctl$SIOCAX25ADDFWD(r2, 0x89ea, &(0x7f00000000c0)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:15:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf#', 0xce02, 0x0) 23:15:19 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:15:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x48000000, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 340.380392][T21861] FAULT_INJECTION: forcing a failure. [ 340.380392][T21861] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 340.393661][T21861] CPU: 0 PID: 21861 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 340.402692][T21861] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 340.412757][T21861] Call Trace: [ 340.416071][T21861] dump_stack+0x172/0x1f0 [ 340.420456][T21861] should_fail.cold+0xa/0x15 [ 340.425062][T21861] ? lo_ioctl+0x188/0x20d0 [ 340.429498][T21861] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 340.435331][T21861] should_fail_alloc_page+0x50/0x60 [ 340.440548][T21861] __alloc_pages_nodemask+0x1a1/0x7e0 [ 340.445936][T21861] ? debug_check_no_obj_freed+0x211/0x444 [ 340.451670][T21861] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 340.457397][T21861] ? find_held_lock+0x35/0x130 [ 340.462215][T21861] cache_grow_begin+0x9c/0x850 [ 340.466989][T21861] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 340.473242][T21861] ? check_preemption_disabled+0x48/0x290 [ 340.479037][T21861] kmem_cache_alloc+0x645/0x710 [ 340.483902][T21861] ? __fget+0x367/0x540 [ 340.488073][T21861] getname_flags+0xd6/0x5b0 [ 340.492598][T21861] do_mkdirat+0xa0/0x2a0 [ 340.496853][T21861] ? __ia32_sys_mknod+0xb0/0xb0 [ 340.501711][T21861] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 340.507182][T21861] ? do_syscall_64+0x26/0x610 [ 340.511870][T21861] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 340.517945][T21861] ? do_syscall_64+0x26/0x610 [ 340.522637][T21861] ? lockdep_hardirqs_on+0x418/0x5d0 [ 340.527937][T21861] __x64_sys_mkdir+0x5c/0x80 [ 340.532539][T21861] do_syscall_64+0x103/0x610 [ 340.537147][T21861] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 340.543046][T21861] RIP: 0033:0x457257 [ 340.546949][T21861] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 340.566617][T21861] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 23:15:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f00000000c0)={0x1, 0xac, 0x81}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x40) ioctl$SIOCGETNODEID(r2, 0x89e1, &(0x7f0000000140)={0x1}) 23:15:19 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) [ 340.575038][T21861] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000457257 [ 340.583017][T21861] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000000 [ 340.590995][T21861] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 340.598976][T21861] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 340.606954][T21861] R13: 0000000000000001 R14: 00000000004dba08 R15: 0000000000000003 23:15:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\xf0', 0xce02, 0x0) [ 340.681997][T21861] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:15:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x4c000000, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:15:19 executing program 4 (fault-call:0 fault-nth:26): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:15:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) write$P9_RCLUNK(r1, &(0x7f0000000000)={0x7, 0x79, 0x2}, 0x7) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) [ 340.856599][T21985] FAULT_INJECTION: forcing a failure. [ 340.856599][T21985] name failslab, interval 1, probability 0, space 0, times 0 [ 340.870497][T21985] CPU: 1 PID: 21985 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 340.879539][T21985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 340.889599][T21985] Call Trace: [ 340.892899][T21985] dump_stack+0x172/0x1f0 [ 340.897254][T21985] should_fail.cold+0xa/0x15 [ 340.901862][T21985] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 340.907685][T21985] ? ___might_sleep+0x163/0x280 [ 340.912552][T21985] __should_failslab+0x121/0x190 [ 340.917518][T21985] should_failslab+0x9/0x14 [ 340.922041][T21985] __kmalloc+0x2dc/0x740 [ 340.926369][T21985] ? ext4_find_extent+0x76e/0x9d0 [ 340.931447][T21985] ext4_find_extent+0x76e/0x9d0 [ 340.936312][T21985] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 340.942484][T21985] ext4_ext_map_blocks+0x1cc/0x4e50 [ 340.947703][T21985] ? ext4_ext_release+0x10/0x10 [ 340.952570][T21985] ? __lock_is_held+0xb6/0x140 [ 340.957351][T21985] ? lock_acquire+0x16f/0x3f0 [ 340.962078][T21985] ? ext4_map_blocks+0x3fd/0x1a00 [ 340.967128][T21985] ext4_map_blocks+0xebb/0x1a00 [ 340.972000][T21985] ? ext4_issue_zeroout+0x190/0x190 [ 340.977214][T21985] ? kasan_check_write+0x14/0x20 [ 340.982162][T21985] ? __brelse+0x95/0xb0 [ 340.986330][T21985] ext4_getblk+0xc4/0x510 [ 340.990672][T21985] ? ext4_iomap_begin+0xfe0/0xfe0 [ 340.995713][T21985] ? ext4_free_inode+0x1450/0x1450 [ 341.000836][T21985] ext4_bread+0x8f/0x230 [ 341.005085][T21985] ? ext4_getblk+0x510/0x510 [ 341.009733][T21985] ext4_append+0x155/0x370 [ 341.014171][T21985] ext4_mkdir+0x61b/0xdf0 [ 341.018522][T21985] ? ext4_init_dot_dotdot+0x520/0x520 [ 341.023906][T21985] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 341.030155][T21985] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 341.036404][T21985] ? security_inode_permission+0xd5/0x110 [ 341.042156][T21985] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 341.048409][T21985] ? security_inode_mkdir+0xee/0x120 [ 341.053725][T21985] vfs_mkdir+0x433/0x690 [ 341.057980][T21985] do_mkdirat+0x234/0x2a0 [ 341.062318][T21985] ? __ia32_sys_mknod+0xb0/0xb0 [ 341.067177][T21985] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 341.072734][T21985] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 341.078809][T21985] ? do_syscall_64+0x26/0x610 [ 341.083498][T21985] ? lockdep_hardirqs_on+0x418/0x5d0 [ 341.088796][T21985] __x64_sys_mkdir+0x5c/0x80 [ 341.093397][T21985] do_syscall_64+0x103/0x610 [ 341.098022][T21985] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 341.103917][T21985] RIP: 0033:0x457257 [ 341.107824][T21985] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 341.127445][T21985] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 341.135865][T21985] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000457257 [ 341.143842][T21985] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000000 [ 341.151819][T21985] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 341.159792][T21985] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 341.167767][T21985] R13: 0000000000000001 R14: 00000000004dba08 R15: 0000000000000003 [ 341.193604][T21985] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:15:20 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, 0x0, 0x0, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:15:20 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:15:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:15:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xbe, 0x40000) write$P9_RLINK(r1, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') open$dir(&(0x7f0000000100)='./file0\x00', 0x2c840, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40086432, &(0x7f0000000100)=0x4) r4 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r4, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:15:20 executing program 4 (fault-call:0 fault-nth:27): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:15:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x68000000, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 341.523450][T22097] FAULT_INJECTION: forcing a failure. [ 341.523450][T22097] name failslab, interval 1, probability 0, space 0, times 0 [ 341.536578][T22097] CPU: 1 PID: 22097 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 341.545615][T22097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 341.555669][T22097] Call Trace: [ 341.559015][T22097] dump_stack+0x172/0x1f0 [ 341.563359][T22097] should_fail.cold+0xa/0x15 [ 341.567961][T22097] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 341.573771][T22097] ? save_stack+0xa9/0xd0 [ 341.578107][T22097] ? __es_tree_search.isra.0+0x1bf/0x230 [ 341.583751][T22097] __should_failslab+0x121/0x190 [ 341.588695][T22097] should_failslab+0x9/0x14 [ 341.593203][T22097] kmem_cache_alloc+0x47/0x710 [ 341.598144][T22097] ? ext4_es_scan+0x6f0/0x6f0 [ 341.602824][T22097] ? do_raw_write_lock+0x124/0x290 [ 341.607947][T22097] __es_insert_extent+0x2cc/0xf20 [ 341.612989][T22097] ext4_es_insert_extent+0x2b7/0xa40 [ 341.618286][T22097] ? ext4_es_scan_clu+0x50/0x50 [ 341.623147][T22097] ? rcu_read_lock_sched_held+0x110/0x130 [ 341.628867][T22097] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 341.635112][T22097] ? ext4_es_find_extent_range+0xff/0x600 [ 341.640840][T22097] ext4_ext_put_gap_in_cache+0xfe/0x150 [ 341.646385][T22097] ? ext4_rereserve_cluster+0x240/0x240 [ 341.651955][T22097] ? ext4_find_extent+0x76e/0x9d0 [ 341.656986][T22097] ? ext4_find_extent+0x6a6/0x9d0 [ 341.662020][T22097] ext4_ext_map_blocks+0x216a/0x4e50 [ 341.667316][T22097] ? ext4_ext_release+0x10/0x10 [ 341.672169][T22097] ? __lock_is_held+0xb6/0x140 [ 341.677031][T22097] ? lock_acquire+0x16f/0x3f0 [ 341.681711][T22097] ? ext4_map_blocks+0x3fd/0x1a00 [ 341.686749][T22097] ext4_map_blocks+0xebb/0x1a00 [ 341.691611][T22097] ? ext4_issue_zeroout+0x190/0x190 [ 341.696816][T22097] ? kasan_check_write+0x14/0x20 [ 341.701758][T22097] ? __brelse+0x95/0xb0 [ 341.705916][T22097] ext4_getblk+0xc4/0x510 [ 341.710252][T22097] ? ext4_iomap_begin+0xfe0/0xfe0 [ 341.715279][T22097] ? ext4_free_inode+0x1450/0x1450 [ 341.720390][T22097] ext4_bread+0x8f/0x230 [ 341.724638][T22097] ? ext4_getblk+0x510/0x510 [ 341.729711][T22097] ext4_append+0x155/0x370 [ 341.734128][T22097] ext4_mkdir+0x61b/0xdf0 [ 341.738459][T22097] ? ext4_init_dot_dotdot+0x520/0x520 [ 341.743825][T22097] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 341.750056][T22097] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 341.756290][T22097] ? security_inode_permission+0xd5/0x110 [ 341.762006][T22097] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 341.768243][T22097] ? security_inode_mkdir+0xee/0x120 [ 341.773531][T22097] vfs_mkdir+0x433/0x690 [ 341.777776][T22097] do_mkdirat+0x234/0x2a0 [ 341.782101][T22097] ? __ia32_sys_mknod+0xb0/0xb0 [ 341.786957][T22097] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 341.792423][T22097] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 341.798488][T22097] ? do_syscall_64+0x26/0x610 [ 341.803164][T22097] ? lockdep_hardirqs_on+0x418/0x5d0 [ 341.808453][T22097] __x64_sys_mkdir+0x5c/0x80 [ 341.813044][T22097] do_syscall_64+0x103/0x610 [ 341.817637][T22097] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 341.823523][T22097] RIP: 0033:0x457257 [ 341.827421][T22097] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 341.847017][T22097] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 341.855428][T22097] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000457257 [ 341.863409][T22097] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000000 [ 341.871391][T22097] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 341.879365][T22097] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 341.887324][T22097] R13: 0000000000000001 R14: 00000000004dba08 R15: 0000000000000003 [ 341.908375][T22097] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:15:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:15:20 executing program 4 (fault-call:0 fault-nth:28): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:15:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_PLL_SET(r2, 0x40207012, &(0x7f00000000c0)={0x4, 0x8, 0x80000001, 0xe7a3, 0xffffffffffffffff, 0x0, 0x7d375605}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:15:20 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:15:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x6c000000, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 342.095774][T22213] FAULT_INJECTION: forcing a failure. [ 342.095774][T22213] name failslab, interval 1, probability 0, space 0, times 0 [ 342.137489][T22213] CPU: 1 PID: 22213 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 342.146529][T22213] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 342.156588][T22213] Call Trace: [ 342.159895][T22213] dump_stack+0x172/0x1f0 [ 342.164249][T22213] should_fail.cold+0xa/0x15 [ 342.168849][T22213] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 342.174660][T22213] ? kasan_check_read+0x11/0x20 [ 342.179520][T22213] ? ___might_sleep+0x163/0x280 [ 342.184378][T22213] __should_failslab+0x121/0x190 [ 342.189331][T22213] should_failslab+0x9/0x14 [ 342.193841][T22213] kmem_cache_alloc+0x2be/0x710 [ 342.198696][T22213] ? __save_stack_trace+0x8a/0xf0 [ 342.203779][T22213] ? ratelimit_state_init+0xb0/0xb0 [ 342.208987][T22213] ext4_alloc_inode+0x1f/0x640 [ 342.213753][T22213] ? ratelimit_state_init+0xb0/0xb0 [ 342.218962][T22213] alloc_inode+0x66/0x190 [ 342.223297][T22213] new_inode_pseudo+0x19/0xf0 [ 342.227978][T22213] new_inode+0x1f/0x40 [ 342.232053][T22213] __ext4_new_inode+0x37e/0x5450 [ 342.236990][T22213] ? filename_create+0x26f/0x4f0 [ 342.241943][T22213] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 342.248015][T22213] ? d_splice_alias+0x6c1/0xcc0 [ 342.252873][T22213] ? debug_check_no_obj_freed+0x211/0x444 [ 342.258607][T22213] ? ext4_free_inode+0x1450/0x1450 [ 342.263729][T22213] ? lock_downgrade+0x880/0x880 [ 342.268584][T22213] ? dqget+0x10d0/0x10d0 [ 342.272841][T22213] ? __lock_is_held+0xb6/0x140 [ 342.277609][T22213] ? check_preemption_disabled+0x48/0x290 [ 342.283334][T22213] ext4_mkdir+0x3d5/0xdf0 [ 342.287681][T22213] ? ext4_init_dot_dotdot+0x520/0x520 [ 342.293057][T22213] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 342.299297][T22213] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 342.305536][T22213] ? security_inode_permission+0xd5/0x110 [ 342.311259][T22213] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 342.317502][T22213] ? security_inode_mkdir+0xee/0x120 [ 342.322795][T22213] vfs_mkdir+0x433/0x690 [ 342.327043][T22213] do_mkdirat+0x234/0x2a0 [ 342.331379][T22213] ? __ia32_sys_mknod+0xb0/0xb0 [ 342.336249][T22213] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 342.341712][T22213] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 342.347809][T22213] ? do_syscall_64+0x26/0x610 [ 342.352490][T22213] ? lockdep_hardirqs_on+0x418/0x5d0 [ 342.357778][T22213] __x64_sys_mkdir+0x5c/0x80 [ 342.362374][T22213] do_syscall_64+0x103/0x610 [ 342.366983][T22213] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 342.372877][T22213] RIP: 0033:0x457257 [ 342.376775][T22213] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 342.396372][T22213] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 342.404795][T22213] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000457257 [ 342.412771][T22213] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000000 [ 342.420746][T22213] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 342.428717][T22213] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 23:15:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) lsetxattr$security_selinux(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000180)='system_u:object_r:systemd_passwd_var_run_t:s0\x00', 0x2e, 0x1) r2 = getpgid(0xffffffffffffffff) prlimit64(r2, 0x3, &(0x7f0000000000)={0x1, 0x1}, &(0x7f00000000c0)) [ 342.436693][T22213] R13: 0000000000000001 R14: 00000000004dba08 R15: 0000000000000003 23:15:21 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, 0x0, 0x0, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:15:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x74000000, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:15:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:15:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:15:21 executing program 4 (fault-call:0 fault-nth:29): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 342.791928][T22333] FAULT_INJECTION: forcing a failure. [ 342.791928][T22333] name failslab, interval 1, probability 0, space 0, times 0 [ 342.804691][T22333] CPU: 0 PID: 22333 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 342.813711][T22333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 342.823763][T22333] Call Trace: [ 342.827058][T22333] dump_stack+0x172/0x1f0 [ 342.831399][T22333] should_fail.cold+0xa/0x15 [ 342.836013][T22333] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 342.841824][T22333] ? save_stack+0xa9/0xd0 [ 342.846156][T22333] ? __es_tree_search.isra.0+0x1bf/0x230 [ 342.851796][T22333] __should_failslab+0x121/0x190 [ 342.856737][T22333] should_failslab+0x9/0x14 [ 342.861239][T22333] kmem_cache_alloc+0x47/0x710 [ 342.866007][T22333] ? ext4_es_scan+0x6f0/0x6f0 [ 342.870684][T22333] ? do_raw_write_lock+0x124/0x290 [ 342.875800][T22333] __es_insert_extent+0x2cc/0xf20 [ 342.880834][T22333] ext4_es_insert_extent+0x2b7/0xa40 [ 342.886128][T22333] ? ext4_es_scan_clu+0x50/0x50 [ 342.890988][T22333] ? rcu_read_lock_sched_held+0x110/0x130 [ 342.896710][T22333] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 342.902951][T22333] ? ext4_es_find_extent_range+0xff/0x600 [ 342.908675][T22333] ext4_ext_put_gap_in_cache+0xfe/0x150 [ 342.914223][T22333] ? ext4_rereserve_cluster+0x240/0x240 [ 342.919770][T22333] ? ext4_find_extent+0x76e/0x9d0 [ 342.924803][T22333] ? ext4_find_extent+0x6a6/0x9d0 [ 342.929841][T22333] ext4_ext_map_blocks+0x216a/0x4e50 [ 342.935140][T22333] ? ext4_ext_release+0x10/0x10 [ 342.939997][T22333] ? __lock_is_held+0xb6/0x140 [ 342.944773][T22333] ? lock_acquire+0x16f/0x3f0 [ 342.949457][T22333] ? ext4_map_blocks+0x3fd/0x1a00 [ 342.954496][T22333] ext4_map_blocks+0xebb/0x1a00 [ 342.959355][T22333] ? ext4_issue_zeroout+0x190/0x190 [ 342.964572][T22333] ? kasan_check_write+0x14/0x20 [ 342.969527][T22333] ? __brelse+0x95/0xb0 [ 342.973687][T22333] ext4_getblk+0xc4/0x510 [ 342.978019][T22333] ? ext4_iomap_begin+0xfe0/0xfe0 [ 342.983058][T22333] ? ext4_free_inode+0x1450/0x1450 [ 342.988170][T22333] ext4_bread+0x8f/0x230 [ 342.992423][T22333] ? ext4_getblk+0x510/0x510 [ 342.997031][T22333] ext4_append+0x155/0x370 [ 343.001465][T22333] ext4_mkdir+0x61b/0xdf0 [ 343.005808][T22333] ? ext4_init_dot_dotdot+0x520/0x520 [ 343.011184][T22333] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 343.017432][T22333] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 343.023683][T22333] ? security_inode_permission+0xd5/0x110 [ 343.029404][T22333] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 343.035659][T22333] ? security_inode_mkdir+0xee/0x120 [ 343.040954][T22333] vfs_mkdir+0x433/0x690 [ 343.045206][T22333] do_mkdirat+0x234/0x2a0 [ 343.049538][T22333] ? __ia32_sys_mknod+0xb0/0xb0 [ 343.054394][T22333] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 343.059868][T22333] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 343.065930][T22333] ? do_syscall_64+0x26/0x610 [ 343.070610][T22333] ? lockdep_hardirqs_on+0x418/0x5d0 [ 343.075895][T22333] __x64_sys_mkdir+0x5c/0x80 [ 343.080488][T22333] do_syscall_64+0x103/0x610 [ 343.085111][T22333] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 343.091002][T22333] RIP: 0033:0x457257 [ 343.094896][T22333] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 343.114495][T22333] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 343.122902][T22333] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000457257 [ 343.130870][T22333] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000000 23:15:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = semget$private(0x0, 0x2, 0x0) semctl$GETVAL(r1, 0x1, 0xc, &(0x7f00000000c0)=""/103) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r2 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) [ 343.138837][T22333] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 343.146805][T22333] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 343.154772][T22333] R13: 0000000000000001 R14: 00000000004dba08 R15: 0000000000000003 23:15:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:15:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xfffffffffffffffe, &(0x7f0000000240)="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") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x2, 0x6}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) [ 343.235564][T22333] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:15:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x7a000000, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:15:23 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:15:23 executing program 4 (fault-call:0 fault-nth:30): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:15:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:15:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) preadv(r0, &(0x7f00000013c0)=[{&(0x7f00000000c0)=""/183, 0xb7}, {&(0x7f0000000000)=""/11, 0xb}, {&(0x7f0000000180)=""/151, 0x97}, {&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/99, 0x63}, {&(0x7f00000012c0)=""/147, 0x93}, {&(0x7f0000001380)}], 0x7, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000001380)=0x1, 0x4) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:15:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x2000000000000, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:15:23 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, 0x0, 0x0, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 345.137873][T22559] FAULT_INJECTION: forcing a failure. [ 345.137873][T22559] name failslab, interval 1, probability 0, space 0, times 0 [ 345.150787][T22559] CPU: 0 PID: 22559 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 345.159804][T22559] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 345.169851][T22559] Call Trace: [ 345.173139][T22559] dump_stack+0x172/0x1f0 [ 345.177475][T22559] should_fail.cold+0xa/0x15 [ 345.182066][T22559] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 345.187885][T22559] ? save_stack+0xa9/0xd0 [ 345.192210][T22559] ? __es_tree_search.isra.0+0x1bf/0x230 [ 345.197845][T22559] __should_failslab+0x121/0x190 [ 345.202784][T22559] should_failslab+0x9/0x14 [ 345.207284][T22559] kmem_cache_alloc+0x47/0x710 [ 345.212046][T22559] ? ext4_es_scan+0x6f0/0x6f0 [ 345.216720][T22559] ? do_raw_write_lock+0x124/0x290 [ 345.221837][T22559] __es_insert_extent+0x2cc/0xf20 [ 345.226865][T22559] ext4_es_insert_extent+0x2b7/0xa40 [ 345.232166][T22559] ? ext4_es_scan_clu+0x50/0x50 [ 345.237017][T22559] ? rcu_read_lock_sched_held+0x110/0x130 [ 345.242733][T22559] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 345.248969][T22559] ? ext4_es_find_extent_range+0xff/0x600 [ 345.254686][T22559] ext4_ext_put_gap_in_cache+0xfe/0x150 [ 345.260227][T22559] ? ext4_rereserve_cluster+0x240/0x240 [ 345.265769][T22559] ? ext4_find_extent+0x76e/0x9d0 [ 345.270794][T22559] ? ext4_find_extent+0x6a6/0x9d0 [ 345.275821][T22559] ext4_ext_map_blocks+0x216a/0x4e50 [ 345.281132][T22559] ? ext4_ext_release+0x10/0x10 [ 345.285979][T22559] ? __lock_is_held+0xb6/0x140 [ 345.290748][T22559] ? lock_acquire+0x16f/0x3f0 [ 345.295422][T22559] ? ext4_map_blocks+0x3fd/0x1a00 [ 345.300463][T22559] ext4_map_blocks+0xebb/0x1a00 [ 345.305319][T22559] ? ext4_issue_zeroout+0x190/0x190 [ 345.310519][T22559] ? kasan_check_write+0x14/0x20 [ 345.315494][T22559] ? __brelse+0x95/0xb0 [ 345.319651][T22559] ext4_getblk+0xc4/0x510 [ 345.323981][T22559] ? ext4_iomap_begin+0xfe0/0xfe0 [ 345.329008][T22559] ? ext4_free_inode+0x1450/0x1450 [ 345.334116][T22559] ext4_bread+0x8f/0x230 [ 345.338350][T22559] ? ext4_getblk+0x510/0x510 [ 345.342945][T22559] ext4_append+0x155/0x370 [ 345.347362][T22559] ext4_mkdir+0x61b/0xdf0 [ 345.351700][T22559] ? ext4_init_dot_dotdot+0x520/0x520 [ 345.357065][T22559] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 345.363298][T22559] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 345.369532][T22559] ? security_inode_permission+0xd5/0x110 [ 345.375247][T22559] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 345.381487][T22559] ? security_inode_mkdir+0xee/0x120 [ 345.386782][T22559] vfs_mkdir+0x433/0x690 [ 345.391037][T22559] do_mkdirat+0x234/0x2a0 [ 345.395363][T22559] ? __ia32_sys_mknod+0xb0/0xb0 [ 345.400210][T22559] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 345.405667][T22559] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 345.411723][T22559] ? do_syscall_64+0x26/0x610 [ 345.416397][T22559] ? lockdep_hardirqs_on+0x418/0x5d0 [ 345.421687][T22559] __x64_sys_mkdir+0x5c/0x80 [ 345.426270][T22559] do_syscall_64+0x103/0x610 [ 345.430872][T22559] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 345.436755][T22559] RIP: 0033:0x457257 [ 345.440667][T22559] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 345.460264][T22559] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 345.468667][T22559] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000457257 [ 345.476632][T22559] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000000 23:15:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000000)) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) [ 345.484592][T22559] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 345.492568][T22559] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 345.500528][T22559] R13: 0000000000000001 R14: 00000000004dba08 R15: 0000000000000003 [ 345.518591][T22559] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:15:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:15:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x10000000000000, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:15:24 executing program 4 (fault-call:0 fault-nth:31): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:15:24 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:15:24 executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f00000000c0)={@dev, @remote}, &(0x7f0000000100)=0x8) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000000)=0x5, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r2 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) [ 345.748388][T22683] FAULT_INJECTION: forcing a failure. [ 345.748388][T22683] name failslab, interval 1, probability 0, space 0, times 0 23:15:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 345.836097][T22683] CPU: 1 PID: 22683 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 345.845144][T22683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 345.845249][T22683] Call Trace: [ 345.858615][T22683] dump_stack+0x172/0x1f0 [ 345.862962][T22683] should_fail.cold+0xa/0x15 [ 345.867560][T22683] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 345.873378][T22683] ? ___might_sleep+0x163/0x280 [ 345.878242][T22683] __should_failslab+0x121/0x190 [ 345.878263][T22683] should_failslab+0x9/0x14 [ 345.878280][T22683] kmem_cache_alloc+0x2be/0x710 [ 345.878296][T22683] ? rcu_read_lock_sched_held+0x110/0x130 [ 345.878311][T22683] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 345.878334][T22683] ? __mark_inode_dirty+0x241/0x1290 [ 345.909759][T22683] ext4_mb_new_blocks+0x5a8/0x3c70 [ 345.914891][T22683] ? ext4_find_extent+0x76e/0x9d0 [ 345.919958][T22683] ext4_ext_map_blocks+0x3094/0x4e50 [ 345.925257][T22683] ? ext4_ext_release+0x10/0x10 [ 345.930199][T22683] ? __lock_is_held+0xb6/0x140 [ 345.934995][T22683] ext4_map_blocks+0x8c5/0x1a00 [ 345.939860][T22683] ? ext4_issue_zeroout+0x190/0x190 [ 345.945070][T22683] ? kasan_check_write+0x14/0x20 [ 345.950025][T22683] ? __brelse+0x95/0xb0 [ 345.954193][T22683] ext4_getblk+0xc4/0x510 [ 345.958529][T22683] ? ext4_iomap_begin+0xfe0/0xfe0 [ 345.963570][T22683] ? ext4_free_inode+0x1450/0x1450 [ 345.968690][T22683] ext4_bread+0x8f/0x230 [ 345.972931][T22683] ? ext4_getblk+0x510/0x510 [ 345.977541][T22683] ext4_append+0x155/0x370 [ 345.981973][T22683] ext4_mkdir+0x61b/0xdf0 [ 345.986317][T22683] ? ext4_init_dot_dotdot+0x520/0x520 [ 345.991689][T22683] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 345.997935][T22683] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 346.004212][T22683] ? security_inode_permission+0xd5/0x110 [ 346.009966][T22683] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 346.016212][T22683] ? security_inode_mkdir+0xee/0x120 [ 346.021502][T22683] vfs_mkdir+0x433/0x690 [ 346.025752][T22683] do_mkdirat+0x234/0x2a0 [ 346.030087][T22683] ? __ia32_sys_mknod+0xb0/0xb0 [ 346.034946][T22683] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 346.040425][T22683] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 346.046492][T22683] ? do_syscall_64+0x26/0x610 [ 346.051198][T22683] ? lockdep_hardirqs_on+0x418/0x5d0 [ 346.056502][T22683] __x64_sys_mkdir+0x5c/0x80 [ 346.061095][T22683] do_syscall_64+0x103/0x610 [ 346.065699][T22683] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 346.071586][T22683] RIP: 0033:0x457257 [ 346.075481][T22683] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 346.095080][T22683] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 346.103486][T22683] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000457257 [ 346.111454][T22683] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000000 [ 346.119436][T22683] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 346.127425][T22683] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 23:15:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$KVM_SET_BOOT_CPU_ID(r2, 0xae78, &(0x7f00000000c0)) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0xa377}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:15:25 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}], 0x1, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:15:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 346.135391][T22683] R13: 0000000000000001 R14: 00000000004dba08 R15: 0000000000000003 23:15:25 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:15:25 executing program 4 (fault-call:0 fault-nth:32): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:15:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x100000000000000, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:15:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf ', 0xce02, 0x0) [ 346.354672][T22807] FAULT_INJECTION: forcing a failure. [ 346.354672][T22807] name failslab, interval 1, probability 0, space 0, times 0 [ 346.367561][T22807] CPU: 1 PID: 22807 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 346.376580][T22807] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 346.386635][T22807] Call Trace: [ 346.389934][T22807] dump_stack+0x172/0x1f0 [ 346.394287][T22807] should_fail.cold+0xa/0x15 [ 346.398887][T22807] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 346.404753][T22807] ? __sigqueue_alloc+0x173/0x4d0 [ 346.409786][T22807] ? find_held_lock+0x35/0x130 [ 346.414561][T22807] __should_failslab+0x121/0x190 [ 346.419516][T22807] should_failslab+0x9/0x14 [ 346.424023][T22807] kmem_cache_alloc+0x47/0x710 [ 346.428794][T22807] ? kasan_check_read+0x11/0x20 [ 346.433647][T22807] __sigqueue_alloc+0x268/0x4d0 [ 346.438500][T22807] __send_signal+0xae2/0x15c0 [ 346.443174][T22807] ? lock_acquire+0x16f/0x3f0 [ 346.447859][T22807] send_signal+0x49/0xd0 23:15:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='stat\x00') r3 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_GET(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8800200}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="000027bd70007efedd77c1b5b35c08000300bf000000"], 0x1c}}, 0x8000) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) r4 = getpgrp(0x0) ptrace$getregset(0x4204, r4, 0x6, &(0x7f0000000000)={&(0x7f00000000c0)=""/92, 0x5c}) 23:15:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$mice(&(0x7f00000002c0)='/dev/input/mice\x00', 0x0, 0x420001) ioctl$EVIOCGSND(r1, 0x8040451a, &(0x7f0000000140)=""/123) r2 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x35) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x10200, 0x0) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f00000000c0)={0x4, 0x1, 0xffffffffffff71a8}) ioctl$SIOCAX25CTLCON(r1, 0x89e8, &(0x7f00000001c0)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3, 0x80000000, 0x4, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:15:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x200000000000000, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:15:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 346.452107][T22807] force_sig_info+0x251/0x310 [ 346.456796][T22807] force_sig_fault+0xbb/0xf0 [ 346.461393][T22807] ? force_sigsegv+0x120/0x120 [ 346.466182][T22807] ? trace_hardirqs_on+0x67/0x230 [ 346.471218][T22807] __bad_area_nosemaphore+0x332/0x420 [ 346.476599][T22807] bad_area+0x69/0x80 [ 346.480598][T22807] __do_page_fault+0x996/0xda0 [ 346.485379][T22807] do_page_fault+0x71/0x581 [ 346.489894][T22807] ? page_fault+0x8/0x30 [ 346.494139][T22807] page_fault+0x1e/0x30 [ 346.498295][T22807] RIP: 0033:0x451aef [ 346.502186][T22807] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f [ 346.521786][T22807] RSP: 002b:00007f77e26b6a88 EFLAGS: 00010283 [ 346.527853][T22807] RAX: 00007f77e26b6b30 RBX: 0000000020000068 RCX: 0000000000000000 [ 346.535825][T22807] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007f77e26b6b30 [ 346.543803][T22807] RBP: 0000000000000001 R08: 00000000000000e0 R09: 000000000000000a [ 346.551774][T22807] R10: 0000000000000075 R11: 00000000004e0de0 R12: 0000000000000004 [ 346.559747][T22807] R13: 0000000000000001 R14: 00000000004dba08 R15: 0000000000000003 23:15:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x10', 0xce02, 0x0) 23:15:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f00000003c0)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[]}, 0x1, 0x0, 0x0, 0x3fffffc}, 0x20000000) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f00000000c0)=0x4, 0x8) r2 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) [ 346.604718][T22807] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:15:25 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}], 0x1, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:15:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x300000000000000, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:15:28 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:15:28 executing program 4 (fault-call:0 fault-nth:33): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:15:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) ioctl$VIDIOC_S_FBUF(r2, 0x4030560b, &(0x7f0000000140)={0x11, 0x12, &(0x7f00000000c0)="4a4963898bc73e29adf345dc44b32ad8568adb2482f438e090ec4a7cd828cc3979b9ca3a956c1cdaee1040e5e4cf4a331f677c2cbbe3d429dff186f8c31ebca4dc232df6d0dc2c915880523912c8", {0xfb, 0xf8, 0x31435641, 0x0, 0xd6b7, 0x0, 0xf, 0x1}}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:15:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:15:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x400000000000000, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:15:28 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}], 0x1, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 349.383324][T23152] FAULT_INJECTION: forcing a failure. [ 349.383324][T23152] name failslab, interval 1, probability 0, space 0, times 0 [ 349.396035][T23152] CPU: 0 PID: 23152 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 349.405069][T23152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 349.415123][T23152] Call Trace: [ 349.418450][T23152] dump_stack+0x172/0x1f0 [ 349.422802][T23152] should_fail.cold+0xa/0x15 [ 349.427388][T23152] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 349.433210][T23152] ? __sigqueue_alloc+0x173/0x4d0 [ 349.438242][T23152] ? find_held_lock+0x35/0x130 [ 349.443005][T23152] __should_failslab+0x121/0x190 [ 349.447970][T23152] should_failslab+0x9/0x14 [ 349.452473][T23152] kmem_cache_alloc+0x47/0x710 [ 349.457235][T23152] ? kasan_check_read+0x11/0x20 [ 349.462081][T23152] __sigqueue_alloc+0x268/0x4d0 [ 349.466942][T23152] __send_signal+0xae2/0x15c0 [ 349.471613][T23152] ? lock_acquire+0x16f/0x3f0 [ 349.476293][T23152] send_signal+0x49/0xd0 [ 349.480537][T23152] force_sig_info+0x251/0x310 [ 349.485215][T23152] force_sig_fault+0xbb/0xf0 [ 349.489800][T23152] ? force_sigsegv+0x120/0x120 [ 349.494571][T23152] ? trace_hardirqs_on+0x67/0x230 [ 349.499600][T23152] __bad_area_nosemaphore+0x332/0x420 [ 349.504974][T23152] bad_area+0x69/0x80 [ 349.508956][T23152] __do_page_fault+0x996/0xda0 [ 349.513726][T23152] do_page_fault+0x71/0x581 [ 349.518223][T23152] ? page_fault+0x8/0x30 [ 349.522469][T23152] page_fault+0x1e/0x30 [ 349.526613][T23152] RIP: 0033:0x451aef [ 349.530505][T23152] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f [ 349.550099][T23152] RSP: 002b:00007f77e26b6a88 EFLAGS: 00010283 [ 349.556157][T23152] RAX: 00007f77e26b6b30 RBX: 0000000020000068 RCX: 0000000000000000 [ 349.564119][T23152] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007f77e26b6b30 [ 349.572087][T23152] RBP: 0000000000000001 R08: 00000000000000e0 R09: 000000000000000a [ 349.580050][T23152] R10: 0000000000000075 R11: 00000000004e0de0 R12: 0000000000000004 [ 349.588013][T23152] R13: 0000000000000001 R14: 00000000004dba08 R15: 0000000000000003 23:15:28 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x3, 0x101c82) lseek(r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r2 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) [ 349.657276][T23152] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:15:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:15:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x500000000000000, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:15:28 executing program 4 (fault-call:0 fault-nth:34): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:15:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") setxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000100)=@sha1={0x1, "515e66388b0bb8ae9e14d5bbb6b786f345442c1d"}, 0x15, 0x1) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:15:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 349.834644][T23275] FAULT_INJECTION: forcing a failure. [ 349.834644][T23275] name failslab, interval 1, probability 0, space 0, times 0 [ 349.847264][T23275] CPU: 0 PID: 23275 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 349.856276][T23275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 349.866331][T23275] Call Trace: [ 349.869626][T23275] dump_stack+0x172/0x1f0 [ 349.873962][T23275] should_fail.cold+0xa/0x15 [ 349.878559][T23275] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 349.884368][T23275] ? __sigqueue_alloc+0x173/0x4d0 [ 349.889414][T23275] ? find_held_lock+0x35/0x130 [ 349.894217][T23275] __should_failslab+0x121/0x190 [ 349.899162][T23275] should_failslab+0x9/0x14 [ 349.903667][T23275] kmem_cache_alloc+0x47/0x710 [ 349.908447][T23275] ? kasan_check_read+0x11/0x20 [ 349.913305][T23275] __sigqueue_alloc+0x268/0x4d0 [ 349.918181][T23275] __send_signal+0xae2/0x15c0 [ 349.922854][T23275] ? lock_acquire+0x16f/0x3f0 [ 349.927536][T23275] send_signal+0x49/0xd0 [ 349.931788][T23275] force_sig_info+0x251/0x310 [ 349.936481][T23275] force_sig_fault+0xbb/0xf0 [ 349.941071][T23275] ? force_sigsegv+0x120/0x120 [ 349.945846][T23275] ? trace_hardirqs_on+0x67/0x230 [ 349.950879][T23275] __bad_area_nosemaphore+0x332/0x420 [ 349.956258][T23275] bad_area+0x69/0x80 [ 349.960262][T23275] __do_page_fault+0x996/0xda0 [ 349.965036][T23275] do_page_fault+0x71/0x581 [ 349.969541][T23275] ? page_fault+0x8/0x30 [ 349.973794][T23275] page_fault+0x1e/0x30 [ 349.977948][T23275] RIP: 0033:0x451aef [ 349.981841][T23275] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f [ 350.001475][T23275] RSP: 002b:00007f77e26b6a88 EFLAGS: 00010283 [ 350.007535][T23275] RAX: 00007f77e26b6b30 RBX: 0000000020000068 RCX: 0000000000000000 [ 350.015504][T23275] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007f77e26b6b30 [ 350.023475][T23275] RBP: 0000000000000001 R08: 00000000000000e0 R09: 000000000000000a [ 350.031457][T23275] R10: 0000000000000075 R11: 00000000004e0de0 R12: 0000000000000004 [ 350.039433][T23275] R13: 0000000000000001 R14: 00000000004dba08 R15: 0000000000000003 [ 350.120357][T23275] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:15:31 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:15:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000000c0)={0x4, [0x3, 0x37f, 0x6cb13c61, 0x8]}, 0xc) r2 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:15:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x600000000000000, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:15:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\xc0', 0xce02, 0x0) 23:15:31 executing program 4 (fault-call:0 fault-nth:35): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:15:31 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {0x0}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 352.691120][T23386] FAULT_INJECTION: forcing a failure. [ 352.691120][T23386] name failslab, interval 1, probability 0, space 0, times 0 [ 352.718730][T23386] CPU: 0 PID: 23386 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 352.727759][T23386] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 352.737918][T23386] Call Trace: [ 352.741219][T23386] dump_stack+0x172/0x1f0 [ 352.745568][T23386] should_fail.cold+0xa/0x15 [ 352.750182][T23386] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 352.755988][T23386] ? lock_downgrade+0x880/0x880 [ 352.760860][T23386] ? ___might_sleep+0x163/0x280 [ 352.765713][T23386] __should_failslab+0x121/0x190 [ 352.770654][T23386] should_failslab+0x9/0x14 [ 352.775159][T23386] __kmalloc_track_caller+0x2d8/0x740 [ 352.780600][T23386] ? setup_sigcontext+0x7d0/0x7d0 [ 352.785634][T23386] ? __bad_area_nosemaphore+0xb3/0x420 [ 352.791098][T23386] ? strndup_user+0x77/0xd0 [ 352.795608][T23386] memdup_user+0x26/0xb0 [ 352.799876][T23386] strndup_user+0x77/0xd0 [ 352.804225][T23386] ksys_mount+0x3c/0x150 [ 352.808483][T23386] __x64_sys_mount+0xbe/0x150 [ 352.813172][T23386] do_syscall_64+0x103/0x610 [ 352.817767][T23386] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 352.823683][T23386] RIP: 0033:0x45a8aa 23:15:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 352.827585][T23386] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 352.847183][T23386] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 352.847199][T23386] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 352.847209][T23386] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 352.847219][T23386] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 [ 352.847228][T23386] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 23:15:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xfffffffffffffffa, &(0x7f00000000c0)="04294f61979f71f1681141bd74c9a4312dbbc8ca67e7b3f6bdd7eea682f2c5990a32abedeeb5d8563c6e094eae3088290b344eb21cdad41ff1812bd7987c4571bfcc235f04f00215288fcebbfbedf893b149c6aa8ed634560ee0f4fc8bacf4db653ed6f46aabe7a1beb866830e52f891e5aad946a47200000000000000000000000000000000000000000000") ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000180)={{0x1, 0x0, 0xffffffffffffffff}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) [ 352.847237][T23386] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:15:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\xff', 0xce02, 0x0) 23:15:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x700000000000000, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:15:31 executing program 4 (fault-call:0 fault-nth:36): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:15:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000000140)={'broute\x00', 0x0, 0x3, 0x23, [], 0x7, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f0000000000)=""/35}, &(0x7f00000001c0)=0x78) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) [ 353.097625][T23513] FAULT_INJECTION: forcing a failure. [ 353.097625][T23513] name failslab, interval 1, probability 0, space 0, times 0 [ 353.119626][T23513] CPU: 0 PID: 23513 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 353.128664][T23513] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 353.138726][T23513] Call Trace: [ 353.142029][T23513] dump_stack+0x172/0x1f0 [ 353.146386][T23513] should_fail.cold+0xa/0x15 [ 353.151000][T23513] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 353.156806][T23513] ? lock_downgrade+0x880/0x880 [ 353.161669][T23513] ? ___might_sleep+0x163/0x280 [ 353.166528][T23513] __should_failslab+0x121/0x190 [ 353.171482][T23513] should_failslab+0x9/0x14 [ 353.175987][T23513] __kmalloc_track_caller+0x2d8/0x740 [ 353.181363][T23513] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 353.187610][T23513] ? strndup_user+0x77/0xd0 [ 353.192125][T23513] memdup_user+0x26/0xb0 [ 353.196375][T23513] strndup_user+0x77/0xd0 [ 353.200712][T23513] ksys_mount+0x7b/0x150 [ 353.204961][T23513] __x64_sys_mount+0xbe/0x150 [ 353.209651][T23513] do_syscall_64+0x103/0x610 [ 353.214250][T23513] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 353.220141][T23513] RIP: 0033:0x45a8aa [ 353.220158][T23513] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 353.220167][T23513] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 353.220182][T23513] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 353.220192][T23513] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 353.220201][T23513] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 [ 353.220210][T23513] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 353.220219][T23513] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:15:34 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(0xffffffffffffffff, 0xa, 0x12) dup2(0xffffffffffffffff, 0xffffffffffffffff) tkill(r0, 0x16) 23:15:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x0f', 0xce02, 0x0) 23:15:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0xa00000000000000, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:15:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x20000, 0x0) ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f00000000c0)={0x1, 0xf, 0x3}) connect$caif(r1, &(0x7f0000000100)=@dgm={0x25, 0x6, 0x3}, 0x18) r2 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x80000) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:15:34 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {0x0}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:15:34 executing program 4 (fault-call:0 fault-nth:37): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 355.788064][T23628] FAULT_INJECTION: forcing a failure. [ 355.788064][T23628] name failslab, interval 1, probability 0, space 0, times 0 23:15:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x2, 0x0) 23:15:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\xfe', 0xce02, 0x0) [ 355.853819][T23628] CPU: 1 PID: 23628 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 355.862856][T23628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 355.872913][T23628] Call Trace: [ 355.876217][T23628] dump_stack+0x172/0x1f0 [ 355.880556][T23628] should_fail.cold+0xa/0x15 [ 355.885155][T23628] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 355.890978][T23628] ? lock_downgrade+0x880/0x880 [ 355.895836][T23628] ? ___might_sleep+0x163/0x280 23:15:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) ioctl$SIOCX25SCUDMATCHLEN(r1, 0x89e7, &(0x7f0000000000)={0x7a}) [ 355.900700][T23628] __should_failslab+0x121/0x190 [ 355.905647][T23628] should_failslab+0x9/0x14 [ 355.910158][T23628] kmem_cache_alloc+0x2be/0x710 [ 355.915185][T23628] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 355.920825][T23628] ? find_held_lock+0x35/0x130 [ 355.925598][T23628] getname_flags+0xd6/0x5b0 [ 355.930109][T23628] user_path_at_empty+0x2f/0x50 [ 355.934980][T23628] do_mount+0x150/0x2c40 [ 355.939232][T23628] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 355.945400][T23628] ? copy_mount_string+0x40/0x40 23:15:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 355.950352][T23628] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 355.956597][T23628] ? _copy_from_user+0xdd/0x150 [ 355.961458][T23628] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 355.967702][T23628] ? copy_mount_options+0x30e/0x440 [ 355.972909][T23628] ksys_mount+0xdb/0x150 [ 355.977169][T23628] __x64_sys_mount+0xbe/0x150 [ 355.981859][T23628] do_syscall_64+0x103/0x610 [ 355.986471][T23628] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 355.992362][T23628] RIP: 0033:0x45a8aa 23:15:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) [ 355.996256][T23628] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 356.015859][T23628] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 356.024273][T23628] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 356.032240][T23628] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 356.040207][T23628] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 23:15:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x3f00000000000000, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 356.048167][T23628] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 356.056135][T23628] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:15:37 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(0xffffffffffffffff, 0xa, 0x12) dup2(0xffffffffffffffff, 0xffffffffffffffff) tkill(r0, 0x16) 23:15:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:15:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x2, 0x0) ioctl$CAPI_GET_MANUFACTURER(r2, 0xc0044306, &(0x7f00000000c0)=0x80) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:15:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x4000000000000000, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:15:37 executing program 4 (fault-call:0 fault-nth:38): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:15:37 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {0x0}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 358.897064][T23863] FAULT_INJECTION: forcing a failure. [ 358.897064][T23863] name failslab, interval 1, probability 0, space 0, times 0 23:15:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 358.979607][T23863] CPU: 0 PID: 23863 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 358.988655][T23863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 358.998713][T23863] Call Trace: [ 359.002016][T23863] dump_stack+0x172/0x1f0 [ 359.006354][T23863] should_fail.cold+0xa/0x15 [ 359.010951][T23863] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 359.016762][T23863] ? lock_downgrade+0x880/0x880 [ 359.021615][T23863] ? ___might_sleep+0x163/0x280 [ 359.026477][T23863] __should_failslab+0x121/0x190 [ 359.031425][T23863] should_failslab+0x9/0x14 [ 359.035945][T23863] kmem_cache_alloc+0x2be/0x710 [ 359.040793][T23863] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 359.046424][T23863] ? find_held_lock+0x35/0x130 [ 359.051209][T23863] getname_flags+0xd6/0x5b0 [ 359.055715][T23863] user_path_at_empty+0x2f/0x50 [ 359.060576][T23863] do_mount+0x150/0x2c40 [ 359.064851][T23863] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 359.071011][T23863] ? copy_mount_string+0x40/0x40 [ 359.075950][T23863] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 359.082189][T23863] ? _copy_from_user+0xdd/0x150 [ 359.087041][T23863] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 359.093283][T23863] ? copy_mount_options+0x30e/0x440 [ 359.098491][T23863] ksys_mount+0xdb/0x150 [ 359.102744][T23863] __x64_sys_mount+0xbe/0x150 [ 359.107436][T23863] do_syscall_64+0x103/0x610 [ 359.112043][T23863] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 359.117933][T23863] RIP: 0033:0x45a8aa [ 359.121829][T23863] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 359.141438][T23863] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 359.149856][T23863] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 359.157826][T23863] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 359.165795][T23863] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 23:15:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x4800000000000000, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:15:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0af51f53072570000000008000") r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x2200, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f0000000100)={0x3, 0x3, 0x1f, 0x3, 0x1f}) r2 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x2000) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000001240)=ANY=[@ANYBLOB="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"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x200, 0x0) setitimer(0x1, &(0x7f0000000040)={{}, {0x0, 0x7530}}, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) [ 359.173763][T23863] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 359.181732][T23863] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:15:38 executing program 4 (fault-call:0 fault-nth:39): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:15:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x4c00000000000000, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:15:38 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 359.295281][T24083] Unknown ioctl -1072409599 [ 359.309511][T24083] Unknown ioctl 1 [ 359.322260][T24083] Unknown ioctl -1072409599 [ 359.336561][T24085] Unknown ioctl 1 [ 359.442379][T24155] FAULT_INJECTION: forcing a failure. [ 359.442379][T24155] name failslab, interval 1, probability 0, space 0, times 0 [ 359.478372][T24155] CPU: 0 PID: 24155 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 359.487416][T24155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 359.497484][T24155] Call Trace: [ 359.500778][T24155] dump_stack+0x172/0x1f0 [ 359.505122][T24155] should_fail.cold+0xa/0x15 [ 359.509718][T24155] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 359.515524][T24155] ? lock_downgrade+0x880/0x880 [ 359.520383][T24155] ? ___might_sleep+0x163/0x280 [ 359.525236][T24155] __should_failslab+0x121/0x190 [ 359.530187][T24155] should_failslab+0x9/0x14 [ 359.534695][T24155] __kmalloc_track_caller+0x2d8/0x740 [ 359.540075][T24155] ? legacy_init_fs_context+0x48/0xe0 [ 359.545464][T24155] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 359.551621][T24155] ? vfs_parse_fs_string+0xe8/0x170 [ 359.556825][T24155] kmemdup_nul+0x31/0xa0 [ 359.561073][T24155] vfs_parse_fs_string+0xe8/0x170 [ 359.566100][T24155] ? vfs_parse_fs_param+0x4b0/0x4b0 [ 359.571308][T24155] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 359.577552][T24155] ? alloc_fs_context+0x3bb/0x640 [ 359.582583][T24155] do_mount+0x6e9/0x2c40 [ 359.586836][T24155] ? rcu_lockdep_current_cpu_online+0x31/0x130 [ 359.592995][T24155] ? copy_mount_string+0x40/0x40 [ 359.598369][T24155] ? _copy_from_user+0xdd/0x150 [ 359.603228][T24155] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 359.609478][T24155] ? copy_mount_options+0x30e/0x440 [ 359.614681][T24155] ksys_mount+0xdb/0x150 [ 359.618929][T24155] __x64_sys_mount+0xbe/0x150 [ 359.623610][T24155] do_syscall_64+0x103/0x610 [ 359.628208][T24155] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 359.634096][T24155] RIP: 0033:0x45a8aa [ 359.637990][T24155] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 359.657590][T24155] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 359.665996][T24155] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 359.673962][T24155] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 359.681934][T24155] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 [ 359.689914][T24155] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 359.697888][T24155] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:15:40 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(0xffffffffffffffff, 0xa, 0x12) dup2(0xffffffffffffffff, 0xffffffffffffffff) tkill(r0, 0x16) 23:15:40 executing program 0: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm-control\x00', 0x20401, 0x0) ioctl$VT_WAITACTIVE(r0, 0x5607) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x480000, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000240)=0x0) r3 = getpgrp(r2) write$FUSE_LK(r1, &(0x7f0000000180)={0x28, 0xffffffffffffffda, 0x5, {{0x0, 0x1ff, 0x0, r3}}}, 0x28) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r4 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r4, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f00000001c0)) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000500)=@assoc_id=0x0, &(0x7f0000000540)=0x4) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000580)={r5, @in={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000400)={0x1, 0xe9d, 0xa, 0x4, 0x4, 0x8, 0x0, 0x462, 0x0}, &(0x7f0000000440)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000480)=@assoc_id=r6, 0x4) r7 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) ioctl$UI_END_FF_UPLOAD(r7, 0x406855c9, &(0x7f00000000c0)={0x0, 0x4, {0x53, 0xffff, 0xffff, {0x9, 0x8}, {0x0, 0x6ac}, @ramp={0x4, 0x4, {0x5, 0x4, 0x7ff, 0x2}}}, {0x56, 0x6, 0x6, {0x0, 0xfffffffffffffffe}, {0x0, 0x2}, @ramp={0xfff, 0x100000001, {0x4, 0xffff, 0xeed, 0x1}}}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000640)={0x40, 0x1, 'client0\x00', 0x0, "d08aebad0ecb5cfc", "b4e5c9fb3204120113db9b24a5bb8f11eb84618bf7e37ae33002e334fdb77dc4", 0x500000000000, 0x3ff}) syz_open_dev$sndpcmp(&(0x7f0000000200)='/dev/snd/pcmC#D#p\x00', 0x1f, 0x20100) connect$nfc_llcp(r1, &(0x7f0000000280)={0x27, 0x0, 0x1, 0x2, 0x3f, 0x10000, "b4e9afe2274254f40cea8e750a08ebba273c44e6af0bd6e8e22103901b89268b568db1326c03d17ed28435d6ed0ae1d1a266bb0d9955463c526f4d0691abfd", 0x2f}, 0x60) open_by_handle_at(r4, &(0x7f0000000300)={0xe8, 0x5, "a41f376867b532e2ead5e34f78a89db9c05e8a40bf379a5cff0ab34c84fe24abc3f1944fc30a5f5b71227676ea0bd845e39e91da126764ab9ec24ff058ba375976b6f9ed49d413a72a07dc364533c3e266628b3c5c3f79b9e59201e6e53dd1b88a889932e7dd61e18d42783919b55331c5ec94cbc423da6fe4f6eb3054bbc08dc1fff4680c4929ad1a409f3dd1f83163f661feb827a83f43a7bf0295ec89216e36f5dfbb344dace7357ac7acc882b0ecaa434cbd9c997dd2b88e60eed58b36d865d9319b1b388df6b43022b0301e2a0c7f9a8fc1efb3a76e6138e82304d627a8"}, 0x80200) 23:15:40 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:15:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x6800000000000000, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:15:40 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000200)=""/1, 0x1}], 0x1, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:15:40 executing program 4 (fault-call:0 fault-nth:40): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 361.980839][T24200] FAULT_INJECTION: forcing a failure. [ 361.980839][T24200] name failslab, interval 1, probability 0, space 0, times 0 [ 362.000184][T24200] CPU: 0 PID: 24200 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 362.009216][T24200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 362.019265][T24200] Call Trace: [ 362.022554][T24200] dump_stack+0x172/0x1f0 [ 362.026889][T24200] should_fail.cold+0xa/0x15 [ 362.031490][T24200] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 362.037291][T24200] ? lock_downgrade+0x880/0x880 [ 362.042138][T24200] ? ___might_sleep+0x163/0x280 [ 362.046986][T24200] __should_failslab+0x121/0x190 [ 362.051921][T24200] should_failslab+0x9/0x14 [ 362.056422][T24200] kmem_cache_alloc_trace+0x2d1/0x760 [ 362.061811][T24200] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 362.067621][T24200] ? rcu_read_lock_sched_held+0x110/0x130 [ 362.073339][T24200] ? kmem_cache_alloc_trace+0x354/0x760 [ 362.078888][T24200] legacy_init_fs_context+0x48/0xe0 [ 362.084079][T24200] ? generic_parse_monolithic+0x200/0x200 [ 362.089794][T24200] alloc_fs_context+0x365/0x640 [ 362.094645][T24200] fs_context_for_mount+0x25/0x30 [ 362.099665][T24200] do_mount+0x13d7/0x2c40 [ 362.103993][T24200] ? rcu_lockdep_current_cpu_online+0x31/0x130 [ 362.110149][T24200] ? copy_mount_string+0x40/0x40 [ 362.115082][T24200] ? _copy_from_user+0xdd/0x150 [ 362.119935][T24200] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 362.126168][T24200] ? copy_mount_options+0x30e/0x440 [ 362.131370][T24200] ksys_mount+0xdb/0x150 [ 362.135609][T24200] __x64_sys_mount+0xbe/0x150 [ 362.140285][T24200] do_syscall_64+0x103/0x610 [ 362.144879][T24200] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 362.150764][T24200] RIP: 0033:0x45a8aa [ 362.154654][T24200] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 23:15:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x10000, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000000c0)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000140)={r3, 0x7}, &(0x7f0000000180)=0x8) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000000480)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x90000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x200, r4, 0x800, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x44, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xec7}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1f}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1ff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xf2bc}]}, @TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x100000001}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x800000000000}]}, @TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_MEDIA={0xb0, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000000000000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8aa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x200}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffffff81}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}]}]}, @TIPC_NLA_MEDIA={0x50, 0x5, [@TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}]}, @TIPC_NLA_BEARER={0xc, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8e62}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}]}]}, 0x200}, 0x1, 0x0, 0x0, 0x8005}, 0x4810) [ 362.174252][T24200] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 362.182659][T24200] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 362.190621][T24200] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 362.198583][T24200] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 [ 362.206545][T24200] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 362.214506][T24200] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:15:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x6c00000000000000, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:15:41 executing program 4 (fault-call:0 fault-nth:41): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:15:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) pipe2(&(0x7f0000000000), 0x4800) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) socket$inet6_tcp(0xa, 0x1, 0x0) [ 362.407633][T24324] FAULT_INJECTION: forcing a failure. [ 362.407633][T24324] name failslab, interval 1, probability 0, space 0, times 0 [ 362.437383][T24324] CPU: 0 PID: 24324 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 362.446428][T24324] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 362.456507][T24324] Call Trace: [ 362.456534][T24324] dump_stack+0x172/0x1f0 [ 362.456562][T24324] should_fail.cold+0xa/0x15 [ 362.456589][T24324] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 362.456614][T24324] ? lock_downgrade+0x880/0x880 [ 362.479399][T24324] ? ___might_sleep+0x163/0x280 [ 362.484267][T24324] __should_failslab+0x121/0x190 [ 362.489211][T24324] should_failslab+0x9/0x14 [ 362.493714][T24324] kmem_cache_alloc_trace+0x2d1/0x760 [ 362.499084][T24324] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 362.504888][T24324] ? rcu_read_lock_sched_held+0x110/0x130 [ 362.510606][T24324] ? kmem_cache_alloc_trace+0x354/0x760 [ 362.516164][T24324] legacy_init_fs_context+0x48/0xe0 [ 362.521362][T24324] ? generic_parse_monolithic+0x200/0x200 [ 362.527090][T24324] alloc_fs_context+0x365/0x640 [ 362.531952][T24324] fs_context_for_mount+0x25/0x30 [ 362.536976][T24324] do_mount+0x13d7/0x2c40 [ 362.541309][T24324] ? rcu_lockdep_current_cpu_online+0x31/0x130 [ 362.547487][T24324] ? copy_mount_string+0x40/0x40 [ 362.552440][T24324] ? _copy_from_user+0xdd/0x150 [ 362.557301][T24324] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 362.563545][T24324] ? copy_mount_options+0x30e/0x440 [ 362.568749][T24324] ksys_mount+0xdb/0x150 [ 362.573005][T24324] __x64_sys_mount+0xbe/0x150 [ 362.577697][T24324] do_syscall_64+0x103/0x610 [ 362.582294][T24324] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 362.588193][T24324] RIP: 0033:0x45a8aa 23:15:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) msync(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4) [ 362.592087][T24324] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 362.611859][T24324] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 362.620267][T24324] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 362.628237][T24324] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 362.636204][T24324] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 [ 362.644176][T24324] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 23:15:41 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 362.652145][T24324] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:15:43 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:15:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) stat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) r4 = getegid() setresgid(r2, r3, r4) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:15:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:15:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x7400000000000000, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:15:43 executing program 4 (fault-call:0 fault-nth:42): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:15:43 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000200)=""/1, 0x1}], 0x1, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 365.043722][T24438] FAULT_INJECTION: forcing a failure. [ 365.043722][T24438] name failslab, interval 1, probability 0, space 0, times 0 [ 365.081010][T24438] CPU: 0 PID: 24438 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 365.090051][T24438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 365.100108][T24438] Call Trace: [ 365.103410][T24438] dump_stack+0x172/0x1f0 [ 365.107780][T24438] should_fail.cold+0xa/0x15 [ 365.112380][T24438] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 365.112398][T24438] ? lock_downgrade+0x880/0x880 [ 365.112417][T24438] ? ___might_sleep+0x163/0x280 [ 365.112449][T24438] __should_failslab+0x121/0x190 [ 365.127921][T24438] should_failslab+0x9/0x14 [ 365.127938][T24438] __kmalloc_track_caller+0x2d8/0x740 [ 365.127967][T24438] ? legacy_init_fs_context+0x48/0xe0 [ 365.148093][T24438] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 365.154248][T24438] ? vfs_parse_fs_string+0xe8/0x170 [ 365.159471][T24438] kmemdup_nul+0x31/0xa0 [ 365.163719][T24438] vfs_parse_fs_string+0xe8/0x170 [ 365.168751][T24438] ? vfs_parse_fs_param+0x4b0/0x4b0 [ 365.173964][T24438] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 365.180211][T24438] ? alloc_fs_context+0x3bb/0x640 [ 365.180237][T24438] do_mount+0x6e9/0x2c40 [ 365.180254][T24438] ? rcu_lockdep_current_cpu_online+0x31/0x130 [ 365.180279][T24438] ? copy_mount_string+0x40/0x40 [ 365.189513][T24438] ? _copy_from_user+0xdd/0x150 [ 365.189533][T24438] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 365.189550][T24438] ? copy_mount_options+0x30e/0x440 [ 365.189571][T24438] ksys_mount+0xdb/0x150 [ 365.221099][T24438] __x64_sys_mount+0xbe/0x150 [ 365.225818][T24438] do_syscall_64+0x103/0x610 [ 365.230418][T24438] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 365.236319][T24438] RIP: 0033:0x45a8aa [ 365.240218][T24438] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 365.259817][T24438] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 365.268225][T24438] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 365.276193][T24438] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 365.284166][T24438] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 23:15:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x7a00000000000000, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:15:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_CPUID2(r3, 0xc008ae91, &(0x7f0000000140)={0x6, 0x0, [{}, {}, {}, {}, {}, {}]}) fcntl$setownex(r1, 0xf, &(0x7f0000000000)={0x1, r2}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'L+', 0x3}, 0x28, 0x2) 23:15:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 365.292167][T24438] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 365.300139][T24438] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:15:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:15:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\xff', 0xce02, 0x0) 23:15:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0xffffffff00000000, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:15:46 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:15:46 executing program 4 (fault-call:0 fault-nth:43): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:15:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x8, 0x3, 0x5}}) 23:15:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\xff', 0xce02, 0x0) 23:15:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x2, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:15:46 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000200)=""/1, 0x1}], 0x1, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:15:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x401, &(0x7f0000000100)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x28000) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0xd1c7, 0x101000) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f00000000c0)=0x9, 0x4) [ 368.138218][T24773] FAULT_INJECTION: forcing a failure. [ 368.138218][T24773] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 368.151456][T24773] CPU: 1 PID: 24773 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 368.160480][T24773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 368.170536][T24773] Call Trace: [ 368.173837][T24773] dump_stack+0x172/0x1f0 [ 368.178191][T24773] should_fail.cold+0xa/0x15 [ 368.182805][T24773] ? unwind_get_return_address+0x61/0xa0 [ 368.188459][T24773] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 368.194274][T24773] ? mark_held_locks+0xf0/0xf0 [ 368.199045][T24773] should_fail_alloc_page+0x50/0x60 [ 368.204257][T24773] __alloc_pages_nodemask+0x1a1/0x7e0 [ 368.209638][T24773] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 368.215362][T24773] ? find_held_lock+0x35/0x130 [ 368.220145][T24773] cache_grow_begin+0x9c/0x850 [ 368.224922][T24773] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 368.231173][T24773] ? check_preemption_disabled+0x48/0x290 23:15:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x4000, 0x0) sendmsg$alg(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f00000000c0)="891d25f1f57eb9ea9c6fc228e7ab0772c5d7a0c0f2a226ddfec8265322a97e38f487c56cfd0dcfb399253b7c532d25220faecd8ab6d51b511e9437cc9d7a20048268d603b03b97c4d73a87bdf5839175f85f2a97933e8f87f4fded0d23fb30237a77676c2d3164b057752ca4de374c8059612883358684e077d70f3afe885685de119ba608a216b6b3f722e3e7d43e96c1173d4d502751d0c15519041b7c5774acfab0aa3efef4c0163c348d76776f5f5ae7385a0edc29340181ee778c", 0xbd}, {&(0x7f0000000180)="c3235ed23be81c0a944c84bc15279c15343b4de58f02ae4be0424d753841bef2d5165b76d51f376cee26c6cdd065874eba8acfc39050005f889e3fca5724179196656cc5aabd04b3e235289bca28d633c45a9eaf4fd87864291ba8ae1715ca2516f66f98fb7e0845cbd7f72c38b0b0d4ea981ac76fd3b0b6421b0ae83e621fbc6afecfce210ed9506b8a04a2f2e70ad93f89b188a434a9c625321f61d207a40e54fee7ddcb62868ff1e18643952d08e1a2510069c774acc1978e27d21190c7486288aea6285e6de27486b1a7319c46f66d7c6c4f1b090a08d4c4ffce12c7c7986a150204665adbd332a46c077ba5d42ba2b8136b", 0xf4}, {&(0x7f0000000280)="92e3730f976e278e076cc5ebbcfb3e76298f79df71aaedf4ce2378af36470ed402f8ad3243fbf094c944db6c14a5679dc490", 0x32}, {&(0x7f00000002c0)="4e0c597ee3e9c28022cd3503cebbfecdd3c29be377f52c1a3ae8c45ef7be520ca0fc2d75b17203feedd1f6ecf4d069484118ef9fe291e728b10342194adfa59b83b2b0f5a5990f43d169796890bd7f526c32812e938056dea75682d51bcc46f0", 0x60}, {&(0x7f0000000340)="8c99f008fca54345e2ffae83258979a494f6657ba6065e1e4535e75b070cd9796ae6f5bed980f14085571734a9ec1365fc6967befd77972845e7d30a7bff36b2d6f73012657b43af8b76ac534f2152a0c85f447f1c8ab2cde1425b82f452a43dc0f894ac9643f6e1d0d11fb29002abc84fa20a25419c28b989080f18eecebba8e86994492143801fee009eb4defa0072d3dfbe1eb7d85ec488fa1b911a17398756e08228bd3bf7385f1aaa4ecedda68105789393007e178e4c3f03", 0xbb}], 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000001701000004000000000000000000000000005000000000000000170100000200000035000000de097ef1f09810451ee709dc8a38788d7f70e91095252f76762a5f4f0d5b9854dedcf8ffffff010fe46309d6678e568b50b7f4813c0000000000000018000000000000001701000002000000000000000000000200000000000000000000000000000000000000000000"], 0x98}, 0x40) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:15:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x3, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 368.236902][T24773] kmem_cache_alloc+0x645/0x710 [ 368.241806][T24773] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 368.248050][T24773] ? should_fail+0x1de/0x852 [ 368.252649][T24773] getname_kernel+0x53/0x370 [ 368.257244][T24773] kern_path+0x20/0x40 [ 368.261318][T24773] lookup_bdev.part.0+0x7b/0x1b0 [ 368.266261][T24773] ? blkdev_open+0x290/0x290 [ 368.270858][T24773] ? check_preemption_disabled+0x48/0x290 [ 368.276588][T24773] blkdev_get_by_path+0x81/0x130 [ 368.281531][T24773] mount_bdev+0x5d/0x3c0 23:15:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x8, 0x800) ioctl$EVIOCGABS20(r2, 0x80184560, &(0x7f00000000c0)=""/199) [ 368.285783][T24773] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 368.291596][T24773] ? vfs_parse_fs_string+0x116/0x170 [ 368.296904][T24773] ext4_mount+0x35/0x40 [ 368.301059][T24773] ? ext4_nfs_get_inode+0xe0/0xe0 [ 368.306088][T24773] legacy_get_tree+0xf2/0x200 [ 368.310775][T24773] vfs_get_tree+0x123/0x450 [ 368.315304][T24773] do_mount+0x1436/0x2c40 [ 368.319649][T24773] ? rcu_lockdep_current_cpu_online+0x31/0x130 [ 368.325814][T24773] ? copy_mount_string+0x40/0x40 [ 368.330756][T24773] ? _copy_from_user+0xdd/0x150 23:15:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) [ 368.335647][T24773] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 368.341892][T24773] ? copy_mount_options+0x30e/0x440 [ 368.347099][T24773] ksys_mount+0xdb/0x150 [ 368.351365][T24773] __x64_sys_mount+0xbe/0x150 [ 368.356065][T24773] do_syscall_64+0x103/0x610 [ 368.360670][T24773] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 368.366582][T24773] RIP: 0033:0x45a8aa [ 368.370485][T24773] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 368.390102][T24773] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 368.398515][T24773] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 368.406484][T24773] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 368.414471][T24773] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 [ 368.422452][T24773] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 368.430428][T24773] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 [ 368.441636][T24773] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:15:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x7416d171c9082c80}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:15:50 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:15:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x4, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:15:50 executing program 4 (fault-call:0 fault-nth:44): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:15:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:15:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x8, 0x2) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0x200, 0x0) ioctl$VHOST_SET_VRING_ERR(r1, 0x4008af22, &(0x7f0000000200)={0x0, r2}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r3 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) r4 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xfff, 0xc0) getsockopt$netrom_NETROM_T1(r4, 0x103, 0x1, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x5452, &(0x7f0000000080)={{0x1, 0x3, 0x0, 0x0, 0x400000101}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x100000000008, 0x47d) 23:15:50 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{0x0}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 371.443581][T25013] FAULT_INJECTION: forcing a failure. [ 371.443581][T25013] name failslab, interval 1, probability 0, space 0, times 0 23:15:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000000)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x2) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x43) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') munlock(&(0x7f0000fff000/0x1000)=nil, 0x1000) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r2, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x81000010}, 0xc, &(0x7f0000000300)={&(0x7f0000000540)=ANY=[@ANYBLOB="2f2cd14091db1890d734010000c1c00252ab9100da6d", @ANYRES16=r3, @ANYBLOB="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"], 0x134}, 0x1, 0x0, 0x0, 0x8001}, 0x3005a720c47091fb) io_setup(0x5, &(0x7f0000000400)=0x0) openat$vimc2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video2\x00', 0x2, 0x0) io_cancel(r4, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x9ea97df97dd11db4, 0x717, r1, &(0x7f0000000440)="3a5e72c4ce44f7eafaea9d91c38f7e4f6fe24fbb12e8ef386b44b0b85a97375146b7da8c71e386a02d05c2ef1537127aa144ac2c2e525bec43739d79028d7113d348eec4e06c8801524d41c339b8f20c494b52558d0e379365fc5b67f1f4b7cc6581d90cb124ea33fab05eaaf78f72960bcb98f4eefdd5bf01a7a117a2d183", 0x7f, 0x2, 0x0, 0x2, 0xffffffffffffff9c}, &(0x7f0000000500)) readlink(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)=""/9, 0x9) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) [ 371.498757][T25013] CPU: 1 PID: 25013 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 371.507801][T25013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 371.517854][T25013] Call Trace: [ 371.521156][T25013] dump_stack+0x172/0x1f0 [ 371.525504][T25013] should_fail.cold+0xa/0x15 [ 371.530117][T25013] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 371.535940][T25013] ? lock_downgrade+0x880/0x880 [ 371.540818][T25013] ? ___might_sleep+0x163/0x280 23:15:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 371.545679][T25013] __should_failslab+0x121/0x190 [ 371.550624][T25013] should_failslab+0x9/0x14 [ 371.555125][T25013] __kmalloc+0x2dc/0x740 [ 371.559389][T25013] ? lockdep_init_map+0x10c/0x5b0 [ 371.564458][T25013] ? prealloc_shrinker+0xd6/0x330 [ 371.569511][T25013] prealloc_shrinker+0xd6/0x330 [ 371.574380][T25013] alloc_super+0x707/0x890 [ 371.578822][T25013] ? test_single_super+0x10/0x10 [ 371.583862][T25013] sget_userns+0xf1/0x560 [ 371.588224][T25013] ? kill_litter_super+0x60/0x60 [ 371.593180][T25013] ? test_single_super+0x10/0x10 [ 371.598284][T25013] ? kill_litter_super+0x60/0x60 [ 371.603222][T25013] sget+0x10c/0x150 [ 371.607036][T25013] mount_bdev+0xff/0x3c0 [ 371.611282][T25013] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 371.617098][T25013] ext4_mount+0x35/0x40 [ 371.621257][T25013] ? ext4_nfs_get_inode+0xe0/0xe0 [ 371.626288][T25013] legacy_get_tree+0xf2/0x200 [ 371.630987][T25013] vfs_get_tree+0x123/0x450 [ 371.635494][T25013] do_mount+0x1436/0x2c40 [ 371.639826][T25013] ? rcu_lockdep_current_cpu_online+0x31/0x130 [ 371.645983][T25013] ? copy_mount_string+0x40/0x40 [ 371.650921][T25013] ? _copy_from_user+0xdd/0x150 [ 371.655771][T25013] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 371.662005][T25013] ? copy_mount_options+0x30e/0x440 [ 371.667204][T25013] ksys_mount+0xdb/0x150 [ 371.671456][T25013] __x64_sys_mount+0xbe/0x150 [ 371.676134][T25013] do_syscall_64+0x103/0x610 [ 371.680730][T25013] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 371.686614][T25013] RIP: 0033:0x45a8aa [ 371.690511][T25013] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 371.710112][T25013] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 371.718530][T25013] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 371.726496][T25013] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 371.734932][T25013] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 [ 371.742897][T25013] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 371.750862][T25013] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:15:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x5, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:15:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x10000) write$tun(r1, &(0x7f00000000c0)={@void, @val={0x1, 0x84, 0x0, 0x0, 0x6, 0x3}, @x25={0x3, 0x40, 0x1f, "0695769e5b0d41b33fad7c1849695a91a18487e727392b05de39034eae929667132fe55adad12b9d4f2c38f93e86762065fae953dee1068b09546cd22e3289765ae36b680d88cedef135b7be4388dbd912c5113d7f95a728c621acde5b1f88de31ac44dc14ecf665cd1254"}}, 0x78) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r2 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:15:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:15:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000100)={{{@in=@remote, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000200)=0xe8) lsetxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000240)=@v3={0x3000000, [{0x0, 0xf5}, {0x7, 0x401}], r1}, 0x18, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r2 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:15:53 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x0, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:15:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x6, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:15:53 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{0x0}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:15:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:15:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f00000000c0)={{0xffffffffffffffff, 0x0, 0x4}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:15:53 executing program 4 (fault-call:0 fault-nth:45): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 374.556758][T25258] FAULT_INJECTION: forcing a failure. [ 374.556758][T25258] name failslab, interval 1, probability 0, space 0, times 0 [ 374.616559][T25258] CPU: 1 PID: 25258 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 374.625597][T25258] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 374.635650][T25258] Call Trace: [ 374.638961][T25258] dump_stack+0x172/0x1f0 [ 374.643323][T25258] should_fail.cold+0xa/0x15 [ 374.647930][T25258] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 374.653758][T25258] ? lock_downgrade+0x880/0x880 [ 374.658621][T25258] ? ___might_sleep+0x163/0x280 [ 374.663492][T25258] __should_failslab+0x121/0x190 [ 374.668438][T25258] should_failslab+0x9/0x14 [ 374.672998][T25258] __kmalloc+0x2dc/0x740 [ 374.677249][T25258] ? lockdep_init_map+0x10c/0x5b0 [ 374.682282][T25258] ? prealloc_shrinker+0xd6/0x330 [ 374.687310][T25258] prealloc_shrinker+0xd6/0x330 [ 374.692167][T25258] alloc_super+0x707/0x890 [ 374.696593][T25258] ? test_single_super+0x10/0x10 [ 374.701537][T25258] sget_userns+0xf1/0x560 [ 374.705872][T25258] ? kill_litter_super+0x60/0x60 [ 374.710821][T25258] ? test_single_super+0x10/0x10 [ 374.715759][T25258] ? kill_litter_super+0x60/0x60 [ 374.720697][T25258] sget+0x10c/0x150 [ 374.724536][T25258] mount_bdev+0xff/0x3c0 [ 374.728786][T25258] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 374.734597][T25258] ext4_mount+0x35/0x40 [ 374.738752][T25258] ? ext4_nfs_get_inode+0xe0/0xe0 [ 374.743780][T25258] legacy_get_tree+0xf2/0x200 [ 374.748475][T25258] vfs_get_tree+0x123/0x450 [ 374.752993][T25258] do_mount+0x1436/0x2c40 [ 374.757335][T25258] ? copy_mount_string+0x40/0x40 [ 374.762278][T25258] ? __sanitizer_cov_trace_pc+0x4/0x50 [ 374.767742][T25258] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 374.773990][T25258] ? copy_mount_options+0x30e/0x440 [ 374.779199][T25258] ksys_mount+0xdb/0x150 [ 374.783460][T25258] __x64_sys_mount+0xbe/0x150 [ 374.788159][T25258] do_syscall_64+0x103/0x610 [ 374.792755][T25258] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 374.798646][T25258] RIP: 0033:0x45a8aa [ 374.802545][T25258] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 374.822149][T25258] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 374.830561][T25258] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 374.838529][T25258] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 374.846497][T25258] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 [ 374.854488][T25258] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 23:15:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x7, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:15:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(r2, 0x8250aea6, &(0x7f00000000c0)=""/191) 23:15:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 374.862465][T25258] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:15:53 executing program 4 (fault-call:0 fault-nth:46): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:15:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x141000, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") ioctl$ASHMEM_GET_PROT_MASK(r1, 0x7706, &(0x7f0000000140)) r2 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000180)={0xa4b, 0x8, 0x6, 0x8000000, 0x6}) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f00000000c0)=0x80000001, 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100), 0x4) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:15:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 375.082635][T25486] FAULT_INJECTION: forcing a failure. [ 375.082635][T25486] name failslab, interval 1, probability 0, space 0, times 0 [ 375.109180][T25486] CPU: 1 PID: 25486 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 375.118205][T25486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 375.128260][T25486] Call Trace: [ 375.131562][T25486] dump_stack+0x172/0x1f0 [ 375.135906][T25486] should_fail.cold+0xa/0x15 [ 375.140503][T25486] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 375.146315][T25486] ? lock_downgrade+0x880/0x880 [ 375.151175][T25486] ? ___might_sleep+0x163/0x280 [ 375.156032][T25486] __should_failslab+0x121/0x190 [ 375.160978][T25486] should_failslab+0x9/0x14 [ 375.165489][T25486] __kmalloc+0x2dc/0x740 [ 375.169734][T25486] ? lockdep_init_map+0x10c/0x5b0 [ 375.174760][T25486] ? prealloc_shrinker+0xd6/0x330 [ 375.179789][T25486] prealloc_shrinker+0xd6/0x330 [ 375.184642][T25486] alloc_super+0x707/0x890 [ 375.189081][T25486] ? test_single_super+0x10/0x10 [ 375.194037][T25486] sget_userns+0xf1/0x560 [ 375.198373][T25486] ? kill_litter_super+0x60/0x60 [ 375.203348][T25486] ? test_single_super+0x10/0x10 [ 375.208289][T25486] ? kill_litter_super+0x60/0x60 [ 375.213224][T25486] sget+0x10c/0x150 [ 375.217212][T25486] mount_bdev+0xff/0x3c0 [ 375.221468][T25486] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 375.227280][T25486] ext4_mount+0x35/0x40 [ 375.231435][T25486] ? ext4_nfs_get_inode+0xe0/0xe0 [ 375.236478][T25486] legacy_get_tree+0xf2/0x200 [ 375.241165][T25486] vfs_get_tree+0x123/0x450 [ 375.245683][T25486] do_mount+0x1436/0x2c40 [ 375.250019][T25486] ? rcu_lockdep_current_cpu_online+0x31/0x130 [ 375.256178][T25486] ? copy_mount_string+0x40/0x40 [ 375.261114][T25486] ? _copy_from_user+0xdd/0x150 [ 375.265981][T25486] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 375.272224][T25486] ? copy_mount_options+0x30e/0x440 [ 375.277434][T25486] ksys_mount+0xdb/0x150 [ 375.281722][T25486] __x64_sys_mount+0xbe/0x150 [ 375.286408][T25486] do_syscall_64+0x103/0x610 [ 375.291011][T25486] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 375.296900][T25486] RIP: 0033:0x45a8aa [ 375.300799][T25486] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 375.320396][T25486] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 375.328804][T25486] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 375.336771][T25486] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 375.344743][T25486] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 [ 375.352715][T25486] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 375.360683][T25486] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:15:56 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x0, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:15:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0xa, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:15:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xffffffffffffff81, 0x200800) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10008009}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xbc, r3, 0x101, 0x70bd27, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xff}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}]}, @IPVS_CMD_ATTR_DAEMON={0x60, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'erspan0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x5}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x98}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7fffffff}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}]}, @IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}]}]}, 0xbc}}, 0x40000) connect$vsock_dgram(r2, &(0x7f00000000c0), 0x10) 23:15:56 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{0x0}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:15:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:15:56 executing program 4 (fault-call:0 fault-nth:47): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 377.656957][T25496] FAULT_INJECTION: forcing a failure. [ 377.656957][T25496] name failslab, interval 1, probability 0, space 0, times 0 [ 377.699796][T25496] CPU: 0 PID: 25496 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 377.708845][T25496] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 377.708905][T25496] Call Trace: [ 377.708934][T25496] dump_stack+0x172/0x1f0 [ 377.708963][T25496] should_fail.cold+0xa/0x15 [ 377.708988][T25496] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 377.709007][T25496] ? lock_downgrade+0x880/0x880 [ 377.709028][T25496] ? ___might_sleep+0x163/0x280 [ 377.709048][T25496] __should_failslab+0x121/0x190 [ 377.709074][T25496] should_failslab+0x9/0x14 [ 377.746966][T25496] kmem_cache_alloc_node_trace+0x270/0x720 [ 377.746993][T25496] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 377.747055][T25496] __kmalloc_node+0x3d/0x70 [ 377.747074][T25496] kvmalloc_node+0x68/0x100 [ 377.747093][T25496] __list_lru_init+0x4aa/0x6e0 [ 377.772983][T25496] alloc_super+0x759/0x890 [ 377.773003][T25496] ? test_single_super+0x10/0x10 [ 377.773020][T25496] sget_userns+0xf1/0x560 23:15:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) finit_module(r0, &(0x7f0000000000)='/dev/snd/timer\x00', 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x2000) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f00000000c0)=0x4) 23:15:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x10, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 377.773036][T25496] ? kill_litter_super+0x60/0x60 [ 377.773055][T25496] ? test_single_super+0x10/0x10 [ 377.773076][T25496] ? kill_litter_super+0x60/0x60 [ 377.782311][T25496] sget+0x10c/0x150 [ 377.782330][T25496] mount_bdev+0xff/0x3c0 [ 377.782348][T25496] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 377.782373][T25496] ext4_mount+0x35/0x40 [ 377.828735][T25496] ? ext4_nfs_get_inode+0xe0/0xe0 [ 377.833765][T25496] legacy_get_tree+0xf2/0x200 [ 377.838461][T25496] vfs_get_tree+0x123/0x450 [ 377.842986][T25496] do_mount+0x1436/0x2c40 [ 377.847320][T25496] ? rcu_lockdep_current_cpu_online+0x31/0x130 [ 377.853496][T25496] ? copy_mount_string+0x40/0x40 [ 377.858441][T25496] ? _copy_from_user+0xdd/0x150 [ 377.863315][T25496] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 377.869555][T25496] ? copy_mount_options+0x30e/0x440 [ 377.874763][T25496] ksys_mount+0xdb/0x150 [ 377.879015][T25496] __x64_sys_mount+0xbe/0x150 [ 377.883702][T25496] do_syscall_64+0x103/0x610 [ 377.888303][T25496] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 377.894195][T25496] RIP: 0033:0x45a8aa 23:15:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x48, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 377.898092][T25496] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 377.917696][T25496] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 377.926102][T25496] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 377.934073][T25496] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 377.942042][T25496] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 23:15:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 377.950014][T25496] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 377.957987][T25496] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:15:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$RDS_RECVERR(r1, 0x114, 0x5, &(0x7f0000000100)=0x1, 0x4) r2 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$sock_bt_hci(r0, 0x8dc3faf97b03bfd9, &(0x7f0000000000)="2eeb7ecdd738de436e8d6f516703c42f9695653839ab78f2af2b60f00675087fe9b415dee07f19") ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:15:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:15:59 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x0, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:15:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000000)={0x0, @aes256, 0x0, "cfe526b68abd8714"}) 23:15:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x4c, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:15:59 executing program 4 (fault-call:0 fault-nth:48): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:15:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:15:59 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:15:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 380.697608][T25833] FAULT_INJECTION: forcing a failure. [ 380.697608][T25833] name failslab, interval 1, probability 0, space 0, times 0 23:15:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_G_PRIORITY(r1, 0x80045643, 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x4000) ioctl$LOOP_SET_DIRECT_IO(r2, 0x4c08, 0x9) r3 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) [ 380.764438][T25833] CPU: 1 PID: 25833 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 380.773508][T25833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 380.783571][T25833] Call Trace: [ 380.786878][T25833] dump_stack+0x172/0x1f0 [ 380.791233][T25833] should_fail.cold+0xa/0x15 [ 380.795840][T25833] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 380.801653][T25833] ? lock_downgrade+0x880/0x880 [ 380.806517][T25833] ? ___might_sleep+0x163/0x280 [ 380.811379][T25833] __should_failslab+0x121/0x190 [ 380.816321][T25833] should_failslab+0x9/0x14 [ 380.820832][T25833] kmem_cache_alloc_trace+0x2d1/0x760 [ 380.826212][T25833] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 380.832110][T25833] __memcg_init_list_lru_node+0x8a/0x1e0 [ 380.837742][T25833] __list_lru_init+0x3d3/0x6e0 [ 380.842508][T25833] alloc_super+0x759/0x890 [ 380.846924][T25833] ? test_single_super+0x10/0x10 [ 380.851857][T25833] sget_userns+0xf1/0x560 [ 380.856182][T25833] ? kill_litter_super+0x60/0x60 [ 380.861118][T25833] ? test_single_super+0x10/0x10 [ 380.866047][T25833] ? kill_litter_super+0x60/0x60 [ 380.870995][T25833] sget+0x10c/0x150 [ 380.874799][T25833] mount_bdev+0xff/0x3c0 [ 380.879038][T25833] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 380.884841][T25833] ext4_mount+0x35/0x40 [ 380.888996][T25833] ? ext4_nfs_get_inode+0xe0/0xe0 [ 380.894015][T25833] legacy_get_tree+0xf2/0x200 [ 380.898694][T25833] vfs_get_tree+0x123/0x450 [ 380.903198][T25833] do_mount+0x1436/0x2c40 [ 380.907529][T25833] ? rcu_lockdep_current_cpu_online+0x31/0x130 [ 380.913683][T25833] ? copy_mount_string+0x40/0x40 [ 380.918626][T25833] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 380.924866][T25833] ? copy_mount_options+0x30e/0x440 [ 380.930065][T25833] ksys_mount+0xdb/0x150 [ 380.934310][T25833] __x64_sys_mount+0xbe/0x150 [ 380.939002][T25833] do_syscall_64+0x103/0x610 [ 380.943604][T25833] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 380.949492][T25833] RIP: 0033:0x45a8aa [ 380.953386][T25833] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 380.972984][T25833] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 380.981394][T25833] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 380.989366][T25833] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 380.997332][T25833] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 [ 381.005308][T25833] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 23:15:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x68, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 381.013269][T25833] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:15:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={r0}) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x7, @mcast1, 0x6}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:15:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:16:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f0000000000)={0x5, 0x8, 0xffffffff, 0x7fffffff, 0x8}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0xf}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:16:02 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:16:02 executing program 4 (fault-call:0 fault-nth:49): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:16:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x6c, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:16:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:16:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x80000, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f00000000c0)={{0x2e, @loopback, 0x4e22, 0x2, 'wrr\x00', 0x0, 0x6, 0x2}, {@broadcast, 0x4e20, 0x0, 0x1, 0x5, 0xfffffffffffffffe}}, 0x44) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:16:02 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 383.787959][T26072] FAULT_INJECTION: forcing a failure. [ 383.787959][T26072] name failslab, interval 1, probability 0, space 0, times 0 [ 383.832989][T26072] CPU: 0 PID: 26072 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 383.842038][T26072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 383.852094][T26072] Call Trace: [ 383.855397][T26072] dump_stack+0x172/0x1f0 [ 383.855425][T26072] should_fail.cold+0xa/0x15 [ 383.855459][T26072] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 383.855492][T26072] ? lock_downgrade+0x880/0x880 [ 383.875010][T26072] ? ___might_sleep+0x163/0x280 23:16:02 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x5452, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x2}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) [ 383.879869][T26072] __should_failslab+0x121/0x190 [ 383.879890][T26072] should_failslab+0x9/0x14 [ 383.879906][T26072] __kmalloc+0x2dc/0x740 [ 383.879927][T26072] ? __list_lru_init+0xd5/0x6e0 [ 383.879944][T26072] __list_lru_init+0xd5/0x6e0 [ 383.879963][T26072] alloc_super+0x759/0x890 [ 383.879982][T26072] ? test_single_super+0x10/0x10 [ 383.879998][T26072] sget_userns+0xf1/0x560 [ 383.880014][T26072] ? kill_litter_super+0x60/0x60 [ 383.880033][T26072] ? test_single_super+0x10/0x10 [ 383.880049][T26072] ? kill_litter_super+0x60/0x60 [ 383.880067][T26072] sget+0x10c/0x150 [ 383.935409][T26072] mount_bdev+0xff/0x3c0 [ 383.939669][T26072] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 383.945495][T26072] ext4_mount+0x35/0x40 [ 383.949657][T26072] ? ext4_nfs_get_inode+0xe0/0xe0 [ 383.954690][T26072] legacy_get_tree+0xf2/0x200 [ 383.959377][T26072] vfs_get_tree+0x123/0x450 [ 383.963889][T26072] do_mount+0x1436/0x2c40 [ 383.968224][T26072] ? rcu_lockdep_current_cpu_online+0x31/0x130 [ 383.974391][T26072] ? copy_mount_string+0x40/0x40 23:16:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x74, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 383.979343][T26072] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 383.985589][T26072] ? copy_mount_options+0x30e/0x440 [ 383.990796][T26072] ksys_mount+0xdb/0x150 [ 383.995051][T26072] __x64_sys_mount+0xbe/0x150 [ 383.999736][T26072] do_syscall_64+0x103/0x610 [ 384.004331][T26072] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 384.010226][T26072] RIP: 0033:0x45a8aa [ 384.014120][T26072] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 23:16:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000340)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000000380)={0x990001, 0x0, "e37fb9e72e4980093b6829535cf23b02ce67257476b8f1272ab8156af6cd3acb"}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") getsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f00000000c0)={@dev, @remote}, &(0x7f0000000100)=0x8) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/fib_triestat\x00\xa9\x1e\x93S\xcb\xc1\xd3v\xa6\xff:\xb8j\xb1\x9fSZ\x03\xea_\xcd\xce\xef\re\xa3y\x00\x00\x00\x00\x9e2\xce\xb3w\xc2&\xb6[\xaa\x9f\xca\x96\xc0\xfbSuB\xb2gd\x0fx\xedJ{\x1f\xc4\xed\xb1l\xde}\xb6\x988{\xc1\xe5\xf8\x8e \xa3\x81]$\x92)a\xbb\xa5\x90^\xf0Di\xcf\x9e\xad\xfa\xb5\xee\xb3St\xc4\xe2F\xf0\xf2E\xab\x91 ^\xf3\x95\xca\x88\x1fky\xfe\x1b\t:>\xfc\xe28\xe1`\xae\xd5\xd6N\xd2\xdfyp\xfb\xcd\x06\\\r*W\xadoUP\xcdq\xa9/\xbe\xd1\x80\x0f@\x86\x05\xf0q(=(=D1\xc9\xca\xb2\x82ZyD\x97I\\\'E@b\x1b\'N\x95o%\xe1\xda\xe3w\xd0\x8d\x89$\xc5\x84\xddZ4y\x10E\x94\xd2\xa1\xce\n9Y\xfe<\xc1\xef \xb2\xaft$G\x98\xcb\xc7\xfe') setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000000)=0xc3e, 0x4) r3 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:16:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 384.033732][T26072] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 384.033748][T26072] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 384.033759][T26072] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 384.033769][T26072] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 [ 384.033778][T26072] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 384.033788][T26072] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:16:03 executing program 4 (fault-call:0 fault-nth:50): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:16:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\xff', 0xce02, 0x0) [ 384.272514][T26300] FAULT_INJECTION: forcing a failure. [ 384.272514][T26300] name failslab, interval 1, probability 0, space 0, times 0 [ 384.312222][T26300] CPU: 0 PID: 26300 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 384.321268][T26300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 384.331320][T26300] Call Trace: [ 384.334630][T26300] dump_stack+0x172/0x1f0 [ 384.338974][T26300] should_fail.cold+0xa/0x15 [ 384.343573][T26300] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 384.349381][T26300] ? lock_downgrade+0x880/0x880 [ 384.354239][T26300] ? ___might_sleep+0x163/0x280 [ 384.359096][T26300] __should_failslab+0x121/0x190 [ 384.364035][T26300] should_failslab+0x9/0x14 [ 384.368543][T26300] kmem_cache_alloc_trace+0x2d1/0x760 [ 384.373927][T26300] __memcg_init_list_lru_node+0x8a/0x1e0 [ 384.379565][T26300] __list_lru_init+0x3d3/0x6e0 [ 384.384338][T26300] alloc_super+0x759/0x890 [ 384.388760][T26300] ? test_single_super+0x10/0x10 [ 384.393705][T26300] sget_userns+0xf1/0x560 [ 384.398038][T26300] ? kill_litter_super+0x60/0x60 [ 384.402983][T26300] ? test_single_super+0x10/0x10 [ 384.407922][T26300] ? kill_litter_super+0x60/0x60 [ 384.412869][T26300] sget+0x10c/0x150 [ 384.416683][T26300] mount_bdev+0xff/0x3c0 [ 384.420932][T26300] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 384.426741][T26300] ext4_mount+0x35/0x40 [ 384.430897][T26300] ? ext4_nfs_get_inode+0xe0/0xe0 [ 384.435928][T26300] legacy_get_tree+0xf2/0x200 [ 384.440616][T26300] vfs_get_tree+0x123/0x450 [ 384.445129][T26300] do_mount+0x1436/0x2c40 [ 384.449480][T26300] ? rcu_lockdep_current_cpu_online+0x31/0x130 [ 384.455646][T26300] ? copy_mount_string+0x40/0x40 [ 384.460587][T26300] ? _copy_from_user+0xdd/0x150 [ 384.465446][T26300] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 384.471713][T26300] ? copy_mount_options+0x30e/0x440 [ 384.476921][T26300] ksys_mount+0xdb/0x150 [ 384.481173][T26300] __x64_sys_mount+0xbe/0x150 [ 384.485860][T26300] do_syscall_64+0x103/0x610 [ 384.490484][T26300] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 384.496380][T26300] RIP: 0033:0x45a8aa [ 384.500275][T26300] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 384.519876][T26300] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 384.528288][T26300] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 384.536258][T26300] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 384.544226][T26300] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 [ 384.552194][T26300] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 384.560164][T26300] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:16:05 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:16:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x7a, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:16:05 executing program 0: r0 = socket$isdn_base(0x22, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r2 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x208002, 0x0) ioctl$TIOCSLCKTRMIOS(r3, 0x5457, &(0x7f0000000100)) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f0000000000)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:16:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:16:05 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:16:05 executing program 4 (fault-call:0 fault-nth:51): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 386.876212][T26311] FAULT_INJECTION: forcing a failure. [ 386.876212][T26311] name failslab, interval 1, probability 0, space 0, times 0 [ 386.908406][T26311] CPU: 1 PID: 26311 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 386.917486][T26311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 386.927555][T26311] Call Trace: [ 386.930874][T26311] dump_stack+0x172/0x1f0 [ 386.935226][T26311] should_fail.cold+0xa/0x15 [ 386.939829][T26311] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 386.945647][T26311] ? lock_downgrade+0x880/0x880 [ 386.950511][T26311] ? ___might_sleep+0x163/0x280 [ 386.955372][T26311] __should_failslab+0x121/0x190 [ 386.960313][T26311] should_failslab+0x9/0x14 [ 386.964826][T26311] kmem_cache_alloc_trace+0x2d1/0x760 [ 386.970204][T26311] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 386.976025][T26311] __memcg_init_list_lru_node+0x8a/0x1e0 [ 386.981663][T26311] __list_lru_init+0x3d3/0x6e0 [ 386.986434][T26311] alloc_super+0x759/0x890 [ 386.990876][T26311] ? test_single_super+0x10/0x10 [ 386.995819][T26311] sget_userns+0xf1/0x560 [ 387.000151][T26311] ? kill_litter_super+0x60/0x60 [ 387.005099][T26311] ? test_single_super+0x10/0x10 [ 387.010039][T26311] ? kill_litter_super+0x60/0x60 [ 387.014983][T26311] sget+0x10c/0x150 [ 387.018801][T26311] mount_bdev+0xff/0x3c0 [ 387.023066][T26311] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 387.028880][T26311] ext4_mount+0x35/0x40 [ 387.033071][T26311] ? ext4_nfs_get_inode+0xe0/0xe0 [ 387.038105][T26311] legacy_get_tree+0xf2/0x200 [ 387.042796][T26311] vfs_get_tree+0x123/0x450 [ 387.047312][T26311] do_mount+0x1436/0x2c40 [ 387.051651][T26311] ? rcu_lockdep_current_cpu_online+0x31/0x130 [ 387.057812][T26311] ? copy_mount_string+0x40/0x40 [ 387.062763][T26311] ? _copy_from_user+0xdd/0x150 [ 387.067625][T26311] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 23:16:05 executing program 0: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x2) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="3c00ee5e", @ANYRES16=r1, @ANYBLOB="200529bd7000fddbdf250200000008000200020000000400050008000400020000000400050008000300ff000000080002000a000000"], 0x3c}, 0x1, 0x0, 0x0, 0x5}, 0x4000) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r3 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x5452, &(0x7f0000000080)={{0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:16:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\xff', 0xce02, 0x0) 23:16:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x300, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:16:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\xff', 0xce02, 0x0) [ 387.073877][T26311] ? copy_mount_options+0x30e/0x440 [ 387.079112][T26311] ksys_mount+0xdb/0x150 [ 387.083368][T26311] __x64_sys_mount+0xbe/0x150 [ 387.088056][T26311] do_syscall_64+0x103/0x610 [ 387.092661][T26311] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 387.098557][T26311] RIP: 0033:0x45a8aa [ 387.098573][T26311] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 23:16:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x500, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 387.098583][T26311] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 387.098598][T26311] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 387.098608][T26311] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 387.098617][T26311] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 [ 387.098626][T26311] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 387.098635][T26311] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:16:06 executing program 4 (fault-call:0 fault-nth:52): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 387.302386][T26540] FAULT_INJECTION: forcing a failure. [ 387.302386][T26540] name failslab, interval 1, probability 0, space 0, times 0 [ 387.316383][T26540] CPU: 1 PID: 26540 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 387.325409][T26540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 387.335468][T26540] Call Trace: [ 387.338783][T26540] dump_stack+0x172/0x1f0 [ 387.343645][T26540] should_fail.cold+0xa/0x15 [ 387.348266][T26540] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 387.354075][T26540] ? lock_downgrade+0x880/0x880 [ 387.358939][T26540] ? ___might_sleep+0x163/0x280 [ 387.363802][T26540] __should_failslab+0x121/0x190 [ 387.368746][T26540] should_failslab+0x9/0x14 [ 387.373253][T26540] kmem_cache_alloc_trace+0x2d1/0x760 [ 387.378632][T26540] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 387.384449][T26540] __memcg_init_list_lru_node+0x8a/0x1e0 [ 387.390127][T26540] __list_lru_init+0x3d3/0x6e0 [ 387.394995][T26540] alloc_super+0x759/0x890 [ 387.399421][T26540] ? test_single_super+0x10/0x10 [ 387.404367][T26540] sget_userns+0xf1/0x560 [ 387.408709][T26540] ? kill_litter_super+0x60/0x60 [ 387.413653][T26540] ? test_single_super+0x10/0x10 [ 387.418589][T26540] ? kill_litter_super+0x60/0x60 [ 387.423527][T26540] sget+0x10c/0x150 [ 387.427344][T26540] mount_bdev+0xff/0x3c0 [ 387.431594][T26540] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 387.437403][T26540] ext4_mount+0x35/0x40 [ 387.441562][T26540] ? ext4_nfs_get_inode+0xe0/0xe0 [ 387.446593][T26540] legacy_get_tree+0xf2/0x200 [ 387.451274][T26540] vfs_get_tree+0x123/0x450 [ 387.455788][T26540] do_mount+0x1436/0x2c40 [ 387.460127][T26540] ? rcu_lockdep_current_cpu_online+0x31/0x130 [ 387.466289][T26540] ? copy_mount_string+0x40/0x40 [ 387.471231][T26540] ? _copy_from_user+0xdd/0x150 [ 387.476089][T26540] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 387.482332][T26540] ? copy_mount_options+0x30e/0x440 [ 387.487536][T26540] ksys_mount+0xdb/0x150 [ 387.491785][T26540] __x64_sys_mount+0xbe/0x150 [ 387.496478][T26540] do_syscall_64+0x103/0x610 [ 387.501078][T26540] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 387.506986][T26540] RIP: 0033:0x45a8aa [ 387.510882][T26540] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 387.530499][T26540] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 387.538915][T26540] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 387.546882][T26540] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 387.554853][T26540] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 [ 387.562828][T26540] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 387.570800][T26540] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:16:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\xff', 0xce02, 0x0) 23:16:06 executing program 0: socket$inet6(0xa, 0x3, 0x6) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, &(0x7f0000000780)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() sched_setaffinity(r1, 0x8, &(0x7f00000002c0)=0x7) r2 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x0, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0xa0) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}}, &(0x7f0000000380)) r3 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r3, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) setsockopt$sock_int(r3, 0x1, 0x8, 0x0, 0x0) bind$inet(r3, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) ioctl$int_in(r3, 0x400000000, &(0x7f0000000440)=0x7) setsockopt$RDS_CONG_MONITOR(r3, 0x114, 0x6, &(0x7f0000000500)=0x1, 0xfffffffffffffcb9) sendto$inet(r3, &(0x7f0000001600)="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", 0x528, 0x0, 0x0, 0x0) r4 = mq_open(&(0x7f0000000540)=']vmnet1selinux[keyring\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x0, 0x1, 0x5}) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x8000, 0x0) ioctl$GIO_SCRNMAP(r5, 0x4b40, &(0x7f0000000200)=""/122) mq_timedsend(r4, &(0x7f00000003c0)="5c73dfd8a0aa65d1b0ea5d82b23c42c03c", 0x11, 0x4, 0x0) mq_timedreceive(r4, &(0x7f0000000100)=""/24, 0x18, 0x0, 0x0) getcwd(&(0x7f0000000480)=""/118, 0xfffffffffffffede) sendmsg$alg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000fc0)="07484fb97c5b5c10a3a5947830aa9ed636f07d3f5ee71d2520b0f6af6fece10a539ac09b49783b3407c08fe98225bdbb177f1f2ee7b2ad2203d9fa8c759cbb2cf62690ee61377692a33c114095e608322acfed2c57c4af7c44dd437fae990842b68ff727447eeec08e6f122ecead48cac22448adbd9796ade86bc359113aa2e5f044b33bf3c928ef9bc48de0112e5604272f240dfa89c7e25f045656f5cfb8d2ce98b05c9b905b238c64635d22989e5047bbbaa37cc7a97ae56f96d872141dfad248c01a16ac5957ca129d0365b807206970ec", 0xd3}], 0x1, 0x0, 0x0, 0x20000000}, 0x4004004) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r2, 0xc0305302, &(0x7f0000000800)={0x3, 0x3f, 0xcc, 0x5, 0x6}) unshare(0x44000000) 23:16:06 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:16:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x600, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:16:06 executing program 4 (fault-call:0 fault-nth:53): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:16:06 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x10000014c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 387.802586][T26647] FAULT_INJECTION: forcing a failure. [ 387.802586][T26647] name failslab, interval 1, probability 0, space 0, times 0 [ 387.841082][T26647] CPU: 1 PID: 26647 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 387.850138][T26647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 387.860205][T26647] Call Trace: [ 387.863520][T26647] dump_stack+0x172/0x1f0 [ 387.867873][T26647] should_fail.cold+0xa/0x15 [ 387.872494][T26647] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 387.878308][T26647] ? lock_downgrade+0x880/0x880 [ 387.883165][T26647] ? ___might_sleep+0x163/0x280 [ 387.888023][T26647] __should_failslab+0x121/0x190 [ 387.892970][T26647] should_failslab+0x9/0x14 [ 387.897492][T26647] kmem_cache_alloc_trace+0x2d1/0x760 [ 387.902869][T26647] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 387.905375][T26758] IPVS: ftp: loaded support on port[0] = 21 [ 387.908681][T26647] __memcg_init_list_lru_node+0x8a/0x1e0 [ 387.908702][T26647] __list_lru_init+0x3d3/0x6e0 [ 387.908721][T26647] alloc_super+0x759/0x890 [ 387.908744][T26647] ? test_single_super+0x10/0x10 [ 387.934322][T26647] sget_userns+0xf1/0x560 [ 387.938655][T26647] ? kill_litter_super+0x60/0x60 [ 387.943597][T26647] ? test_single_super+0x10/0x10 [ 387.943614][T26647] ? kill_litter_super+0x60/0x60 [ 387.943626][T26647] sget+0x10c/0x150 [ 387.943644][T26647] mount_bdev+0xff/0x3c0 [ 387.943661][T26647] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 387.943680][T26647] ext4_mount+0x35/0x40 [ 387.953723][T26647] ? ext4_nfs_get_inode+0xe0/0xe0 [ 387.953742][T26647] legacy_get_tree+0xf2/0x200 [ 387.953763][T26647] vfs_get_tree+0x123/0x450 [ 387.953784][T26647] do_mount+0x1436/0x2c40 [ 387.971726][T26647] ? rcu_lockdep_current_cpu_online+0x31/0x130 [ 387.971751][T26647] ? copy_mount_string+0x40/0x40 23:16:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x700, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:16:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\xff', 0xce02, 0x0) [ 387.971768][T26647] ? _copy_from_user+0xdd/0x150 [ 387.971788][T26647] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 387.981462][T26647] ? copy_mount_options+0x30e/0x440 [ 387.981485][T26647] ksys_mount+0xdb/0x150 [ 387.981506][T26647] __x64_sys_mount+0xbe/0x150 [ 387.981526][T26647] do_syscall_64+0x103/0x610 [ 387.981549][T26647] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 387.981567][T26647] RIP: 0033:0x45a8aa [ 387.990374][T26647] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 387.990382][T26647] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 387.990397][T26647] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 387.990406][T26647] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 387.990417][T26647] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 [ 387.990425][T26647] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 387.990433][T26647] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:16:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\xff', 0xce02, 0x0) 23:16:07 executing program 4 (fault-call:0 fault-nth:54): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:16:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0xa00, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:16:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 388.282285][T26874] FAULT_INJECTION: forcing a failure. [ 388.282285][T26874] name failslab, interval 1, probability 0, space 0, times 0 [ 388.326220][T26874] CPU: 0 PID: 26874 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 388.335292][T26874] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 388.345366][T26874] Call Trace: [ 388.348672][T26874] dump_stack+0x172/0x1f0 [ 388.353020][T26874] should_fail.cold+0xa/0x15 [ 388.357634][T26874] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 388.363445][T26874] ? lock_downgrade+0x880/0x880 [ 388.368333][T26874] ? ___might_sleep+0x163/0x280 [ 388.373193][T26874] __should_failslab+0x121/0x190 [ 388.378137][T26874] should_failslab+0x9/0x14 [ 388.382643][T26874] kmem_cache_alloc_trace+0x2d1/0x760 [ 388.388022][T26874] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 388.393841][T26874] __memcg_init_list_lru_node+0x8a/0x1e0 [ 388.399496][T26874] __list_lru_init+0x3d3/0x6e0 [ 388.404266][T26874] alloc_super+0x759/0x890 [ 388.408691][T26874] ? test_single_super+0x10/0x10 [ 388.413634][T26874] sget_userns+0xf1/0x560 [ 388.417970][T26874] ? kill_litter_super+0x60/0x60 [ 388.422915][T26874] ? test_single_super+0x10/0x10 [ 388.427856][T26874] ? kill_litter_super+0x60/0x60 [ 388.432795][T26874] sget+0x10c/0x150 [ 388.436608][T26874] mount_bdev+0xff/0x3c0 [ 388.440872][T26874] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 388.446683][T26874] ext4_mount+0x35/0x40 [ 388.450839][T26874] ? ext4_nfs_get_inode+0xe0/0xe0 [ 388.455861][T26874] legacy_get_tree+0xf2/0x200 [ 388.460539][T26874] vfs_get_tree+0x123/0x450 [ 388.465041][T26874] do_mount+0x1436/0x2c40 [ 388.469374][T26874] ? copy_mount_string+0x40/0x40 [ 388.474308][T26874] ? copy_mount_options+0x234/0x440 [ 388.479504][T26874] ? copy_mount_options+0x23a/0x440 [ 388.484702][T26874] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 388.490944][T26874] ? copy_mount_options+0x30e/0x440 [ 388.496142][T26874] ksys_mount+0xdb/0x150 [ 388.500388][T26874] __x64_sys_mount+0xbe/0x150 [ 388.505064][T26874] do_syscall_64+0x103/0x610 [ 388.509661][T26874] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 388.515542][T26874] RIP: 0033:0x45a8aa [ 388.519433][T26874] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 388.539039][T26874] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 388.547443][T26874] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 388.555425][T26874] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 388.563397][T26874] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 23:16:07 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x10000014c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 388.571361][T26874] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 388.579326][T26874] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 [ 388.607641][T26883] IPVS: ftp: loaded support on port[0] = 21 23:16:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x20004e22}, 0x1c) listen(r0, 0x2) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000006, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 23:16:09 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:16:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:16:09 executing program 4 (fault-call:0 fault-nth:55): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:16:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x3f00, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:16:09 executing program 0: socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'veth0\x00', 0x201a}) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e22, @initdev}, 0x10) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) dup2(r1, r0) 23:16:09 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x10000014c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 390.907495][T26999] FAULT_INJECTION: forcing a failure. [ 390.907495][T26999] name failslab, interval 1, probability 0, space 0, times 0 [ 390.954489][T26999] CPU: 1 PID: 26999 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 390.963547][T26999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 390.973606][T26999] Call Trace: [ 390.976911][T26999] dump_stack+0x172/0x1f0 [ 390.981269][T26999] should_fail.cold+0xa/0x15 [ 390.985872][T26999] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 390.991682][T26999] ? lock_downgrade+0x880/0x880 [ 390.996541][T26999] ? ___might_sleep+0x163/0x280 [ 391.001397][T26999] __should_failslab+0x121/0x190 [ 391.006350][T26999] should_failslab+0x9/0x14 [ 391.010865][T26999] kmem_cache_alloc_trace+0x2d1/0x760 [ 391.016248][T26999] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 391.022064][T26999] __memcg_init_list_lru_node+0x8a/0x1e0 [ 391.027703][T26999] __list_lru_init+0x3d3/0x6e0 [ 391.032479][T26999] alloc_super+0x759/0x890 [ 391.036905][T26999] ? test_single_super+0x10/0x10 [ 391.041845][T26999] sget_userns+0xf1/0x560 [ 391.046181][T26999] ? kill_litter_super+0x60/0x60 [ 391.051132][T26999] ? test_single_super+0x10/0x10 [ 391.056072][T26999] ? kill_litter_super+0x60/0x60 [ 391.061010][T26999] sget+0x10c/0x150 [ 391.064826][T26999] mount_bdev+0xff/0x3c0 [ 391.069072][T26999] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 391.074889][T26999] ext4_mount+0x35/0x40 [ 391.079046][T26999] ? ext4_nfs_get_inode+0xe0/0xe0 [ 391.084077][T26999] legacy_get_tree+0xf2/0x200 [ 391.088764][T26999] vfs_get_tree+0x123/0x450 [ 391.093273][T26999] do_mount+0x1436/0x2c40 [ 391.097620][T26999] ? copy_mount_string+0x40/0x40 [ 391.102569][T26999] ? __sanitizer_cov_trace_const_cmp8+0x13/0x20 [ 391.108821][T26999] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 391.115079][T26999] ? copy_mount_options+0x30e/0x440 [ 391.120283][T26999] ksys_mount+0xdb/0x150 [ 391.124524][T26999] __x64_sys_mount+0xbe/0x150 [ 391.129200][T26999] do_syscall_64+0x103/0x610 [ 391.133792][T26999] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 391.139677][T26999] RIP: 0033:0x45a8aa [ 391.143591][T26999] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 391.163186][T26999] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 391.171591][T26999] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 391.179557][T26999] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 391.187523][T26999] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 [ 391.195493][T26999] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 23:16:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x4000, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:16:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 391.203465][T26999] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:16:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x4800, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:16:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) syz_genetlink_get_family_id$team(0x0) 23:16:10 executing program 4 (fault-call:0 fault-nth:56): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:16:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\xf9', 0xce02, 0x0) [ 391.662679][T27329] FAULT_INJECTION: forcing a failure. [ 391.662679][T27329] name failslab, interval 1, probability 0, space 0, times 0 [ 391.675403][T27329] CPU: 1 PID: 27329 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 391.684429][T27329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 391.684437][T27329] Call Trace: [ 391.684470][T27329] dump_stack+0x172/0x1f0 [ 391.684499][T27329] should_fail.cold+0xa/0x15 [ 391.684523][T27329] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 391.684543][T27329] ? lock_downgrade+0x880/0x880 [ 391.684565][T27329] ? ___might_sleep+0x163/0x280 [ 391.684588][T27329] __should_failslab+0x121/0x190 [ 391.684610][T27329] should_failslab+0x9/0x14 [ 391.684626][T27329] kmem_cache_alloc_trace+0x2d1/0x760 [ 391.684645][T27329] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 391.684668][T27329] __memcg_init_list_lru_node+0x8a/0x1e0 [ 391.684688][T27329] __list_lru_init+0x3d3/0x6e0 [ 391.684710][T27329] alloc_super+0x759/0x890 [ 391.684739][T27329] ? test_single_super+0x10/0x10 [ 391.684764][T27329] sget_userns+0xf1/0x560 [ 391.727609][T27329] ? kill_litter_super+0x60/0x60 [ 391.727631][T27329] ? test_single_super+0x10/0x10 [ 391.727646][T27329] ? kill_litter_super+0x60/0x60 [ 391.727665][T27329] sget+0x10c/0x150 [ 391.748941][T27329] mount_bdev+0xff/0x3c0 [ 391.748961][T27329] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 391.748978][T27329] ext4_mount+0x35/0x40 [ 391.748999][T27329] ? ext4_nfs_get_inode+0xe0/0xe0 [ 391.749015][T27329] legacy_get_tree+0xf2/0x200 [ 391.749037][T27329] vfs_get_tree+0x123/0x450 [ 391.763124][T27329] do_mount+0x1436/0x2c40 [ 391.763145][T27329] ? rcu_lockdep_current_cpu_online+0x31/0x130 [ 391.763167][T27329] ? copy_mount_string+0x40/0x40 [ 391.772416][T27329] ? _copy_from_user+0xdd/0x150 [ 391.772439][T27329] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 391.772466][T27329] ? copy_mount_options+0x30e/0x440 [ 391.772488][T27329] ksys_mount+0xdb/0x150 [ 391.850315][T27329] __x64_sys_mount+0xbe/0x150 [ 391.855016][T27329] do_syscall_64+0x103/0x610 [ 391.859626][T27329] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 391.865519][T27329] RIP: 0033:0x45a8aa [ 391.869417][T27329] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 391.889032][T27329] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 391.897448][T27329] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 391.905428][T27329] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 391.913405][T27329] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 [ 391.921376][T27329] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 391.929346][T27329] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:16:12 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:16:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x4c00, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:16:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:16:12 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) execve(0x0, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$P9_RWALK(r3, 0x0, 0x0) recvmmsg(r3, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 23:16:12 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, 0x0, 0x0, 0x0) 23:16:12 executing program 4 (fault-call:0 fault-nth:57): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 394.005279][T27336] FAULT_INJECTION: forcing a failure. [ 394.005279][T27336] name failslab, interval 1, probability 0, space 0, times 0 [ 394.028808][T27336] CPU: 1 PID: 27336 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 394.037867][T27336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 394.047930][T27336] Call Trace: [ 394.051240][T27336] dump_stack+0x172/0x1f0 [ 394.055588][T27336] should_fail.cold+0xa/0x15 [ 394.060186][T27336] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 394.066004][T27336] ? lock_downgrade+0x880/0x880 [ 394.070863][T27336] ? ___might_sleep+0x163/0x280 [ 394.075727][T27336] __should_failslab+0x121/0x190 [ 394.080684][T27336] should_failslab+0x9/0x14 [ 394.085194][T27336] kmem_cache_alloc_node_trace+0x270/0x720 [ 394.091012][T27336] ? kmem_cache_alloc_trace+0x354/0x760 [ 394.096564][T27336] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 394.102389][T27336] __kmalloc_node+0x3d/0x70 [ 394.106916][T27336] kvmalloc_node+0x68/0x100 [ 394.111431][T27336] __list_lru_init+0x4aa/0x6e0 [ 394.116219][T27336] alloc_super+0x759/0x890 [ 394.120642][T27336] ? test_single_super+0x10/0x10 [ 394.120658][T27336] sget_userns+0xf1/0x560 [ 394.120674][T27336] ? kill_litter_super+0x60/0x60 [ 394.120693][T27336] ? test_single_super+0x10/0x10 [ 394.120709][T27336] ? kill_litter_super+0x60/0x60 [ 394.120727][T27336] sget+0x10c/0x150 [ 394.129991][T27336] mount_bdev+0xff/0x3c0 [ 394.130009][T27336] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 394.130027][T27336] ext4_mount+0x35/0x40 [ 394.130041][T27336] ? ext4_nfs_get_inode+0xe0/0xe0 [ 394.130064][T27336] legacy_get_tree+0xf2/0x200 [ 394.172561][T27336] vfs_get_tree+0x123/0x450 [ 394.177083][T27336] do_mount+0x1436/0x2c40 [ 394.181441][T27336] ? rcu_lockdep_current_cpu_online+0x31/0x130 [ 394.187640][T27336] ? copy_mount_string+0x40/0x40 [ 394.192608][T27336] ? _copy_from_user+0xdd/0x150 [ 394.197493][T27336] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 394.203757][T27336] ? copy_mount_options+0x30e/0x440 [ 394.208980][T27336] ksys_mount+0xdb/0x150 [ 394.213249][T27336] __x64_sys_mount+0xbe/0x150 [ 394.217942][T27336] do_syscall_64+0x103/0x610 [ 394.222558][T27336] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 394.228457][T27336] RIP: 0033:0x45a8aa [ 394.232364][T27336] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 23:16:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x6800, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:16:13 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@fat=@fmask={'fmask'}}]}) [ 394.251975][T27336] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 394.260400][T27336] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 394.268406][T27336] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 394.276387][T27336] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 [ 394.284368][T27336] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 394.292342][T27336] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:16:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x7f', 0xce02, 0x0) 23:16:13 executing program 4 (fault-call:0 fault-nth:58): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 394.407180][T27472] FAT-fs (loop0): bogus number of reserved sectors [ 394.431665][T27472] FAT-fs (loop0): Can't find a valid FAT filesystem [ 394.450011][T27541] FAULT_INJECTION: forcing a failure. [ 394.450011][T27541] name failslab, interval 1, probability 0, space 0, times 0 [ 394.463420][T27541] CPU: 0 PID: 27541 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 394.472488][T27541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 394.482553][T27541] Call Trace: [ 394.485857][T27541] dump_stack+0x172/0x1f0 [ 394.490196][T27541] should_fail.cold+0xa/0x15 [ 394.494796][T27541] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 394.500609][T27541] ? lock_downgrade+0x880/0x880 [ 394.505520][T27541] ? ___might_sleep+0x163/0x280 [ 394.510378][T27541] __should_failslab+0x121/0x190 [ 394.515324][T27541] should_failslab+0x9/0x14 [ 394.519832][T27541] kmem_cache_alloc_trace+0x2d1/0x760 [ 394.525213][T27541] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 394.531027][T27541] __memcg_init_list_lru_node+0x8a/0x1e0 [ 394.536687][T27541] __list_lru_init+0x3d3/0x6e0 [ 394.541470][T27541] alloc_super+0x759/0x890 [ 394.545907][T27541] ? test_single_super+0x10/0x10 [ 394.550848][T27541] sget_userns+0xf1/0x560 [ 394.555180][T27541] ? kill_litter_super+0x60/0x60 [ 394.560131][T27541] ? test_single_super+0x10/0x10 [ 394.565070][T27541] ? kill_litter_super+0x60/0x60 [ 394.570004][T27541] sget+0x10c/0x150 [ 394.573815][T27541] mount_bdev+0xff/0x3c0 [ 394.578063][T27541] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 394.583876][T27541] ext4_mount+0x35/0x40 [ 394.588033][T27541] ? ext4_nfs_get_inode+0xe0/0xe0 [ 394.593064][T27541] legacy_get_tree+0xf2/0x200 [ 394.597752][T27541] vfs_get_tree+0x123/0x450 [ 394.602260][T27541] do_mount+0x1436/0x2c40 [ 394.606604][T27541] ? rcu_lockdep_current_cpu_online+0x31/0x130 [ 394.612764][T27541] ? copy_mount_string+0x40/0x40 [ 394.617733][T27541] ? _copy_from_user+0xdd/0x150 [ 394.622591][T27541] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 394.628836][T27541] ? copy_mount_options+0x30e/0x440 [ 394.634042][T27541] ksys_mount+0xdb/0x150 [ 394.638296][T27541] __x64_sys_mount+0xbe/0x150 [ 394.642983][T27541] do_syscall_64+0x103/0x610 [ 394.647607][T27541] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 394.653504][T27541] RIP: 0033:0x45a8aa [ 394.657406][T27541] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 394.677028][T27541] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 394.685454][T27541] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 394.693795][T27541] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 394.701774][T27541] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 [ 394.709746][T27541] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 394.717717][T27541] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:16:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x6c00, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:16:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x8c', 0xce02, 0x0) [ 394.767096][T27568] FAT-fs (loop0): bogus number of reserved sectors [ 394.778788][T27568] FAT-fs (loop0): Can't find a valid FAT filesystem 23:16:15 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:16:15 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, 0x0, 0x0, 0x0) 23:16:15 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f66db68"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) syz_open_dev$dmmidi(0x0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:16:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\xf4', 0xce02, 0x0) 23:16:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x7400, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:16:15 executing program 4 (fault-call:0 fault-nth:59): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 397.101859][T27690] FAULT_INJECTION: forcing a failure. [ 397.101859][T27690] name failslab, interval 1, probability 0, space 0, times 0 [ 397.121646][T27690] CPU: 0 PID: 27690 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 397.130679][T27690] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 397.140732][T27690] Call Trace: [ 397.144045][T27690] dump_stack+0x172/0x1f0 [ 397.148404][T27690] should_fail.cold+0xa/0x15 [ 397.153008][T27690] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 397.158822][T27690] ? lock_downgrade+0x880/0x880 [ 397.163684][T27690] ? ___might_sleep+0x163/0x280 [ 397.168558][T27690] __should_failslab+0x121/0x190 [ 397.173517][T27690] should_failslab+0x9/0x14 [ 397.178028][T27690] kmem_cache_alloc_node_trace+0x270/0x720 [ 397.183850][T27690] ? kmem_cache_alloc_trace+0x354/0x760 [ 397.189403][T27690] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 397.195215][T27690] __kmalloc_node+0x3d/0x70 [ 397.199758][T27690] kvmalloc_node+0x68/0x100 [ 397.204301][T27690] __list_lru_init+0x4aa/0x6e0 [ 397.209092][T27690] alloc_super+0x759/0x890 [ 397.213517][T27690] ? test_single_super+0x10/0x10 [ 397.213534][T27690] sget_userns+0xf1/0x560 [ 397.213551][T27690] ? kill_litter_super+0x60/0x60 [ 397.213572][T27690] ? test_single_super+0x10/0x10 [ 397.222826][T27690] ? kill_litter_super+0x60/0x60 [ 397.222840][T27690] sget+0x10c/0x150 [ 397.222860][T27690] mount_bdev+0xff/0x3c0 [ 397.245642][T27690] ? ext4_calculate_overhead+0x11b0/0x11b0 23:16:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\xf5', 0xce02, 0x0) [ 397.251457][T27690] ext4_mount+0x35/0x40 [ 397.255628][T27690] ? ext4_nfs_get_inode+0xe0/0xe0 [ 397.260656][T27690] legacy_get_tree+0xf2/0x200 [ 397.265340][T27690] vfs_get_tree+0x123/0x450 [ 397.269854][T27690] do_mount+0x1436/0x2c40 [ 397.274196][T27690] ? rcu_lockdep_current_cpu_online+0x31/0x130 [ 397.280393][T27690] ? copy_mount_string+0x40/0x40 [ 397.285333][T27690] ? _copy_from_user+0xdd/0x150 [ 397.290188][T27690] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 397.296428][T27690] ? copy_mount_options+0x30e/0x440 [ 397.301644][T27690] ksys_mount+0xdb/0x150 [ 397.305893][T27690] __x64_sys_mount+0xbe/0x150 [ 397.310582][T27690] do_syscall_64+0x103/0x610 [ 397.315184][T27690] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 397.321093][T27690] RIP: 0033:0x45a8aa [ 397.324993][T27690] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 397.344596][T27690] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 23:16:16 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f66db68"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) syz_open_dev$dmmidi(0x0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:16:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x7a00, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 397.353007][T27690] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 397.360980][T27690] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 397.368952][T27690] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 [ 397.376940][T27690] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 397.384957][T27690] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:16:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\xf6', 0xce02, 0x0) 23:16:16 executing program 4 (fault-call:0 fault-nth:60): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:16:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\xfb', 0xce02, 0x0) [ 397.646757][T27916] FAULT_INJECTION: forcing a failure. [ 397.646757][T27916] name failslab, interval 1, probability 0, space 0, times 0 [ 397.675217][T27916] CPU: 1 PID: 27916 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 397.684262][T27916] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 397.694316][T27916] Call Trace: [ 397.697615][T27916] dump_stack+0x172/0x1f0 [ 397.701954][T27916] should_fail.cold+0xa/0x15 [ 397.706565][T27916] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 397.712375][T27916] ? lock_downgrade+0x880/0x880 [ 397.717233][T27916] ? ___might_sleep+0x163/0x280 [ 397.722089][T27916] __should_failslab+0x121/0x190 [ 397.722109][T27916] should_failslab+0x9/0x14 [ 397.722126][T27916] kmem_cache_alloc_node_trace+0x270/0x720 [ 397.722147][T27916] ? kmem_cache_alloc_trace+0x354/0x760 [ 397.731561][T27916] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 397.731581][T27916] __kmalloc_node+0x3d/0x70 [ 397.731601][T27916] kvmalloc_node+0x68/0x100 [ 397.731621][T27916] __list_lru_init+0x4aa/0x6e0 [ 397.762451][T27916] alloc_super+0x759/0x890 [ 397.766886][T27916] ? test_single_super+0x10/0x10 [ 397.771823][T27916] sget_userns+0xf1/0x560 [ 397.776155][T27916] ? kill_litter_super+0x60/0x60 [ 397.781095][T27916] ? test_single_super+0x10/0x10 [ 397.786036][T27916] ? kill_litter_super+0x60/0x60 [ 397.790971][T27916] sget+0x10c/0x150 [ 397.794785][T27916] mount_bdev+0xff/0x3c0 [ 397.799034][T27916] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 397.804844][T27916] ext4_mount+0x35/0x40 [ 397.809008][T27916] ? ext4_nfs_get_inode+0xe0/0xe0 [ 397.814037][T27916] legacy_get_tree+0xf2/0x200 [ 397.818720][T27916] vfs_get_tree+0x123/0x450 [ 397.823232][T27916] do_mount+0x1436/0x2c40 [ 397.827568][T27916] ? rcu_lockdep_current_cpu_online+0x31/0x130 [ 397.833730][T27916] ? copy_mount_string+0x40/0x40 [ 397.838668][T27916] ? _copy_from_user+0xdd/0x150 [ 397.843524][T27916] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 397.849865][T27916] ? copy_mount_options+0x30e/0x440 [ 397.855074][T27916] ksys_mount+0xdb/0x150 [ 397.859320][T27916] __x64_sys_mount+0xbe/0x150 [ 397.864007][T27916] do_syscall_64+0x103/0x610 [ 397.868602][T27916] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 397.874506][T27916] RIP: 0033:0x45a8aa [ 397.878405][T27916] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 397.898008][T27916] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 397.906416][T27916] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 397.914387][T27916] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 397.922358][T27916] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 [ 397.930325][T27916] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 397.938292][T27916] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:16:18 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(0x0, 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:16:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x20000, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:16:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:16:18 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, 0x0, 0x0, 0x0) 23:16:18 executing program 4 (fault-call:0 fault-nth:61): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 400.173378][T27925] FAULT_INJECTION: forcing a failure. [ 400.173378][T27925] name failslab, interval 1, probability 0, space 0, times 0 [ 400.217410][T27925] CPU: 0 PID: 27925 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 400.226504][T27925] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 400.236575][T27925] Call Trace: [ 400.239888][T27925] dump_stack+0x172/0x1f0 [ 400.244234][T27925] should_fail.cold+0xa/0x15 [ 400.248837][T27925] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 400.254655][T27925] ? lock_downgrade+0x880/0x880 [ 400.259532][T27925] ? ___might_sleep+0x163/0x280 [ 400.264399][T27925] __should_failslab+0x121/0x190 [ 400.269351][T27925] should_failslab+0x9/0x14 [ 400.273865][T27925] kmem_cache_alloc_trace+0x2d1/0x760 [ 400.279248][T27925] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 400.285070][T27925] __memcg_init_list_lru_node+0x8a/0x1e0 [ 400.290720][T27925] __list_lru_init+0x3d3/0x6e0 [ 400.295521][T27925] alloc_super+0x759/0x890 [ 400.299954][T27925] ? test_single_super+0x10/0x10 [ 400.304900][T27925] sget_userns+0xf1/0x560 [ 400.309241][T27925] ? kill_litter_super+0x60/0x60 [ 400.314189][T27925] ? test_single_super+0x10/0x10 [ 400.319135][T27925] ? kill_litter_super+0x60/0x60 [ 400.324078][T27925] sget+0x10c/0x150 [ 400.327901][T27925] mount_bdev+0xff/0x3c0 [ 400.332159][T27925] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 400.337975][T27925] ext4_mount+0x35/0x40 [ 400.342143][T27925] ? ext4_nfs_get_inode+0xe0/0xe0 [ 400.347178][T27925] legacy_get_tree+0xf2/0x200 [ 400.351868][T27925] vfs_get_tree+0x123/0x450 [ 400.356386][T27925] do_mount+0x1436/0x2c40 [ 400.360732][T27925] ? rcu_lockdep_current_cpu_online+0x31/0x130 [ 400.366900][T27925] ? copy_mount_string+0x40/0x40 [ 400.371846][T27925] ? _copy_from_user+0xdd/0x150 [ 400.376718][T27925] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 400.382970][T27925] ? copy_mount_options+0x30e/0x440 [ 400.388187][T27925] ksys_mount+0xdb/0x150 [ 400.392446][T27925] __x64_sys_mount+0xbe/0x150 [ 400.397173][T27925] do_syscall_64+0x103/0x610 [ 400.401784][T27925] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 400.407687][T27925] RIP: 0033:0x45a8aa [ 400.411589][T27925] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 400.431196][T27925] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 400.439611][T27925] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 400.447587][T27925] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 400.455569][T27925] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 23:16:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:16:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x100000, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 400.463546][T27925] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 400.471531][T27925] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:16:19 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f66db68"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) syz_open_dev$dmmidi(0x0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:16:19 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(0x0, 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:16:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:16:19 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f66db68"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) syz_open_dev$dmmidi(0x0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:16:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x1000000, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:16:19 executing program 4 (fault-call:0 fault-nth:62): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:16:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:16:19 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f66db68"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) syz_open_dev$dmmidi(0x0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 400.778358][T28155] FAULT_INJECTION: forcing a failure. [ 400.778358][T28155] name failslab, interval 1, probability 0, space 0, times 0 [ 400.809107][T28155] CPU: 1 PID: 28155 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 400.818147][T28155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 400.828210][T28155] Call Trace: [ 400.831532][T28155] dump_stack+0x172/0x1f0 [ 400.835889][T28155] should_fail.cold+0xa/0x15 [ 400.840518][T28155] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 400.846343][T28155] ? lock_downgrade+0x880/0x880 [ 400.846363][T28155] ? ___might_sleep+0x163/0x280 [ 400.846383][T28155] __should_failslab+0x121/0x190 [ 400.846402][T28155] should_failslab+0x9/0x14 [ 400.846424][T28155] kmem_cache_alloc_trace+0x2d1/0x760 [ 400.856111][T28155] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 400.856135][T28155] __memcg_init_list_lru_node+0x8a/0x1e0 [ 400.856156][T28155] __list_lru_init+0x3d3/0x6e0 [ 400.856175][T28155] alloc_super+0x759/0x890 [ 400.856197][T28155] ? test_single_super+0x10/0x10 [ 400.896517][T28155] sget_userns+0xf1/0x560 [ 400.900860][T28155] ? kill_litter_super+0x60/0x60 [ 400.905815][T28155] ? test_single_super+0x10/0x10 [ 400.910763][T28155] ? kill_litter_super+0x60/0x60 [ 400.915710][T28155] sget+0x10c/0x150 [ 400.919535][T28155] mount_bdev+0xff/0x3c0 [ 400.923791][T28155] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 400.929613][T28155] ext4_mount+0x35/0x40 [ 400.933778][T28155] ? ext4_nfs_get_inode+0xe0/0xe0 [ 400.938813][T28155] legacy_get_tree+0xf2/0x200 [ 400.943528][T28155] vfs_get_tree+0x123/0x450 [ 400.948048][T28155] do_mount+0x1436/0x2c40 [ 400.952389][T28155] ? rcu_lockdep_current_cpu_online+0x31/0x130 [ 400.958558][T28155] ? copy_mount_string+0x40/0x40 [ 400.963522][T28155] ? _copy_from_user+0xdd/0x150 [ 400.968387][T28155] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 400.974638][T28155] ? copy_mount_options+0x30e/0x440 [ 400.979851][T28155] ksys_mount+0xdb/0x150 [ 400.984107][T28155] __x64_sys_mount+0xbe/0x150 [ 400.988800][T28155] do_syscall_64+0x103/0x610 [ 400.993410][T28155] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 400.999307][T28155] RIP: 0033:0x45a8aa [ 401.003218][T28155] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 23:16:19 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000), 0x0, 0x0) 23:16:19 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(0x0, 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) [ 401.022830][T28155] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 401.031248][T28155] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 401.039226][T28155] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 401.047204][T28155] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 [ 401.055183][T28155] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 401.063159][T28155] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:16:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:16:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x2000000, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:16:20 executing program 4 (fault-call:0 fault-nth:63): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:16:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\xff', 0xce02, 0x0) [ 401.255879][T28278] FAULT_INJECTION: forcing a failure. [ 401.255879][T28278] name failslab, interval 1, probability 0, space 0, times 0 [ 401.278741][T28278] CPU: 0 PID: 28278 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 401.287785][T28278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 401.297845][T28278] Call Trace: [ 401.301156][T28278] dump_stack+0x172/0x1f0 [ 401.305532][T28278] should_fail.cold+0xa/0x15 [ 401.310144][T28278] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 401.315960][T28278] ? lock_downgrade+0x880/0x880 [ 401.320826][T28278] ? ___might_sleep+0x163/0x280 [ 401.325692][T28278] __should_failslab+0x121/0x190 [ 401.330644][T28278] should_failslab+0x9/0x14 [ 401.335159][T28278] kmem_cache_alloc_trace+0x2d1/0x760 [ 401.340547][T28278] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 401.346361][T28278] __memcg_init_list_lru_node+0x8a/0x1e0 [ 401.352006][T28278] __list_lru_init+0x3d3/0x6e0 [ 401.356807][T28278] alloc_super+0x759/0x890 [ 401.361238][T28278] ? test_single_super+0x10/0x10 [ 401.366214][T28278] sget_userns+0xf1/0x560 [ 401.370559][T28278] ? kill_litter_super+0x60/0x60 [ 401.375537][T28278] ? test_single_super+0x10/0x10 [ 401.380514][T28278] ? kill_litter_super+0x60/0x60 [ 401.385510][T28278] sget+0x10c/0x150 [ 401.389335][T28278] mount_bdev+0xff/0x3c0 [ 401.393595][T28278] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 401.399416][T28278] ext4_mount+0x35/0x40 [ 401.403587][T28278] ? ext4_nfs_get_inode+0xe0/0xe0 [ 401.408628][T28278] legacy_get_tree+0xf2/0x200 [ 401.413325][T28278] vfs_get_tree+0x123/0x450 [ 401.417841][T28278] do_mount+0x1436/0x2c40 [ 401.422196][T28278] ? rcu_lockdep_current_cpu_online+0x31/0x130 [ 401.428369][T28278] ? copy_mount_string+0x40/0x40 [ 401.433323][T28278] ? _copy_from_user+0xdd/0x150 [ 401.438194][T28278] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 401.444446][T28278] ? copy_mount_options+0x30e/0x440 [ 401.449693][T28278] ksys_mount+0xdb/0x150 [ 401.453961][T28278] __x64_sys_mount+0xbe/0x150 [ 401.458654][T28278] do_syscall_64+0x103/0x610 [ 401.463350][T28278] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 401.469305][T28278] RIP: 0033:0x45a8aa [ 401.473213][T28278] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 401.492823][T28278] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 23:16:20 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) [ 401.501242][T28278] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 401.509218][T28278] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 401.517202][T28278] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 [ 401.525180][T28278] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 401.525190][T28278] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:16:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x3000000, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:16:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:16:20 executing program 4 (fault-call:0 fault-nth:64): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 401.704107][T28428] FAULT_INJECTION: forcing a failure. [ 401.704107][T28428] name failslab, interval 1, probability 0, space 0, times 0 [ 401.717396][T28428] CPU: 1 PID: 28428 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 401.726433][T28428] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 401.736528][T28428] Call Trace: [ 401.739841][T28428] dump_stack+0x172/0x1f0 [ 401.744193][T28428] should_fail.cold+0xa/0x15 [ 401.748801][T28428] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 401.754619][T28428] ? lock_downgrade+0x880/0x880 [ 401.759500][T28428] ? ___might_sleep+0x163/0x280 [ 401.764366][T28428] __should_failslab+0x121/0x190 [ 401.769319][T28428] should_failslab+0x9/0x14 [ 401.773834][T28428] kmem_cache_alloc_trace+0x2d1/0x760 [ 401.773853][T28428] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 401.773875][T28428] __memcg_init_list_lru_node+0x8a/0x1e0 [ 401.785050][T28428] __list_lru_init+0x3d3/0x6e0 [ 401.785070][T28428] alloc_super+0x759/0x890 [ 401.785092][T28428] ? test_single_super+0x10/0x10 [ 401.804839][T28428] sget_userns+0xf1/0x560 [ 401.809179][T28428] ? kill_litter_super+0x60/0x60 [ 401.814134][T28428] ? test_single_super+0x10/0x10 [ 401.819080][T28428] ? kill_litter_super+0x60/0x60 [ 401.824029][T28428] sget+0x10c/0x150 [ 401.827850][T28428] mount_bdev+0xff/0x3c0 [ 401.832104][T28428] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 401.837920][T28428] ext4_mount+0x35/0x40 [ 401.842083][T28428] ? ext4_nfs_get_inode+0xe0/0xe0 [ 401.847118][T28428] legacy_get_tree+0xf2/0x200 [ 401.851811][T28428] vfs_get_tree+0x123/0x450 [ 401.856327][T28428] do_mount+0x1436/0x2c40 [ 401.860671][T28428] ? rcu_lockdep_current_cpu_online+0x31/0x130 [ 401.866840][T28428] ? copy_mount_string+0x40/0x40 [ 401.871788][T28428] ? _copy_from_user+0xdd/0x150 [ 401.876650][T28428] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 401.882903][T28428] ? copy_mount_options+0x30e/0x440 [ 401.888117][T28428] ksys_mount+0xdb/0x150 [ 401.892372][T28428] __x64_sys_mount+0xbe/0x150 [ 401.897062][T28428] do_syscall_64+0x103/0x610 [ 401.901671][T28428] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 401.907571][T28428] RIP: 0033:0x45a8aa [ 401.911497][T28428] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 401.931139][T28428] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 401.939559][T28428] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa 23:16:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x4000000, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 401.947536][T28428] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 401.955519][T28428] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 [ 401.963515][T28428] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 401.971511][T28428] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:16:22 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f66db68"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) syz_open_dev$dmmidi(0x0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:16:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:16:22 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000), 0x0, 0x0) 23:16:22 executing program 4 (fault-call:0 fault-nth:65): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:16:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x5000000, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:16:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 403.892174][T28607] FAULT_INJECTION: forcing a failure. [ 403.892174][T28607] name failslab, interval 1, probability 0, space 0, times 0 [ 403.934701][T28607] CPU: 0 PID: 28607 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 403.943757][T28607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 403.943765][T28607] Call Trace: [ 403.943791][T28607] dump_stack+0x172/0x1f0 [ 403.943819][T28607] should_fail.cold+0xa/0x15 [ 403.943847][T28607] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 403.943868][T28607] ? lock_downgrade+0x880/0x880 [ 403.943891][T28607] ? ___might_sleep+0x163/0x280 [ 403.943920][T28607] __should_failslab+0x121/0x190 [ 403.986620][T28607] should_failslab+0x9/0x14 [ 403.991137][T28607] kmem_cache_alloc_trace+0x2d1/0x760 [ 403.996583][T28607] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 403.996608][T28607] __memcg_init_list_lru_node+0x8a/0x1e0 [ 403.996629][T28607] __list_lru_init+0x3d3/0x6e0 [ 403.996648][T28607] alloc_super+0x759/0x890 [ 403.996671][T28607] ? test_single_super+0x10/0x10 [ 404.022208][T28607] sget_userns+0xf1/0x560 [ 404.026548][T28607] ? kill_litter_super+0x60/0x60 [ 404.031513][T28607] ? test_single_super+0x10/0x10 [ 404.036456][T28607] ? kill_litter_super+0x60/0x60 [ 404.041421][T28607] sget+0x10c/0x150 [ 404.045240][T28607] mount_bdev+0xff/0x3c0 [ 404.049500][T28607] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 404.055312][T28607] ext4_mount+0x35/0x40 [ 404.059466][T28607] ? ext4_nfs_get_inode+0xe0/0xe0 [ 404.064519][T28607] legacy_get_tree+0xf2/0x200 [ 404.069204][T28607] vfs_get_tree+0x123/0x450 [ 404.073715][T28607] do_mount+0x1436/0x2c40 [ 404.078061][T28607] ? copy_mount_string+0x40/0x40 [ 404.083012][T28607] ? copy_mount_options+0x244/0x440 [ 404.088217][T28607] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 404.094462][T28607] ? copy_mount_options+0x30e/0x440 [ 404.099685][T28607] ksys_mount+0xdb/0x150 [ 404.103932][T28607] __x64_sys_mount+0xbe/0x150 [ 404.108620][T28607] do_syscall_64+0x103/0x610 [ 404.113220][T28607] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 404.119112][T28607] RIP: 0033:0x45a8aa 23:16:23 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f66db68"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) syz_open_dev$dmmidi(0x0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 404.123003][T28607] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 404.142600][T28607] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 404.142616][T28607] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 404.142626][T28607] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 404.142637][T28607] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 [ 404.142646][T28607] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 404.142655][T28607] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:16:23 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:16:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x6000000, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:16:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:16:23 executing program 4 (fault-call:0 fault-nth:66): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 404.622286][T28729] FAULT_INJECTION: forcing a failure. [ 404.622286][T28729] name failslab, interval 1, probability 0, space 0, times 0 [ 404.640993][T28729] CPU: 0 PID: 28729 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 404.650032][T28729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 404.660088][T28729] Call Trace: [ 404.663394][T28729] dump_stack+0x172/0x1f0 [ 404.667746][T28729] should_fail.cold+0xa/0x15 [ 404.672345][T28729] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 404.678154][T28729] ? lock_downgrade+0x880/0x880 [ 404.683007][T28729] ? ___might_sleep+0x163/0x280 [ 404.687902][T28729] __should_failslab+0x121/0x190 [ 404.692844][T28729] should_failslab+0x9/0x14 [ 404.697352][T28729] kmem_cache_alloc_trace+0x2d1/0x760 [ 404.702732][T28729] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 404.708550][T28729] __memcg_init_list_lru_node+0x8a/0x1e0 [ 404.714187][T28729] __list_lru_init+0x3d3/0x6e0 [ 404.718958][T28729] alloc_super+0x759/0x890 [ 404.723381][T28729] ? test_single_super+0x10/0x10 [ 404.728320][T28729] sget_userns+0xf1/0x560 [ 404.732765][T28729] ? kill_litter_super+0x60/0x60 [ 404.737709][T28729] ? test_single_super+0x10/0x10 [ 404.742645][T28729] ? kill_litter_super+0x60/0x60 [ 404.747580][T28729] sget+0x10c/0x150 [ 404.751391][T28729] mount_bdev+0xff/0x3c0 [ 404.755638][T28729] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 404.761453][T28729] ext4_mount+0x35/0x40 [ 404.765625][T28729] ? ext4_nfs_get_inode+0xe0/0xe0 [ 404.770664][T28729] legacy_get_tree+0xf2/0x200 [ 404.775357][T28729] vfs_get_tree+0x123/0x450 [ 404.779866][T28729] do_mount+0x1436/0x2c40 [ 404.784200][T28729] ? rcu_lockdep_current_cpu_online+0x31/0x130 [ 404.790365][T28729] ? copy_mount_string+0x40/0x40 [ 404.795304][T28729] ? _copy_from_user+0xdd/0x150 [ 404.800166][T28729] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 404.806410][T28729] ? copy_mount_options+0x30e/0x440 [ 404.811615][T28729] ksys_mount+0xdb/0x150 [ 404.815862][T28729] __x64_sys_mount+0xbe/0x150 [ 404.820543][T28729] do_syscall_64+0x103/0x610 [ 404.825142][T28729] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 404.831036][T28729] RIP: 0033:0x45a8aa [ 404.834933][T28729] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 404.854530][T28729] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 404.862943][T28729] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa 23:16:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:16:23 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000), 0x0, 0x0) [ 404.870912][T28729] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 404.878884][T28729] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 [ 404.886852][T28729] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 404.894822][T28729] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:16:23 executing program 4 (fault-call:0 fault-nth:67): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:16:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x7000000, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:16:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\xff', 0xce02, 0x0) [ 405.077996][T28840] FAULT_INJECTION: forcing a failure. [ 405.077996][T28840] name failslab, interval 1, probability 0, space 0, times 0 [ 405.105651][T28840] CPU: 0 PID: 28840 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 405.114685][T28840] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 405.124739][T28840] Call Trace: [ 405.128038][T28840] dump_stack+0x172/0x1f0 [ 405.132378][T28840] should_fail.cold+0xa/0x15 [ 405.136981][T28840] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 405.142793][T28840] ? lock_downgrade+0x880/0x880 [ 405.147651][T28840] ? ___might_sleep+0x163/0x280 [ 405.152524][T28840] __should_failslab+0x121/0x190 [ 405.157481][T28840] should_failslab+0x9/0x14 [ 405.161995][T28840] kmem_cache_alloc_trace+0x2d1/0x760 [ 405.167370][T28840] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 405.173185][T28840] __memcg_init_list_lru_node+0x8a/0x1e0 [ 405.178827][T28840] __list_lru_init+0x3d3/0x6e0 [ 405.183595][T28840] alloc_super+0x759/0x890 [ 405.188018][T28840] ? test_single_super+0x10/0x10 [ 405.192960][T28840] sget_userns+0xf1/0x560 [ 405.197292][T28840] ? kill_litter_super+0x60/0x60 [ 405.202236][T28840] ? test_single_super+0x10/0x10 [ 405.207174][T28840] ? kill_litter_super+0x60/0x60 [ 405.212107][T28840] sget+0x10c/0x150 [ 405.215920][T28840] mount_bdev+0xff/0x3c0 [ 405.220165][T28840] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 405.225977][T28840] ext4_mount+0x35/0x40 [ 405.230134][T28840] ? ext4_nfs_get_inode+0xe0/0xe0 [ 405.235162][T28840] legacy_get_tree+0xf2/0x200 [ 405.239844][T28840] vfs_get_tree+0x123/0x450 [ 405.244353][T28840] do_mount+0x1436/0x2c40 [ 405.248694][T28840] ? copy_mount_string+0x40/0x40 [ 405.253645][T28840] ? copy_mount_options+0x234/0x440 [ 405.258847][T28840] ? copy_mount_options+0x23a/0x440 [ 405.264052][T28840] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 405.270297][T28840] ? copy_mount_options+0x30e/0x440 [ 405.275517][T28840] ksys_mount+0xdb/0x150 [ 405.279769][T28840] __x64_sys_mount+0xbe/0x150 [ 405.284455][T28840] do_syscall_64+0x103/0x610 [ 405.289078][T28840] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 405.294971][T28840] RIP: 0033:0x45a8aa [ 405.298869][T28840] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 405.318480][T28840] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 405.326902][T28840] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 405.334881][T28840] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 405.342848][T28840] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 [ 405.350818][T28840] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 405.358790][T28840] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:16:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:16:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0xa000000, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:16:26 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f66db68"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) syz_open_dev$dmmidi(0x0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:16:26 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:16:26 executing program 4 (fault-call:0 fault-nth:68): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:16:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:16:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x3f000000, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:16:26 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) [ 407.701897][T29066] FAULT_INJECTION: forcing a failure. [ 407.701897][T29066] name failslab, interval 1, probability 0, space 0, times 0 [ 407.724981][T29066] CPU: 0 PID: 29066 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 407.734015][T29066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 407.744077][T29066] Call Trace: [ 407.747383][T29066] dump_stack+0x172/0x1f0 [ 407.751813][T29066] should_fail.cold+0xa/0x15 [ 407.756410][T29066] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 407.762235][T29066] ? lock_downgrade+0x880/0x880 [ 407.767109][T29066] ? ___might_sleep+0x163/0x280 [ 407.771967][T29066] __should_failslab+0x121/0x190 [ 407.771987][T29066] should_failslab+0x9/0x14 [ 407.772003][T29066] kmem_cache_alloc_trace+0x2d1/0x760 [ 407.772026][T29066] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 407.772050][T29066] __memcg_init_list_lru_node+0x8a/0x1e0 [ 407.772072][T29066] __list_lru_init+0x3d3/0x6e0 [ 407.781508][T29066] alloc_super+0x759/0x890 [ 407.781529][T29066] ? test_single_super+0x10/0x10 [ 407.781544][T29066] sget_userns+0xf1/0x560 [ 407.781560][T29066] ? kill_litter_super+0x60/0x60 [ 407.781580][T29066] ? test_single_super+0x10/0x10 [ 407.781601][T29066] ? kill_litter_super+0x60/0x60 [ 407.831525][T29066] sget+0x10c/0x150 [ 407.835346][T29066] mount_bdev+0xff/0x3c0 [ 407.839596][T29066] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 407.845511][T29066] ext4_mount+0x35/0x40 [ 407.849676][T29066] ? ext4_nfs_get_inode+0xe0/0xe0 [ 407.854707][T29066] legacy_get_tree+0xf2/0x200 [ 407.859386][T29066] vfs_get_tree+0x123/0x450 [ 407.863886][T29066] do_mount+0x1436/0x2c40 [ 407.868219][T29066] ? copy_mount_string+0x40/0x40 [ 407.873156][T29066] ? copy_mount_options+0x234/0x440 [ 407.878350][T29066] ? copy_mount_options+0x23a/0x440 [ 407.883542][T29066] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 407.889776][T29066] ? copy_mount_options+0x30e/0x440 [ 407.894976][T29066] ksys_mount+0xdb/0x150 [ 407.899223][T29066] __x64_sys_mount+0xbe/0x150 [ 407.903900][T29066] do_syscall_64+0x103/0x610 [ 407.908507][T29066] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 407.914390][T29066] RIP: 0033:0x45a8aa [ 407.918277][T29066] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 407.937870][T29066] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 23:16:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:16:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x40000000, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:16:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 407.946271][T29066] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 407.954235][T29066] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 407.962202][T29066] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 [ 407.970164][T29066] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 407.978128][T29066] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:16:26 executing program 4 (fault-call:0 fault-nth:69): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:16:27 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 408.153905][T29243] FAULT_INJECTION: forcing a failure. [ 408.153905][T29243] name failslab, interval 1, probability 0, space 0, times 0 [ 408.186917][T29243] CPU: 1 PID: 29243 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 408.195959][T29243] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 408.206024][T29243] Call Trace: [ 408.209323][T29243] dump_stack+0x172/0x1f0 [ 408.213671][T29243] should_fail.cold+0xa/0x15 [ 408.218275][T29243] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 408.224082][T29243] ? lock_downgrade+0x880/0x880 [ 408.228940][T29243] ? ___might_sleep+0x163/0x280 [ 408.233809][T29243] __should_failslab+0x121/0x190 [ 408.238768][T29243] should_failslab+0x9/0x14 [ 408.243273][T29243] kmem_cache_alloc_trace+0x2d1/0x760 [ 408.248661][T29243] __memcg_init_list_lru_node+0x8a/0x1e0 [ 408.254301][T29243] __list_lru_init+0x3d3/0x6e0 [ 408.259075][T29243] alloc_super+0x759/0x890 [ 408.263520][T29243] ? test_single_super+0x10/0x10 [ 408.268503][T29243] sget_userns+0xf1/0x560 [ 408.272853][T29243] ? kill_litter_super+0x60/0x60 [ 408.277801][T29243] ? test_single_super+0x10/0x10 [ 408.282747][T29243] ? kill_litter_super+0x60/0x60 [ 408.287690][T29243] sget+0x10c/0x150 [ 408.291511][T29243] mount_bdev+0xff/0x3c0 [ 408.295756][T29243] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 408.301566][T29243] ext4_mount+0x35/0x40 [ 408.305724][T29243] ? ext4_nfs_get_inode+0xe0/0xe0 [ 408.310754][T29243] legacy_get_tree+0xf2/0x200 [ 408.315438][T29243] vfs_get_tree+0x123/0x450 [ 408.319966][T29243] do_mount+0x1436/0x2c40 [ 408.324308][T29243] ? rcu_lockdep_current_cpu_online+0x31/0x130 [ 408.330490][T29243] ? copy_mount_string+0x40/0x40 [ 408.335431][T29243] ? _copy_from_user+0xdd/0x150 [ 408.340288][T29243] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 408.346527][T29243] ? copy_mount_options+0x30e/0x440 [ 408.351732][T29243] ksys_mount+0xdb/0x150 [ 408.355984][T29243] __x64_sys_mount+0xbe/0x150 [ 408.360689][T29243] do_syscall_64+0x103/0x610 [ 408.365285][T29243] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 408.371193][T29243] RIP: 0033:0x45a8aa [ 408.375092][T29243] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 408.394694][T29243] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 23:16:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x48000000, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 408.403106][T29243] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 408.411075][T29243] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 408.419047][T29243] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 [ 408.427025][T29243] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 408.435002][T29243] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:16:29 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f66db68"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) syz_open_dev$dmmidi(0x0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:16:29 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:16:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:16:29 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 23:16:29 executing program 4 (fault-call:0 fault-nth:70): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:16:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x4c000000, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:16:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 410.774254][T29404] FAULT_INJECTION: forcing a failure. [ 410.774254][T29404] name failslab, interval 1, probability 0, space 0, times 0 [ 410.805537][T29404] CPU: 1 PID: 29404 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 410.814579][T29404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 410.814587][T29404] Call Trace: [ 410.814611][T29404] dump_stack+0x172/0x1f0 [ 410.814641][T29404] should_fail.cold+0xa/0x15 [ 410.814665][T29404] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 410.842704][T29404] ? lock_downgrade+0x880/0x880 [ 410.847563][T29404] ? ___might_sleep+0x163/0x280 [ 410.847585][T29404] __should_failslab+0x121/0x190 [ 410.857339][T29404] should_failslab+0x9/0x14 [ 410.861857][T29404] kmem_cache_alloc_trace+0x2d1/0x760 [ 410.867244][T29404] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 410.873056][T29404] __memcg_init_list_lru_node+0x8a/0x1e0 [ 410.878696][T29404] __list_lru_init+0x3d3/0x6e0 [ 410.883469][T29404] alloc_super+0x759/0x890 [ 410.887919][T29404] ? test_single_super+0x10/0x10 [ 410.892857][T29404] sget_userns+0xf1/0x560 [ 410.897189][T29404] ? kill_litter_super+0x60/0x60 [ 410.902138][T29404] ? test_single_super+0x10/0x10 [ 410.907075][T29404] ? kill_litter_super+0x60/0x60 [ 410.912020][T29404] sget+0x10c/0x150 [ 410.915831][T29404] mount_bdev+0xff/0x3c0 [ 410.920083][T29404] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 410.925894][T29404] ext4_mount+0x35/0x40 [ 410.930058][T29404] ? ext4_nfs_get_inode+0xe0/0xe0 [ 410.935087][T29404] legacy_get_tree+0xf2/0x200 [ 410.935109][T29404] vfs_get_tree+0x123/0x450 [ 410.935130][T29404] do_mount+0x1436/0x2c40 [ 410.935149][T29404] ? rcu_lockdep_current_cpu_online+0x31/0x130 [ 410.935170][T29404] ? copy_mount_string+0x40/0x40 [ 410.948625][T29404] ? _copy_from_user+0xdd/0x150 [ 410.948647][T29404] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 410.948664][T29404] ? copy_mount_options+0x30e/0x440 [ 410.948685][T29404] ksys_mount+0xdb/0x150 [ 410.948705][T29404] __x64_sys_mount+0xbe/0x150 [ 410.948729][T29404] do_syscall_64+0x103/0x610 [ 410.989529][T29404] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 410.995421][T29404] RIP: 0033:0x45a8aa [ 410.999322][T29404] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 23:16:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x68000000, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 411.018923][T29404] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 411.027338][T29404] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 411.035312][T29404] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 411.043282][T29404] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 [ 411.051250][T29404] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 411.059221][T29404] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:16:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:16:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x6c000000, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:16:30 executing program 4 (fault-call:0 fault-nth:71): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:16:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 411.232671][T29627] FAULT_INJECTION: forcing a failure. [ 411.232671][T29627] name failslab, interval 1, probability 0, space 0, times 0 [ 411.278456][T29627] CPU: 0 PID: 29627 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 411.287524][T29627] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 411.297584][T29627] Call Trace: [ 411.300888][T29627] dump_stack+0x172/0x1f0 [ 411.305254][T29627] should_fail.cold+0xa/0x15 [ 411.309857][T29627] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 411.315668][T29627] ? lock_downgrade+0x880/0x880 [ 411.320531][T29627] ? ___might_sleep+0x163/0x280 [ 411.325393][T29627] __should_failslab+0x121/0x190 [ 411.330337][T29627] should_failslab+0x9/0x14 [ 411.334844][T29627] __kmalloc+0x2dc/0x740 [ 411.339090][T29627] ? __list_lru_init+0xd5/0x6e0 [ 411.343969][T29627] __list_lru_init+0xd5/0x6e0 [ 411.348668][T29627] alloc_super+0x784/0x890 [ 411.353098][T29627] ? test_single_super+0x10/0x10 [ 411.358067][T29627] sget_userns+0xf1/0x560 [ 411.362396][T29627] ? kill_litter_super+0x60/0x60 [ 411.367334][T29627] ? test_single_super+0x10/0x10 [ 411.372277][T29627] ? kill_litter_super+0x60/0x60 [ 411.377228][T29627] sget+0x10c/0x150 [ 411.381040][T29627] mount_bdev+0xff/0x3c0 [ 411.385289][T29627] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 411.391102][T29627] ext4_mount+0x35/0x40 [ 411.395289][T29627] ? ext4_nfs_get_inode+0xe0/0xe0 [ 411.400325][T29627] legacy_get_tree+0xf2/0x200 [ 411.405003][T29627] vfs_get_tree+0x123/0x450 [ 411.409527][T29627] do_mount+0x1436/0x2c40 [ 411.413860][T29627] ? rcu_lockdep_current_cpu_online+0x31/0x130 [ 411.420016][T29627] ? copy_mount_string+0x40/0x40 [ 411.424974][T29627] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 411.431213][T29627] ? copy_mount_options+0x30e/0x440 [ 411.436415][T29627] ksys_mount+0xdb/0x150 [ 411.440680][T29627] __x64_sys_mount+0xbe/0x150 [ 411.445363][T29627] do_syscall_64+0x103/0x610 [ 411.449977][T29627] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 411.455861][T29627] RIP: 0033:0x45a8aa [ 411.459755][T29627] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 411.479356][T29627] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 411.487767][T29627] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 411.495740][T29627] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 411.503710][T29627] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 [ 411.511679][T29627] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 411.519662][T29627] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:16:32 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f66db68"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) syz_open_dev$dmmidi(0x0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:16:32 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:16:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x74000000, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:16:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:16:32 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 23:16:32 executing program 4 (fault-call:0 fault-nth:72): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 413.844803][T29739] FAULT_INJECTION: forcing a failure. [ 413.844803][T29739] name failslab, interval 1, probability 0, space 0, times 0 [ 413.885946][T29739] CPU: 0 PID: 29739 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 413.894975][T29739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 413.905032][T29739] Call Trace: [ 413.908338][T29739] dump_stack+0x172/0x1f0 [ 413.912679][T29739] should_fail.cold+0xa/0x15 [ 413.917279][T29739] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 413.923093][T29739] ? lock_downgrade+0x880/0x880 [ 413.927979][T29739] ? ___might_sleep+0x163/0x280 [ 413.932835][T29739] __should_failslab+0x121/0x190 [ 413.937781][T29739] should_failslab+0x9/0x14 [ 413.942291][T29739] kmem_cache_alloc_trace+0x2d1/0x760 [ 413.947668][T29739] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 413.953495][T29739] __memcg_init_list_lru_node+0x8a/0x1e0 [ 413.959140][T29739] __list_lru_init+0x3d3/0x6e0 [ 413.963907][T29739] alloc_super+0x759/0x890 [ 413.968331][T29739] ? test_single_super+0x10/0x10 [ 413.973272][T29739] sget_userns+0xf1/0x560 [ 413.977607][T29739] ? kill_litter_super+0x60/0x60 [ 413.982552][T29739] ? test_single_super+0x10/0x10 [ 413.987515][T29739] ? kill_litter_super+0x60/0x60 [ 413.992455][T29739] sget+0x10c/0x150 [ 413.996283][T29739] mount_bdev+0xff/0x3c0 [ 414.000533][T29739] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 414.006342][T29739] ext4_mount+0x35/0x40 [ 414.010514][T29739] ? ext4_nfs_get_inode+0xe0/0xe0 [ 414.015548][T29739] legacy_get_tree+0xf2/0x200 [ 414.020233][T29739] vfs_get_tree+0x123/0x450 [ 414.024744][T29739] do_mount+0x1436/0x2c40 [ 414.029081][T29739] ? rcu_lockdep_current_cpu_online+0x31/0x130 [ 414.035243][T29739] ? copy_mount_string+0x40/0x40 [ 414.040206][T29739] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 414.046446][T29739] ? copy_mount_options+0x30e/0x440 [ 414.051665][T29739] ksys_mount+0xdb/0x150 [ 414.055915][T29739] __x64_sys_mount+0xbe/0x150 [ 414.060599][T29739] do_syscall_64+0x103/0x610 [ 414.065198][T29739] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 414.071088][T29739] RIP: 0033:0x45a8aa [ 414.074986][T29739] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 414.094585][T29739] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 414.102999][T29739] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 414.110985][T29739] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 414.118952][T29739] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 [ 414.126921][T29739] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 23:16:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 414.134888][T29739] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:16:33 executing program 4 (fault-call:0 fault-nth:73): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:16:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x7a000000, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 414.282169][T29856] FAULT_INJECTION: forcing a failure. [ 414.282169][T29856] name failslab, interval 1, probability 0, space 0, times 0 [ 414.302120][T29856] CPU: 0 PID: 29856 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 414.311168][T29856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 414.321250][T29856] Call Trace: [ 414.324553][T29856] dump_stack+0x172/0x1f0 [ 414.324579][T29856] should_fail.cold+0xa/0x15 [ 414.324603][T29856] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 414.339303][T29856] ? lock_downgrade+0x880/0x880 [ 414.339323][T29856] ? ___might_sleep+0x163/0x280 [ 414.339343][T29856] __should_failslab+0x121/0x190 [ 414.339362][T29856] should_failslab+0x9/0x14 [ 414.339378][T29856] kmem_cache_alloc_trace+0x2d1/0x760 [ 414.339397][T29856] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 414.339420][T29856] __memcg_init_list_lru_node+0x8a/0x1e0 [ 414.339440][T29856] __list_lru_init+0x3d3/0x6e0 [ 414.380034][T29856] alloc_super+0x784/0x890 [ 414.384460][T29856] ? test_single_super+0x10/0x10 [ 414.389420][T29856] sget_userns+0xf1/0x560 [ 414.393754][T29856] ? kill_litter_super+0x60/0x60 [ 414.398697][T29856] ? test_single_super+0x10/0x10 [ 414.403642][T29856] ? kill_litter_super+0x60/0x60 [ 414.408582][T29856] sget+0x10c/0x150 [ 414.412393][T29856] mount_bdev+0xff/0x3c0 [ 414.416640][T29856] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 414.422451][T29856] ext4_mount+0x35/0x40 [ 414.426617][T29856] ? ext4_nfs_get_inode+0xe0/0xe0 [ 414.431646][T29856] legacy_get_tree+0xf2/0x200 [ 414.436331][T29856] vfs_get_tree+0x123/0x450 [ 414.440845][T29856] do_mount+0x1436/0x2c40 [ 414.445181][T29856] ? rcu_lockdep_current_cpu_online+0x31/0x130 [ 414.451343][T29856] ? copy_mount_string+0x40/0x40 [ 414.456286][T29856] ? _copy_from_user+0xdd/0x150 [ 414.461158][T29856] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 414.467398][T29856] ? copy_mount_options+0x30e/0x440 [ 414.472604][T29856] ksys_mount+0xdb/0x150 [ 414.476855][T29856] __x64_sys_mount+0xbe/0x150 [ 414.481546][T29856] do_syscall_64+0x103/0x610 [ 414.486145][T29856] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 414.492032][T29856] RIP: 0033:0x45a8aa [ 414.495925][T29856] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 414.515533][T29856] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 414.523947][T29856] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa 23:16:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 414.531917][T29856] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 414.539909][T29856] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 [ 414.547879][T29856] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 414.555848][T29856] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:16:33 executing program 4 (fault-call:0 fault-nth:74): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:16:33 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x6}, @exit], &(0x7f0000000200)='\x83VG?\xfc\xd9b\xed\xa1\xdepBh\x92E\xd1\xe5UG\xc7\x15/\x01\xab\xa4|4%\x1e\xcdb\xff\x19m\xb2\b\x13=\x02;\x88\xec\xc1\x91\xfe:\x9eO\xd5\xf4\xfc3nLy\xd2%\xee\xf0o\xf7\xe4\xfa 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 414.929626][T29967] ** This means that this is a DEBUG kernel and it is ** [ 414.930169][T29965] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 414.954369][T29967] ** unsafe for production use. ** [ 414.955638][T29965] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 414.955649][T29965] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 414.955659][T29965] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 [ 414.955667][T29965] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 414.955683][T29965] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 [ 414.985319][T29967] ** ** [ 415.068763][T29967] ** If you see this message and you are not debugging ** [ 415.076324][T29967] ** the kernel, report this immediately to your vendor! ** [ 415.084128][T29967] ** ** [ 415.091734][T29967] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 415.099360][T29967] ********************************************************** 23:16:35 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f66db68"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) syz_open_dev$dmmidi(0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:16:35 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:16:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x2000000000000, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:16:35 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:16:35 executing program 4 (fault-call:0 fault-nth:75): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:16:35 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0xffffffffffffff25) openat$tun(0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r1, 0xf}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000100)=0x1) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r4 = getpid() write$cgroup_pid(r1, &(0x7f0000000080)=r4, 0x12) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) openat$cgroup_ro(r1, &(0x7f0000000140)='cpuacct.usage_percpu\x00', 0x0, 0x0) write$cgroup_int(r5, &(0x7f0000000000), 0x17b) close(0xffffffffffffffff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r7 = openat$cgroup_ro(r6, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xa2a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 416.959869][T29981] FAULT_INJECTION: forcing a failure. [ 416.959869][T29981] name failslab, interval 1, probability 0, space 0, times 0 23:16:35 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:16:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x10000000000000, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 417.059910][T29981] CPU: 0 PID: 29981 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 417.068953][T29981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 417.079003][T29981] Call Trace: [ 417.082302][T29981] dump_stack+0x172/0x1f0 [ 417.086654][T29981] should_fail.cold+0xa/0x15 [ 417.091256][T29981] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 417.097066][T29981] ? lock_downgrade+0x880/0x880 [ 417.101926][T29981] ? ___might_sleep+0x163/0x280 [ 417.106781][T29981] __should_failslab+0x121/0x190 [ 417.111724][T29981] should_failslab+0x9/0x14 [ 417.116229][T29981] __kmalloc+0x2dc/0x740 [ 417.120491][T29981] ? __list_lru_init+0xd5/0x6e0 [ 417.125357][T29981] __list_lru_init+0xd5/0x6e0 [ 417.130041][T29981] alloc_super+0x784/0x890 [ 417.134469][T29981] ? test_single_super+0x10/0x10 [ 417.139434][T29981] sget_userns+0xf1/0x560 [ 417.143766][T29981] ? kill_litter_super+0x60/0x60 [ 417.148711][T29981] ? test_single_super+0x10/0x10 [ 417.153650][T29981] ? kill_litter_super+0x60/0x60 [ 417.158591][T29981] sget+0x10c/0x150 [ 417.162406][T29981] mount_bdev+0xff/0x3c0 [ 417.166653][T29981] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 417.172466][T29981] ext4_mount+0x35/0x40 [ 417.176636][T29981] ? ext4_nfs_get_inode+0xe0/0xe0 [ 417.181665][T29981] legacy_get_tree+0xf2/0x200 [ 417.184262][T30087] device nr0 entered promiscuous mode [ 417.186347][T29981] vfs_get_tree+0x123/0x450 [ 417.186369][T29981] do_mount+0x1436/0x2c40 [ 417.186387][T29981] ? rcu_lockdep_current_cpu_online+0x31/0x130 [ 417.186408][T29981] ? copy_mount_string+0x40/0x40 [ 417.211721][T29981] ? _copy_from_user+0xdd/0x150 [ 417.216589][T29981] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 417.216607][T29981] ? copy_mount_options+0x30e/0x440 [ 417.216630][T29981] ksys_mount+0xdb/0x150 [ 417.216651][T29981] __x64_sys_mount+0xbe/0x150 [ 417.216672][T29981] do_syscall_64+0x103/0x610 [ 417.216697][T29981] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 417.247432][T29981] RIP: 0033:0x45a8aa [ 417.251334][T29981] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 417.270938][T29981] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 417.279351][T29981] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 417.279361][T29981] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 417.279371][T29981] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 [ 417.279380][T29981] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 417.279390][T29981] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:16:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:16:36 executing program 4 (fault-call:0 fault-nth:76): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:16:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x100000000000000, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:16:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\xff', 0xce02, 0x0) [ 417.901950][T30304] FAULT_INJECTION: forcing a failure. [ 417.901950][T30304] name failslab, interval 1, probability 0, space 0, times 0 [ 417.917808][T30304] CPU: 1 PID: 30304 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 417.926835][T30304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 417.936885][T30304] Call Trace: [ 417.940189][T30304] dump_stack+0x172/0x1f0 [ 417.944536][T30304] should_fail.cold+0xa/0x15 [ 417.949135][T30304] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 417.954942][T30304] ? lock_downgrade+0x880/0x880 [ 417.959804][T30304] ? ___might_sleep+0x163/0x280 [ 417.964660][T30304] __should_failslab+0x121/0x190 [ 417.969600][T30304] should_failslab+0x9/0x14 [ 417.974112][T30304] kmem_cache_alloc_trace+0x2d1/0x760 [ 417.979497][T30304] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 417.985313][T30304] __memcg_init_list_lru_node+0x8a/0x1e0 [ 417.990955][T30304] __list_lru_init+0x3d3/0x6e0 [ 417.995722][T30304] alloc_super+0x784/0x890 [ 418.000145][T30304] ? test_single_super+0x10/0x10 [ 418.005081][T30304] sget_userns+0xf1/0x560 [ 418.009413][T30304] ? kill_litter_super+0x60/0x60 [ 418.014361][T30304] ? test_single_super+0x10/0x10 [ 418.019298][T30304] ? kill_litter_super+0x60/0x60 [ 418.024234][T30304] sget+0x10c/0x150 [ 418.028056][T30304] mount_bdev+0xff/0x3c0 [ 418.032302][T30304] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 418.038114][T30304] ext4_mount+0x35/0x40 [ 418.042271][T30304] ? ext4_nfs_get_inode+0xe0/0xe0 [ 418.047301][T30304] legacy_get_tree+0xf2/0x200 [ 418.051990][T30304] vfs_get_tree+0x123/0x450 [ 418.056512][T30304] do_mount+0x1436/0x2c40 [ 418.060908][T30304] ? rcu_lockdep_current_cpu_online+0x31/0x130 [ 418.067074][T30304] ? copy_mount_string+0x40/0x40 [ 418.072027][T30304] ? _copy_from_user+0xdd/0x150 [ 418.076887][T30304] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 418.083133][T30304] ? copy_mount_options+0x30e/0x440 [ 418.088351][T30304] ksys_mount+0xdb/0x150 [ 418.092602][T30304] __x64_sys_mount+0xbe/0x150 [ 418.097290][T30304] do_syscall_64+0x103/0x610 [ 418.101892][T30304] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 418.107785][T30304] RIP: 0033:0x45a8aa [ 418.111689][T30304] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 418.131286][T30304] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 418.139695][T30304] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 418.147667][T30304] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 418.155648][T30304] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 [ 418.163621][T30304] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 418.171594][T30304] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:16:38 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f66db68"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) syz_open_dev$dmmidi(0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:16:38 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, 0x0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:16:38 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:16:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x200000000000000, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:16:38 executing program 4 (fault-call:0 fault-nth:77): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:16:38 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0xffffffffffffff25) openat$tun(0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r1, 0xf}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000100)=0x1) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r4 = getpid() write$cgroup_pid(r1, &(0x7f0000000080)=r4, 0x12) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) openat$cgroup_ro(r1, &(0x7f0000000140)='cpuacct.usage_percpu\x00', 0x0, 0x0) write$cgroup_int(r5, &(0x7f0000000000), 0x17b) close(0xffffffffffffffff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r7 = openat$cgroup_ro(r6, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xa2a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 420.019391][T30314] FAULT_INJECTION: forcing a failure. [ 420.019391][T30314] name failslab, interval 1, probability 0, space 0, times 0 [ 420.045297][T30314] CPU: 1 PID: 30314 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 420.054338][T30314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 420.064394][T30314] Call Trace: [ 420.067706][T30314] dump_stack+0x172/0x1f0 [ 420.072062][T30314] should_fail.cold+0xa/0x15 [ 420.076661][T30314] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 420.082468][T30314] ? lock_downgrade+0x880/0x880 [ 420.082497][T30314] ? ___might_sleep+0x163/0x280 [ 420.082517][T30314] __should_failslab+0x121/0x190 [ 420.082537][T30314] should_failslab+0x9/0x14 [ 420.082554][T30314] kmem_cache_alloc_trace+0x2d1/0x760 [ 420.082572][T30314] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 420.082595][T30314] __memcg_init_list_lru_node+0x8a/0x1e0 [ 420.092276][T30314] __list_lru_init+0x3d3/0x6e0 [ 420.092295][T30314] alloc_super+0x784/0x890 [ 420.092313][T30314] ? test_single_super+0x10/0x10 [ 420.092328][T30314] sget_userns+0xf1/0x560 [ 420.092344][T30314] ? kill_litter_super+0x60/0x60 [ 420.092362][T30314] ? test_single_super+0x10/0x10 [ 420.092378][T30314] ? kill_litter_super+0x60/0x60 [ 420.092391][T30314] sget+0x10c/0x150 [ 420.092409][T30314] mount_bdev+0xff/0x3c0 [ 420.092426][T30314] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 420.092445][T30314] ext4_mount+0x35/0x40 23:16:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 420.092459][T30314] ? ext4_nfs_get_inode+0xe0/0xe0 [ 420.092477][T30314] legacy_get_tree+0xf2/0x200 [ 420.092506][T30314] vfs_get_tree+0x123/0x450 [ 420.092526][T30314] do_mount+0x1436/0x2c40 [ 420.092545][T30314] ? rcu_lockdep_current_cpu_online+0x31/0x130 [ 420.092567][T30314] ? copy_mount_string+0x40/0x40 [ 420.092584][T30314] ? _copy_from_user+0xdd/0x150 [ 420.092604][T30314] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 420.092631][T30314] ? copy_mount_options+0x30e/0x440 23:16:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 420.127959][T30314] ksys_mount+0xdb/0x150 [ 420.127980][T30314] __x64_sys_mount+0xbe/0x150 [ 420.128003][T30314] do_syscall_64+0x103/0x610 [ 420.128032][T30314] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 420.128049][T30314] RIP: 0033:0x45a8aa [ 420.165834][T30314] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 420.165844][T30314] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 420.165860][T30314] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 420.165870][T30314] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 420.165879][T30314] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 [ 420.165889][T30314] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 420.165898][T30314] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:16:39 executing program 4 (fault-call:0 fault-nth:78): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:16:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x300000000000000, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:16:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 420.427641][T30435] FAULT_INJECTION: forcing a failure. [ 420.427641][T30435] name failslab, interval 1, probability 0, space 0, times 0 [ 420.465310][T30435] CPU: 1 PID: 30435 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 420.474353][T30435] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 420.484408][T30435] Call Trace: [ 420.487723][T30435] dump_stack+0x172/0x1f0 [ 420.492070][T30435] should_fail.cold+0xa/0x15 [ 420.496665][T30435] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 420.498008][T30427] device nr0 entered promiscuous mode [ 420.502474][T30435] ? lock_downgrade+0x880/0x880 [ 420.502503][T30435] ? ___might_sleep+0x163/0x280 [ 420.502522][T30435] __should_failslab+0x121/0x190 [ 420.502541][T30435] should_failslab+0x9/0x14 [ 420.502564][T30435] kmem_cache_alloc_trace+0x2d1/0x760 [ 420.517697][T30435] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 420.517730][T30435] __memcg_init_list_lru_node+0x8a/0x1e0 [ 420.543907][T30435] __list_lru_init+0x3d3/0x6e0 [ 420.548683][T30435] alloc_super+0x784/0x890 [ 420.553096][T30435] ? test_single_super+0x10/0x10 [ 420.558031][T30435] sget_userns+0xf1/0x560 [ 420.562375][T30435] ? kill_litter_super+0x60/0x60 [ 420.567312][T30435] ? test_single_super+0x10/0x10 [ 420.572243][T30435] ? kill_litter_super+0x60/0x60 [ 420.577173][T30435] sget+0x10c/0x150 [ 420.580982][T30435] mount_bdev+0xff/0x3c0 [ 420.585228][T30435] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 420.591038][T30435] ext4_mount+0x35/0x40 [ 420.595190][T30435] ? ext4_nfs_get_inode+0xe0/0xe0 [ 420.600218][T30435] legacy_get_tree+0xf2/0x200 [ 420.604897][T30435] vfs_get_tree+0x123/0x450 [ 420.609398][T30435] do_mount+0x1436/0x2c40 [ 420.613728][T30435] ? rcu_lockdep_current_cpu_online+0x31/0x130 [ 420.619885][T30435] ? copy_mount_string+0x40/0x40 [ 420.624819][T30435] ? _copy_from_user+0xdd/0x150 [ 420.629669][T30435] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 420.635906][T30435] ? copy_mount_options+0x30e/0x440 [ 420.641107][T30435] ksys_mount+0xdb/0x150 [ 420.645357][T30435] __x64_sys_mount+0xbe/0x150 [ 420.650039][T30435] do_syscall_64+0x103/0x610 [ 420.654631][T30435] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 420.660526][T30435] RIP: 0033:0x45a8aa [ 420.664417][T30435] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 420.684020][T30435] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 420.692428][T30435] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 420.700391][T30435] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 420.708355][T30435] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 [ 420.716320][T30435] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 420.724281][T30435] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:16:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:16:41 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f66db68"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) syz_open_dev$dmmidi(0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:16:41 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, 0x0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:16:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x400000000000000, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:16:41 executing program 4 (fault-call:0 fault-nth:79): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:16:41 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:16:41 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) syz_genetlink_get_family_id$team(0x0) [ 423.062866][T30549] FAULT_INJECTION: forcing a failure. [ 423.062866][T30549] name failslab, interval 1, probability 0, space 0, times 0 [ 423.078936][T30549] CPU: 1 PID: 30549 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 423.087967][T30549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 423.098030][T30549] Call Trace: [ 423.101328][T30549] dump_stack+0x172/0x1f0 [ 423.105672][T30549] should_fail.cold+0xa/0x15 [ 423.110281][T30549] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 423.116093][T30549] ? lock_downgrade+0x880/0x880 [ 423.120951][T30549] ? ___might_sleep+0x163/0x280 [ 423.125810][T30549] __should_failslab+0x121/0x190 [ 423.130753][T30549] should_failslab+0x9/0x14 [ 423.135266][T30549] kmem_cache_alloc_trace+0x2d1/0x760 [ 423.140644][T30549] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 423.146463][T30549] __memcg_init_list_lru_node+0x8a/0x1e0 [ 423.152115][T30549] __list_lru_init+0x3d3/0x6e0 [ 423.156892][T30549] alloc_super+0x784/0x890 [ 423.161314][T30549] ? test_single_super+0x10/0x10 [ 423.166254][T30549] sget_userns+0xf1/0x560 [ 423.170592][T30549] ? kill_litter_super+0x60/0x60 [ 423.175535][T30549] ? test_single_super+0x10/0x10 [ 423.180477][T30549] ? kill_litter_super+0x60/0x60 [ 423.185427][T30549] sget+0x10c/0x150 [ 423.189248][T30549] mount_bdev+0xff/0x3c0 [ 423.193504][T30549] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 423.199320][T30549] ext4_mount+0x35/0x40 [ 423.203477][T30549] ? ext4_nfs_get_inode+0xe0/0xe0 [ 423.208539][T30549] legacy_get_tree+0xf2/0x200 [ 423.213224][T30549] vfs_get_tree+0x123/0x450 [ 423.217739][T30549] do_mount+0x1436/0x2c40 [ 423.222086][T30549] ? copy_mount_string+0x40/0x40 [ 423.227042][T30549] ? copy_mount_options+0x1de/0x440 [ 423.232245][T30549] ? copy_mount_options+0x1f8/0x440 [ 423.237447][T30549] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 423.243693][T30549] ? copy_mount_options+0x30e/0x440 [ 423.248902][T30549] ksys_mount+0xdb/0x150 [ 423.253150][T30549] __x64_sys_mount+0xbe/0x150 [ 423.257834][T30549] do_syscall_64+0x103/0x610 [ 423.262433][T30549] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 423.268324][T30549] RIP: 0033:0x45a8aa [ 423.272221][T30549] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 423.291827][T30549] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 423.300238][T30549] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa 23:16:42 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:16:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x500000000000000, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:16:42 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff3fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0a4, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 423.308212][T30549] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 423.316187][T30549] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 [ 423.324156][T30549] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 423.332122][T30549] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:16:42 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:16:42 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:16:42 executing program 4 (fault-call:0 fault-nth:80): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 423.622575][T30782] FAULT_INJECTION: forcing a failure. [ 423.622575][T30782] name failslab, interval 1, probability 0, space 0, times 0 [ 423.638323][T30782] CPU: 0 PID: 30782 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 423.647349][T30782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 423.657397][T30782] Call Trace: [ 423.660695][T30782] dump_stack+0x172/0x1f0 [ 423.665036][T30782] should_fail.cold+0xa/0x15 [ 423.669632][T30782] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 423.675442][T30782] ? lock_downgrade+0x880/0x880 [ 423.681167][T30782] ? ___might_sleep+0x163/0x280 [ 423.686021][T30782] __should_failslab+0x121/0x190 [ 423.690979][T30782] should_failslab+0x9/0x14 [ 423.695517][T30782] kmem_cache_alloc_trace+0x2d1/0x760 [ 423.700927][T30782] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 423.706743][T30782] __memcg_init_list_lru_node+0x8a/0x1e0 [ 423.712383][T30782] __list_lru_init+0x3d3/0x6e0 [ 423.717155][T30782] alloc_super+0x784/0x890 [ 423.721582][T30782] ? test_single_super+0x10/0x10 [ 423.726534][T30782] sget_userns+0xf1/0x560 [ 423.730867][T30782] ? kill_litter_super+0x60/0x60 [ 423.735808][T30782] ? test_single_super+0x10/0x10 [ 423.740749][T30782] ? kill_litter_super+0x60/0x60 [ 423.745684][T30782] sget+0x10c/0x150 [ 423.749526][T30782] mount_bdev+0xff/0x3c0 [ 423.753793][T30782] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 423.759603][T30782] ext4_mount+0x35/0x40 [ 423.763778][T30782] ? ext4_nfs_get_inode+0xe0/0xe0 [ 423.768804][T30782] legacy_get_tree+0xf2/0x200 [ 423.773498][T30782] vfs_get_tree+0x123/0x450 [ 423.778018][T30782] do_mount+0x1436/0x2c40 [ 423.782355][T30782] ? rcu_lockdep_current_cpu_online+0x31/0x130 [ 423.788531][T30782] ? copy_mount_string+0x40/0x40 [ 423.793474][T30782] ? _copy_from_user+0xdd/0x150 [ 423.798348][T30782] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 423.804589][T30782] ? copy_mount_options+0x30e/0x440 [ 423.809796][T30782] ksys_mount+0xdb/0x150 [ 423.814044][T30782] __x64_sys_mount+0xbe/0x150 [ 423.818730][T30782] do_syscall_64+0x103/0x610 [ 423.823326][T30782] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 423.829216][T30782] RIP: 0033:0x45a8aa [ 423.833114][T30782] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 423.852714][T30782] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 423.861124][T30782] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 423.869095][T30782] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 423.877064][T30782] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 [ 423.885031][T30782] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 423.893008][T30782] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:16:44 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f66db68"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:16:45 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, 0x0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:16:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x600000000000000, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:16:45 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:16:45 executing program 3: clone(0xfffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x9f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(0x0, 0x0) 23:16:45 executing program 4 (fault-call:0 fault-nth:81): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 426.417280][T30794] FAULT_INJECTION: forcing a failure. [ 426.417280][T30794] name failslab, interval 1, probability 0, space 0, times 0 [ 426.439771][T30794] CPU: 1 PID: 30794 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 426.448805][T30794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 426.458859][T30794] Call Trace: [ 426.462153][T30794] dump_stack+0x172/0x1f0 [ 426.466501][T30794] should_fail.cold+0xa/0x15 [ 426.471120][T30794] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 426.476939][T30794] ? lock_downgrade+0x880/0x880 [ 426.481895][T30794] ? ___might_sleep+0x163/0x280 [ 426.486753][T30794] __should_failslab+0x121/0x190 [ 426.491697][T30794] should_failslab+0x9/0x14 [ 426.496208][T30794] kmem_cache_alloc_trace+0x2d1/0x760 [ 426.501583][T30794] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 426.507400][T30794] __memcg_init_list_lru_node+0x8a/0x1e0 [ 426.513047][T30794] __list_lru_init+0x3d3/0x6e0 [ 426.517811][T30794] alloc_super+0x784/0x890 [ 426.522229][T30794] ? test_single_super+0x10/0x10 [ 426.527160][T30794] sget_userns+0xf1/0x560 [ 426.531487][T30794] ? kill_litter_super+0x60/0x60 [ 426.536443][T30794] ? test_single_super+0x10/0x10 [ 426.541376][T30794] ? kill_litter_super+0x60/0x60 [ 426.546317][T30794] sget+0x10c/0x150 [ 426.550125][T30794] mount_bdev+0xff/0x3c0 [ 426.554366][T30794] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 426.560169][T30794] ext4_mount+0x35/0x40 [ 426.564330][T30794] ? ext4_nfs_get_inode+0xe0/0xe0 [ 426.569363][T30794] legacy_get_tree+0xf2/0x200 [ 426.574043][T30794] vfs_get_tree+0x123/0x450 [ 426.578548][T30794] do_mount+0x1436/0x2c40 [ 426.582882][T30794] ? copy_mount_string+0x40/0x40 [ 426.587818][T30794] ? copy_mount_options+0x1de/0x440 [ 426.593018][T30794] ? copy_mount_options+0x1e3/0x440 [ 426.598212][T30794] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 426.604448][T30794] ? copy_mount_options+0x30e/0x440 [ 426.609651][T30794] ksys_mount+0xdb/0x150 [ 426.613894][T30794] __x64_sys_mount+0xbe/0x150 [ 426.618572][T30794] do_syscall_64+0x103/0x610 [ 426.623162][T30794] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 426.629044][T30794] RIP: 0033:0x45a8aa [ 426.632932][T30794] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 426.652533][T30794] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 426.660936][T30794] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 426.668897][T30794] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 426.676863][T30794] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 [ 426.684825][T30794] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 426.692786][T30794] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:16:45 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:16:45 executing program 4 (fault-call:0 fault-nth:82): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:16:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x700000000000000, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:16:45 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 426.864024][T30907] FAULT_INJECTION: forcing a failure. [ 426.864024][T30907] name failslab, interval 1, probability 0, space 0, times 0 [ 426.888079][T30907] CPU: 0 PID: 30907 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 426.897113][T30907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 426.897121][T30907] Call Trace: [ 426.897146][T30907] dump_stack+0x172/0x1f0 [ 426.897176][T30907] should_fail.cold+0xa/0x15 [ 426.897202][T30907] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 426.919419][T30907] ? lock_downgrade+0x880/0x880 [ 426.930046][T30907] ? ___might_sleep+0x163/0x280 [ 426.934903][T30907] __should_failslab+0x121/0x190 [ 426.939844][T30907] should_failslab+0x9/0x14 [ 426.944345][T30907] kmem_cache_alloc_trace+0x2d1/0x760 [ 426.949716][T30907] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 426.955534][T30907] __memcg_init_list_lru_node+0x8a/0x1e0 [ 426.961180][T30907] __list_lru_init+0x3d3/0x6e0 [ 426.965940][T30907] alloc_super+0x784/0x890 [ 426.970357][T30907] ? test_single_super+0x10/0x10 [ 426.975289][T30907] sget_userns+0xf1/0x560 [ 426.979615][T30907] ? kill_litter_super+0x60/0x60 [ 426.984558][T30907] ? test_single_super+0x10/0x10 [ 426.989489][T30907] ? kill_litter_super+0x60/0x60 [ 426.994431][T30907] sget+0x10c/0x150 [ 426.998237][T30907] mount_bdev+0xff/0x3c0 [ 427.002477][T30907] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 427.008306][T30907] ext4_mount+0x35/0x40 [ 427.012467][T30907] ? ext4_nfs_get_inode+0xe0/0xe0 [ 427.017502][T30907] legacy_get_tree+0xf2/0x200 [ 427.022196][T30907] vfs_get_tree+0x123/0x450 [ 427.026696][T30907] do_mount+0x1436/0x2c40 [ 427.031023][T30907] ? rcu_lockdep_current_cpu_online+0x31/0x130 [ 427.037551][T30907] ? copy_mount_string+0x40/0x40 [ 427.042489][T30907] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 427.048747][T30907] ? copy_mount_options+0x30e/0x440 [ 427.053943][T30907] ksys_mount+0xdb/0x150 [ 427.058183][T30907] __x64_sys_mount+0xbe/0x150 [ 427.062858][T30907] do_syscall_64+0x103/0x610 [ 427.067450][T30907] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 427.073334][T30907] RIP: 0033:0x45a8aa [ 427.077225][T30907] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 427.096819][T30907] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 427.105223][T30907] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 427.113189][T30907] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 427.121151][T30907] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 [ 427.129114][T30907] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 427.137074][T30907] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:16:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0xa00000000000000, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:16:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:16:47 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f66db68"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:16:48 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(0x0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:16:48 executing program 4 (fault-call:0 fault-nth:83): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:16:48 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$P9_RWALK(r3, 0x0, 0x0) recvmmsg(r3, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 23:16:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x3f00000000000000, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:16:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x7f', 0xce02, 0x0) 23:16:48 executing program 3: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) close(r0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)) ppoll(&(0x7f0000000000)=[{r1}], 0x1, 0x0, 0x0, 0x0) [ 429.526219][T31139] FAULT_INJECTION: forcing a failure. [ 429.526219][T31139] name failslab, interval 1, probability 0, space 0, times 0 23:16:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\xff', 0xce02, 0x0) [ 429.603480][T31139] CPU: 1 PID: 31139 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 429.612538][T31139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 429.622593][T31139] Call Trace: [ 429.625894][T31139] dump_stack+0x172/0x1f0 [ 429.630231][T31139] should_fail.cold+0xa/0x15 [ 429.634831][T31139] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 429.640641][T31139] ? lock_downgrade+0x880/0x880 [ 429.645511][T31139] ? ___might_sleep+0x163/0x280 [ 429.650369][T31139] __should_failslab+0x121/0x190 [ 429.655314][T31139] should_failslab+0x9/0x14 [ 429.659827][T31139] kmem_cache_alloc_node_trace+0x270/0x720 [ 429.665641][T31139] ? kmem_cache_alloc_trace+0x354/0x760 [ 429.671194][T31139] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 429.677007][T31139] __kmalloc_node+0x3d/0x70 [ 429.681540][T31139] kvmalloc_node+0x68/0x100 [ 429.686056][T31139] __list_lru_init+0x4aa/0x6e0 [ 429.690830][T31139] alloc_super+0x784/0x890 [ 429.695255][T31139] ? test_single_super+0x10/0x10 [ 429.700197][T31139] sget_userns+0xf1/0x560 [ 429.704536][T31139] ? kill_litter_super+0x60/0x60 [ 429.709479][T31139] ? test_single_super+0x10/0x10 [ 429.714430][T31139] ? kill_litter_super+0x60/0x60 [ 429.719368][T31139] sget+0x10c/0x150 [ 429.723185][T31139] mount_bdev+0xff/0x3c0 [ 429.727434][T31139] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 429.733251][T31139] ext4_mount+0x35/0x40 [ 429.737414][T31139] ? ext4_nfs_get_inode+0xe0/0xe0 [ 429.742446][T31139] legacy_get_tree+0xf2/0x200 [ 429.747137][T31139] vfs_get_tree+0x123/0x450 [ 429.751649][T31139] do_mount+0x1436/0x2c40 [ 429.755986][T31139] ? rcu_lockdep_current_cpu_online+0x31/0x130 [ 429.762167][T31139] ? copy_mount_string+0x40/0x40 [ 429.767110][T31139] ? _copy_from_user+0xdd/0x150 [ 429.771969][T31139] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 429.778214][T31139] ? copy_mount_options+0x30e/0x440 [ 429.778237][T31139] ksys_mount+0xdb/0x150 [ 429.778258][T31139] __x64_sys_mount+0xbe/0x150 [ 429.778279][T31139] do_syscall_64+0x103/0x610 [ 429.778303][T31139] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 429.787717][T31139] RIP: 0033:0x45a8aa [ 429.787733][T31139] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 429.787742][T31139] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 429.787757][T31139] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 429.787767][T31139] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 23:16:48 executing program 3: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x80000) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000240)=@assoc_value={0x0}, &(0x7f0000000280)=0x8) syz_extract_tcp_res(&(0x7f0000000380), 0x7, 0x7000000000000) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000340)=@assoc_value={r1, 0xfffffffffffffffc}, 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000500)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x101100, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x4e22, @local}, 0x10) syz_open_dev$sndtimer(0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200), 0xc, 0x0}, 0x4010) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, &(0x7f0000000c00)=ANY=[]) syz_extract_tcp_res(&(0x7f0000000140), 0x100000000, 0x1) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000540)='/dev/urandom\x00', 0x0, 0x0) 23:16:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x4000000000000000, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 429.787777][T31139] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 [ 429.787793][T31139] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 429.866577][T31139] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:16:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce03, 0x0) 23:16:48 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) 23:16:50 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f66db68"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:16:51 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) select(0x0, 0x0, 0x0, &(0x7f0000000fc0)={0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x40, &(0x7f0000000f9b), 0x0) 23:16:51 executing program 4 (fault-call:0 fault-nth:84): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:16:51 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(0x0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:16:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce0a, 0x0) 23:16:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x4800000000000000, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 432.566432][T31382] FAULT_INJECTION: forcing a failure. [ 432.566432][T31382] name failslab, interval 1, probability 0, space 0, times 0 [ 432.600985][T31382] CPU: 0 PID: 31382 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 432.610023][T31382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 432.620076][T31382] Call Trace: [ 432.623374][T31382] dump_stack+0x172/0x1f0 [ 432.627729][T31382] should_fail.cold+0xa/0x15 [ 432.632330][T31382] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 432.638142][T31382] ? lock_downgrade+0x880/0x880 [ 432.642995][T31382] ? ___might_sleep+0x163/0x280 [ 432.643015][T31382] __should_failslab+0x121/0x190 [ 432.643034][T31382] should_failslab+0x9/0x14 [ 432.643051][T31382] kmem_cache_alloc_trace+0x2d1/0x760 [ 432.643069][T31382] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 432.643093][T31382] __memcg_init_list_lru_node+0x8a/0x1e0 [ 432.643114][T31382] __list_lru_init+0x3d3/0x6e0 [ 432.643138][T31382] alloc_super+0x784/0x890 [ 432.662747][T31382] ? test_single_super+0x10/0x10 [ 432.662765][T31382] sget_userns+0xf1/0x560 [ 432.662782][T31382] ? kill_litter_super+0x60/0x60 [ 432.662801][T31382] ? test_single_super+0x10/0x10 [ 432.662824][T31382] ? kill_litter_super+0x60/0x60 [ 432.707612][T31382] sget+0x10c/0x150 [ 432.711427][T31382] mount_bdev+0xff/0x3c0 [ 432.715674][T31382] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 432.721480][T31382] ext4_mount+0x35/0x40 [ 432.725650][T31382] ? ext4_nfs_get_inode+0xe0/0xe0 [ 432.730801][T31382] legacy_get_tree+0xf2/0x200 [ 432.735485][T31382] vfs_get_tree+0x123/0x450 [ 432.740011][T31382] do_mount+0x1436/0x2c40 [ 432.744355][T31382] ? rcu_lockdep_current_cpu_online+0x31/0x130 [ 432.750545][T31382] ? copy_mount_string+0x40/0x40 [ 432.755517][T31382] ? _copy_from_user+0xdd/0x150 [ 432.760386][T31382] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 432.766631][T31382] ? copy_mount_options+0x30e/0x440 [ 432.771841][T31382] ksys_mount+0xdb/0x150 [ 432.776093][T31382] __x64_sys_mount+0xbe/0x150 [ 432.780777][T31382] do_syscall_64+0x103/0x610 [ 432.785376][T31382] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 432.791267][T31382] RIP: 0033:0x45a8aa [ 432.795161][T31382] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 23:16:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce10, 0x0) 23:16:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x4c00000000000000, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 432.814760][T31382] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 432.823173][T31382] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 432.831147][T31382] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 432.839117][T31382] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 [ 432.847083][T31382] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 432.855056][T31382] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:16:51 executing program 4 (fault-call:0 fault-nth:85): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:16:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce14, 0x0) [ 432.998137][T31581] FAULT_INJECTION: forcing a failure. [ 432.998137][T31581] name failslab, interval 1, probability 0, space 0, times 0 [ 433.032248][T31581] CPU: 0 PID: 31581 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 433.041275][T31581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 433.051326][T31581] Call Trace: [ 433.054615][T31581] dump_stack+0x172/0x1f0 [ 433.058949][T31581] should_fail.cold+0xa/0x15 [ 433.063547][T31581] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 433.069351][T31581] ? lock_downgrade+0x880/0x880 [ 433.074198][T31581] ? ___might_sleep+0x163/0x280 [ 433.079047][T31581] __should_failslab+0x121/0x190 [ 433.083983][T31581] should_failslab+0x9/0x14 [ 433.088479][T31581] kmem_cache_alloc_trace+0x2d1/0x760 [ 433.093859][T31581] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 433.099668][T31581] __memcg_init_list_lru_node+0x8a/0x1e0 [ 433.105337][T31581] __list_lru_init+0x3d3/0x6e0 [ 433.110101][T31581] alloc_super+0x784/0x890 [ 433.114534][T31581] ? test_single_super+0x10/0x10 [ 433.119469][T31581] sget_userns+0xf1/0x560 [ 433.123803][T31581] ? kill_litter_super+0x60/0x60 [ 433.128736][T31581] ? test_single_super+0x10/0x10 [ 433.133680][T31581] ? kill_litter_super+0x60/0x60 [ 433.138610][T31581] sget+0x10c/0x150 [ 433.142416][T31581] mount_bdev+0xff/0x3c0 [ 433.146657][T31581] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 433.152459][T31581] ext4_mount+0x35/0x40 [ 433.156609][T31581] ? ext4_nfs_get_inode+0xe0/0xe0 [ 433.161642][T31581] legacy_get_tree+0xf2/0x200 [ 433.166320][T31581] vfs_get_tree+0x123/0x450 [ 433.170820][T31581] do_mount+0x1436/0x2c40 [ 433.175149][T31581] ? rcu_lockdep_current_cpu_online+0x31/0x130 [ 433.181303][T31581] ? copy_mount_string+0x40/0x40 [ 433.186233][T31581] ? _copy_from_user+0xdd/0x150 [ 433.191083][T31581] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 433.197315][T31581] ? copy_mount_options+0x30e/0x440 [ 433.202555][T31581] ksys_mount+0xdb/0x150 [ 433.206798][T31581] __x64_sys_mount+0xbe/0x150 [ 433.211472][T31581] do_syscall_64+0x103/0x610 [ 433.216072][T31581] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 433.221954][T31581] RIP: 0033:0x45a8aa [ 433.225843][T31581] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 23:16:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x6800000000000000, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 433.245437][T31581] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 433.253837][T31581] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 433.261801][T31581] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 433.269767][T31581] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 [ 433.277726][T31581] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 433.285686][T31581] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:16:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:16:53 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f66db68"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:16:53 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) getsockname(r1, 0x0, &(0x7f0000000240)) 23:16:53 executing program 4 (fault-call:0 fault-nth:86): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 434.593356][T31710] FAULT_INJECTION: forcing a failure. [ 434.593356][T31710] name failslab, interval 1, probability 0, space 0, times 0 [ 434.652931][T31710] CPU: 0 PID: 31710 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 434.661978][T31710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 434.672043][T31710] Call Trace: [ 434.675343][T31710] dump_stack+0x172/0x1f0 [ 434.679693][T31710] should_fail.cold+0xa/0x15 [ 434.684292][T31710] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 434.690100][T31710] ? lock_downgrade+0x880/0x880 [ 434.694957][T31710] ? ___might_sleep+0x163/0x280 [ 434.699823][T31710] __should_failslab+0x121/0x190 [ 434.704770][T31710] should_failslab+0x9/0x14 [ 434.709278][T31710] kmem_cache_alloc_trace+0x2d1/0x760 [ 434.714652][T31710] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 434.720474][T31710] __memcg_init_list_lru_node+0x8a/0x1e0 [ 434.726126][T31710] __list_lru_init+0x3d3/0x6e0 [ 434.731054][T31710] alloc_super+0x784/0x890 [ 434.735488][T31710] ? test_single_super+0x10/0x10 [ 434.740446][T31710] sget_userns+0xf1/0x560 [ 434.744781][T31710] ? kill_litter_super+0x60/0x60 [ 434.749726][T31710] ? test_single_super+0x10/0x10 [ 434.754677][T31710] ? kill_litter_super+0x60/0x60 [ 434.759615][T31710] sget+0x10c/0x150 [ 434.763433][T31710] mount_bdev+0xff/0x3c0 [ 434.767678][T31710] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 434.773493][T31710] ext4_mount+0x35/0x40 [ 434.777667][T31710] ? ext4_nfs_get_inode+0xe0/0xe0 [ 434.782696][T31710] legacy_get_tree+0xf2/0x200 [ 434.787382][T31710] vfs_get_tree+0x123/0x450 [ 434.791893][T31710] do_mount+0x1436/0x2c40 [ 434.796227][T31710] ? rcu_lockdep_current_cpu_online+0x31/0x130 [ 434.802392][T31710] ? copy_mount_string+0x40/0x40 [ 434.807332][T31710] ? _copy_from_user+0xdd/0x150 [ 434.812193][T31710] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 434.818434][T31710] ? copy_mount_options+0x30e/0x440 [ 434.823641][T31710] ksys_mount+0xdb/0x150 [ 434.827893][T31710] __x64_sys_mount+0xbe/0x150 [ 434.832579][T31710] do_syscall_64+0x103/0x610 [ 434.837177][T31710] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 434.843067][T31710] RIP: 0033:0x45a8aa [ 434.846962][T31710] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 434.866565][T31710] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 434.874971][T31710] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 434.882947][T31710] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 434.890915][T31710] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 [ 434.898884][T31710] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 434.906856][T31710] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:16:54 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(0x0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:16:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x6c00000000000000, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:16:54 executing program 1: r0 = semget(0x3, 0x2, 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x3a6]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) r1 = shmget(0x1, 0x2000, 0x78000414, &(0x7f0000ffd000/0x2000)=nil) shmat(r1, &(0x7f0000ffe000/0x2000)=nil, 0x0) r2 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x596, 0x40000) ioctl$BLKGETSIZE(r2, 0x1260, &(0x7f0000000140)) 23:16:54 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:16:54 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f66db68"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) tkill(r0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:16:54 executing program 4 (fault-call:0 fault-nth:87): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:16:54 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f66db68"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) tkill(r0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 435.656258][T31728] FAULT_INJECTION: forcing a failure. [ 435.656258][T31728] name failslab, interval 1, probability 0, space 0, times 0 [ 435.713157][T31728] CPU: 0 PID: 31728 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 435.722203][T31728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 435.732283][T31728] Call Trace: [ 435.735608][T31728] dump_stack+0x172/0x1f0 [ 435.739949][T31728] should_fail.cold+0xa/0x15 [ 435.744555][T31728] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 435.750363][T31728] ? lock_downgrade+0x880/0x880 [ 435.755216][T31728] ? ___might_sleep+0x163/0x280 23:16:54 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f66db68"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) tkill(r0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 435.760077][T31728] __should_failslab+0x121/0x190 [ 435.765043][T31728] should_failslab+0x9/0x14 [ 435.769568][T31728] kmem_cache_alloc_trace+0x2d1/0x760 [ 435.774948][T31728] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 435.780786][T31728] __memcg_init_list_lru_node+0x8a/0x1e0 [ 435.786424][T31728] __list_lru_init+0x3d3/0x6e0 [ 435.791190][T31728] alloc_super+0x784/0x890 [ 435.795607][T31728] ? test_single_super+0x10/0x10 [ 435.795624][T31728] sget_userns+0xf1/0x560 [ 435.795640][T31728] ? kill_litter_super+0x60/0x60 [ 435.795661][T31728] ? test_single_super+0x10/0x10 [ 435.809827][T31728] ? kill_litter_super+0x60/0x60 [ 435.819665][T31728] sget+0x10c/0x150 [ 435.823486][T31728] mount_bdev+0xff/0x3c0 [ 435.827762][T31728] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 435.833573][T31728] ext4_mount+0x35/0x40 [ 435.837728][T31728] ? ext4_nfs_get_inode+0xe0/0xe0 [ 435.842756][T31728] legacy_get_tree+0xf2/0x200 [ 435.847439][T31728] vfs_get_tree+0x123/0x450 [ 435.851949][T31728] do_mount+0x1436/0x2c40 [ 435.856286][T31728] ? rcu_lockdep_current_cpu_online+0x31/0x130 [ 435.862446][T31728] ? copy_mount_string+0x40/0x40 [ 435.867392][T31728] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 435.873634][T31728] ? copy_mount_options+0x30e/0x440 [ 435.878841][T31728] ksys_mount+0xdb/0x150 [ 435.883094][T31728] __x64_sys_mount+0xbe/0x150 [ 435.887791][T31728] do_syscall_64+0x103/0x610 [ 435.892390][T31728] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 435.898273][T31728] RIP: 0033:0x45a8aa [ 435.902182][T31728] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 435.921780][T31728] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 435.930188][T31728] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 435.938174][T31728] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 435.946161][T31728] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 [ 435.954141][T31728] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 23:16:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000003000)=[{&(0x7f0000000000)=""/2, 0x2}], 0x1, 0x0) sigaltstack(&(0x7f0000003000/0x2000)=nil, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="2f6465762f6e756c6c62302284cf00263c69c1178d21943600"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:16:54 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:16:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x7400000000000000, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 435.962153][T31728] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:16:54 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f66db68"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:16:55 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(0xffffffffffffffff, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:16:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x3) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="2f6465762fdce0b0c1b895bfd48f6e756c6c623000"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:16:55 executing program 3: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:16:55 executing program 4 (fault-call:0 fault-nth:88): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:16:55 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f66db68"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:16:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x7a00000000000000, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:16:55 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f66db68"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 436.538565][T31965] FAULT_INJECTION: forcing a failure. [ 436.538565][T31965] name failslab, interval 1, probability 0, space 0, times 0 [ 436.558746][T31965] CPU: 0 PID: 31965 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 436.567777][T31965] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 436.577828][T31965] Call Trace: [ 436.581130][T31965] dump_stack+0x172/0x1f0 23:16:55 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f66db68"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x18) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) [ 436.585646][T31965] should_fail.cold+0xa/0x15 [ 436.590256][T31965] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 436.596066][T31965] ? lock_downgrade+0x880/0x880 [ 436.600920][T31965] ? ___might_sleep+0x163/0x280 [ 436.605780][T31965] __should_failslab+0x121/0x190 [ 436.610728][T31965] should_failslab+0x9/0x14 [ 436.615338][T31965] kmem_cache_alloc_trace+0x2d1/0x760 [ 436.620731][T31965] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 436.626605][T31965] __memcg_init_list_lru_node+0x8a/0x1e0 [ 436.632249][T31965] __list_lru_init+0x3d3/0x6e0 23:16:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/dCv/nullb0\x00'], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) fstat(0xffffffffffffffff, &(0x7f00000012c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001340)={{{@in6=@remote, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) r3 = geteuid() getresuid(&(0x7f0000001480), &(0x7f00000014c0)=0x0, &(0x7f0000001500)) lchown(&(0x7f0000001640)='./file0\x00', r3, r1) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000140)='./file0\x00', 0x3ff, 0x2, &(0x7f0000001280)=[{&(0x7f0000000180)="e3bd3cebbdbf4ed9546340c6a795ebddfedc56e723c16ffef74de1bbd685f370ea037dec67ad4ea3bbba39ed3501c87403c56ba1427335c3538316b92405b781cddda0e4e9f4e63bafdeecb9beb257e1f7c60f8ec8e09875ee228c30102b17120d5953a195ff89ca264e968c20abf4b94c8c2055e934114e27deab4869929a5352885fa19ec397464ed54a5b19e87a41c0f7aa545b9bb3acaf9355897fa3e6bfe42b3a9db525724a6e2ae786eb001137f6c913a9c9e55e02b490a50551a87b28abcc91a8d44f3b9537704ab8e991", 0xce, 0x4}, {&(0x7f0000000280)="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", 0x1000, 0x9}], 0x10000, &(0x7f0000001540)={[{@acl='acl'}, {@acl='acl'}, {@acl='acl'}, {@user_xattr='user_xattr'}], [{@audit='audit'}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@euid_gt={'euid>', r0}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@subj_user={'subj_user'}}, {@uid_gt={'uid>', r2}}, {@euid_gt={'euid>', r3}}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@euid_eq={'euid', 0x3d, r4}}]}) [ 436.637057][T31965] alloc_super+0x784/0x890 [ 436.641486][T31965] ? test_single_super+0x10/0x10 [ 436.646439][T31965] sget_userns+0xf1/0x560 [ 436.646457][T31965] ? kill_litter_super+0x60/0x60 [ 436.646477][T31965] ? test_single_super+0x10/0x10 [ 436.646492][T31965] ? kill_litter_super+0x60/0x60 [ 436.646515][T31965] sget+0x10c/0x150 [ 436.646538][T31965] mount_bdev+0xff/0x3c0 [ 436.673648][T31965] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 436.679461][T31965] ext4_mount+0x35/0x40 [ 436.683619][T31965] ? ext4_nfs_get_inode+0xe0/0xe0 [ 436.688648][T31965] legacy_get_tree+0xf2/0x200 [ 436.688674][T31965] vfs_get_tree+0x123/0x450 [ 436.688694][T31965] do_mount+0x1436/0x2c40 [ 436.688712][T31965] ? rcu_lockdep_current_cpu_online+0x31/0x130 [ 436.688735][T31965] ? copy_mount_string+0x40/0x40 [ 436.688752][T31965] ? _copy_from_user+0xdd/0x150 [ 436.688777][T31965] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 436.718117][T31965] ? copy_mount_options+0x30e/0x440 [ 436.718140][T31965] ksys_mount+0xdb/0x150 [ 436.718160][T31965] __x64_sys_mount+0xbe/0x150 [ 436.718185][T31965] do_syscall_64+0x103/0x610 [ 436.743136][T31965] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 436.749023][T31965] RIP: 0033:0x45a8aa [ 436.752934][T31965] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 436.772537][T31965] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 436.772553][T31965] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa 23:16:55 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f66db68"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x18) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) 23:16:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0xffffffff00000000, 0x0, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 436.772563][T31965] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 436.772572][T31965] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 [ 436.772581][T31965] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 436.772590][T31965] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:16:55 executing program 4 (fault-call:0 fault-nth:89): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 436.883693][T31982] erofs: read_super, device -> /dev/loop1 [ 436.909202][T31982] erofs: options -> acl,acl,acl,user_xattr,audit,fscontext=staff_u,mask=^MAY_APPEND,euid>00000000000000000000,mask=^MAY_READ,subj_user=,uid>00000000000000000000,euid>00000000000000000000,func=MODULE_CHECK,euid=00000000000000000000, [ 436.955499][T31982] erofs: cannot find valid erofs superblock [ 437.031455][T32132] FAULT_INJECTION: forcing a failure. [ 437.031455][T32132] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 437.044680][T32132] CPU: 0 PID: 32132 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 437.053691][T32132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 437.063738][T32132] Call Trace: [ 437.067033][T32132] dump_stack+0x172/0x1f0 [ 437.071375][T32132] should_fail.cold+0xa/0x15 [ 437.075979][T32132] ? ksys_mount+0xdb/0x150 [ 437.080410][T32132] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 437.086233][T32132] ? mark_held_locks+0xf0/0xf0 [ 437.091002][T32132] should_fail_alloc_page+0x50/0x60 [ 437.096214][T32132] __alloc_pages_nodemask+0x1a1/0x7e0 [ 437.101594][T32132] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 437.107327][T32132] cache_grow_begin+0x9c/0x850 [ 437.112091][T32132] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 437.118332][T32132] ? check_preemption_disabled+0x48/0x290 [ 437.124058][T32132] kmem_cache_alloc_trace+0x67f/0x760 [ 437.129443][T32132] ext4_fill_super+0x12c/0xcaf0 [ 437.134294][T32132] ? address_val+0x90/0x90 [ 437.138715][T32132] ? enable_ptr_key_workfn+0x30/0x30 [ 437.144005][T32132] ? reacquire_held_locks+0xfb/0x520 [ 437.149287][T32132] ? alloc_super+0x158/0x890 [ 437.153880][T32132] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 437.160120][T32132] ? vsnprintf+0x32f/0x19b0 [ 437.164638][T32132] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 437.170452][T32132] ? snprintf+0xbb/0xf0 [ 437.174605][T32132] ? vsprintf+0x40/0x40 [ 437.178762][T32132] ? wait_for_completion+0x440/0x440 [ 437.184051][T32132] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 437.189773][T32132] ? set_blocksize+0x2bf/0x340 [ 437.189804][T32132] mount_bdev+0x307/0x3c0 [ 437.189821][T32132] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 437.189839][T32132] ? mount_bdev+0x307/0x3c0 [ 437.198910][T32132] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 437.198929][T32132] ext4_mount+0x35/0x40 [ 437.198943][T32132] ? ext4_nfs_get_inode+0xe0/0xe0 [ 437.198960][T32132] legacy_get_tree+0xf2/0x200 [ 437.198982][T32132] vfs_get_tree+0x123/0x450 [ 437.233326][T32132] do_mount+0x1436/0x2c40 [ 437.237662][T32132] ? rcu_lockdep_current_cpu_online+0x31/0x130 [ 437.243820][T32132] ? copy_mount_string+0x40/0x40 [ 437.248764][T32132] ? _copy_from_user+0xdd/0x150 [ 437.253641][T32132] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 437.259887][T32132] ? copy_mount_options+0x30e/0x440 [ 437.265092][T32132] ksys_mount+0xdb/0x150 [ 437.269369][T32132] __x64_sys_mount+0xbe/0x150 [ 437.274062][T32132] do_syscall_64+0x103/0x610 [ 437.278655][T32132] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 437.284592][T32132] RIP: 0033:0x45a8aa [ 437.288485][T32132] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 437.308097][T32132] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 437.316513][T32132] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 437.324490][T32132] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 437.332474][T32132] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 [ 437.340450][T32132] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 437.348416][T32132] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 [ 437.369461][T32132] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:16:58 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(0xffffffffffffffff, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:16:58 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f66db68"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x18) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) 23:16:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x2, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:16:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) utime(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={0x1, 0x2}) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:16:58 executing program 4 (fault-call:0 fault-nth:90): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:16:58 executing program 3: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) [ 439.637218][T32201] FAULT_INJECTION: forcing a failure. [ 439.637218][T32201] name failslab, interval 1, probability 0, space 0, times 0 23:16:58 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f66db68"], 0x1) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 439.722859][T32201] CPU: 0 PID: 32201 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 439.731909][T32201] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 439.731918][T32201] Call Trace: [ 439.731958][T32201] dump_stack+0x172/0x1f0 [ 439.732017][T32201] should_fail.cold+0xa/0x15 [ 439.732059][T32201] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 439.732081][T32201] ? lock_downgrade+0x880/0x880 [ 439.732115][T32201] ? ___might_sleep+0x163/0x280 [ 439.732135][T32201] __should_failslab+0x121/0x190 [ 439.732156][T32201] should_failslab+0x9/0x14 [ 439.732174][T32201] kmem_cache_alloc_trace+0x2d1/0x760 [ 439.732192][T32201] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 439.732215][T32201] __memcg_init_list_lru_node+0x8a/0x1e0 [ 439.732258][T32201] __list_lru_init+0x3d3/0x6e0 [ 439.749885][T32201] alloc_super+0x784/0x890 [ 439.749905][T32201] ? test_single_super+0x10/0x10 [ 439.749922][T32201] sget_userns+0xf1/0x560 [ 439.749939][T32201] ? kill_litter_super+0x60/0x60 [ 439.749958][T32201] ? test_single_super+0x10/0x10 [ 439.749974][T32201] ? kill_litter_super+0x60/0x60 [ 439.749987][T32201] sget+0x10c/0x150 [ 439.750005][T32201] mount_bdev+0xff/0x3c0 [ 439.750022][T32201] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 439.750047][T32201] ext4_mount+0x35/0x40 [ 439.847337][T32201] ? ext4_nfs_get_inode+0xe0/0xe0 [ 439.852374][T32201] legacy_get_tree+0xf2/0x200 [ 439.857055][T32201] vfs_get_tree+0x123/0x450 [ 439.861567][T32201] do_mount+0x1436/0x2c40 [ 439.865915][T32201] ? rcu_lockdep_current_cpu_online+0x31/0x130 [ 439.872080][T32201] ? copy_mount_string+0x40/0x40 [ 439.877024][T32201] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 439.883270][T32201] ? copy_mount_options+0x30e/0x440 [ 439.888476][T32201] ksys_mount+0xdb/0x150 [ 439.892733][T32201] __x64_sys_mount+0xbe/0x150 [ 439.897423][T32201] do_syscall_64+0x103/0x610 [ 439.902025][T32201] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 439.907930][T32201] RIP: 0033:0x45a8aa 23:16:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[@ANYBLOB="2fe790d6051d5a5319efdb3940c49e0fd857a87f4bd95756f01c6469c18c92ac55ea79453f5a50d0e6cdd75357b3c05cd2ea424b884ef373b2908f53cd7ca4781dcc1d2f3223216606d72a6f104a77ee7f0000007b351540d7190527edc17348c2c0a9e8a5f1d957f380c513cd72cbe318a489509fa50adc0b97e89e8c0fffca25d6b9a8f972e485216b417c6cab866d02006825fff141"], &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ext4\x00', 0x100000000ce02, 0x0) [ 439.911843][T32201] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 439.931444][T32201] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 439.939853][T32201] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 439.947822][T32201] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 439.955795][T32201] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 [ 439.963761][T32201] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 23:16:58 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f66db68"], 0x1) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 439.971738][T32201] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:16:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x3, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:16:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[@ANYRES32], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='*\xe3\xe1]', 0xce02, 0x0) msgget$private(0x0, 0x2) 23:16:59 executing program 4 (fault-call:0 fault-nth:91): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 440.211302][T32411] FAULT_INJECTION: forcing a failure. [ 440.211302][T32411] name failslab, interval 1, probability 0, space 0, times 0 [ 440.239036][T32411] CPU: 1 PID: 32411 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 440.248063][T32411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 440.258113][T32411] Call Trace: [ 440.261405][T32411] dump_stack+0x172/0x1f0 [ 440.261426][T32411] should_fail.cold+0xa/0x15 [ 440.261444][T32411] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 440.261464][T32411] ? lock_downgrade+0x880/0x880 [ 440.281006][T32411] ? ___might_sleep+0x163/0x280 [ 440.285862][T32411] __should_failslab+0x121/0x190 [ 440.290800][T32411] should_failslab+0x9/0x14 [ 440.295303][T32411] kmem_cache_alloc_trace+0x2d1/0x760 [ 440.300681][T32411] ? memcpy+0x46/0x50 [ 440.304670][T32411] ext4_fill_super+0x12c/0xcaf0 [ 440.309528][T32411] ? address_val+0x90/0x90 [ 440.313980][T32411] ? enable_ptr_key_workfn+0x30/0x30 [ 440.319263][T32411] ? reacquire_held_locks+0xfb/0x520 [ 440.324544][T32411] ? alloc_super+0x158/0x890 [ 440.329139][T32411] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 440.335376][T32411] ? vsnprintf+0x32f/0x19b0 [ 440.339891][T32411] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 440.345699][T32411] ? snprintf+0xbb/0xf0 [ 440.349851][T32411] ? vsprintf+0x40/0x40 [ 440.354006][T32411] ? wait_for_completion+0x440/0x440 [ 440.359289][T32411] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 440.365004][T32411] ? set_blocksize+0x2bf/0x340 [ 440.369774][T32411] mount_bdev+0x307/0x3c0 [ 440.374118][T32411] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 440.379914][T32411] ? mount_bdev+0x307/0x3c0 [ 440.384420][T32411] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 440.390221][T32411] ext4_mount+0x35/0x40 [ 440.394375][T32411] ? ext4_nfs_get_inode+0xe0/0xe0 [ 440.399397][T32411] legacy_get_tree+0xf2/0x200 [ 440.404092][T32411] vfs_get_tree+0x123/0x450 [ 440.408600][T32411] do_mount+0x1436/0x2c40 [ 440.412946][T32411] ? rcu_lockdep_current_cpu_online+0x31/0x130 [ 440.419122][T32411] ? copy_mount_string+0x40/0x40 [ 440.424090][T32411] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 440.430355][T32411] ? copy_mount_options+0x30e/0x440 [ 440.435557][T32411] ksys_mount+0xdb/0x150 [ 440.439804][T32411] __x64_sys_mount+0xbe/0x150 [ 440.444483][T32411] do_syscall_64+0x103/0x610 [ 440.449089][T32411] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 440.454989][T32411] RIP: 0033:0x45a8aa [ 440.458903][T32411] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 440.478500][T32411] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 440.486920][T32411] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 440.494890][T32411] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 440.502860][T32411] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 [ 440.510829][T32411] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 440.518797][T32411] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:17:01 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(0xffffffffffffffff, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:17:01 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f66db68"], 0x1) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:17:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0xd2442cc5a1d9ccac, 0x0) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f0000000140)=0xd69) 23:17:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x4, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:17:01 executing program 4 (fault-call:0 fault-nth:92): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:17:01 executing program 3: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 23:17:01 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 442.726992][T32446] e Filesystem requires source device [ 442.748419][T32449] FAULT_INJECTION: forcing a failure. [ 442.748419][T32449] name failslab, interval 1, probability 0, space 0, times 0 [ 442.762605][T32446] e Filesystem requires source device 23:17:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000240)='system_u:object_r:dbusd_etc_t:s0\x00', 0x21, 0x2) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x10000, 0x0) ioctl$KVM_S390_UCAS_MAP(r0, 0x4018ae50, &(0x7f0000000280)={0xffffffffffffff1c, 0x1ff, 0x6}) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000140)=0x1, &(0x7f0000000180)=0x2) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="efbdfc09a60dbd1cb48bc2413dc81a79db644a7c29aa99fd2d0d6bbfb77f91ef0a11af80fbdcf94546b14296a7927c17deb28b3149250582bd0c68c3e089ff12d2cbf955141ee21b640efd2b7079d09051f6d6f2cde98b126f30"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 442.835665][T32449] CPU: 1 PID: 32449 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 442.844719][T32449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 442.854775][T32449] Call Trace: [ 442.858081][T32449] dump_stack+0x172/0x1f0 [ 442.862426][T32449] should_fail.cold+0xa/0x15 [ 442.867046][T32449] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 442.872854][T32449] ? lock_downgrade+0x880/0x880 [ 442.877708][T32449] ? ___might_sleep+0x163/0x280 [ 442.882569][T32449] __should_failslab+0x121/0x190 [ 442.887522][T32449] should_failslab+0x9/0x14 [ 442.892041][T32449] __kmalloc_track_caller+0x2d8/0x740 [ 442.897419][T32449] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 442.903661][T32449] ? bdev_name.isra.0+0x1aa/0x200 [ 442.908686][T32449] ? ext4_fill_super+0xf0/0xcaf0 [ 442.913635][T32449] kstrdup+0x3a/0x70 [ 442.917542][T32449] ext4_fill_super+0xf0/0xcaf0 [ 442.922310][T32449] ? address_val+0x90/0x90 [ 442.926734][T32449] ? enable_ptr_key_workfn+0x30/0x30 [ 442.932020][T32449] ? reacquire_held_locks+0xfb/0x520 [ 442.937310][T32449] ? alloc_super+0x158/0x890 [ 442.941906][T32449] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 442.948145][T32449] ? vsnprintf+0x32f/0x19b0 [ 442.952661][T32449] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 442.958478][T32449] ? snprintf+0xbb/0xf0 [ 442.962648][T32449] ? vsprintf+0x40/0x40 [ 442.966807][T32449] ? wait_for_completion+0x440/0x440 [ 442.972095][T32449] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 442.977814][T32449] ? set_blocksize+0x2bf/0x340 [ 442.982582][T32449] mount_bdev+0x307/0x3c0 [ 442.987006][T32449] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 442.992818][T32449] ? mount_bdev+0x307/0x3c0 [ 442.997328][T32449] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 443.003135][T32449] ext4_mount+0x35/0x40 [ 443.007307][T32449] ? ext4_nfs_get_inode+0xe0/0xe0 [ 443.012335][T32449] legacy_get_tree+0xf2/0x200 [ 443.017018][T32449] vfs_get_tree+0x123/0x450 [ 443.021565][T32449] do_mount+0x1436/0x2c40 [ 443.025899][T32449] ? rcu_lockdep_current_cpu_online+0x31/0x130 [ 443.032061][T32449] ? copy_mount_string+0x40/0x40 [ 443.036999][T32449] ? _copy_from_user+0xdd/0x150 [ 443.041858][T32449] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 443.048092][T32449] ? copy_mount_options+0x30e/0x440 [ 443.053303][T32449] ksys_mount+0xdb/0x150 [ 443.057558][T32449] __x64_sys_mount+0xbe/0x150 [ 443.062240][T32449] do_syscall_64+0x103/0x610 [ 443.066842][T32449] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 443.072733][T32449] RIP: 0033:0x45a8aa [ 443.076625][T32449] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 443.096226][T32449] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 443.105676][T32449] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 443.113648][T32449] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 443.121615][T32449] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 23:17:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x5, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 443.129584][T32449] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 443.137567][T32449] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 23:17:02 executing program 4 (fault-call:0 fault-nth:93): syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:17:02 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x0) dup2(r1, r2) tkill(r0, 0x16) 23:17:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f6465bb391320acb9b6ed8a"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:17:02 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:17:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x6, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:17:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r0, 0x4010ae74, &(0x7f0000000140)={0x0, 0x8, 0x3}) 23:17:02 executing program 3 (fault-call:8 fault-nth:0): pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:17:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="2f64ff010000756c6c6230000d13419d86a47cb359d4991ab9275e986d10a98f6207e6b2a5a5ba409ac30c629fd321d4d72e024a16db7a9ab8"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:17:02 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x0) dup2(r1, r2) tkill(r0, 0x16) [ 443.524432][ T319] FAULT_INJECTION: forcing a failure. [ 443.524432][ T319] name failslab, interval 1, probability 0, space 0, times 0 [ 443.543707][ T319] CPU: 1 PID: 319 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190201 #25 [ 443.552563][ T319] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 443.562620][ T319] Call Trace: [ 443.565923][ T319] dump_stack+0x172/0x1f0 [ 443.570274][ T319] should_fail.cold+0xa/0x15 [ 443.574873][ T319] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 443.580680][ T319] ? lock_downgrade+0x880/0x880 [ 443.580700][ T319] ? ___might_sleep+0x163/0x280 [ 443.580720][ T319] __should_failslab+0x121/0x190 [ 443.580739][ T319] should_failslab+0x9/0x14 [ 443.580761][ T319] __kmalloc_track_caller+0x2d8/0x740 [ 443.590457][ T319] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 443.590473][ T319] ? bdev_name.isra.0+0x1aa/0x200 [ 443.590490][ T319] ? ext4_fill_super+0xf0/0xcaf0 [ 443.590531][ T319] kstrdup+0x3a/0x70 [ 443.590554][ T319] ext4_fill_super+0xf0/0xcaf0 [ 443.630228][ T319] ? address_val+0x90/0x90 [ 443.634654][ T319] ? enable_ptr_key_workfn+0x30/0x30 [ 443.639942][ T319] ? reacquire_held_locks+0xfb/0x520 [ 443.645238][ T319] ? alloc_super+0x158/0x890 [ 443.649843][ T319] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 443.656087][ T319] ? vsnprintf+0x32f/0x19b0 [ 443.660611][ T319] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 443.666426][ T319] ? snprintf+0xbb/0xf0 [ 443.670586][ T319] ? vsprintf+0x40/0x40 [ 443.674750][ T319] ? wait_for_completion+0x440/0x440 [ 443.680050][ T319] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 443.684075][ T327] FAULT_INJECTION: forcing a failure. [ 443.684075][ T327] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 443.685771][ T319] ? set_blocksize+0x2bf/0x340 [ 443.685793][ T319] mount_bdev+0x307/0x3c0 [ 443.685810][ T319] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 443.685822][ T319] ? mount_bdev+0x307/0x3c0 [ 443.685837][ T319] ? ext4_calculate_overhead+0x11b0/0x11b0 [ 443.685864][ T319] ext4_mount+0x35/0x40 [ 443.685879][ T319] ? ext4_nfs_get_inode+0xe0/0xe0 [ 443.685896][ T319] legacy_get_tree+0xf2/0x200 [ 443.738220][ T319] vfs_get_tree+0x123/0x450 [ 443.742735][ T319] do_mount+0x1436/0x2c40 [ 443.747074][ T319] ? rcu_lockdep_current_cpu_online+0x31/0x130 [ 443.753236][ T319] ? copy_mount_string+0x40/0x40 [ 443.758182][ T319] ? _copy_from_user+0xdd/0x150 [ 443.763049][ T319] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 443.769296][ T319] ? copy_mount_options+0x30e/0x440 [ 443.774502][ T319] ksys_mount+0xdb/0x150 [ 443.778763][ T319] __x64_sys_mount+0xbe/0x150 [ 443.783450][ T319] do_syscall_64+0x103/0x610 [ 443.788053][ T319] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 443.793943][ T319] RIP: 0033:0x45a8aa [ 443.797841][ T319] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 443.817439][ T319] RSP: 002b:00007f77e26b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 443.825853][ T319] RAX: ffffffffffffffda RBX: 00007f77e26b6b30 RCX: 000000000045a8aa [ 443.833823][ T319] RDX: 00007f77e26b6ad0 RSI: 0000000020000000 RDI: 00007f77e26b6af0 [ 443.841796][ T319] RBP: 0000000020000000 R08: 00007f77e26b6b30 R09: 00007f77e26b6ad0 [ 443.849770][ T319] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 443.849779][ T319] R13: 0000000000000000 R14: 00000000004dba08 R15: 0000000000000003 [ 443.875471][ T327] CPU: 0 PID: 327 Comm: syz-executor3 Not tainted 5.0.0-rc4-next-20190201 #25 [ 443.884342][ T327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 443.894393][ T327] Call Trace: [ 443.897689][ T327] dump_stack+0x172/0x1f0 [ 443.902027][ T327] should_fail.cold+0xa/0x15 [ 443.906625][ T327] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 443.912440][ T327] should_fail_alloc_page+0x50/0x60 [ 443.912458][ T327] __alloc_pages_nodemask+0x1a1/0x7e0 [ 443.912472][ T327] ? __lock_is_held+0xb6/0x140 [ 443.912495][ T327] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 443.923064][ T327] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 443.923079][ T327] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 443.923093][ T327] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 443.923112][ T327] alloc_pages_vma+0x39a/0x540 [ 443.923135][ T327] do_huge_pmd_wp_page+0xf1e/0x3690 [ 443.923164][ T327] ? __split_huge_pmd+0x2c80/0x2c80 [ 443.923179][ T327] ? __lock_acquire+0x54b/0x4790 [ 443.923196][ T327] ? __lock_acquire+0x54b/0x4790 [ 443.923214][ T327] ? pmd_val+0x85/0x100 [ 443.923235][ T327] ? add_mm_counter_fast.part.0+0x40/0x40 [ 443.933692][ T327] __handle_mm_fault+0x1651/0x3ec0 [ 443.992225][ T327] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 443.997776][ T327] ? find_held_lock+0x35/0x130 [ 444.002558][ T327] ? handle_mm_fault+0x322/0xb30 [ 444.007524][ T327] ? kasan_check_read+0x11/0x20 [ 444.012399][ T327] handle_mm_fault+0x43f/0xb30 [ 444.017171][ T327] __do_page_fault+0x5ef/0xda0 [ 444.021948][ T327] do_page_fault+0x71/0x581 [ 444.026460][ T327] page_fault+0x1e/0x30 [ 444.030621][ T327] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 444.037206][ T327] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 83 [ 444.056819][ T327] RSP: 0018:ffff88804e15fab0 EFLAGS: 00010206 [ 444.062887][ T327] RAX: 0000000000000000 RBX: 0000000000001000 RCX: 0000000000000500 [ 444.070855][ T327] RDX: 0000000000001000 RSI: ffff88809f04db00 RDI: 0000000020200000 [ 444.078824][ T327] RBP: ffff88804e15fae8 R08: ffffed1013e09c00 R09: 0000000000000000 [ 444.086794][ T327] R10: ffffed1013e09bff R11: ffff88809f04dfff R12: 00000000201ff500 [ 444.094764][ T327] R13: ffff88809f04d000 R14: 0000000020200500 R15: 00007ffffffff000 [ 444.102761][ T327] ? copyout+0xe2/0x100 [ 444.106955][ T327] copy_page_to_iter+0x347/0xd00 [ 444.111931][ T327] pipe_to_user+0xb4/0x170 [ 444.116346][ T327] ? anon_pipe_buf_release+0x1c6/0x270 [ 444.121825][ T327] __splice_from_pipe+0x39a/0x7e0 [ 444.126855][ T327] ? iter_to_pipe+0x560/0x560 [ 444.131555][ T327] do_vmsplice.part.0+0x249/0x2b0 [ 444.136582][ T327] ? do_tee+0x7c0/0x7c0 [ 444.140740][ T327] ? import_iovec+0x12e/0x200 [ 444.145427][ T327] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 444.151669][ T327] __do_sys_vmsplice+0x1b9/0x210 [ 444.156650][ T327] ? vmsplice_type.isra.0+0x160/0x160 [ 444.162031][ T327] ? check_preemption_disabled+0x48/0x290 [ 444.167756][ T327] ? wait_for_completion+0x440/0x440 [ 444.173046][ T327] ? __sb_end_write+0xd9/0x110 [ 444.177817][ T327] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 444.184057][ T327] ? fput+0x128/0x1a0 [ 444.188050][ T327] ? ksys_write+0x166/0x1f0 [ 444.192569][ T327] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 444.198029][ T327] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 444.203492][ T327] ? do_syscall_64+0x26/0x610 [ 444.208208][ T327] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 444.214276][ T327] ? do_syscall_64+0x26/0x610 [ 444.218972][ T327] __x64_sys_vmsplice+0x97/0xf0 [ 444.223828][ T327] do_syscall_64+0x103/0x610 [ 444.228423][ T327] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 444.234313][ T327] RIP: 0033:0x457e39 [ 444.238211][ T327] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 444.257813][ T327] RSP: 002b:00007fa49379bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000116 [ 444.266225][ T327] RAX: ffffffffffffffda RBX: 00007fa49379bc90 RCX: 0000000000457e39 [ 444.274214][ T327] RDX: 0000000000000001 RSI: 0000000020000000 RDI: 0000000000000003 [ 444.282192][ T327] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 444.290161][ T327] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa49379c6d4 [ 444.298131][ T327] R13: 00000000004c6b96 R14: 00000000004dc230 R15: 0000000000000006 23:17:04 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:17:04 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x0) dup2(r1, r2) tkill(r0, 0x16) 23:17:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x7, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:17:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2d9db3484f667dcd136230009ee29d886db21b964eaad32fea5fa5e1148dba7b3e59d119dd2568ab134e04ea611c19c51ad98bf2bb3fe5e01c56b09d561dfa5d5b726d3112e3035ca187017ef10de9377067a391a387208acbca5e6f293d0ee681c6a4dd36b97f957029c442cc00f2b2c85d14f5faa81a442041a1410b003fc675d4b30a2a4fe3aa9af49638955f518cf8de8379803e9e1d62746a56ac876f165dc2b858cf3125a628c12d1dde00000000006b8951627ad163ae"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x8000, 0x0) ioctl$TCGETS(r0, 0x5401, &(0x7f00000000c0)) 23:17:04 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:17:04 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 445.883337][ T338] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:17:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x5) mount(&(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) rename(&(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000240)='./file0/file0\x00') ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000180)={{0x2, 0x4e22, @local}, {0x1, @random="fed1d289c422"}, 0x4, {0x2, 0x4e24, @local}, 'eql\x00'}) fcntl$notify(r0, 0x402, 0x80000022) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x0, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0/file0\x00', 0x10) 23:17:04 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:17:04 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='\nxt3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:17:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0xa, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:17:04 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(0xffffffffffffffff, r2) tkill(r0, 0x16) [ 446.057632][ T452] e Filesystem requires source device 23:17:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="2f2465762f6e756c6c62300b558411209d9d9578c43d5c72f400"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:17:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x10, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:17:05 executing program 1: r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x1, 0x2) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)=""/96, 0x60) ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000080)={0x6, [0x3fffffff8000, 0xd325, 0x5, 0x8001, 0x80000001, 0xfffffffffffffffa]}) fcntl$getown(r0, 0x9) mkdir(&(0x7f00000000c0)='./file0\x00', 0x1000) 23:17:05 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='%xt3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:17:05 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x82) acct(0x0) lsetxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64EXEC\x00', &(0x7f00000000c0)='self\x00', 0x5, 0x1) r0 = getuid() syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x400, 0x5, &(0x7f0000000440)=[{&(0x7f0000000180)="3ba0999d95973adb4e03b9819dd1531ae1b4b16abd2b816a78a666938b3709f2a2fafa2b06db84bc3e6301a2f6b52af3352a5811b61d0f75501a42e868811cbf3eab44c9e787998dab1d3bb8fe6901242169260266cc7d24d26be681c40cfb5e25ae6706640c57e32860ae536a40356fa47e2b664d09cc4a0ede", 0x7a, 0x5}, {&(0x7f0000000200)="914e0df85b929a2734884b9a6711f8cbc2bb4aec9cfeb9a6bc8439ffd05f4186087cbd137cb9582af21dbff07c32decb61d043c0e2c57efa1f9b7dfc1405dbf422e32b15ecf94d0cd32c6f441ce7254a5d104674a02c4020be07411698b29c49806b0b33d8eedb167af65ac879349f58abd50b3d16c7954ab4b85776daafcdd5ce1754a4e39477e20b4e14ae6ca6282b1ab37ef47ad04ad8eb36731f15770dc4226754692eee3bd520db933634166972b1c0be5d074af0564ad78152a89b28c407b41c330235fc43b803ecd144ea9b840411dab8acfa22ac74c9e0509950a1cc8935a15b9e38309b96917f85f91013bb", 0xf0, 0x4}, {&(0x7f0000000300)="119b6b04d77b60d30d39f7efa4a97cc123", 0x11, 0x8}, {&(0x7f0000000340)="58f35efb1c934c70f1ff179c9c20325d236fcc155adf5d879ccbdf0834df0500b16d6c9fde863d7675dad53c6a9356339a0970cb28892affe83c4b5396b8", 0x3e, 0x101}, {&(0x7f0000000380)="1ae05dc4793b1ca708a089486d7fb77235b9306ff4f7bd2a24e07033963893245e7f552cd46f44d02a19efe548b95f4d2ed8f86de5ba8dd0a08b5abb4120d411105eed7e875988f398af212cdad9d1ec688fcb94983acfd0bc4c12dfced13d39caaf6827c34570e0dd0c5a2043ff2c1c3bc1c286e1909ac891cf253c45c708f3f2a451bcb0a31dbe263b1ea1a772f288492566f666b1a4b431557ef3f3ccdd09b0d702291db78eebb30eb6f44d6bf3473974123e62b9", 0xb6, 0x401}], 0x80800, &(0x7f00000004c0)={[{@nonumtail='nnonumtail=1'}, {@rodir='rodir'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}], [{@smackfsdef={'smackfsdef', 0x3d, 'self\x00'}}, {@dont_hash='dont_hash'}, {@appraise_type='appraise_type=imasig'}, {@hash='hash'}, {@dont_appraise='dont_appraise'}, {@dont_appraise='dont_appraise'}, {@euid_eq={'euid', 0x3d, r0}}]}) 23:17:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x48, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:17:05 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='e\nt3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:17:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[@ANYRESHEX], &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='logf\x06\x00', 0xce02, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x40) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x2, 0x0) fadvise64(r0, 0x0, 0x81c, 0x5) modify_ldt$read_default(0x2, &(0x7f0000000180)=""/9, 0x9) umount2(&(0x7f00000000c0)='./file0\x00', 0x100000b) 23:17:07 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:17:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x4c, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:17:07 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x2000}], 0x1, 0x0) 23:17:07 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[@ANYRESOCT], &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:17:07 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(0xffffffffffffffff, r2) tkill(r0, 0x16) 23:17:07 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='e%t3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:17:08 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x2) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f641e18a3ea687bc6fd3363bebeac76333b45cce051b0010000000000000040a4e1872a7471af7f56c1c6861d935dbaaea5f166f06cdbe3c568708253ca53071797f88f31765ccd"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x200, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x10001, 0x4) 23:17:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x68, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:17:08 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ex\n3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:17:08 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/d\x00v_s\xd6\xd8p6\x00') ioctl$VIDIOC_SUBDEV_G_EDID(r0, 0xc0285628, &(0x7f0000000180)={0x0, 0x80000000, 0x6, [], &(0x7f0000000140)=0x380}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:17:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x6c, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:17:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000140)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='aufs\x00', 0x1000100000ce02, 0x0) 23:17:10 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:17:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x40) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:17:10 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ex%3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:17:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x74, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:17:11 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(0xffffffffffffffff, r2) tkill(r0, 0x16) 23:17:11 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3000}], 0x1, 0x0) 23:17:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000004540)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000004480)=[{{&(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000200)}, {&(0x7f0000000240)}, {&(0x7f0000000280)=""/52, 0x34}, {&(0x7f00000002c0)=""/213, 0xd5}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/7, 0x7}, {&(0x7f0000000440)=""/110, 0x6e}], 0x7, &(0x7f0000000540)=""/239, 0xef}, 0x6}, {{0x0, 0x0, &(0x7f0000001c40)=[{&(0x7f0000000640)=""/176, 0xb0}, {&(0x7f0000000700)=""/113, 0x71}, {&(0x7f0000000780)=""/248, 0xf8}, {&(0x7f0000000880)=""/159, 0x9f}, {&(0x7f0000000940)=""/202, 0xca}, {&(0x7f0000000a40)=""/106, 0x6a}, {&(0x7f0000000ac0)=""/254, 0xfe}, {&(0x7f0000000bc0)=""/84, 0x54}, {&(0x7f0000000c40)=""/4096, 0x1000}], 0x9, &(0x7f0000001d00)=""/196, 0xc4}, 0xfffffffffffffffc}, {{&(0x7f0000001e00)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x80, &(0x7f00000043c0)=[{&(0x7f0000001e80)=""/4096, 0x1000}, {&(0x7f0000002e80)=""/170, 0xaa}, {&(0x7f0000002f40)=""/115, 0x73}, {&(0x7f0000002fc0)=""/227, 0xe3}, {&(0x7f00000030c0)=""/41, 0x29}, {&(0x7f0000003100)=""/129, 0x81}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/219, 0xdb}, {&(0x7f00000042c0)=""/110, 0x6e}, {&(0x7f0000004340)=""/106, 0x6a}], 0xa}, 0x2}], 0x3, 0x10100, &(0x7f0000004580)={r0, r1+10000000}) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000004600)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r2, &(0x7f0000004780)={&(0x7f00000045c0), 0xc, &(0x7f0000004740)={&(0x7f0000004640)={0xdc, r3, 0x210, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xf16c}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1ce}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}]}, @TIPC_NLA_MEDIA={0x20, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x40}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8d5}]}, @TIPC_NLA_BEARER={0x54, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3f}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x94f}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}]}, 0xdc}, 0x1, 0x0, 0x0, 0x4000000}, 0x5) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x400, 0x0) connect$pptp(r4, &(0x7f0000000140)={0x18, 0x2, {0x1, @rand_addr=0x8}}, 0x1e) ioctl$KVM_GET_REGS(r4, 0x8090ae81, &(0x7f00000047c0)) 23:17:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x7a, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:17:11 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ex`3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:17:11 executing program 1: listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/117, 0x75) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:17:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x300, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:17:11 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x401e0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="2f6465762f6e756c4260000000000000006559f2123298646e623000"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:17:14 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:17:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x500, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:17:14 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext\t\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:17:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="2f6465762f6e756c6c623000eae0dd3f0bfa1208c981ad70ecabd543387324afeeef130e56116c7d15c4f90b7ebd6b00916941bea59fd2fbe19e821e7720a98ff4600b8aa840ea8c206810b88fafe84db9e52f40cfcc6a0151f543d535ec55ff030000000000008d32d585829d13d3bc8598835b0fd6540aac934e5ec8d7c394aaba2a34538dfc2f2150f36230b563b4431565909a0d098f9ecfa98427aa75cfbba39bf39f15dee35693e0f81e8a302269fcb59b0feec86501e2489c7f660a240e51916e1d7427f71c99edb6e863cf8c0a2f0e434de8f52960180b3a2dd900000000feffffff00001b"], &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) r0 = creat(&(0x7f00000000c0)='.\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, &(0x7f0000000200)=""/94) readlinkat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=""/96, 0x60) 23:17:14 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, 0xffffffffffffffff) tkill(r0, 0x16) 23:17:14 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x4000}], 0x1, 0x0) 23:17:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clock_gettime(0x7, &(0x7f0000000140)) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:17:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x600, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:17:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@md0='/dev/md0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='\xdc\x83(\x8b\x85\xa1\xd0\xf4\xda\x84u\xca\xd7\xac\x15\x9c\xb6u\xb3+0', 0xce02, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x20080, 0x0) 23:17:14 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext\n\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:17:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000000000053e6d70035b3d3ad2aefbb87274dafeb8d6f3f80f59bfb36ef231f433aa9484775f5"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:17:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="c62f646707623000"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) read$eventfd(r0, &(0x7f0000000140), 0x8) [ 455.609164][ T1769] e Filesystem requires source device 23:17:17 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:17:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x700, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:17:17 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f6465762f6e756c6c621a00"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) lsetxattr$security_smack_transmute(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000180)='TRUE', 0x4, 0x1) 23:17:17 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext%\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:17:17 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, 0xffffffffffffffff) tkill(r0, 0x16) 23:17:17 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x5000}], 0x1, 0x0) 23:17:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\t\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:17:17 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:17:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0xa00, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:17:17 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:17:17 executing program 1: r0 = socket(0x7, 0x4, 0xffffffff) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f00000000c0)={'icmp6\x00'}, &(0x7f0000000140)=0x1e) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000340)='/dev/admmidi#\x00', 0xfffffffffffffff7, 0x84580) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="c99eda8ef1dd843b3c6baeffe0e36a255fdeb3b2127a3b2da36ee4ed0a0afdb23bb16338eb9fdba902bbfe2560a0dd4b5b8825dfe7cf5a5d1b2a1a0b7084f2579573ddaaa5fb5f1c9f7821eaea3c4e1e58d37dbff1a9a940fb7161a9afa1cd59af75a3659d69aef8107140c755208e70a80c88ae6a05873a07d07ba25c3dbb2701916127b26323e3d900827d0ba5228c5186035310905e9cb80f0447f621a79b58aedada5380f0daf1cf6ee4bd20b8652c183b2e77e6ce4cd1ee05c1c5314a5d100d491a4ec47948bdb3"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000240)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000040)=0xe8) stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r2, &(0x7f0000000400)={0x90, 0x0, 0x8, {0x3, 0x0, 0x98de, 0x3, 0xa45, 0x4, {0x1, 0x0, 0x8, 0x6, 0x3ff, 0x2, 0x100000001, 0x7, 0x2, 0x7, 0x9182, r3, r4, 0x3, 0x6}}}, 0x90) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, &(0x7f00000001c0)=""/107) [ 458.447443][ T1900] e Filesystem requires source device 23:17:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x422001, 0x0) accept4(r0, &(0x7f0000000180)=@nfc_llcp, &(0x7f0000000200)=0x80, 0x80800) mkdir(&(0x7f00000000c0)='./file0\x00', 0x18a) 23:17:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x3f00, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:17:17 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext7\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:17:17 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000140)={0x0, 0xfff, 0xab, 0x5, 0x1, 0x3}, &(0x7f0000000180)=0x14) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000001c0)=@assoc_value={r2, 0x80}, 0x8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000200)={0x26, 0x8}) 23:17:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x4000, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:17:20 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, 0xffffffffffffffff) tkill(r0, 0x16) 23:17:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="2f64bcdd7065762d6e756c6c628400"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:17:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x4800, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:17:20 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext`\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:17:20 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x6000}], 0x1, 0x0) 23:17:20 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:17:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000003c0)=ANY=[@ANYBLOB="2f62b228fa23700a6e4764845cd5820d57b4707fb4159ca2a604991f817ddeb5a226c608fcc7a86d10c6a71e3eaa91099887d6234ae37924480102527aa9c0e6bc597f2967a5f39197d175a208c180a3b9024c9272b2747a73fa42f7375df800b610288df1ed09f0234bac9b780a5777331266295c527e3134bbc08746416e36afbfddf5f1935e208152f89b435cf9f8838f1b28f61e98024d1f8bb8c80475c30a0e6097c522810e4380dbbc61893862ca975a445d135eafb94862d289b5915007aa4011be5703d2e7181731d3e6ff644fbf9c02e5a7a09edb614ae21ccee17a8babc5a0c526d3c27f60d8b1e7f3a56876f0"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x20000, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r0, 0x28, &(0x7f0000000140)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r1, 0x3, 0x8}, 0xc) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000240)={0x4, 0x70, 0x8000, 0x1ff, 0x6, 0x2, 0x0, 0x7, 0x212c, 0x7, 0x8, 0x1ff, 0xc4a2, 0x80, 0x4, 0x1ff, 0x100000001, 0x5, 0x7, 0x8, 0x3f, 0x15, 0x9, 0xcb5, 0xfbac, 0xcca, 0xbd18, 0x5, 0x7, 0x7, 0x100, 0x5, 0x7f, 0x2, 0x80, 0x5, 0x0, 0x3, 0x0, 0x5, 0x1, @perf_bp={&(0x7f00000000c0), 0x5}, 0x22008, 0x80000000, 0x3, 0x0, 0x1, 0x8000, 0x1f}) 23:17:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x4c00, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:17:20 executing program 1: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cachefiles\x00', 0x400000, 0x0) recvfrom$rxrpc(r0, &(0x7f0000000540)=""/3, 0x3, 0x20, &(0x7f0000000580)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x756, @mcast2}}, 0x24) setxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='security.capability\x00', &(0x7f0000000180)=@v1={0x1000000, [{0x9, 0xb2d1}]}, 0xc, 0x2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:17:20 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='extc\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:17:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x6800, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:17:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sysfs$3(0x3) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:17:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x6c00, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:17:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:17:23 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='extd\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:17:23 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(0x0, 0x16) 23:17:23 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x7000}], 0x1, 0x0) 23:17:23 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:17:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x80) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) r0 = creat(&(0x7f0000000200)='./file0\x00', 0x400000005) openat$cgroup_int(r0, &(0x7f0000000140)='memory.high\x00', 0x2, 0x0) 23:17:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x7400, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:17:23 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) unshare(0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x4000, 0x22) ioctl$RTC_UIE_OFF(r0, 0x7004) r1 = getpid() capset(&(0x7f0000000140)={0x200f1526, r1}, &(0x7f0000000180)={0x6, 0x3, 0x7fff, 0x6, 0x2, 0x200}) 23:17:23 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x02', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:17:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x7a00, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:17:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') 23:17:23 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x03', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:17:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x20000, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:17:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x20000, 0x0) write$9p(r0, &(0x7f0000000140)="3a44c3ec0e6b04aa7c9a3527b9560cd757c7e23fcf4dff0245f9349ee387b9c02fc995071d9d5e65e21a855e87d42e06e9f164bcb832110637b490c34c2e434ddd52130ffa72541a061fc7a9750a2ef0675b4e45c53d3e0b04b3651b8879849807d38aa0", 0x64) 23:17:24 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(0x0, 0x16) 23:17:24 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x0) utimensat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={{0x77359400}, {0x77359400}}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000380)={'NETMAP\x00'}, &(0x7f00000003c0)=0x1e) gettid() ioprio_get$pid(0x0, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2000000006}, 0x1c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e1f, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r1 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000027, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) utimensat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)={{0x0, 0x7530}, {r2, r3/1000+30000}}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000100)) open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/dev/nwll^0\x00'], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:17:26 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:17:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x100000, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:17:26 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x04', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:17:26 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x9000}], 0x1, 0x0) 23:17:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x6) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f030000006e756cddb3789e"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='mqueue\x00', 0x8000, 0x0) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=""/198, 0xc6) 23:17:26 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(0x0, 0x16) 23:17:26 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000840)='/dev/amidi#\x00', 0x8, 0x200) getresuid(&(0x7f0000000880), &(0x7f00000008c0)=0x0, &(0x7f0000000900)) r2 = getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in=@dev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000000a40)=0xe8) mount$fuseblk(&(0x7f0000000780)='/dev/loop0\x00', &(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='fuseblk\x00', 0x18000, &(0x7f0000000a80)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x6}}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x200}}, {@max_read={'max_read', 0x3d, 0x5}}, {@allow_other='allow_other'}], [{@uid_lt={'uid<', r3}}, {@dont_measure='dont_measure'}, {@smackfsfloor={'smackfsfloor', 0x3d, 'euid<'}}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x21}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}, {@obj_type={'obj_type', 0x3d, '@md5summd5sum/}'}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}]}}) mkdir(&(0x7f0000000000)='./file0\x00', 0x48) r4 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x3, 0x200) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_unix(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x4, &(0x7f0000000500)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_9p2000='version=9p2000'}, {@dfltuid={'dfltuid', 0x3d, r5}}], [{@euid_eq={'euid', 0x3d, r6}}, {@subj_type={'subj_type', 0x3d, '['}}, {@fsname={'fsname', 0x3d, 'vboxnet1'}}, {@measure='measure'}, {@appraise_type='appraise_type=imasig'}]}}) write$P9_RREADDIR(r4, &(0x7f0000000100)={0xb, 0x29, 0x2, {0x9}}, 0xb) mount$bpf(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x4020, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0xd2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x80}}], [{@fsmagic={'fsmagic', 0x3d, 0x4}}, {@smackfsroot={'smackfsroot', 0x3d, 'trans=unix,'}}, {@dont_appraise='dont_appraise'}, {@euid_lt={'euid<', r6}}, {@fowner_lt={'fowner<', r5}}, {@uid_lt={'uid<', r5}}, {@dont_appraise='dont_appraise'}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@fowner_gt={'fowner>', r5}}]}) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f6465762f99756c623000"], &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)='cgroup ', 0xce02, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x800, &(0x7f0000000240)={'trans=unix,', {[{@access_client='access=client'}, {@version_9p2000='version=9p2000'}, {@version_u='version=9p2000.u'}, {@access_user='access=user'}, {@cachetag={'cachetag'}}], [{@defcontext={'defcontext', 0x3d, 'root'}}]}}) 23:17:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x1000000, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 467.804685][ T3107] 9pnet: p9_fd_create_unix (3107): problem connecting socket: ./file0: -111 23:17:26 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x05', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 467.872732][ T3107] 9pnet: p9_fd_create_unix (3107): problem connecting socket: ./file0: -111 [ 467.943258][ T3107] 9pnet: p9_fd_create_unix (3107): problem connecting socket: ./file0: -111 23:17:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x2000000, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:17:26 executing program 1: r0 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x2000) syz_mount_image$nfs(&(0x7f0000000280)='nfs\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x7, &(0x7f0000000780)=[{&(0x7f0000000300)="32328abcce56a904cbc25dc629f66f78943768ed0e2395f5389fee0321e648df1be7e148dd326f9714cfe393ab9013d92e46d57809c5d286717a7f223dbdd71c091da641e98ba178983076ca9185757225d8493fba8a5393f855fb4d35ef2c9563b88b43d07eb10adaf5cbca65a1a26680bc3e3078c88115e1b7520f874ff7e0971dea63e356adfd9fc36fd1568533de8fb09ee7a1372fdfbd52df4d75ba399a465bdec5844f", 0xa6}, {&(0x7f00000003c0)="fefbcafd9b88e553ba959cd6c7a9db82e14c7b0e2aa9137f22b1cb2abcad7d364b2a5dca44d0cfd47d86171648ed0b14ef8faed03b5542b9da7a22056f749404724a65ad1bc441fecbe46b88c5cc1859bd6cec5be72a30a9f550100d1fda38b5ee6947cd437f75b587434cf452ec114734d9f1b7f933270af0b487dd2c9a952295efd7499ae8d1ebdf54e116b7c5ab7528a01949efca960cf185e1af9e5396a23694769c2eeaea47cc7127253a4107b12741bf17d674a2cd13209c1b0d2ba8dc615f2eff2924af16a783156f072200d6cbc0bb47461680c1e5669265cb9ec2b5b89c9d20fc56e7b7d04033f6ef9fbd6cb2", 0xf1, 0x9}, {&(0x7f00000004c0)='\r:', 0x2}, {&(0x7f0000000500)="2279e0e76538bab7f4b93108a8597469323f1dd7594d900b3622da874d8d1d83fcbc0c6a3d86a097d7d33125a2c27ee9be4426cca0bec1a383c440e6c310526898252dd32de4775b616f4135f05ce9dafb0b436e148b1e8af8102386044b265576bb6e7211e3ed537204fb9eb2acbc9ed0574a72f16bc7d2bf77740859f947b60b286c2b2c1027925ea9e7a8fc5e512d6a893c2ec22a927953f744f59d16c31ff68dd3324e1b0342b2656b90a72b", 0xae, 0x10001}, {&(0x7f00000005c0)="f0d13ce982016bfd21a0d6f77fc382c56308593b09114c8e25407a15e07102e1853e98e4529bce90eaa4ef021dbe2045946bd80ce5eedc7f8dd4a6bbc73d4072", 0x40, 0x10000}, {&(0x7f0000000600)="2529aa56957d9856a03219f89af34dda4386326c2b36b66bc1cfaffcd20dfb16d0b2fc5c08d116112018da2d96d5dd156494d9f6ce20dc4d957797a0f7f848b1c74ef5c5b441f5f18341161f3439ca8b02df800c98b233aae8492599bce15ae4a4f8a6cc546745b326cfd8cc61862c72d184e5188591059e1f9dc0a81ce8f8e7fb9a9c1b42c5e94eead6bf62136de9d764db64c16ee6eba2b464185b3d01d09b9318a5016fc0f677e5dcbd110ef7d42f0c5174fd62f8105452bf8545c95d1a67dda90a289ca140833dc68fd693489fd71258cf2aa6ce737aeae586d69f33e27efd8a", 0xe2, 0x7}, {&(0x7f0000000700)="554faafe10f73104eedecdb3cb11ca751b77607c9012140370d5a6b1840ce4806d13a6736a5884a23c001ff96391b8f2bb4044a17654ac0943af561b41dd3a8130d6d2fca9d9bbd217f813dccab77ca386e478ef4c8d7ab385902fde85f01c818b66365e64aa4c", 0x67, 0x9}], 0x20000, &(0x7f0000000840)='selinux\xed+\\&\x00') statx(r0, &(0x7f0000000140)='./file0\x00', 0x7100, 0x16, &(0x7f0000000180)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:17:27 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x06', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:17:29 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:17:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x3000000, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:17:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="2f6465762f6e756c6c623000ffaaff7f83fb3ace60d223d28e8234f1614c0739b8d62844d5342eac4aedc0c230edbed7202d"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xcdff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f00000000c0)={0x6, 0x5}) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r0, 0xc0385720, &(0x7f0000000140)={0x1, {0x0, 0x989680}, 0xfc17, 0x2}) 23:17:29 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\a', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:17:29 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x0) 23:17:29 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x9b00}], 0x1, 0x0) 23:17:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="2ecd3f696c650000"], &(0x7f00000002c0)='./file0\x00', &(0x7f00000003c0)='hostfs\x00c@\xf2\xe1%p\x156;.\xcb\x83\x05\x8c\xf4d\xad;(\x97\x1e\xbb\xbb\x10\xec\xbdY\xe5\x95\xf1<>3\xd5\x83$\xf9\f`\x83\xb5>\xcb\x10\xe8ch\x83\xdc\xd3\xf5\x15\xfe\'u{\xa6\xe2\x05\x99\xe5\xd43b\xa0u\xb3\xa4\xb1?\x84\xd5}:3/q\"\x0f\x81\x82\x98\xbe]\xb0H', 0x1040000, 0x0) 23:17:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x4000000, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:17:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x9, 0x100) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000240)="3aaff636f4e6d82372810bd144e6f25f", 0x10) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x82, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='security.capability\x00', &(0x7f0000000180)=@v1={0x1000000, [{0x9, 0x9}]}, 0xc, 0x3) 23:17:29 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\b', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:17:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x5000000, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:17:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=@sr0='/dev/sr0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) syslog(0x4, &(0x7f0000000140)=""/174, 0xae) 23:17:32 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:17:32 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\t', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:17:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x6000000, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:17:32 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0xad0276b6390b9c89) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x0, 0x2) ioctl$SIOCGETNODEID(r0, 0x89e1, &(0x7f0000000000)) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000180)) 23:17:32 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x0) 23:17:32 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x5528aec0}], 0x1, 0x0) 23:17:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x7000000, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:17:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x2000, 0x0) recvmsg(r0, &(0x7f0000001440)={&(0x7f0000000140)=@caif=@dgm, 0x80, &(0x7f00000013c0)=[{&(0x7f00000001c0)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/98, 0x62}, {&(0x7f0000001240)=""/240, 0xf0}, {&(0x7f0000001340)=""/103, 0x67}], 0x4, &(0x7f0000001400)}, 0x40012140) faccessat(r0, &(0x7f0000001400)='./file0\x00', 0x9, 0x800) ioctl$KIOCSOUND(r0, 0x4b2f, 0x400) 23:17:32 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\n', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:17:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:17:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0xa000000, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:17:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x21, 0x0) 23:17:35 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:17:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x3f000000, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:17:35 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x10', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:17:35 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x0, 0x2) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000180)={0x3e, 0x4, 0x6, 0xb, 0x5, 0x81}) mkdir(&(0x7f0000000000)='./file1\x00', 0x20) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$PPPIOCDISCONN(r1, 0x7439) 23:17:35 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() creat(&(0x7f00000002c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3f) creat(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) unlink(&(0x7f0000000100)='./file0\x00') fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x0) 23:17:35 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x7ffff000}], 0x1, 0x0) 23:17:35 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)='udf\x00', 0xce02, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x40000, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000240)={0x0, &(0x7f0000000140)="0e7f4e9815f56535f0c4b14411dc84acf18dd0dc5f65424590f0435c9f1815667bfe08091c7a4e26b509ab452bcb061d15e1ce32d47c19f8d5cfda0268c0219c2b862ab55fc21e5ffa9fdf925073ad08d5eacc5b6fafe611efbec7cc3f6e233b82169767af6568194ee2ec4cbe81da49de67058d0001df0b583ec0bb775079139a32c6ee6bda941dec8419855c10a79952425df2bf3b0a1821b4bc1683bf6b47da4ad3abfdbbda1531f95294bcd9e4eb0484d4ea9a5a9eed2ec1c4907719e5c25d90efbd1fb065992d232dce2c881be80fc6e12ac7"}) 23:17:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x40000000, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:17:35 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3#', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:17:36 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2fb267947675"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000000)) 23:17:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x48000000, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:17:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="248ad5b6f8d2393e6f77297d4130377e924baeb4048d7c229ad0ab263da2e53c7f0cd7fb324b3c90a93ed103a2df4c8f1b410f06740b3cc773dceb0aed7811539a9dc8a9704d4ef5ead8f5d8bd88e1dad6b58eaf53ef21b08b2f9336a6e2b8a0"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f00000001c0)) 23:17:38 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:17:38 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x38) mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x8000, 0x0) 23:17:38 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3-', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:17:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x4c000000, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:17:38 executing program 5: 23:17:38 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x2, 0x0) 23:17:38 executing program 5: [ 480.074142][ T2481] block nbd1: Attempted send on invalid socket [ 480.081045][ T2481] print_req_error: I/O error, dev nbd1, sector 64 flags 0 [ 480.092921][ T2481] block nbd1: Attempted send on invalid socket [ 480.099562][ T2481] print_req_error: I/O error, dev nbd1, sector 256 flags 0 [ 480.107585][ T4437] UDF-fs: error (device nbd1): udf_read_tagged: read failed, block=256, location=256 [ 480.121031][ T2481] block nbd1: Attempted send on invalid socket [ 480.127309][ T2481] print_req_error: I/O error, dev nbd1, sector 512 flags 0 [ 480.135004][ T4437] UDF-fs: error (device nbd1): udf_read_tagged: read failed, block=512, location=512 [ 480.158128][ T2481] block nbd1: Attempted send on invalid socket [ 480.164472][ T2481] print_req_error: I/O error, dev nbd1, sector 64 flags 0 [ 480.172914][ T2480] block nbd1: Attempted send on invalid socket [ 480.179294][ T2480] print_req_error: I/O error, dev nbd1, sector 512 flags 0 [ 480.186785][ T4437] UDF-fs: error (device nbd1): udf_read_tagged: read failed, block=256, location=256 [ 480.205664][ T2480] block nbd1: Attempted send on invalid socket [ 480.212316][ T2480] print_req_error: I/O error, dev nbd1, sector 1024 flags 0 23:17:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x68000000, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:17:39 executing program 5: [ 480.223460][ T4437] UDF-fs: error (device nbd1): udf_read_tagged: read failed, block=512, location=512 [ 480.242383][ T2480] block nbd1: Attempted send on invalid socket [ 480.248819][ T2480] print_req_error: I/O error, dev nbd1, sector 64 flags 0 [ 480.265595][ T2481] block nbd1: Attempted send on invalid socket [ 480.271864][ T2481] print_req_error: I/O error, dev nbd1, sector 1024 flags 0 [ 480.279560][ T4437] UDF-fs: error (device nbd1): udf_read_tagged: read failed, block=256, location=256 23:17:39 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3H', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:17:39 executing program 5: [ 480.341187][ T2481] block nbd1: Attempted send on invalid socket [ 480.347391][ T2481] print_req_error: I/O error, dev nbd1, sector 2048 flags 0 [ 480.355191][ T4437] UDF-fs: error (device nbd1): udf_read_tagged: read failed, block=512, location=512 [ 480.375739][ T2480] block nbd1: Attempted send on invalid socket [ 480.382068][ T2480] print_req_error: I/O error, dev nbd1, sector 64 flags 0 23:17:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x6c000000, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 480.399119][ T4437] UDF-fs: error (device nbd1): udf_read_tagged: read failed, block=256, location=256 [ 480.434911][ T4437] UDF-fs: error (device nbd1): udf_read_tagged: read failed, block=512, location=512 [ 480.462261][ T4437] UDF-fs: warning (device nbd1): udf_fill_super: No partition found (1) 23:17:41 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbe"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:17:41 executing program 5: 23:17:41 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x40, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, &(0x7f0000000580)=""/83) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2146993000000000d966698d"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) socketpair(0x0, 0x7, 0x401, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x40000, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0xcea, 0x3, 0x7, 0x8, 0x0, 0x2, 0x4400, 0x8, 0xfffffffffffffff8, 0x3, 0x1f, 0xff, 0xfffffffffffff801, 0xffffffffffff73df, 0xffff, 0x9, 0x1a, 0x0, 0x7, 0x8, 0x5, 0x6, 0xb9, 0x53, 0x9, 0x400, 0x20a000000, 0x3, 0x4, 0xfffffffffffffffe, 0x9, 0x80, 0x4, 0x3ff, 0x7fffffff, 0x4, 0x0, 0xc8, 0x5, @perf_bp={&(0x7f0000000180)}, 0x400, 0x2, 0x9, 0x3, 0xff, 0x30, 0xc57}, 0x0, 0x4, r3, 0xb) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000200)={&(0x7f0000000600)=ANY=[@ANYBLOB="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", @ANYRES16=r2, @ANYBLOB="00082dbd7000fedbdf250300000004000500"], 0x18}, 0x1, 0x0, 0x0, 0x10}, 0x1) r4 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x204180, 0x0) pwrite64(r4, &(0x7f0000000440)="bee84c304dd33b746dab304fb358bf28891e4c30ecfd8d35fb59be311adaf4299a33b652d2749557d96f3a5fb2418e18247b82caf38737604a29a576866f525da1b024940d019260fc436dd1de4a3ba17064735a0b3d546c0b", 0x59, 0x0) 23:17:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x74000000, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:17:41 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3L', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:17:41 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x3, 0x0) 23:17:42 executing program 5: 23:17:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x7a000000, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:17:42 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x101040, 0x40) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="008000000000a98e00000000000000000083"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0xce02, 0x0) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='udf\x00', 0x4, 0x3) 23:17:42 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x38) mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x8000, 0x0) 23:17:42 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3`', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 483.333469][ T4898] e Filesystem requires source device [ 483.344437][ T4915] e Filesystem requires source device 23:17:42 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x480, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x2, 0x5, 0x5, 0x7}, &(0x7f0000000200)=0x14) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000240)={r1, 0x2}, &(0x7f0000000280)=0x8) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000180)={0x3, &(0x7f0000000140)="bf0719b3f1c5ce8f297833099c2bfc6426f082dab57f00be88f3fddf05c5f6707eb36c380cbeeddd45bfd3f2b631de7d87e636e2923bfa2d6c3336"}) [ 483.499911][ T4995] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=256, location=256 [ 483.513880][ T4995] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=512, location=512 [ 483.531879][ T4995] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=256, location=256 [ 483.548972][ T4995] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=512, location=512 [ 483.565630][ T4995] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=256, location=256 [ 483.576054][ T4995] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=512, location=512 [ 483.586666][ T4995] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=256, location=256 [ 483.599354][ T4995] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=512, location=512 [ 483.609300][ T4995] UDF-fs: warning (device nbd5): udf_fill_super: No partition found (1) 23:17:45 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbe"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:17:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x2000000000000, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:17:45 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) r0 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000140)={0x9, 0x4, @name="094e2d7c3952b9b69ee5359469ae1d68d9d26ac37d4295ed690232229e2a6485"}) 23:17:45 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x38) mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x8000, 0x0) 23:17:45 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3h', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:17:45 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x4, 0x0) [ 486.271303][ T2481] nbd_handle_cmd: 14 callbacks suppressed [ 486.271428][ T2481] block nbd5: Attempted send on invalid socket [ 486.283451][ T2481] print_req_error: 14 callbacks suppressed [ 486.283463][ T2481] print_req_error: I/O error, dev nbd5, sector 64 flags 0 [ 486.297239][ T2481] block nbd5: Attempted send on invalid socket [ 486.303595][ T2481] print_req_error: I/O error, dev nbd5, sector 256 flags 0 23:17:45 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='udf\x00', 0xce02, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xfffffffffffffffc, 0x0) openat(r0, &(0x7f0000000140)='./file0/file0\x00', 0x109001, 0x104) [ 486.313734][ T5020] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=256, location=256 23:17:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x10000000000000, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 486.370923][ T2481] block nbd5: Attempted send on invalid socket [ 486.377201][ T2481] print_req_error: I/O error, dev nbd5, sector 512 flags 0 [ 486.389565][ T5020] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=512, location=512 23:17:45 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3l', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 486.422152][ T2481] block nbd5: Attempted send on invalid socket [ 486.428422][ T2481] print_req_error: I/O error, dev nbd5, sector 64 flags 0 [ 486.437116][ T2481] block nbd5: Attempted send on invalid socket [ 486.443613][ T2481] print_req_error: I/O error, dev nbd5, sector 512 flags 0 [ 486.457828][ T5020] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=256, location=256 [ 486.476841][ T2481] block nbd5: Attempted send on invalid socket [ 486.483452][ T2481] print_req_error: I/O error, dev nbd5, sector 1024 flags 0 [ 486.495978][ T5020] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=512, location=512 [ 486.513207][ T2481] block nbd5: Attempted send on invalid socket [ 486.519664][ T2481] print_req_error: I/O error, dev nbd5, sector 64 flags 0 [ 486.528408][ T2481] block nbd5: Attempted send on invalid socket [ 486.534717][ T2481] print_req_error: I/O error, dev nbd5, sector 1024 flags 0 [ 486.546637][ T5020] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=256, location=256 23:17:45 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x8) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f0200000000000000463000"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 486.576086][ T2481] block nbd5: Attempted send on invalid socket [ 486.582456][ T2481] print_req_error: I/O error, dev nbd5, sector 2048 flags 0 [ 486.601905][ T5020] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=512, location=512 23:17:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x100000000000000, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 486.624903][ T2481] block nbd5: Attempted send on invalid socket [ 486.631466][ T2481] print_req_error: I/O error, dev nbd5, sector 64 flags 0 [ 486.644798][ T5020] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=256, location=256 [ 486.668926][ T5020] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=512, location=512 [ 486.701198][ T5020] UDF-fs: warning (device nbd5): udf_fill_super: No partition found (1) 23:17:45 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000680)=0xe8) syz_mount_image$gfs2(&(0x7f0000000200)='gfs2\x00', &(0x7f0000000240)='./file0\x00', 0x4, 0x6, &(0x7f00000004c0)=[{&(0x7f0000000280)="0a881d5db216a76312c98257173348cfb18ba69200f4f4274206bed1daef45b1b0c5d584da56ed1b8e5969d984a1b407ff7c98d81b952ee0ab990d561d998ec990eb0335d7055cf8d7cf7692a5286d6a55c93264227344ba20e6686df552f663447f8298fcc8a458816d7a9bf9e1885ab5149a290e8705eb529328e46e0670", 0x7f, 0x8}, {&(0x7f0000000300), 0x0, 0xfffffffffffffffc}, {&(0x7f0000000340)="8bf514e81039b6c4485c15858dbb372175", 0x11, 0x5}, {&(0x7f0000000380)="7d2abfda573e20e9fc4457ee5af8d12d899972cd3b7b2dc9d421e142ac76264673208eb941c779c907e4f9cab2e4c7d272386162e3d69a15629b63e9fa67832acff8ab09f2db5511cf2ae5b94a3473c121333e1e6ad78dca9c1db66d78dc6482208136b581b7bade9db37b6f", 0x6c, 0x5}, {&(0x7f0000000400)="d0517655f6380dc6220a59fe3800b2141f4b7ea4cda6768f2e4dbcbbbce92915bcc59d0f69d979c175d3b44b3584afeaf54b29454182709ea63553120ca67424bb44dfc57229aed1baddf9701b29e9d643d3142dcfb8484cf53e65fbcc937c33c5e0325c", 0x64, 0x10001}, {&(0x7f0000000480)="160f39800f613628bc0fd82a2aac19b0f138030e564aac2dfef5f8460b", 0x1d}], 0x0, &(0x7f00000006c0)={[{@discard='discard'}, {@suiddir='suiddir'}, {@loccookie='loccookie'}, {@acl='acl'}, {@nosuiddir='nosuiddir'}], [{@fsmagic={'fsmagic', 0x3d, 0xb2}}, {@hash='hash'}, {@euid_gt={'euid>', r0}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/nullb0\x00'}}]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) r3 = dup(0xffffffffffffff9c) ioctl$UI_SET_FFBIT(r3, 0x4004556b, 0x7d) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) utimes(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={{r1, r2/1000+10000}, {r4, r5/1000+10000}}) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 486.894570][ T5347] gfs2: invalid mount option: fsmagic=0x00000000000000b2 [ 486.906885][ T5347] gfs2: can't parse mount arguments 23:17:48 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbe"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:17:48 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x38) mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x8000, 0x0) 23:17:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x200000000000000, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:17:48 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3t', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:17:48 executing program 1: r0 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x8, 0x20040) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000200)=0x54) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = dup(0xffffffffffffffff) ioctl$TIOCMBIS(r1, 0x5416, &(0x7f00000000c0)=0x100400801) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:17:48 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x5, 0x0) 23:17:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000580)=ANY=[@ANYRES64, @ANYPTR=&(0x7f0000000380)=ANY=[@ANYRES32, @ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRESOCT, @ANYPTR, @ANYRES16, @ANYRES32, @ANYRES16], @ANYRESDEC, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRESDEC, @ANYPTR, @ANYRESOCT, @ANYPTR, @ANYPTR, @ANYRESDEC], @ANYRES32, @ANYRESOCT, @ANYRESOCT, @ANYRESDEC, @ANYPTR64=&(0x7f0000000340)=ANY=[@ANYRESHEX, @ANYPTR64, @ANYRES32], @ANYPTR], @ANYRESDEC], &(0x7f0000000480)='./file0\x00', &(0x7f0000000500)='udf\x00', 0x81e5a9d95eef8bb1, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) utimes(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)={{}, {r0, r1/1000+10000}}) [ 489.340986][ T5358] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=256, location=256 [ 489.355122][ T5358] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=512, location=512 23:17:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x300000000000000, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 489.407367][ T5358] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=256, location=256 [ 489.439407][ T5358] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=512, location=512 23:17:48 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3z', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 489.476224][ T5358] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=256, location=256 [ 489.505094][ T5358] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=512, location=512 23:17:48 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) r0 = dup(0xffffffffffffff9c) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000003840), 0x4) [ 489.535840][ T5358] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=256, location=256 [ 489.559014][ T5358] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=512, location=512 [ 489.595064][ T5358] UDF-fs: warning (device nbd5): udf_fill_super: No partition found (1) 23:17:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x400000000000000, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:17:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x40, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000240)={@tipc=@id={0x1e, 0x3, 0x3, {0x4e20, 0x4}}, {&(0x7f0000000140)=""/168, 0xa8}, &(0x7f0000000200), 0x10}, 0xa0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)=ANY=[@ANYRES32=0x0, @ANYBLOB="bc000000df0c54a02f6f19281bd601a8b12aed96242bee35e77b155d7808071e428727a0472905497922eb8f8c51bab8ff9eba479171eb1e3ce3bd4f2329f1c2bef49e95d557681d089ba991b5708d8494241565a6bfc5ebb9bd03d16880db9ede031234149be92f0b2e4cf618992c7e11287397a76c74b04e4db26596e7ade951fa2dde3a8f44b943ed8eb183aa838ba75d5fc6481e6763d4507796162643678bcc000000000000000000000000000000000000000000000000000000000000"], &(0x7f0000000400)=0xc4) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000480)={r1, 0x30, &(0x7f0000000440)=[@in={0x2, 0x4e23, @broadcast}, @in={0x2, 0x4e24, @multicast2}, @in={0x2, 0x4e20, @rand_addr=0x200}]}, &(0x7f00000004c0)=0x10) 23:17:51 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:17:51 executing program 5: mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x8000, 0x0) 23:17:51 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:17:51 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0xa4) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) execve(&(0x7f0000000000)='./file1\x00', &(0x7f0000000340)=[&(0x7f00000000c0)='\x00', &(0x7f0000000180)='vmnet1wlan1trustednodev\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000200)='/dev/nullb0\x00', &(0x7f0000000240)='/dev/nullb0\x00', &(0x7f0000000280)='udf\x00', &(0x7f00000002c0)='md5sum{\x00', &(0x7f0000000300)='udf\x00'], &(0x7f0000000440)=[&(0x7f0000000380)='[[&ppp1em1-@\x00', &(0x7f00000003c0)='udf\x00', &(0x7f0000000400)='/dev/nullb0\x00']) 23:17:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x500000000000000, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:17:51 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x8, 0x0) [ 492.354647][ T5704] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:17:51 executing program 5: mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x8000, 0x0) 23:17:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0xfffffffffffffffd) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/Q<\x00\x00\x00\x00\x00\x00b0\x00'], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 492.429294][ T5704] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:17:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x600000000000000, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:17:51 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x10', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:17:51 executing program 5: mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x8000, 0x0) 23:17:51 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:17:54 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:17:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x700000000000000, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:17:54 executing program 5: mkdir(0x0, 0x38) mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x8000, 0x0) 23:17:54 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x40) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:17:54 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:17:54 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x9, 0x0) 23:17:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000880)='/dev/dsp#\x00', 0x0, 0x280000) accept4$vsock_stream(r0, &(0x7f0000000180)={0x28, 0x0, 0xffffffff}, 0x10, 0x80800) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000900)={{{@in6=@ipv4={[], [], @initdev}, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000000a00)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f0000000ac0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x20021810}, 0xc, &(0x7f0000000a80)={&(0x7f0000000a40)=ANY=[@ANYBLOB="3c0000002e03050029bd7000fddbdf2500000000", @ANYRES32=r1, @ANYBLOB="f2ff02000900ffff0000060008000b000000000008000b000101000008000b0001000000"], 0x3c}, 0x1, 0x0, 0x0, 0x4000010}, 0x800) r3 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0xa, r3, &(0x7f00000001c0)='ceph\x00', &(0x7f0000000200)={'syz', 0x1}, r3) keyctl$get_persistent(0x16, r2, r3) r4 = getpgid(0x0) write$P9_RGETLOCK(r0, &(0x7f0000000280)={0x21, 0x37, 0x1, {0x3, 0x400, 0x638b5f1e, r4, 0x3, ',@-'}}, 0x21) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB='/dev/lullb0\x00'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce06, 0x0) ioctl$IOC_PR_RESERVE(r0, 0x401070c9, &(0x7f0000000240)={0xffff800000000000, 0x9, 0x1}) socket(0x0, 0x800, 0x2) 23:17:54 executing program 5: mkdir(0x0, 0x38) mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x8000, 0x0) [ 495.429917][ T5943] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:17:54 executing program 5: mkdir(0x0, 0x38) mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x8000, 0x0) [ 495.511179][ T5943] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:17:54 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:17:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0xa00000000000000, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:17:54 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x8000, 0x0) [ 495.691615][ T6064] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 495.701493][ T2480] nbd_handle_cmd: 14 callbacks suppressed [ 495.701509][ T2480] block nbd5: Attempted send on invalid socket [ 495.714083][ T2480] print_req_error: 14 callbacks suppressed [ 495.714090][ T2480] print_req_error: I/O error, dev nbd5, sector 64 flags 0 [ 495.727649][ T2481] block nbd5: Attempted send on invalid socket [ 495.733984][ T2481] print_req_error: I/O error, dev nbd5, sector 256 flags 0 [ 495.741787][ T6067] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=256, location=256 [ 495.762716][ T6064] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 495.767236][ T2481] block nbd5: Attempted send on invalid socket [ 495.777659][ T2481] print_req_error: I/O error, dev nbd5, sector 512 flags 0 [ 495.789408][ T6067] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=512, location=512 [ 495.802738][ T2481] block nbd5: Attempted send on invalid socket [ 495.809290][ T2481] print_req_error: I/O error, dev nbd5, sector 64 flags 0 [ 495.816913][ T2481] block nbd5: Attempted send on invalid socket [ 495.823199][ T2481] print_req_error: I/O error, dev nbd5, sector 512 flags 0 [ 495.830749][ T6067] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=256, location=256 [ 495.846927][ T2481] block nbd5: Attempted send on invalid socket [ 495.853296][ T2481] print_req_error: I/O error, dev nbd5, sector 1024 flags 0 [ 495.867470][ T6067] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=512, location=512 [ 495.878624][ T2481] block nbd5: Attempted send on invalid socket [ 495.885097][ T2481] print_req_error: I/O error, dev nbd5, sector 64 flags 0 [ 495.898879][ T2481] block nbd5: Attempted send on invalid socket [ 495.905117][ T2481] print_req_error: I/O error, dev nbd5, sector 1024 flags 0 [ 495.912835][ T6067] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=256, location=256 [ 495.937404][ T2481] block nbd5: Attempted send on invalid socket [ 495.943690][ T2481] print_req_error: I/O error, dev nbd5, sector 2048 flags 0 [ 495.963940][ T6067] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=512, location=512 [ 495.981603][ T2481] block nbd5: Attempted send on invalid socket [ 495.987773][ T2481] print_req_error: I/O error, dev nbd5, sector 64 flags 0 [ 495.999042][ T6067] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=256, location=256 [ 496.009004][ T6067] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=512, location=512 [ 496.018797][ T6067] UDF-fs: warning (device nbd5): udf_fill_super: No partition found (1) 23:17:57 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:17:57 executing program 1: mount(&(0x7f0000000000)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:17:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x3f00000000000000, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:17:57 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:17:57 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x8000, 0x0) 23:17:57 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0xf, 0x0) 23:17:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 498.520131][ T6178] e Filesystem requires source device [ 498.525786][ T6180] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:17:57 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x8000, 0x0) 23:17:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x4000000000000000, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:17:57 executing program 1: setxattr$security_smack_entry(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='security.SMACK64IPOUT\x00', &(0x7f0000000180)='/dev/nullb0\x00', 0xc, 0x0) r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x8001, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000200)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)='fuseblk\x00', 0xce02, 0x0) [ 498.616776][ T6233] e Filesystem requires source device [ 498.637520][ T6180] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 498.655410][ T6293] e Filesystem requires source device 23:17:57 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:17:57 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x8000, 0x0) [ 498.775988][ T6323] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 498.836689][ T6406] e Filesystem requires source device [ 498.893351][ T6323] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:18:00 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:18:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x4800000000000000, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:18:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f6465762f6e756c6c62020012e4813be6f4bb6c995aa0f9773d5e1c6ae16930a23ecec35c71bb8dfa256f45d965389af1e8c1633491b74cf7a56e09719ffb3abd68a2d19d18787cd56485ad5058f2c175449562ca404529a3c3d4ae5c824bf4eacea11f7c34b5833f"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:18:00 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nbd={'/dev/nbd'}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x8000, 0x0) 23:18:00 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:18:00 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x64, 0x0) 23:18:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) accept4(r0, &(0x7f0000000140)=@ipx, &(0x7f00000000c0)=0x80, 0x80800) 23:18:00 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nbd={'/dev/nbd'}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x8000, 0x0) [ 501.613050][ T6418] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 501.677032][ T6418] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:18:00 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nbd={'/dev/nbd'}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x8000, 0x0) 23:18:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x4c00000000000000, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:18:00 executing program 1: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f0165762f6e756c6c623000"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='c%%\xce\xe9M\x14*`k\xb0\xe1\xe4\x99|-\xaa\xf1\x10\x134\xb3\xd5\x9e>\x1d\xca\xdb\xc2\xdf\t\xd9\xfa\xefATN\xda\xceB\xe2\x94M*\x94\x9b\x1d\x89\x95\xa7\xd4\xa4\xb2P\x8f\xa6\xe1\xdfI\xe7\xce\xe8\x02qr\xbe\xaee\xcb\xba\xfd\xb5\xb4M&!\x8d\t\xe5\x81\x85\xf3\xb8\x98\x0fp\x1c\x0f\xb1\xb2\x1dSM\xab\x8b;=\xea\xa3\x16\xcc1/', 0xce02, 0x0) 23:18:00 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x19', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:18:03 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:18:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f6465762f6e756c6c62300084ad797eb4fe1bbec7836041065d68719b3210dcdc284c14890243ae51318b0bdc0cf63d9a0c43d7a51b4580b0261c396daebdcb4745ec012dd06174c6b8fef5e29dab4758d6d049afbc1f0e8c07cdc5251f5c8e809cb251b9f81f375fbea307d6afe156a97ab905f71096637d93625e32c0"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:18:03 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f0000000100)='udf\x00', 0x8000, 0x0) 23:18:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x6800000000000000, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:18:03 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x04', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:18:03 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x300, 0x0) 23:18:03 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f0000000100)='udf\x00', 0x8000, 0x0) 23:18:03 executing program 1: prctl$PR_SET_KEEPCAPS(0x8, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pread64(r0, &(0x7f00000028c0)=""/56, 0x38, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x2) sendmmsg$alg(r1, &(0x7f0000002700)=[{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000280)="cd4a6ace9d21947d6186fc4671e1eef6f4b0595b33c616059ee25249f85f34c45107cfbdee64878d8bfa2718c66fb64d2987b86e3984e2a69c2a1dbcd8c9731cf30dc6f54ef60515fa25a56f38e1a0868269f9f50b40e81f06d981dc7a4c927e378117c7bcd558", 0x67}, {&(0x7f0000000300)="e843332832e0525123c05e633308446fdc09f22a03483a29601f043ce61674dfa2f16bb3175fddf4963180dfddeaee3495067e05f59a50a61de754108db2528dbd270584a32acacdace7725e28954e5bea77a5e746cbab5e3dd8f46ea3d3982f12983217a142348994c4561ee4c21c01cecff929c29235db62ce102f26bcba6982dd2e43aca6253af2bd8e3843c60c6cf0a6c70b31f784e6d62bcb02b71738dddd07240bc19ef81465ebeb9d89b3deb40cfab2f1c227909999a7705d2682b67fc7ebc6260a26d5653c82", 0xca}], 0x2, &(0x7f0000000440)=[@op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18}, @op={0x18}], 0x60, 0x4000800}, {0x0, 0x0, &(0x7f0000000780)=[{&(0x7f00000004c0)="8e72aa545eb5e834b4f3c0f5354628668bc1fbd18536cf9087e4cc870a14c51894cf6e661d84691e54ef37d47550ce58efa957eabc992e290da838e583a08cb4f41ec4bccc9247c0e835545c7a1f71b03438ef89a214cf5b1c0313d7101293931a8f771fd63ba6a9d53386e72bd8fcad1b03b0c453c1e8f9491bcb14be1919e038b46b8450ffffd1d9b0574cb52391c887cdee0c5f3e7d34389e5adfe2dbc9f689aaf489cb02b3ba8f70dff13ce544ccaf49cee2e1d8da8f50e4d0f9c7ad9c5a7069833e81028e18d6d5ceb804a193ab00cb2e68144834b96ea817b0be463358f5e0da4eca95a64f7e0b788f35ded870a13873", 0xf3}, {&(0x7f00000005c0)="3d264b25f0614079d1f9a555aac92c655b675c3819723a6b5c28656f61a0480f0e44687b09c6931898725febf6c0228d058c7fec6b5912053cdddf0385bb90a53cd757d8d2dd70a06d8b31b81c73deca5f237704ae4edfa846fcecd6be4b3f358c3ccb291d736253a04d2b81ca6dc1242b9617f25b0a49dbfbd7c743c25872275e670738678f2b9ab4059f4507f9fe7d2208fd8602e1889ebb0b4ceccbcb6244963051b98d413ae9b998468cc2895c065b6588482c0c317099f0fc0e4e1e5398af9a2ced98754098d0bb71968f9a8d4016b383bf87a492f7c0348d870bc5720a97526ff4ba91d5056f62a4298ec09d", 0xef}, {&(0x7f00000006c0)="c99e", 0x2}, {&(0x7f0000000700)="28c91086398c8173048864deb64f3e9ca1ce7e38ad6a6bc6d0c668f14edc08991d56d81db01649c141ca4753fac2cd50ee7756da56318831e2a8b5b4c6a18b7d12df843885f51c9587ca881f0d8f10b179c243ff7f6d2b4a0f7acf15d23e49d2375e276693183764778977", 0x6b}], 0x4, 0x0, 0x0, 0x20040000}, {0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f00000007c0)="1c00286a402f8b1e53ba8bba2b0f275250a391b5b27ae479661f0ef38fa635a9dfdddb45b2573e0cdddf", 0x2a}, {&(0x7f0000000800)="aff630c4922ca62fb1366c85821552af2911a9985da9057f65a5150761ac9aeed03616659d2c6178689c203d1fc404b380732d2459fa4184ceb2d4c34d3d45ecbf215ae25b76395fcf4fd346beacd7f9e8f80c5cc571dc7102c7406fb566cdf62f9336edff1b23e3a0247db2af341e53bb7bc2588427be17d4bea88b24e06d7ec707904c43a15f174cc248a4b63578c742a1ee974b5059a11c22b2c66ee39a772209bf", 0xa3}, {&(0x7f00000008c0)="9b175ecb7660d2b06ad56513d4bfb23cd74893979dc4ee8aea637c73c1571b8835c6f505337ec3a330037c105d449cc0dee6b0c1de16fe0aea0144cf37732b0f6cd2bb3951b16b52fd1a1605e875dea91e359fe63e8c6b5becd3932cf13a8519b39d8b291c", 0x65}, {&(0x7f0000000940)="86235ccc6a0e8ef24f1d345f854c2dc8113f86e75ce8ceeae6d0a88319785b01fac66f9ba3d88ac8c3796ac4a66a181a9bcbf642cb9f4cb76248bd3641005d0242e432c71b59607e7f36e6d1", 0x4c}, {&(0x7f00000009c0)="7ab724e5b4c36ea15ba12e2a90087b596eff1483f11c93f35a80ac2ccc31af2248251a610a9a16f034c2ea056d33e823f59cdf1557a11e8c5954e3d6d366da9c7669054e4d6660a2e3a2c895d6b387cbdd463ea1b0c95d357b6865b52d9fe2889bc1f10ef19548c33aa0b5ffe2d63965bd092211e6de8728e1f02715d20ecd9c197c4eb492591e85670732e0728e2f057661c45876586955d4c521985dc4cec44bd7359f0c227efda8323d432ef6ef052e9eec5201573c4affe9c86fca73eeb4dc73ecb77403cf851869f78910f3330ec99d7fd5b0045d10382b165bc7d6d303162d0aee", 0xe4}, {&(0x7f0000000ac0)="693f7b3e5de32bc6790caa4201a022a87b916ab986ca1321fb50a6f2db638bae8506ae306d5256b372372ae1358e4c2118a6db07d440986a28f35ccf4a9a57b9bf54d2e9484d0a", 0x47}], 0x6}, {0x0, 0x0, &(0x7f0000000dc0)=[{&(0x7f0000000bc0)="1132b9919dd931812569e25c01703afd94c6b92432aa192486736f52fe5aa92bd17e54a590d64668ee99d475d2d79ec878595f088a33e04e16a7ee7c6cd149196f82527573a86efa1ad33bd029a133222988f93ce95d76c40314e1beefa32aa56edf0824549338fd139fee84ce17bc29cff0eb23ec0fbe967f2f203c4974cbd5bad4f1c5d4e0f2e57af0921b5f135872c47fc6dfcea3493691e5e0f0fd14b99f8f64fe19b96727f13ef8cbe24f0d232f6c7c0be64fad79422600304410d637caf187741a249b6f962166df3d6ef2daa7c22e2ef6e3a247916d817303be457119a0d524e290f29f847c8476b0c991771a0bfe76", 0xf3}, {&(0x7f0000000cc0)="b9f36b22bacc6bee72e18282ce3caeefb8226b10f3f1e85a2f7aab737a76c7dfda8e83684d14231cc99a7b14fca0f56306fe9e3e985506c2c84a8773ac7f3598529fd7edad5767ee6a9123f9058cd5bbe302973bc1508706e83a4e326c57e3a79092f0b6b25028cbbfc07b7d6bcf0f5037123b6c1a2f0c5604cc8811a89dfa081b04db59de8f359874f2a53756a1518cf1463240212f2edebc8f105b89f1a8aa1a58a38312a3023e9b8154b4a6dbb1dd71e6500d33958256333e069696df8c48972c679fbd2359a7767804329da344147c3d8dfe36d0503254347323c4b7491b8b75c5c052313ec62f24a7acf7", 0xed}], 0x2, 0x0, 0x0, 0x40}, {0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000e00)="15f7310acdadf38325ad4d1a044c60cdee87533615d24b61c1bd0a992ca88e5735dc20fdc02b20d9b5312f1652f4910a02aa0c162d0141db00d5de2a5a2877aeca4fa129456af34b167935c820cde453e3e0f1637a80bfcd037a9333bdf8f2bea82ae6f6e34ed9df0c572a92e150dfb5faf96c07c309311428b6fbd213b3c062c8548635a29e792975be86abbf1889b582d64bdcb6387441700a9eafceb067d361ed4b043fe0d531da08ed21bd8e0178f82c1262d1fd9917a5342bde543c443560", 0xc1}, {&(0x7f0000000f00)="f1903828a174fb31cc2238adfba21e0fbbeb73c445aacb56238b3b16d04569f0568ab302abfb6dae3a80441c080e0965e999983b01056557dcb1459739f3a46e8bc6420b8c22e14fd26b403161", 0x4d}], 0x2, &(0x7f0000000fc0)=ANY=[@ANYBLOB="30000000000000001701000000000000150000001a7463a519fc535983fd5b045e1d647fc4a3e8be3a00000000000000980000000000000017010000020000007e000000c52227649518e5c79070d7970e53c1e76cb2c5d93b0d11a4896d6d57522d186ee9c76b25c50cd55c92cf93fdac78e95e5b6eefdf67e7046e79c16e9d4d0029ff64a02aadb433913d910278671d84c9aa0e30a66de77e8be90ba2ab1e48e636cf8afd436883d59702802714fc1e00c6da52000949f85becd1c6e047f74c07000000000000"], 0xc8}, {0x0, 0x0, &(0x7f0000001380)=[{&(0x7f00000010c0)="159cb8347144af714495e9b2475f7ebab4a42aa995ebde2f7c0704f5db42741d00e0703bdde11560d8793d7984b4c6adb5f38ec92003a9e55923af08757cbf91a817a549dd3c8edd695f01ac186a92569244b294a48878fadef0e0188da84b493ca3b3f1dc3014e454c2746f683bf310b0cfac46dc03633c55facffb018ea2026278fc0231e6f50a2d6fd3fa954a284d", 0x90}, {&(0x7f0000001180)="053598e940928716915972d1dacf683585db4fc67ea5da83e1f975f372ff58813f1dad01f8d9b74de3c126f43932663036cb08caf68e801c41c0286ee0536af3c3318fba1116d4acb83dbd9ae8bf67e9e181", 0x52}, {&(0x7f0000001200)="5ee49ad99e6dadedc8e219f95ddd1cece519be33f16cc4791bbad441747bb544f9f447fd4c7bca9f6af4a90f5f0425ff50fa90e21e4e2288ecc8cce0a467fe91f0dfd0587c10e413972a552ec288a02dea8efb13c5606bff21f7649867cfd25a4d2c849c547abca066d9f2ad37fef91dde", 0x71}, {&(0x7f0000001280)="be7b3b90f0a9eae7bf83ddb53f1350a421db99db82654527ed0efc371d02be168e77f6de83741456123227ef77", 0x2d}, {&(0x7f00000012c0)="65f1e42db66523f86fdf21754f4978e203fb33c2e6", 0x15}, {&(0x7f0000001300)="6b8c749b852ac00a35c7fd971cdaf558672b2132bed63c283d299a7a8819cde5e536a954515cb5a9e8204459b9f60918f406e5077554a343a5564153a7e3dacb5a40e37cf98286729279caab8d49d45739d40392e048ac05", 0x58}], 0x6, &(0x7f0000001400)=[@op={0x18}, @iv={0x20, 0x117, 0x2, 0x9, "55064b4187ae135954"}, @assoc={0x18, 0x117, 0x4, 0x67b}, @iv={0x1018, 0x117, 0x2, 0x1000, "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"}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0xffffffff}, @assoc={0x18, 0x117, 0x4, 0x5}], 0x10b0, 0x4000}, {0x0, 0x0, &(0x7f0000002680)=[{&(0x7f00000024c0)="58e783294fa781999b4729c7d9d55ffb2a6925d150385e94a135fa0e146640dac8634bfbc20eeb106477dcafbd29d7a192a259d99d283f451a32b1887b6a1ed5495c8c25dd3ef4726a2ffa6f41e364d0e705066dfd84a2898edf0e27ff06d0cb5f0f16df98003afdea81911acf635ecbf51793088586603127f0ed9235d2aed7347c399bdf611647c17fdcfe117c399ad1a3c031377dfbb4b55e02fd320dfb6861eae3052c8e9bdd785b2e073da9f861ff535b942864efdeeb0aa05541d6", 0xbe}, {&(0x7f0000002580)="ad89d9f4a4991caada6cbdac97b19244fc11306ad0d7226acc1544c476a66d4214015f296143be67cc9fb6f5ea5f566097b72fd56224ee909d0ca8aead9a7eaaeca96a868590df60", 0x48}, {&(0x7f0000002600)="f3791dd66107e66b78eb5c44dc3f1b7e99ab9119150b2e8d494b10eaf252a786a39e9fa279a3adeb7a4305b34f1e895478d4a78477b031401da36f6cc7667c2cdef25d17fa399f6e259114d8e919d2409f2ee9624def5b992f27df81adb032c15a9a26e97d53798feadcd96567d25d441d17", 0x72}], 0x3, &(0x7f00000026c0)=[@op={0x18, 0x117, 0x3, 0x1}, @iv={0x18, 0x117, 0x2, 0x4, "448a207e"}], 0x30, 0x800}], 0x7, 0x0) statfs(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/230) 23:18:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x6c00000000000000, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:18:03 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3 ', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:18:03 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f0000000100)='udf\x00', 0x8000, 0x0) [ 504.837535][ T6768] e Filesystem requires source device [ 504.876334][ T6770] e Filesystem requires source device 23:18:03 executing program 1: mkdir(&(0x7f0000000140)='./file0/../file0\x00', 0x3) mount(&(0x7f00000000c0)=@filename='./file0/../file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:18:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000340)={0x2, 'hsr0\x00'}, 0x18) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$nl_generic(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="200000001100000127bd7000fe2518df00000c008b0070707030000047289b75ef4cc80e0000"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x8004) setxattr$trusted_overlay_origin(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x1) setxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=@known='trusted.overlay.origin\x00', &(0x7f00000002c0)='\x00', 0x1, 0x1) mknod(&(0x7f0000000180)='./file0\x00', 0x1000, 0x1f) 23:18:06 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:18:06 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000000c0)='./file0\x00', 0x0, 0x8000, 0x0) 23:18:06 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x0f', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:18:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x7400000000000000, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:18:06 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0xf000, 0x0) 23:18:06 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000000c0)='./file0\x00', 0x0, 0x8000, 0x0) 23:18:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_extract_tcp_res$synack(&(0x7f00000000c0), 0x1, 0x0) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f6465762f6e756c6c62300034606bffd302a99fff228895740a4e9384e17810619790c89ed1e91c5f3889228f1136b9aef23068a0af0621478a3776b33e7be4a7ce500aba11e0ec266ae0c06f9ae2e0404ea2c8ba18895b2e0043a3bfdefc65a9e9e1ba454c7511662bae9ef11d09600259cdb874579880b2090cdcf3d223609bd071f383a03477a3105c7ab519d9b8a386fbc427452c185a12bde5e9dbda73eb07f03b927957a7183f1efa000bf8e178add25e2d62e5c83def92f9b3c97ea2883c5c6598faf015792f916904c9e70856b352ab32a123825852"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:18:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x7a00000000000000, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:18:06 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:18:06 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000000c0)='./file0\x00', 0x0, 0x8000, 0x0) 23:18:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) ioperm(0x4, 0x4, 0x80000000) [ 508.093125][ T7062] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:18:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0xffffffff00000000, 0x1000}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 508.177708][ T7062] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:18:09 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f66db"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:18:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f6d6d35126e300000000000"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:18:09 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x0, 0x0) 23:18:09 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:18:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x300}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:18:09 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0xfffff000, 0x0) 23:18:09 executing program 1: mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x2000, &(0x7f0000000180)={[{@index_off='index=off'}], [{@measure='measure'}]}) [ 510.859889][ T2481] nbd_handle_cmd: 2 callbacks suppressed [ 510.859905][ T2481] block nbd5: Attempted send on invalid socket [ 510.863003][ T7239] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 510.865648][ T2481] print_req_error: 2 callbacks suppressed [ 510.865657][ T2481] print_req_error: I/O error, dev nbd5, sector 64 flags 0 [ 510.894927][ T2481] block nbd5: Attempted send on invalid socket [ 510.901250][ T2481] print_req_error: I/O error, dev nbd5, sector 256 flags 0 [ 510.908843][ T7237] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=256, location=256 [ 510.938980][ T2480] block nbd5: Attempted send on invalid socket [ 510.945270][ T2480] print_req_error: I/O error, dev nbd5, sector 512 flags 0 23:18:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f64656811b3662f6e87ff8094a658f6756c6c584e2aaeda5039f251cc733e6f1cfa92c0e2f4814de6c42e177b220361ca5826230a024fb4d416f2c2060053ed9dd38bde976f8a8197665d4cb0a5b593460fed83353cf140149d3d2363cd2823f3e89b06a6063541fdbb6256aadaa602b9fb1ebc80ff8368b6b2e0e95feea0311177625a889008913afd723f41b5d112a21d4fe9e3906b350d4fbe8e3d63b38fbaef76be766f174eec761f57854a7a24be2c8d0d162167a35e2c25d33857d03bd517b6d0bd9174a838728bcbf240cddd7251a298b868b06e8edead9bda"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:18:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x500}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 510.952991][ T7237] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=512, location=512 [ 510.969543][ T7237] UDF-fs: warning (device nbd5): udf_load_vrs: No anchor found [ 510.984726][ T7239] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 511.000548][ T7237] UDF-fs: Scanning with blocksize 512 failed [ 511.022900][ T2480] block nbd5: Attempted send on invalid socket [ 511.029190][ T2480] print_req_error: I/O error, dev nbd5, sector 64 flags 0 [ 511.054440][ T2480] block nbd5: Attempted send on invalid socket [ 511.060928][ T2480] print_req_error: I/O error, dev nbd5, sector 512 flags 0 [ 511.068281][ T7237] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=256, location=256 23:18:09 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x10', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 511.093816][ T2480] block nbd5: Attempted send on invalid socket [ 511.100172][ T2480] print_req_error: I/O error, dev nbd5, sector 1024 flags 0 [ 511.114229][ T7237] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=512, location=512 23:18:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="0fe75a3adda94c31fa9f4067945c917125634fd65cac67643883539c31ff918f33fa2e47a2172ecf2dc681947e238286"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce05, 0x0) [ 511.138270][ T7237] UDF-fs: warning (device nbd5): udf_load_vrs: No anchor found [ 511.154862][ T7237] UDF-fs: Scanning with blocksize 1024 failed [ 511.173677][ T2480] block nbd5: Attempted send on invalid socket [ 511.180067][ T2480] print_req_error: I/O error, dev nbd5, sector 64 flags 0 [ 511.194297][ T2480] block nbd5: Attempted send on invalid socket [ 511.200982][ T2480] print_req_error: I/O error, dev nbd5, sector 1024 flags 0 [ 511.209394][ T7237] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=256, location=256 [ 511.241440][ T2480] block nbd5: Attempted send on invalid socket [ 511.247690][ T2480] print_req_error: I/O error, dev nbd5, sector 2048 flags 0 [ 511.256463][ T7237] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=512, location=512 [ 511.281630][ T7237] UDF-fs: warning (device nbd5): udf_load_vrs: No anchor found 23:18:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x600}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 511.302694][ T7237] UDF-fs: Scanning with blocksize 2048 failed [ 511.326698][ T2481] block nbd5: Attempted send on invalid socket [ 511.333059][ T2481] print_req_error: I/O error, dev nbd5, sector 64 flags 0 [ 511.347780][ T7237] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=256, location=256 [ 511.376174][ T7237] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=512, location=512 [ 511.437919][ T7237] UDF-fs: warning (device nbd5): udf_load_vrs: No anchor found [ 511.478396][ T7237] UDF-fs: Scanning with blocksize 4096 failed [ 511.494932][ T7237] UDF-fs: warning (device nbd5): udf_fill_super: No partition found (1) 23:18:12 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f66db"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:18:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x2, 0x2a00) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000140)={0xff, 0x7ad}) 23:18:12 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:18:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x700}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:18:12 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x0, 0x0) 23:18:12 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0xfffffffe, 0x0) [ 513.902760][ T7577] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 513.920843][ T7574] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=256, location=256 23:18:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) r0 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x6, 0x10400) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000140), &(0x7f0000000180)=0xc) [ 513.975603][ T7574] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=512, location=512 [ 513.990246][ T7574] UDF-fs: warning (device nbd5): udf_load_vrs: No anchor found [ 514.002901][ T7574] UDF-fs: Scanning with blocksize 512 failed [ 514.010308][ T7574] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=256, location=256 [ 514.020474][ T7574] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=512, location=512 [ 514.030454][ T7574] UDF-fs: warning (device nbd5): udf_load_vrs: No anchor found [ 514.053004][ T7577] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 514.062137][ T7574] UDF-fs: Scanning with blocksize 1024 failed 23:18:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x900}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 514.074630][ T7574] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=256, location=256 [ 514.107552][ T7574] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=512, location=512 23:18:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f6451080000756c6c62300054c32fac7e5242b148df8da5cf70974a40a761de50118be7639aef21edc368e1c5303e98e4309312e58ee98b4580e5f53cba17af8aa1d7adcd06219019a30a113bcde96a331a468b76cddee63c2b34cd5a80d561590b303f8795d2a8033b80120df69bff617bd18c28fbf4e33d27d06afaf18435c7132bbb7c9afbf11796a1f0efd0374d1542d78a76e435bf76a3f96462924447f1d672212e3898221eb1c9"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:18:13 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 514.138781][ T7574] UDF-fs: warning (device nbd5): udf_load_vrs: No anchor found [ 514.168022][ T7574] UDF-fs: Scanning with blocksize 2048 failed 23:18:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/dev/nullb \x00'], &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)='. 3\x0f<\x8f,3\x9b\xectz\xcd\xeb\xe2\xb4T\xfd\xbf}\x1f\x83\x9b\xd3\x1d0\xb4\x8e4\xf1]|\xca\xc93>\xbfm4\x90\xfd\xe4\xf6\x17\xc4(`V\x98\x9d\x0e\xe4~,{\x15e0\x16z\x9c`\xc9t\xa4k\x86\'N1y\t\x122\xe0?\a\x04\x94\xcf[Y\xdc#\xde\xeb8T\x16\xaa\xb1\xc1\xd4-\x8e\x01\xe3O>\xfc\x1dc\xec\x8cTVSz!Dz\xd7[\xac\xf40\xeel\x14\xa3\xe8\xc9j\xdf\xde?3\xca\xd3V2\xb7\xa6\xa4\xde\xcb\xb2t\xb2\xcf\t\xdd\x85\xbdvu\x95\xf1\x9d\f\x1e3\xb4Y\xc7\x050\xce\x9dl\'\xb6\xb1\xaa\xa2Azn\xf23J\xa2gJ^.\xaf\x86\xb2a\xa7.\xb4\xe2.\x1c\xd1BE:\xd5F:\r\xaa\xcb\x1f/\x81\x03\f\xf6\xb6\x1a\xbf)\x90\xe7\x83ny\xee\fY\xce\xb5i|\x0f\xbd3\x99\x00\x00', 0xce02, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r1}, 0x248) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000480)={0x0, 0x80000000}, &(0x7f00000004c0)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000000c0)={r2, 0xfffe, 0x576}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000180)={0x0, 0x5, 0x0, 0x0, 0x40}, &(0x7f00000002c0)=0x18) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f00000003c0)={r3, 0x2, 0x2, 0x100000000, 0x7, 0x80, 0x883c, 0x14, {r4, @in={{0x2, 0x4e22, @broadcast}}, 0x1, 0xfffffffffffffff8, 0x1, 0x2, 0x2}}, &(0x7f0000000340)=0xb0) [ 514.200852][ T7574] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=256, location=256 [ 514.242552][ T7574] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=512, location=512 [ 514.270047][ T7701] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 514.278896][ T7574] UDF-fs: warning (device nbd5): udf_load_vrs: No anchor found [ 514.295885][ T7574] UDF-fs: Scanning with blocksize 4096 failed [ 514.304092][ T7574] UDF-fs: warning (device nbd5): udf_fill_super: No partition found (1) [ 514.330644][ T7701] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:18:13 executing program 1: r0 = getpgid(0x0) ptrace$setsig(0x4203, r0, 0x0, &(0x7f0000000140)={0x32, 0x310, 0x1}) mount$9p_unix(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000200)='9p\x00', 0x12000, &(0x7f0000000240)={'trans=unix,', {[{@privport='privport'}, {@fscache='fscache'}, {@access_any='access=any'}]}}) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="2f37f0e11e495282a4ab8f4e125c55e32c01f5d264a658d8357b35880efc73b7fe98895c77be7b6c9ceba55efce0e92550497a24df5f64d76d1f3195d1e5d5d9f33bff44938ef367ff25d4bd51e96f748cd5017083552d062b555c020060c3a69b4930c81dbbd27ea777430a010600fe"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0xa002, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0x2) 23:18:15 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f66db"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:18:15 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x0, 0x0) 23:18:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0xa00}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:18:15 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:18:15 executing program 1: setxattr$security_smack_entry(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='security.SMACK64IPOUT\x00', &(0x7f0000000180)='/dev/nullb0\x00', 0xc, 0x0) r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x8001, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000200)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)='fuseblk\x00', 0xce02, 0x0) 23:18:15 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0xfffffffffffff000, 0x0) [ 516.970261][ T7835] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 516.985031][ T2481] nbd_handle_cmd: 14 callbacks suppressed [ 516.985048][ T2481] block nbd5: Attempted send on invalid socket [ 516.997139][ T2481] print_req_error: 14 callbacks suppressed [ 516.997150][ T2481] print_req_error: I/O error, dev nbd5, sector 64 flags 0 [ 517.010636][ T2481] block nbd5: Attempted send on invalid socket [ 517.016886][ T2481] print_req_error: I/O error, dev nbd5, sector 256 flags 0 [ 517.024406][ T7836] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=256, location=256 [ 517.042871][ T2481] block nbd5: Attempted send on invalid socket [ 517.049246][ T2481] print_req_error: I/O error, dev nbd5, sector 512 flags 0 [ 517.056722][ T7836] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=512, location=512 [ 517.066544][ T7836] UDF-fs: warning (device nbd5): udf_load_vrs: No anchor found [ 517.074476][ T7836] UDF-fs: Scanning with blocksize 512 failed [ 517.084450][ T2481] block nbd5: Attempted send on invalid socket [ 517.090789][ T2481] print_req_error: I/O error, dev nbd5, sector 64 flags 0 [ 517.098340][ T2481] block nbd5: Attempted send on invalid socket [ 517.104695][ T2481] print_req_error: I/O error, dev nbd5, sector 512 flags 0 23:18:15 executing program 1: setxattr$security_smack_entry(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='security.SMACK64IPOUT\x00', &(0x7f0000000180)='/dev/nullb0\x00', 0xc, 0x0) r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x8001, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000200)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)='fuseblk\x00', 0xce02, 0x0) 23:18:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0xb00}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 517.112460][ T7836] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=256, location=256 [ 517.130285][ T7835] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 517.144992][ T2481] block nbd5: Attempted send on invalid socket [ 517.151489][ T2481] print_req_error: I/O error, dev nbd5, sector 1024 flags 0 [ 517.162223][ T7836] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=512, location=512 [ 517.174731][ T7836] UDF-fs: warning (device nbd5): udf_load_vrs: No anchor found [ 517.182638][ T7836] UDF-fs: Scanning with blocksize 1024 failed [ 517.201299][ T2481] block nbd5: Attempted send on invalid socket [ 517.207747][ T2481] print_req_error: I/O error, dev nbd5, sector 64 flags 0 23:18:16 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 517.216397][ T2481] block nbd5: Attempted send on invalid socket [ 517.222690][ T2481] print_req_error: I/O error, dev nbd5, sector 1024 flags 0 [ 517.230220][ T7836] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=256, location=256 [ 517.258196][ T2481] block nbd5: Attempted send on invalid socket 23:18:16 executing program 1: setxattr$security_smack_entry(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='security.SMACK64IPOUT\x00', &(0x7f0000000180)='/dev/nullb0\x00', 0xc, 0x0) r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x8001, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000200)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)='fuseblk\x00', 0xce02, 0x0) [ 517.264530][ T2481] print_req_error: I/O error, dev nbd5, sector 2048 flags 0 [ 517.272107][ T7836] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=512, location=512 [ 517.285944][ T7836] UDF-fs: warning (device nbd5): udf_load_vrs: No anchor found [ 517.294881][ T7836] UDF-fs: Scanning with blocksize 2048 failed [ 517.302658][ T2481] block nbd5: Attempted send on invalid socket [ 517.309206][ T2481] print_req_error: I/O error, dev nbd5, sector 64 flags 0 [ 517.329315][ T7836] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=256, location=256 [ 517.359178][ T7836] UDF-fs: error (device nbd5): udf_read_tagged: read failed, block=512, location=512 [ 517.376970][ T8012] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 517.392452][ T7836] UDF-fs: warning (device nbd5): udf_load_vrs: No anchor found [ 517.403430][ T7836] UDF-fs: Scanning with blocksize 4096 failed [ 517.414266][ T7836] UDF-fs: warning (device nbd5): udf_fill_super: No partition found (1) 23:18:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0xc00}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 517.451938][ T8012] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:18:16 executing program 1: setxattr$security_smack_entry(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='security.SMACK64IPOUT\x00', &(0x7f0000000180)='/dev/nullb0\x00', 0xc, 0x0) r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x8001, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000200)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 23:18:18 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f66db68"], 0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:18:18 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:18:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000000), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1000000003c) fcntl$setstatus(r1, 0x4, 0x42803) 23:18:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0xd00}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:18:18 executing program 1: setxattr$security_smack_entry(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='security.SMACK64IPOUT\x00', &(0x7f0000000180)='/dev/nullb0\x00', 0xc, 0x0) r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x8001, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000200)) 23:18:18 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x2) 23:18:18 executing program 1: setxattr$security_smack_entry(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='security.SMACK64IPOUT\x00', &(0x7f0000000180)='/dev/nullb0\x00', 0xc, 0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000200)) [ 520.089048][ T8217] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:18:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0xe00}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:18:19 executing program 1: setxattr$security_smack_entry(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='security.SMACK64IPOUT\x00', &(0x7f0000000180)='/dev/nullb0\x00', 0xc, 0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000200)) [ 520.184608][ T8217] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:18:19 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f66db68"], 0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:18:19 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:18:19 executing program 1: setxattr$security_smack_entry(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='security.SMACK64IPOUT\x00', &(0x7f0000000180)='/dev/nullb0\x00', 0xc, 0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000200)) 23:18:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1002}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 520.450315][ T8435] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:18:19 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f66db68"], 0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 520.545633][ T8435] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:18:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000000), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1000000003c) fcntl$setstatus(r1, 0x4, 0x42803) 23:18:19 executing program 1: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x8001, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000200)) 23:18:19 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:18:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1003}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:18:19 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f66db68"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:18:19 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x3) 23:18:19 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f66db68"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:18:19 executing program 1: r0 = openat$md(0xffffffffffffff9c, 0x0, 0x8001, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000200)) [ 520.999000][ T8569] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:18:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1004}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 521.094057][ T8569] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:18:20 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f66db68"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:18:20 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:18:20 executing program 1: r0 = openat$md(0xffffffffffffff9c, 0x0, 0x8001, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000200)) [ 521.348190][ T8751] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 521.407395][ T8751] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:18:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000000), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1000000003c) fcntl$setstatus(r1, 0x4, 0x42803) 23:18:22 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f66db68"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:18:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1005}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:18:22 executing program 1: r0 = openat$md(0xffffffffffffff9c, 0x0, 0x8001, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000200)) 23:18:22 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:18:22 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x4) 23:18:22 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f66db68"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:18:22 executing program 1: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000200)) [ 524.044975][ T8814] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:18:23 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f66db68"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 524.119751][ T8814] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:18:23 executing program 1: openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000200)) 23:18:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1006}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:18:23 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 524.309972][ T8955] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 524.388459][ T8955] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:18:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000000), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1000000003c) fcntl$setstatus(r1, 0x4, 0x42803) 23:18:23 executing program 1: openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000200)) 23:18:23 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f66db68"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:18:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1007}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:18:23 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 524.570924][ T9073] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 524.664276][ T9073] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:18:23 executing program 1: openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000200)) 23:18:23 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f66db68"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:18:23 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x5) 23:18:23 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\xc0', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:18:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x100a}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:18:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000000), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x42803) 23:18:23 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f66db68"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:18:23 executing program 1: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, 0x0) 23:18:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1048}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:18:23 executing program 1: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, 0x0) 23:18:23 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f66db68"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:18:23 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x0f', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:18:24 executing program 1: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, 0x0) 23:18:24 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f66db68"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:18:24 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x6) 23:18:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x104c}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:18:24 executing program 1: 23:18:24 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:18:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000000), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x42803) 23:18:24 executing program 1: [ 525.758042][ T9471] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:18:24 executing program 1: 23:18:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1068}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 525.857315][ T9471] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:18:24 executing program 1: 23:18:24 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:18:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x106c}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 526.078763][ T9693] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 526.142229][ T9693] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:18:27 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f66db68"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:18:27 executing program 1: 23:18:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1074}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:18:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000000), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x42803) 23:18:27 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:18:27 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x7) 23:18:27 executing program 1: [ 528.316678][ T9807] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:18:27 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000040)) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000180)=0x6) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:18:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x107a}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 528.435147][ T9807] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:18:27 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 528.598767][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 528.604723][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 528.689088][ T9929] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:18:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1100}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:18:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000000), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, 0x0, 0x0) tkill(r2, 0x1000000003c) fcntl$setstatus(r1, 0x4, 0x42803) [ 528.843086][ T9929] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 529.158762][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 529.164653][ C1] protocol 88fb is buggy, dev hsr_slave_1 23:18:30 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f66db68"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:18:30 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:18:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1200}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:18:30 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x8) 23:18:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000000), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, 0x0, 0x0) tkill(r2, 0x1000000003c) fcntl$setstatus(r1, 0x4, 0x42803) 23:18:30 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x300, 0x0, 0x6}, @exit], &(0x7f0000000200)='\x83VG?\xfc\xd9b\xed\xa1\xdepBh\x92E\xd1\xe5UG\xc7\x15/\x01\xab\xa4|4%\x1e\xcdb\xff\x19m\xb2\b\x13=\x02;\x88\xec\xc1\x91\xfe:\x9eO\xd5\xf4\xfc3nLy\xd2%\xee\xf0o\xf7\xe4\xfa0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x9) 23:18:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000000), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1000000003c) fcntl$setstatus(r1, 0x4, 0x42803) 23:18:33 executing program 1: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000500)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x0, 0x0) syz_open_dev$sndtimer(0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, &(0x7f0000000c00)=ANY=[]) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000540)='/dev/urandom\x00', 0x0, 0x0) [ 534.535958][T10494] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 534.613707][T10494] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:18:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:18:33 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:18:33 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) getrlimit(0x0, 0x0) 23:18:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 534.820476][T10676] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:18:33 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000680)=0xe8) syz_mount_image$gfs2(&(0x7f0000000200)='gfs2\x00', &(0x7f0000000240)='./file0\x00', 0x4, 0x6, &(0x7f00000004c0)=[{&(0x7f0000000280)="0a881d5db216a76312c98257173348cfb18ba69200f4f4274206bed1daef45b1b0c5d584da56ed1b8e5969d984a1b407ff7c98d81b952ee0ab990d561d998ec990eb0335d7055cf8d7cf7692a5286d6a55c93264227344ba20e6686df552f663447f8298fcc8a458816d7a9bf9e1885ab5149a290e8705eb529328e46e0670", 0x7f, 0x8}, {&(0x7f0000000300), 0x0, 0xfffffffffffffffc}, {&(0x7f0000000340)="8bf514e81039b6c4485c15858dbb372175", 0x11, 0x5}, {&(0x7f0000000380)="7d2abfda573e20e9fc4457ee5af8d12d899972cd3b7b2dc9d421e142ac76264673208eb941c779c907e4f9cab2e4c7d272386162e3d69a15629b63e9fa67832acff8ab09f2db5511cf2ae5b94a3473c121333e1e6ad78dca9c1db66d78dc6482208136b581b7bade9db37b6f", 0x6c, 0x5}, {&(0x7f0000000400)="d0517655f6380dc6220a59fe3800b2141f4b7ea4cda6768f2e4dbcbbbce92915bcc59d0f69d979c175d3b44b3584afeaf54b29454182709ea63553120ca67424bb44dfc57229aed1baddf9701b29e9d643d3142dcfb8484cf53e65fbcc937c33c5e0325c", 0x64, 0x10001}, {&(0x7f0000000480)="160f39800f613628bc0fd82a2aac19b0f138030e564aac2dfef5f8460b", 0x1d}], 0x0, &(0x7f00000006c0)={[{@discard='discard'}, {@suiddir='suiddir'}, {@loccookie='loccookie'}, {@acl='acl'}, {@nosuiddir='nosuiddir'}], [{@fsmagic={'fsmagic', 0x3d, 0xb2}}, {@hash='hash'}, {@euid_gt={'euid>', r0}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/nullb0\x00'}}]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) r3 = dup(0xffffffffffffff9c) ioctl$UI_SET_FFBIT(r3, 0x4004556b, 0x7d) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) utimes(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={{r1, r2/1000+10000}, {r4, r5/1000+10000}}) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) [ 534.894790][T10676] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:18:33 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 535.032794][T10816] gfs2: invalid mount option: fsmagic=0x00000000000000b2 [ 535.053481][T10816] gfs2: can't parse mount arguments [ 535.059891][T10828] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 535.200668][T10828] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:18:36 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f66db68"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:18:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:18:36 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x0) utimensat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={{0x77359400}, {0x77359400}}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000380)={'NETMAP\x00'}, &(0x7f00000003c0)=0x1e) gettid() ioprio_get$pid(0x0, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2000000006}, 0x1c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e1f, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r1 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000027, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) utimensat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)={{0x0, 0x7530}, {r2, r3/1000+30000}}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000100)) open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/dev/nwll^0\x00'], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0xce02, 0x0) 23:18:36 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:18:36 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x10) 23:18:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000000), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1000000003c) fcntl$setstatus(r1, 0x4, 0x42803) [ 537.627521][T10839] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:18:36 executing program 0: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9bb05de55a5023caaa6cc0854dc1a3b9ca26f005ba4efb26c4bff000000002d00670d7bae3dbea1b8c00288e66e64e6066f66db68"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 537.724995][T10839] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:18:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) 23:18:36 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:18:36 executing program 1 (fault-call:1 fault-nth:0): r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000200)) 23:18:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 537.961482][T11010] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:18:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000000), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1000000003c) fcntl$setstatus(r1, 0x4, 0x42803) 23:18:36 executing program 1: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000200)) [ 538.065858][T11010] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:18:37 executing program 1: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x2, &(0x7f0000000200)) 23:18:37 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="800000001000030b9a9522455c9300d4f1f4d4e6a84f71000100000000000000004000190040000080003bdbfd9bb8835cadbe5b0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 23:18:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x1000}, [0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) [ 538.217899][T11177] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 538.278810][T11177] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 23:18:37 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x300) 23:18:37 executing program 1: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x125d, &(0x7f0000000200)) [ 538.549303][ T22] WARNING: CPU: 1 PID: 22 at kernel/workqueue.c:3018 __flush_work+0x74c/0x8a0 [ 538.558353][ T22] Kernel panic - not syncing: panic_on_warn set ... [ 538.564954][ T22] CPU: 1 PID: 22 Comm: kworker/1:1 Not tainted 5.0.0-rc4-next-20190201 #25 [ 538.573531][ T22] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 538.583662][ T22] Workqueue: md_misc mddev_delayed_delete [ 538.589377][ T22] Call Trace: [ 538.592670][ T22] dump_stack+0x172/0x1f0 [ 538.597003][ T22] ? __flush_work+0x6e0/0x8a0 [ 538.601727][ T22] panic+0x2cb/0x65c [ 538.605640][ T22] ? __warn_printk+0xf3/0xf3 [ 538.610237][ T22] ? __flush_work+0x74c/0x8a0 [ 538.614915][ T22] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 538.621156][ T22] ? __warn.cold+0x5/0x45 [ 538.625484][ T22] ? __warn+0xe8/0x1d0 [ 538.629562][ T22] ? __flush_work+0x74c/0x8a0 [ 538.634244][ T22] __warn.cold+0x20/0x45 [ 538.638488][ T22] ? __flush_work+0x74c/0x8a0 [ 538.643171][ T22] report_bug+0x263/0x2b0 [ 538.647507][ T22] do_error_trap+0x11b/0x200 [ 538.652104][ T22] do_invalid_op+0x37/0x50 [ 538.656536][ T22] ? __flush_work+0x74c/0x8a0 [ 538.661215][ T22] invalid_op+0x14/0x20 [ 538.665376][ T22] RIP: 0010:__flush_work+0x74c/0x8a0 [ 538.670660][ T22] Code: 74 58 e8 47 b7 25 00 fb 66 0f 1f 44 00 00 45 31 e4 e9 86 fd ff ff e8 33 b7 25 00 0f 0b 45 31 e4 e9 77 fd ff ff e8 24 b7 25 00 <0f> 0b 45 31 e4 e9 68 fd ff ff e8 15 b7 25 00 4c 89 ff 45 31 e4 e8 [ 538.690353][ T22] RSP: 0018:ffff8880a99d79a0 EFLAGS: 00010293 [ 538.696420][ T22] RAX: ffff8880a99c25c0 RBX: ffff8880a1008528 RCX: ffffffff814a3dbb [ 538.704393][ T22] RDX: 0000000000000000 RSI: ffffffff814a446c RDI: 0000000000000001 [ 538.712364][ T22] RBP: ffff8880a99d7b10 R08: ffff8880a99c25c0 R09: ffff8880a99c2e88 [ 538.720331][ T22] R10: 0000000000000000 R11: 0000000000000000 R12: dffffc0000000000 [ 538.728300][ T22] R13: ffff8880a99d7ae8 R14: 0000000000000001 R15: 0000000000000001 [ 538.736852][ T22] ? __flush_work+0x9b/0x8a0 [ 538.741454][ T22] ? __flush_work+0x74c/0x8a0 [ 538.746160][ T22] ? insert_work+0x3a0/0x3a0 [ 538.750759][ T22] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 538.756573][ T22] ? debug_object_assert_init+0x17b/0x2f0 [ 538.762298][ T22] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 538.768106][ T22] ? lockdep_hardirqs_on+0x418/0x5d0 [ 538.773397][ T22] ? trace_hardirqs_on+0x67/0x230 [ 538.778427][ T22] ? try_to_del_timer_sync+0xc1/0x110 [ 538.783804][ T22] ? mark_held_locks+0xa4/0xf0 [ 538.788566][ T22] ? __cancel_work_timer+0xc4/0x520 [ 538.793776][ T22] ? __cancel_work_timer+0x1d3/0x520 [ 538.799059][ T22] ? cancel_work_sync+0x18/0x20 [ 538.803907][ T22] ? __cancel_work_timer+0x1d3/0x520 [ 538.809191][ T22] ? lockdep_hardirqs_on+0x418/0x5d0 [ 538.814477][ T22] ? trace_hardirqs_on+0x67/0x230 [ 538.819505][ T22] __cancel_work_timer+0x3bf/0x520 [ 538.824630][ T22] ? try_to_grab_pending+0x710/0x710 [ 538.829922][ T22] ? try_to_del_timer_sync+0xc1/0x110 [ 538.835292][ T22] ? detach_if_pending+0x4f0/0x4f0 [ 538.840408][ T22] ? lockdep_hardirqs_on+0x418/0x5d0 [ 538.845696][ T22] ? trace_hardirqs_on+0x67/0x230 [ 538.850725][ T22] cancel_work_sync+0x18/0x20 [ 538.855481][ T22] blk_sync_queue+0x33/0x190 [ 538.860078][ T22] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 538.866329][ T22] blk_cleanup_queue+0x100/0x200 [ 538.871290][ T22] md_free+0xcb/0x1b0 [ 538.875275][ T22] kobject_put.cold+0x28f/0x2ec [ 538.880137][ T22] mddev_delayed_delete+0x34/0x40 [ 538.885163][ T22] process_one_work+0x98e/0x1790 [ 538.890123][ T22] ? pwq_dec_nr_in_flight+0x320/0x320 [ 538.895500][ T22] ? lock_acquire+0x16f/0x3f0 [ 538.900206][ T22] worker_thread+0x98/0xe40 [ 538.904711][ T22] ? trace_hardirqs_on+0x67/0x230 [ 538.909750][ T22] kthread+0x357/0x430 [ 538.913818][ T22] ? process_one_work+0x1790/0x1790 [ 538.919016][ T22] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 538.925285][ T22] ret_from_fork+0x3a/0x50 [ 538.931012][ T22] Kernel Offset: disabled [ 538.935436][ T22] Rebooting in 86400 seconds..