0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000001800)={0x120, r4, 0x8, 0x70bd26, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:dpkg_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ip6_vti0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'erspan0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @NLBL_UNLABEL_A_SECCTX={0x29, 0x7, 'system_u:object_r:pinentry_exec_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:dpkg_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @remote}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @loopback}, @NLBL_UNLABEL_A_SECCTX={0x24, 0x7, 'system_u:object_r:apm_bios_t:s0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}]}, 0x120}, 0x1, 0x0, 0x0, 0x80000}, 0x40001) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, r4, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @remote}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x2a}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40040d0}, 0x4004080) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) [ 827.572274] FAT-fs (loop0): Directory bread(block 6) failed [ 827.581734] FAT-fs (loop0): Directory bread(block 6) failed [ 827.598494] BTRFS info (device loop2): unrecognized mount option 'Nڞ' [ 827.663271] FAULT_INJECTION: forcing a failure. [ 827.663271] name failslab, interval 1, probability 0, space 0, times 0 [ 827.674700] CPU: 0 PID: 14382 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 827.682588] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 827.691939] Call Trace: [ 827.694538] dump_stack+0x1b2/0x283 [ 827.698174] should_fail.cold+0x10a/0x154 [ 827.702347] should_failslab+0xd6/0x130 [ 827.706305] kmem_cache_alloc_node_trace+0x25a/0x400 [ 827.711396] __kmalloc_node+0x38/0x70 [ 827.715178] kvmalloc_node+0x46/0xd0 [ 827.718875] alloc_fdtable+0xc7/0x270 [ 827.722658] dup_fd+0x5f2/0xaf0 [ 827.725923] copy_process.part.0+0x1b57/0x6f00 [ 827.730489] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 827.735498] ? _raw_spin_unlock_irq+0x5a/0x80 [ 827.739973] ? finish_task_switch+0x178/0x610 [ 827.744446] ? finish_task_switch+0x14d/0x610 [ 827.748917] ? switch_mm_irqs_off+0x2d2/0xeb0 [ 827.753394] ? __schedule+0x893/0x1de0 [ 827.757267] ? __cleanup_sighand+0x40/0x40 [ 827.761481] ? retint_kernel+0x2d/0x2d [ 827.765365] _do_fork+0x184/0xc80 [ 827.768799] ? SyS_write+0x1c6/0x210 [ 827.772488] ? fork_idle+0x270/0x270 [ 827.776179] ? fput+0xb/0x140 [ 827.779286] ? SyS_write+0x14d/0x210 [ 827.783001] ? SyS_read+0x210/0x210 [ 827.786607] ? do_syscall_64+0x4c/0x640 [ 827.790561] ? sys_vfork+0x20/0x20 [ 827.794080] do_syscall_64+0x1d5/0x640 [ 827.797949] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 827.803137] RIP: 0033:0x45de59 [ 827.806323] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 827.814011] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 827.821260] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 827.828523] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 827.835784] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 827.843029] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:04:29 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf3372922f1b8e4c87", 0x2a, 0x600}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 827.977195] BTRFS error (device loop2): open_ctree failed 00:04:29 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf3372922f1b8e4c87", 0x2a, 0x600}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 828.018120] FAT-fs (loop0): Directory bread(block 6) failed [ 828.025912] FAT-fs (loop0): Directory bread(block 6) failed 00:04:29 executing program 1: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x8d, 0x4000000090}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f00000041c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x1, 0x0, 0x3, 0x0, 0x8}, 0x0) mkdir(&(0x7f0000000540)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000440)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f21fbbfeb084f762af7f3c05db564653d30303030303030303030303030303030303036", @ANYRESDEC=0x0, @ANYBLOB="2c67726f7510d069013d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) msgsnd(0x0, &(0x7f0000000580)=ANY=[], 0x8, 0x0) 00:04:29 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf3372922f1b8e4c87", 0x2a, 0x600}, {0x0}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 828.142900] FAT-fs (loop0): Directory bread(block 6) failed [ 828.158319] FAT-fs (loop0): Directory bread(block 6) failed [ 828.270982] FAT-fs (loop0): Directory bread(block 6) failed [ 828.285574] FAT-fs (loop0): Directory bread(block 6) failed 00:04:30 executing program 5 (fault-call:10 fault-nth:8): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:04:30 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf3372922f1b8e4c87", 0x2a, 0x600}, {0x0}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 828.395831] BTRFS info (device loop2): unrecognized mount option 'Nڞ' [ 828.432670] FAT-fs (loop0): Directory bread(block 6) failed [ 828.452481] FAT-fs (loop0): Directory bread(block 6) failed [ 828.458947] BTRFS error (device loop2): open_ctree failed [ 828.505094] FAULT_INJECTION: forcing a failure. [ 828.505094] name failslab, interval 1, probability 0, space 0, times 0 [ 828.516605] CPU: 1 PID: 14431 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 828.524497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 828.533847] Call Trace: [ 828.536436] dump_stack+0x1b2/0x283 [ 828.540068] should_fail.cold+0x10a/0x154 [ 828.544215] should_failslab+0xd6/0x130 [ 828.548188] kmem_cache_alloc_node_trace+0x25a/0x400 [ 828.553290] __kmalloc_node+0x38/0x70 [ 828.557098] kvmalloc_node+0x46/0xd0 [ 828.560809] alloc_fdtable+0x133/0x270 [ 828.564691] dup_fd+0x5f2/0xaf0 [ 828.567973] copy_process.part.0+0x1b57/0x6f00 [ 828.572553] ? _raw_spin_unlock_irq+0x24/0x80 [ 828.577047] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 828.582062] ? _raw_spin_unlock_irq+0x5a/0x80 [ 828.586581] ? finish_task_switch+0x178/0x610 [ 828.591076] ? finish_task_switch+0x14d/0x610 [ 828.595567] ? switch_mm_irqs_off+0x2d2/0xeb0 [ 828.600070] ? __cleanup_sighand+0x40/0x40 [ 828.604304] ? lock_downgrade+0x740/0x740 [ 828.608459] _do_fork+0x184/0xc80 [ 828.611912] ? fork_idle+0x270/0x270 [ 828.615637] ? fput+0xb/0x140 [ 828.618738] ? SyS_write+0x14d/0x210 [ 828.622447] ? SyS_read+0x210/0x210 [ 828.626076] ? do_syscall_64+0x4c/0x640 [ 828.630046] ? sys_vfork+0x20/0x20 [ 828.633587] do_syscall_64+0x1d5/0x640 [ 828.637487] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 828.642699] RIP: 0033:0x45de59 [ 828.645879] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 828.653583] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 828.660848] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 828.668122] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 828.675385] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000008 [ 828.682650] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:04:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000500)="597d766800000000000000000000000000000000000000000000000000000000fcb2096bad154c2da9a086564f36bcc3000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045010000000000000000000000010000000000000000000001000000000000720000000000001000000010000000100000000000000000000000000000000000000000000000000000000000000000122badb145de474f84c86b8fd41337fdfcb2096bad154c2da9a086564f36bcc3", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e4000010000000000000004000000000000200000000000000000001000000000002000000000000000010000000100000001000000100000001000000000000000000100000000000122badb145de474f84c86b8fd41337fd", 0x6c, 0x10320}, {&(0x7f0000000280)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="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"]) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = open(&(0x7f00000001c0)='./file0\x00', 0xa440, 0x110) r2 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x0, 0x1, 0x1, 0x1f, 0x0, 0x400000000}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r2, r3, &(0x7f0000000240)=0x202, 0x4000000000dc) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000001700)='NLBL_UNLBL\x00') r5 = socket(0x11, 0x800000003, 0x8) sendmsg$NLBL_UNLABEL_C_STATICADD(r3, &(0x7f0000000640)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001780)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c7fc5db6cdef069691c1538af5784cc33cbb0d4e80385acf560eb3aece760751d023b69a4cc8e519643edf017aa42ee890b77e13bd5ff194db428aca06f6667a4d49a6404d7067e4aabab05b075f3d5476a93659168c63788d138bc3d7d7d5a67b53ab72c", @ANYRES16=r5, @ANYBLOB="00022dbd7000fedbdf250300000008000400e0000002"], 0x1c}, 0x1, 0x0, 0x0, 0x8}, 0x20008004) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000001940)=ANY=[@ANYBLOB="000000002509eae5f1c5a6558f5e41c38022e68b6aa734a36c2882ffa1915a3194388323d0cc9e0dc58a05130ff60f38072c5bf69c4b1644f151e5e9968e62485548d1e65cb71f44e8e62565157656f3b80c6fdc569bb073d32fdc9236f3556e056fe4ab40a822494dfc42d74d3ace54cee82b26a2e370ce36910c26519b0db6e3039bb525ff34f2ce00"/153, @ANYRES16=r4, @ANYBLOB="040001000000080200fe88000000000000000000000000000108000500ac1e0001140006006272696467655f736c6176655f31000014000600636169663000000000000000000000001400020020010000000000000000000000000000080004007f000001080004007f000001"], 0x7c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc001) sendmsg$NLBL_UNLABEL_C_ACCEPT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000001800)={0x120, r4, 0x8, 0x70bd26, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:dpkg_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ip6_vti0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'erspan0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @NLBL_UNLABEL_A_SECCTX={0x29, 0x7, 'system_u:object_r:pinentry_exec_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:dpkg_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @remote}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @loopback}, @NLBL_UNLABEL_A_SECCTX={0x24, 0x7, 'system_u:object_r:apm_bios_t:s0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}]}, 0x120}, 0x1, 0x0, 0x0, 0x80000}, 0x40001) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, r4, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @remote}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x2a}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40040d0}, 0x4004080) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) 00:04:30 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf3372922f1b8e4c87", 0x2a, 0x600}, {0x0}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 828.839230] print_req_error: I/O error, dev loop2, sector 0 [ 828.903566] FAT-fs (loop0): Directory bread(block 6) failed [ 828.905032] print_req_error: I/O error, dev loop2, sector 0 [ 828.918956] FAT-fs (loop0): Directory bread(block 6) failed 00:04:30 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 828.943856] BTRFS info (device loop2): unrecognized mount option 'Nڞ)!v>!AtYӷ{B6({;zk=O>n}T#3$' 00:04:30 executing program 1: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x20400, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000300)={{0x9, 0x2}, 'port1\x00', 0xe, 0x10000, 0x0, 0x2c6, 0x8, 0xfffffffa, 0x7, 0x0, 0x2, 0x5}) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000000c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x48}, 0x1, 0x0, 0x0, 0x91}, 0x44808) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x8d, 0x4000000090}, 0x0) getpid() r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000041c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000180)) write(r3, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x3, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000540)='./file0\x00', 0x31) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000440)='fuse\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000060000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="1e7322d40b2de6edf77c5821c156a47282434d77917f9dba73b27841fbb9029525d348c54dc16185a7a3f334f800dd54eaf160f9bdb19fecdd06a2a790478b9a69261de9641784b6af5056e84a6618695fcbd5ce3d66dd9d7f66b3c3da435452f2c19dcb4b3f8cb9953ea4d7a7e70e5922864e9d6ad82f8ac917ec0094841e40526b7e51b38fb724ac2e3d78e5ce945de92945f7baa11b5e86a5f485a1714045b280c8bb91fefebb7384077e85aac454cc212b1bfc14a69615a56c1eb559b7371e19b83c05d348c16dd8f26bc48ec854b177eac20ddf2869d7d461f49521c4cdc4bbe31b2e4e499ae69bc23f4a929a55727c3421483e"]) msgsnd(0x0, &(0x7f0000000580)=ANY=[], 0x8, 0x0) 00:04:30 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 829.047131] BTRFS error (device loop2): open_ctree failed 00:04:30 executing program 5 (fault-call:10 fault-nth:9): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:04:31 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 829.375273] FAULT_INJECTION: forcing a failure. [ 829.375273] name failslab, interval 1, probability 0, space 0, times 0 [ 829.386718] CPU: 0 PID: 14477 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 829.394612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 829.403960] Call Trace: [ 829.406549] dump_stack+0x1b2/0x283 [ 829.410179] should_fail.cold+0x10a/0x154 [ 829.414324] should_failslab+0xd6/0x130 [ 829.418297] kmem_cache_alloc+0x28e/0x3c0 [ 829.422448] copy_fs_struct+0x43/0x2d0 [ 829.426336] copy_process.part.0+0x3b97/0x6f00 [ 829.430919] ? get_pid_task+0xb8/0x130 [ 829.434807] ? proc_fail_nth_write+0x7b/0x180 [ 829.439301] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 829.444239] ? __cleanup_sighand+0x40/0x40 [ 829.448472] ? lock_downgrade+0x740/0x740 [ 829.452622] _do_fork+0x184/0xc80 [ 829.456078] ? fork_idle+0x270/0x270 [ 829.459790] ? fput+0xb/0x140 [ 829.462895] ? SyS_write+0x14d/0x210 [ 829.466605] ? SyS_read+0x210/0x210 [ 829.470229] ? do_syscall_64+0x4c/0x640 [ 829.474199] ? sys_vfork+0x20/0x20 [ 829.477741] do_syscall_64+0x1d5/0x640 [ 829.481634] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 829.486817] RIP: 0033:0x45de59 [ 829.490000] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 829.497808] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 829.505063] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 829.512381] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 829.519637] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000009 [ 829.526895] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:04:31 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 829.684596] BTRFS info (device loop2): unrecognized mount option 'Nڞ)!v>!AtYӷ{B6({;zk=O>n}T#3$' 00:04:31 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 829.766575] BTRFS error (device loop2): open_ctree failed 00:04:31 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:04:31 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:04:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e4000010000000000000004000000000000200000000000000000001000000000002000000000000000010000000100000001000000100000001000000000000000000100000000000122badb145de474f84c86b8fd41337fd", 0x6c, 0x10320}, {&(0x7f0000000280)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000002800)=ANY=[@ANYBLOB="4eda9e"]) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = open(&(0x7f00000001c0)='./file0\x00', 0xa440, 0x110) sendmsg$GTP_CMD_GETPDP(r1, &(0x7f0000000740)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000700)={&(0x7f00000008c0)=ANY=[@ANYBLOB="000000004004618893b4aad3862f61e0b2f842e879b6b94f15d69c5179a739515a0b00b87d0ec3189648694f01b7a6a5ed91387a6157b9b97ffdcb5d8ce92a9edcbef6e59e020e8c758576d712991b8d9dd5c134bbf69171230072308d8caaa2f37fd54a7277c25c9ec018770030b51c0563525f74b788449835f0f7b82f07ea21d52e92d789596d730a67bb5088c427dd08c5b12518ae324f61faca65ca2b438220f1c77040d4aee69b3ff48857d873816ca6894897aa3fb5e2", @ANYRES16=0x0, @ANYBLOB="080029bd7000fedbdf250200000006000600010000000c000300040000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000200010000000800080002000000"], 0x40}, 0x1, 0x0, 0x0, 0x190}, 0x8810) r2 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x0, 0x1, 0x1, 0x1f, 0x0, 0x400000000}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r2, 0xffffffffffffffff, &(0x7f0000000240)=0x202, 0x4000000000dc) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000001700)='NLBL_UNLBL\x00') r5 = socket(0x11, 0x800000003, 0x8) sendmsg$NLBL_UNLABEL_C_STATICADD(r3, &(0x7f0000000640)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001780)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c7fc5db6cdef069691c1538af5784cc33cbb0d4e80385acf560eb3aece760751d023b69a4cc8e4f9606000000000000000b77e1a06f6667a4d49a6404d7067e4aabab05b075f3d547aaeac209624db22cd138bc3d7d7d5a67b53ab72c0000000000000000", @ANYRES16=r5, @ANYBLOB="00022dbd7000fedbdf250300000008000400e0000002"], 0x1c}, 0x1, 0x0, 0x0, 0x8}, 0x20008004) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000001940)=ANY=[@ANYBLOB="000000002509eae5f1c5a6558f5e41c38022e68b6aa734a36c2882ffa1915a3194388323d0cc9e0dc58a05130ff60f38072c5bf69c4b1644f151e5e9968e62485548d1e65cb71f44e8e62565157656f3b80c6fdc569bb073d32fdc9236f3556e056fe4ab40a822494dfc42d74d3ace54cee82b26a2e370ce36910c26519b0db6e3039bb525ff34f2ce00"/153, @ANYRES16=r4, @ANYBLOB="040001000000080200fe88000000000000000000000000000108000500ac1e0001140006006272696467655f736c6176655f31000014000600636169663000000000000000000000001400020020010000000000000000000000000000080004007f000001080004007f000001"], 0x7c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc001) sendmsg$NLBL_UNLABEL_C_ACCEPT(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f00000009c0)=ANY=[@ANYRESDEC, @ANYRES16=r4, @ANYBLOB="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"], 0x120}, 0x1, 0x0, 0x0, 0x80000}, 0x40001) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000800)=ANY=[@ANYBLOB="3a1951bae8de84000000800000e99761156856c1c9addb550600000000000000b5cdcecc266c08adace3a55d2b588eeee53f9b88e8644ae5d64579b04486cbd4a3ccb8c56372c97e0ca202355a1e70525ec1aa30071f3140753c2a3b49159763bec4d240689828b214627c7564c331a5ed", @ANYRES16=r4, @ANYBLOB="000229bd7000fcdbdf250600000008000400ac1414bb08000500ac1e010108000400ac14142a"], 0x2c}, 0x1, 0x0, 0x0, 0x40040d0}, 0x4004080) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) 00:04:31 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 829.976025] BTRFS info (device loop2): unrecognized mount option 'Nڞ' 00:04:31 executing program 5 (fault-call:10 fault-nth:10): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:04:31 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:04:31 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180), 0x0, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 830.046460] BTRFS error (device loop2): open_ctree failed 00:04:31 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000500)="597d766800000000000000000000000000000000000000000000000000000000fcb2096bad154c2da9a086564f36bcc3000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045010000000000000000000000010000000000000000000001000000000000720000000000001000000010000000100000000000000000000000000000000000000000000000000000000000000000122badb145de474f84c86b8fd41337fdfcb2096bad154c2da9a086564f36bcc3", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e4000010000000000000004000000000000200000000000000000001000000000002000000000000000010000000100000001000000100000001000000000000000000100000000000122badb145de474f84c86b8fd41337fd", 0x6c, 0x10320}, {&(0x7f0000000280)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000002800)=ANY=[@ANYBLOB="4eda9e"]) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = open(&(0x7f00000001c0)='./file0\x00', 0xa440, 0x110) r2 = socket$inet6(0xa, 0x3, 0x6) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r1, &(0x7f0000006d40)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000006d00)={&(0x7f0000006c00)={0xe8, 0x0, 0x0, 0x70bd2d, 0x25dfdbfe, {}, [@HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0xe8}, 0x1, 0x0, 0x0, 0x10}, 0x20000800) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x0, 0x1, 0x1, 0x1f, 0x0, 0x400000000}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r2, r3, &(0x7f0000000240)=0x202, 0x4000000000dc) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000001700)='NLBL_UNLBL\x00') r5 = socket(0x11, 0x800000003, 0x8) sendmsg$NLBL_UNLABEL_C_STATICADD(r3, &(0x7f0000000640)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001780)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c7fc5db6cdef069691c1538af5784cc33cbb0d4e80385acf560eb3aece760751d023b69a4cc8e519643edf017aa42ee890b77e13bd5ff194db428aca06f6667a4d49a6404d7067e4aabab05b075f3d5476a93659168c63788d138bc3d7d7d5a67b53ab72c", @ANYRES16=r5, @ANYBLOB="00022dbd7000fedbdf250300000008000400e0000002"], 0x1c}, 0x1, 0x0, 0x0, 0x8}, 0x20008004) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000001940)=ANY=[@ANYBLOB="000000002509eae5f1c5a6558f5e41c38022e68b6aa734a36c2882ffa1915a3194388323d0cc9e0dc58a05130ff60f38072c5bf69c4b1644f151e5e9968e62485548d1e65cb71f44e8e62565157656f3b80c6fdc569bb073d32fdc9236f3556e056fe4ab40a822494dfc42d74d3ace54cee82b26a2e370ce36910c26519b0db6e3039bb525ff34f2ce00"/153, @ANYRES16=r4, @ANYBLOB="040001000000080200fe88000000000000000000000000000108000500ac1e0001140006006272696467655f736c6176655f31000014000600636169663000000000000000000000001400020020010000000000000000000000000000080004007f000001080004007f000001"], 0x7c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc001) sendmsg$NLBL_UNLABEL_C_ACCEPT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000001800)={0x120, r4, 0x8, 0x70bd26, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:dpkg_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ip6_vti0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'erspan0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @NLBL_UNLABEL_A_SECCTX={0x29, 0x7, 'system_u:object_r:pinentry_exec_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:dpkg_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @remote}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @loopback}, @NLBL_UNLABEL_A_SECCTX={0x24, 0x7, 'system_u:object_r:apm_bios_t:s0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}]}, 0x120}, 0x1, 0x0, 0x0, 0x80000}, 0x40001) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, r4, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @remote}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x2a}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40040d0}, 0x4004080) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) [ 830.307212] FAULT_INJECTION: forcing a failure. [ 830.307212] name failslab, interval 1, probability 0, space 0, times 0 [ 830.318594] CPU: 1 PID: 14537 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 830.326510] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 830.335863] Call Trace: [ 830.338452] dump_stack+0x1b2/0x283 [ 830.342084] should_fail.cold+0x10a/0x154 [ 830.346233] should_failslab+0xd6/0x130 [ 830.350204] kmem_cache_alloc+0x28e/0x3c0 [ 830.354360] copy_process.part.0+0x3bfa/0x6f00 [ 830.358942] ? get_pid_task+0xb8/0x130 [ 830.362831] ? proc_fail_nth_write+0x7b/0x180 [ 830.367323] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 830.372262] ? __cleanup_sighand+0x40/0x40 [ 830.376497] ? lock_downgrade+0x740/0x740 [ 830.380649] _do_fork+0x184/0xc80 [ 830.384130] ? fork_idle+0x270/0x270 [ 830.387839] ? fput+0xb/0x140 [ 830.390940] ? SyS_write+0x14d/0x210 [ 830.394651] ? SyS_read+0x210/0x210 [ 830.398418] ? SyS_clock_settime+0x1a0/0x1a0 [ 830.402825] ? do_syscall_64+0x4c/0x640 [ 830.406795] ? sys_vfork+0x20/0x20 [ 830.410333] do_syscall_64+0x1d5/0x640 [ 830.414225] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 830.419414] RIP: 0033:0x45de59 [ 830.422597] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 830.430305] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 830.437570] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 830.444835] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 00:04:32 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180), 0x0, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 830.452103] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000a [ 830.459359] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:04:32 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180), 0x0, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:04:32 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e4000010000000000000004000000000000200000000000000000001000000000002000000000000000010000000100000001000000100000001000000000000000000100000000000122badb145de474f84c86b8fd41337fd", 0x6c, 0x10320}, {&(0x7f0000000280)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000002800)=ANY=[@ANYBLOB="4eda9e"]) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = open(&(0x7f00000001c0)='./file0\x00', 0xa440, 0x110) r2 = socket$inet6(0xa, 0x3, 0x6) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r1, &(0x7f0000006d40)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000006d00)={&(0x7f0000006c00)={0xe8, 0x0, 0x0, 0x70bd2d, 0x25dfdbfe, {}, [@HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0xe8}, 0x1, 0x0, 0x0, 0x10}, 0x20000800) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x0, 0x1, 0x1, 0x1f, 0x0, 0x400000000}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r2, r3, &(0x7f0000000240)=0x202, 0x4000000000dc) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000001700)='NLBL_UNLBL\x00') r5 = socket(0x11, 0x800000003, 0x8) sendmsg$NLBL_UNLABEL_C_STATICADD(r3, &(0x7f0000000640)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001780)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c7fc5db6cdef069691c1538af5784cc33cbb0d4e80385acf560eb3aece760751d023b69a4cc8e519643edf017aa42ee890b77e13bd5ff194db428aca06f6667a4d49a6404d7067e4aabab05b075f3d5476a93659168c63788d138bc3d7d7d5a67b53ab72c", @ANYRES16=r5, @ANYBLOB="00022dbd7000fedbdf250300000008000400e0000002"], 0x1c}, 0x1, 0x0, 0x0, 0x8}, 0x20008004) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000001940)=ANY=[@ANYBLOB="000000002509eae5f1c5a6558f5e41c38022e68b6aa734a36c2882ffa1915a3194388323d0cc9e0dc58a05130ff60f38072c5bf69c4b1644f151e5e9968e62485548d1e65cb71f44e8e62565157656f3b80c6fdc569bb073d32fdc9236f3556e056fe4ab40a822494dfc42d74d3ace54cee82b26a2e370ce36910c26519b0db6e3039bb525ff34f2ce00"/153, @ANYRES16=r4, @ANYBLOB="040001000000080200fe88000000000000000000000000000108000500ac1e0001140006006272696467655f736c6176655f31000014000600636169663000000000000000000000001400020020010000000000000000000000000000080004007f000001080004007f000001"], 0x7c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc001) sendmsg$NLBL_UNLABEL_C_ACCEPT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000001800)={0x120, r4, 0x8, 0x70bd26, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:dpkg_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ip6_vti0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'erspan0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @NLBL_UNLABEL_A_SECCTX={0x29, 0x7, 'system_u:object_r:pinentry_exec_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:dpkg_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @remote}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @loopback}, @NLBL_UNLABEL_A_SECCTX={0x24, 0x7, 'system_u:object_r:apm_bios_t:s0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}]}, 0x120}, 0x1, 0x0, 0x0, 0x80000}, 0x40001) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, r4, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @remote}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x2a}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40040d0}, 0x4004080) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) 00:04:32 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf3372922f1b8e4c87", 0x2a, 0x600}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 830.759637] BTRFS info (device loop2): unrecognized mount option 'Nڞ' [ 830.816823] BTRFS error (device loop2): open_ctree failed 00:04:32 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff", 0x15, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:04:32 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e4000010000000000000004000000000000200000000000000000001000000000002000000000000000010000000100000001000000100000001000000000000000000100000000000122badb145de474f84c86b8fd41337fd", 0x6c, 0x10320}, {&(0x7f0000000280)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000002800)=ANY=[@ANYBLOB="4eda9e"]) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = open(&(0x7f00000001c0)='./file0\x00', 0xa440, 0x110) r2 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x0, 0x1, 0x1, 0x1f, 0x0, 0x400000000}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r2, r3, &(0x7f0000000240)=0x202, 0x4000000000dc) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000001700)='NLBL_UNLBL\x00') r5 = socket(0x11, 0x800000003, 0x8) sendmsg$NLBL_UNLABEL_C_STATICADD(r3, &(0x7f0000000640)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001780)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c7fc5db6cdef069691c3538af5784cc33cbb0d4e80385acf560eb3aece760751d123b69a4cc8e519643edf017aa42ee890b77e13bd5ff194db428aca06f6667a4d49a6404d7067e4aabab05b075f3d5470900000068c63788d138bc3d7d7d5a67b53ab72c", @ANYRES16=r5, @ANYBLOB="00022dbd7000fedbdf250300000008000400e0000002"], 0x1c}, 0x1, 0x0, 0x0, 0x8}, 0x20008004) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000001940)=ANY=[@ANYBLOB="000000002509eae5f1c5a6558f5e41c38022e68b6aa734a36c2882ffa1915a3194388323d0cc9e0dc58a05130ff60f38072c5bf69c4b1644f151e5e9968e62485548d1e65cb71f44e8e62565157656f3b80c6fdc569bb073d32fdc9236f3556e056fe4ab40a822494dfc42d74d3ace54cee82b26a2e370ce36910c26519b0db6e3039bb525ff34f2ce00"/153, @ANYRES16=r4, @ANYBLOB="040001000000080200fe88000000000000000000000000000108000500ac1e0001140006006272696467655f736c6176655f31000014000600636169663000000000000000000000001400020020010000000000000000000000000000080004007f000001080004007f000001"], 0x7c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc001) sendmsg$NLBL_UNLABEL_C_ACCEPT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000001800)={0x114, r4, 0x8, 0x70bd26, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:dpkg_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ip6_vti0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'erspan0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @NLBL_UNLABEL_A_SECCTX={0x29, 0x7, 'system_u:object_r:pinentry_exec_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:dpkg_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @remote}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_SECCTX={0x24, 0x7, 'system_u:object_r:apm_bios_t:s0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}]}, 0x114}, 0x1, 0x0, 0x0, 0x80000}, 0x40001) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, r4, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @remote}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x2a}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40040d0}, 0x4004080) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) 00:04:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e4000010000000000000004000000000000200000000000000000001000000000002000000000000000010000000100000001000000100000001000000000000000000100000000000122badb145de474f84c86b8fd41337fd", 0x6c, 0x10320}, {&(0x7f0000000280)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000002800)=ANY=[@ANYBLOB="4eda9e"]) setsockopt$bt_hci_HCI_DATA_DIR(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)=0x2da, 0x4) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = open(&(0x7f00000001c0)='./file0\x00', 0xa440, 0x110) r2 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x1, 0x1, 0x1, 0xc96, 0x0, 0x400000000}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r2, r3, &(0x7f0000000240)=0x202, 0x4000000000dc) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000001700)='NLBL_UNLBL\x00') r5 = socket(0x11, 0x800000003, 0x8) sendmsg$NLBL_UNLABEL_C_STATICADD(r3, &(0x7f0000000640)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001780)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c7fc5db6cdef069691c1538af5784cc33cbb0d4e80385acf560eb3aece760751d023b69a4cc8e519643edf017aa42ee890b77e13bd5ff194db428aca06f6667a4d49a6404d7067e4aabab05b075f3d5476a93659168c63788d138bc3d7d7d5a67b53ab72c", @ANYRES16=r5, @ANYBLOB="00022dbd7000fedbdf250300000008000400e0000002"], 0x1c}, 0x1, 0x0, 0x0, 0x8}, 0x20008004) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000001940)=ANY=[@ANYBLOB="000000002509eae5f1c5a6558f5e41c38022e68b6aa734a36c2882ffa1915a3194388323d0cc9e0dc58a05130ff60f38072c5bf69c4b1644f151e5e9968e62485548d1e65cb71f44e8e62565157656f3b80c6fdc569bb073d32fdc9236f3556e056fe4ab40a822494dfc42d74d3ace54cee82b26a2e370ce36910c26519b0db6e3039bb525ff34f2ce00"/153, @ANYRES16=r4, @ANYBLOB="040001000000080200fe88000000000000000000000000000108000500ac1e0001140006006272696467655f736c6176655f31000014000600636169663000000000000000000000001400020020010000000000000000000000000000080004007f000001080004007f000001"], 0x7c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc001) sendmsg$NLBL_UNLABEL_C_ACCEPT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000001800)={0x120, r4, 0x8, 0x70bd26, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:dpkg_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ip6_vti0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'erspan0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @NLBL_UNLABEL_A_SECCTX={0x29, 0x7, 'system_u:object_r:pinentry_exec_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:dpkg_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @remote}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @loopback}, @NLBL_UNLABEL_A_SECCTX={0x24, 0x7, 'system_u:object_r:apm_bios_t:s0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}]}, 0x120}, 0x1, 0x0, 0x0, 0x80000}, 0x40001) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, r4, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @remote}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x2a}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40040d0}, 0x4004080) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) 00:04:32 executing program 5 (fault-call:10 fault-nth:11): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:04:32 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff", 0x15, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:04:32 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x200000, &(0x7f0000000300)=ANY=[@ANYBLOB="6a6465763d2e2f66696c65302c636f6d6d69743d3078303030303030303030303030303030322c686173683d72757061736f762c6578706f73655f70726976726f6f742c736d61636b66737472616e736d7574653d242f28f72c2e287b5d2c26292375abebeba6c0273472252ed0615b2c66736d616769633d3078303030303030303030303030303430312c00"]) r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) [ 831.031529] BTRFS info (device loop2): unrecognized mount option 'Nڞ' 00:04:32 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000023c0)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0xffffffffffffff91) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa42e, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f00000fc000/0x18000)=nil, &(0x7f00000001c0)=[@text16={0x10, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 831.106969] BTRFS error (device loop2): open_ctree failed [ 831.153829] FAULT_INJECTION: forcing a failure. [ 831.153829] name failslab, interval 1, probability 0, space 0, times 0 [ 831.165295] CPU: 0 PID: 14594 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 831.173189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 831.182563] Call Trace: [ 831.185155] dump_stack+0x1b2/0x283 [ 831.188774] should_fail.cold+0x10a/0x154 [ 831.192914] should_failslab+0xd6/0x130 [ 831.196978] kmem_cache_alloc+0x28e/0x3c0 [ 831.201117] copy_process.part.0+0x1cd2/0x6f00 [ 831.205694] ? trace_hardirqs_on+0x10/0x10 [ 831.209911] ? _raw_spin_unlock_irq+0x24/0x80 [ 831.214414] ? __cleanup_sighand+0x40/0x40 [ 831.218638] ? lock_downgrade+0x740/0x740 [ 831.222790] ? _raw_spin_unlock_irq+0x24/0x80 [ 831.227282] _do_fork+0x184/0xc80 [ 831.230720] ? fork_idle+0x270/0x270 [ 831.234432] ? io_schedule_timeout+0x140/0x140 [ 831.239003] ? do_syscall_64+0x4c/0x640 [ 831.242959] ? sys_vfork+0x20/0x20 [ 831.246481] do_syscall_64+0x1d5/0x640 [ 831.250356] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 831.255611] RIP: 0033:0x45de59 [ 831.258782] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 831.266482] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 831.273750] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 831.281000] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 831.288250] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000b [ 831.295503] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:04:33 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff", 0x15, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:04:33 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000680)=ANY=[@ANYBLOB="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"/595], &(0x7f0000000140)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x2, 0x300) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000300)) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl1\x00', &(0x7f0000000580)={'syztnl0\x00', 0x0, 0x29, 0x0, 0x9, 0x0, 0x3, @ipv4={[], [], @initdev={0xac, 0x1e, 0x7, 0x0}}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x0, 0x700, 0x8, 0xc}}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000280)={@local, 0x0, r3}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000640)=r0, 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001280)='./cgroup/syz0\x00', 0x1ff) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) perf_event_open(&(0x7f00000014c0)={0x0, 0x70, 0x40, 0xca, 0x2, 0x8, 0x0, 0x0, 0x400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001480)}, 0x0, 0xff, 0x6, 0x0, 0x0, 0x1, 0x9}, 0xffffffffffffffff, 0x0, r2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce0", 0x0, 0x2f, 0x0, 0x0, 0xfffffffffffffe2a}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x8b, 0x0, 0x0, 0x0, 0xffc000, 0x3, 0x3d, 0x2, 0x0, 0x38, 0x0, 0x6, 0x1, 0x20, 0x1, 0x0, 0x20, 0x560}, [{0x1, 0x7, 0x9, 0x0, 0x7fffffff, 0x0, 0x2, 0x800}], "", [[]]}, 0x158) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(0xffffffffffffffff, 0x28, 0x6, &(0x7f00000002c0), 0x10) 00:04:33 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3", 0x20, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:04:33 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3", 0x20, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:04:33 executing program 5 (fault-call:10 fault-nth:12): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) [ 831.843137] BTRFS info (device loop2): unrecognized mount option 'Nڞ' [ 831.929620] BTRFS error (device loop2): open_ctree failed 00:04:33 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3", 0x20, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 832.123805] FAULT_INJECTION: forcing a failure. [ 832.123805] name failslab, interval 1, probability 0, space 0, times 0 [ 832.135184] CPU: 1 PID: 14648 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 832.143082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 832.152437] Call Trace: [ 832.155046] dump_stack+0x1b2/0x283 [ 832.158685] should_fail.cold+0x10a/0x154 [ 832.162834] ? ___might_sleep+0x16e/0x2b0 [ 832.166984] should_failslab+0xd6/0x130 [ 832.170958] kmem_cache_alloc+0x28e/0x3c0 [ 832.175107] create_new_namespaces+0x30/0x720 [ 832.179597] ? security_capable+0x88/0xb0 [ 832.183747] copy_namespaces+0x27b/0x310 [ 832.187810] copy_process.part.0+0x2600/0x6f00 [ 832.192391] ? trace_hardirqs_on+0x10/0x10 [ 832.196621] ? lock_downgrade+0x740/0x740 [ 832.200768] ? check_preemption_disabled+0x35/0x240 [ 832.205782] ? check_preemption_disabled+0x35/0x240 [ 832.210801] ? finish_task_switch+0x178/0x610 [ 832.215305] ? __cleanup_sighand+0x40/0x40 [ 832.219538] ? _raw_spin_unlock_irq+0x5a/0x80 [ 832.224031] ? finish_task_switch+0x14d/0x610 [ 832.228520] ? switch_mm_irqs_off+0x2d2/0xeb0 [ 832.233017] _do_fork+0x184/0xc80 [ 832.236471] ? fork_idle+0x270/0x270 [ 832.240179] ? io_schedule_timeout+0x140/0x140 [ 832.244763] ? do_syscall_64+0x4c/0x640 [ 832.248731] ? sys_vfork+0x20/0x20 [ 832.252276] do_syscall_64+0x1d5/0x640 [ 832.256169] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 832.261361] RIP: 0033:0x45de59 [ 832.264543] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 00:04:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000500)="597d766800000000000000000000000000000000000000000000000000000000fcb2096bad154c2da9a086564f36bcc3000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045010000000000000000000000010000000000000000000001000000000000720000000000001000000010000000100000000000000000000000000000000000000000000000000000000000000000122badb145de474f84c86b8fd41337fdfcb2096bad154c2da9a086564f36bcc3", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e4000010000000000000004000000000000200000000000000000001000000000002000000000000000010000000100000001000000100000001000000000000000000100000000000122badb145de474f84c86b8fd41337fd", 0x6c, 0x10320}, {&(0x7f0000000280)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000002800)=ANY=[@ANYBLOB="4eda9e"]) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = open(&(0x7f00000001c0)='./file0\x00', 0xa440, 0x110) r2 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x0, 0x1, 0x1, 0x1f, 0x0, 0x400000000}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r2, r3, &(0x7f0000000240)=0x202, 0x4000000000dc) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000001700)='NLBL_UNLBL\x00') r5 = socket(0x11, 0x800000003, 0x8) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(0xffffffffffffffff, 0xc2604110, &(0x7f0000000800)={0x30e08, [[0x3f, 0x8, 0x5, 0x1, 0x5, 0x4, 0x28, 0x7f], [0x8, 0x2, 0x8000, 0x4, 0x5, 0x0, 0x5d13, 0x2], [0x3, 0x4, 0x20, 0x4, 0x8, 0x1000, 0x2, 0x6]], [], [{0x0, 0x1, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x4, 0x1, 0x0, 0x1}, {0xffff, 0x7f, 0x1, 0x1, 0x1}, {0x80000000, 0x8, 0x1, 0x1, 0x1}, {0x10002, 0x44e0, 0x1, 0x0, 0x0, 0x1}, {0xff, 0x0, 0x1, 0x0, 0x1}, {0x415e, 0x81, 0x1, 0x1, 0x1}, {0xe3c1, 0x5, 0x0, 0x0, 0x0, 0x1}, {0x5, 0x9}, {0x60e027c2, 0xd5f, 0x0, 0x1, 0x0, 0x1}, {0x2, 0x939, 0x0, 0x1}, {0x101, 0x0, 0x1, 0x1, 0x1}], [], 0x2}) sendmsg$NLBL_UNLABEL_C_STATICADD(r3, &(0x7f0000000640)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001780)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c7fc5db6cdef069691c1538af5784cc33cbb0d4e80385acf560eb3aece760751d023b69a4cc8e519643edf017aa42ee890b77e13bd5ff194db428aca06f6667a4d49a6404d7067e4aabab05b075f3d5476a93659168c63788d138bc3d7d7d5a67b53ab72c", @ANYRES16=r5, @ANYBLOB="00022dbd7000fedbdf250300000008000400e0000002"], 0x1c}, 0x1, 0x0, 0x0, 0x8}, 0x20008004) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000001940)=ANY=[@ANYBLOB="000000002509eae5f1c5a6558f5e41c38022e68b6aa734a36c2882ffa1915a3194388323d0cc9e0dc58a05130ff60f38072c5bf69c4b1644f151e5e9968e62485548d1e65cb71f44e8e62565157656f3b80c6fdc569bb073d32fdc9236f3556e056fe4ab40a822494dfc42d74d3ace54cee82b26a2e370ce36910c26519b0db6e3039bb525ff34f2ce00"/153, @ANYRES16=r4, @ANYBLOB="040001000000080200fe88000000000000000000000000000108000500ac1e0001140006006272696467655f736c6176655f31000014000600636169663000000000000000000000001400020020010000000000000000000000000000080004007f000001080004007f000001"], 0x7c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc001) sendmsg$NLBL_UNLABEL_C_ACCEPT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000001800)={0x120, r4, 0x8, 0x70bd26, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:dpkg_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ip6_vti0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'erspan0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @NLBL_UNLABEL_A_SECCTX={0x29, 0x7, 'system_u:object_r:pinentry_exec_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:dpkg_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @remote}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @loopback}, @NLBL_UNLABEL_A_SECCTX={0x24, 0x7, 'system_u:object_r:apm_bios_t:s0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}]}, 0x120}, 0x1, 0x0, 0x0, 0x80000}, 0x40001) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, r4, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @remote}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x2a}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40040d0}, 0x4004080) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) [ 832.272247] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 832.279512] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 832.286778] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 832.294044] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000c [ 832.301311] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:04:34 executing program 1: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x8d, 0x4000000090}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x8}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000041c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) ioctl$MON_IOCX_GET(r3, 0x40189206, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0) mkdir(&(0x7f0000000540)='./file0\x00', 0x0) r4 = openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000440)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) listen(r4, 0x7) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000200), 0x12) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000280)=0x7fe5) 00:04:34 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 832.494898] BTRFS info (device loop2): unrecognized mount option 'Nڞ' [ 832.612676] BTRFS error (device loop2): open_ctree failed 00:04:34 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) sched_setattr(0x0, &(0x7f0000000000)={0x38, 0x1, 0x1000007a, 0x8, 0x8, 0x8001, 0x6, 0xa, 0x7, 0x1}, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)=0xa498) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x200002) sendfile(r0, r4, 0x0, 0x80001d00c0d0) 00:04:34 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3", 0x20, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:04:34 executing program 5 (fault-call:10 fault-nth:13): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:04:34 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3", 0x20, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:04:34 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)={0x14, r1, 0x711, 0x0, 0x0, {0x8}}, 0x14}}, 0x0) sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x200}]}, 0x1c}, 0x1, 0x0, 0x0, 0x84}, 0x20000800) r2 = socket(0x11, 0x800000003, 0x8) bind(r2, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000000)={'raw\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) [ 832.956881] FAULT_INJECTION: forcing a failure. [ 832.956881] name failslab, interval 1, probability 0, space 0, times 0 [ 832.968217] CPU: 0 PID: 14699 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 832.976114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 832.985462] Call Trace: [ 832.988046] dump_stack+0x1b2/0x283 [ 832.991666] should_fail.cold+0x10a/0x154 [ 832.995795] should_failslab+0xd6/0x130 [ 832.999753] kmem_cache_alloc+0x28e/0x3c0 [ 833.003884] create_new_namespaces+0x30/0x720 [ 833.008366] ? security_capable+0x88/0xb0 [ 833.012504] copy_namespaces+0x27b/0x310 [ 833.016558] copy_process.part.0+0x2600/0x6f00 [ 833.021143] ? trace_hardirqs_on+0x10/0x10 [ 833.025367] ? retint_kernel+0x2d/0x2d [ 833.029251] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 833.034257] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 833.039012] ? __cleanup_sighand+0x40/0x40 [ 833.043257] ? _raw_spin_unlock_irq+0x5a/0x80 [ 833.047750] _do_fork+0x184/0xc80 [ 833.051210] ? fork_idle+0x270/0x270 [ 833.054931] ? io_schedule_timeout+0x140/0x140 [ 833.059512] ? SyS_read+0x210/0x210 [ 833.063138] ? SyS_clock_settime+0x1a0/0x1a0 [ 833.067543] ? do_syscall_64+0x4c/0x640 [ 833.071513] ? sys_vfork+0x20/0x20 [ 833.075049] do_syscall_64+0x1d5/0x640 [ 833.078936] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 833.084119] RIP: 0033:0x45de59 [ 833.087297] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 833.095005] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 833.102275] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 833.109544] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 833.116850] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000d [ 833.124119] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:04:34 executing program 1: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="0c010000", @ANYRES16=0x0, @ANYBLOB="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"], 0x10c}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f00000000c0)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) writev(r1, &(0x7f0000000540)=[{&(0x7f0000000140)="7f49b6b64c6de85c374703cfda6e", 0xe}, {&(0x7f00000003c0)='I', 0x1}, {&(0x7f00000004c0)="2614434e0836bd288024650a9f9ef6676b0d68a065b614dbb22c4e54c90b6a7a36edf2", 0x23}], 0x3) [ 833.264461] BTRFS info (device loop2): unrecognized mount option 'Nڞ' [ 833.265352] print_req_error: I/O error, dev loop0, sector 0 00:04:35 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3", 0x20, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:04:35 executing program 1: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000dc0)='/dev/dsp1\x00', 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2000, 0x0) ioctl$USBDEVFS_FREE_STREAMS(r3, 0x8008551d, &(0x7f0000000040)={0x8823, 0xf, [{0x5}, {0x9}, {0x5}, {0x4, 0x1}, {0x7}, {0x5, 0x1}, {0x9}, {0xb, 0x1}, {0x3}, {0xc, 0x1}, {0x7}, {0x2, 0x1}, {0x9}, {0x5, 0x1}, {0x1}]}) syz_mount_image$hfs(&(0x7f0000001340)='hfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001800), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='quiet,codepage=i']) [ 833.347414] BTRFS error (device loop2): open_ctree failed 00:04:35 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000500)="597d766800000000000000000000000000000000000000000000000000000000fcb2096bad154c2da9a086564f36bcc3000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045010000000000000000000000010000000000000000000001000000000000720000000000001000000010000000100000000000000000000000000000000000000000000000000000000000000000122badb145de474f84c86b8fd41337fdfcb2096bad154c2da9a086564f36bcc3", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e4000010000000000000004000000000000200000000000000000001000000000002000000000000000010000000100000001000000100000001000000000000000000100000000000122badb145de474f84c86b8fd41337fd", 0x6c, 0x10320}, {&(0x7f0000000280)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000002800)=ANY=[@ANYBLOB="4e5abe"]) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000680)=@qipcrtr, 0x80, &(0x7f0000000a40)=[{&(0x7f0000000700)=""/35, 0x23}, {&(0x7f0000000740)=""/38, 0x26}, {&(0x7f0000000800)=""/177, 0xb1}, {&(0x7f00000008c0)=""/204, 0xcc}, {&(0x7f00000009c0)=""/84, 0x54}, {&(0x7f0000000780)=""/41, 0x29}], 0x6}, 0x101) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = open(&(0x7f00000001c0)='./file0\x00', 0xa440, 0x110) r2 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x0, 0x1, 0x1, 0x1f, 0x0, 0x400000000}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r2, r3, &(0x7f0000000240)=0x202, 0x4000000000dc) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000001700)='NLBL_UNLBL\x00') r5 = socket(0x11, 0x800000003, 0x8) sendmsg$NLBL_UNLABEL_C_STATICADD(r3, &(0x7f0000000640)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001780)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c7fc5db6cdef069691c1538af5784cc33cbb0d4e80385acf560eb3aece760751d023b69a4cc8e519643edf017aa42ee890b77e13bd5ff194db428aca06f6667a4d49a6404d7067e4aabab05b075f3d5476a93659168c63788d138bc3d7d7d5a67b53ab72c", @ANYRES16=r5, @ANYBLOB="00022dbd7000fedbdf250300000008000400e0000002"], 0x1c}, 0x1, 0x0, 0x0, 0x8}, 0x20008004) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000001940)=ANY=[@ANYBLOB="000000002509eae5f1c5a6558f5e41c38022e68b6aa734a36c2882ffa1915a3194388323d0cc9e0dc58a05130ff60f38072c5bf69c4b1644f151e5e9968e62485548d1e65cb71f44e8e62565157656f3b80c6fdc569bb073d32fdc9236f3556e056fe4ab40a822494dfc42d74d3ace54cee82b26a2e370ce36910c26519b0db6e3039bb525ff34f2ce00"/153, @ANYRES16=r4, @ANYBLOB="040001000000080200fe88000000000000000000000000000108000500ac1e0001140006006272696467655f736c6176655f31000014000600636169663000000000000000000000001400020020010000000000000000000000000000080004007f000001080004007f000001"], 0x7c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc001) sendmsg$NLBL_UNLABEL_C_ACCEPT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000b00)=ANY=[@ANYBLOB="200100001ed70d0f417fc8b10cdd615424f9a3ed4440dc276bd9337345cbd2e109b29a6452839ed7f236dee01c115a51854b077981430b8b6aa81f18d5ae5fc6db1f31c0e20dc82325243623d4fe5fde657c9df1701bcad46a003e18c73879d1844bf8dd312eed5b36173893e3d85e7fe61ffc6889b9d9a468eb2a48e8434ac50ae1a1374eabe1e75226db49889dabbd73a397c3f3d4944cf910c38a2c685c0fafc62a931ce687779cf3f0124d5f82e53af233a6bbaa8f2f33b822656a4077f6b3bd960a7ef9c20f526670138e940a6e3f1dc600000000000000", @ANYRES16=r4, @ANYBLOB="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"], 0x120}, 0x1, 0x0, 0x0, 0x80000}, 0x40001) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, r4, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @remote}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x2a}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40040d0}, 0x4004080) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) 00:04:35 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf33", 0x23, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:04:35 executing program 1: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000596adc1c0028d1250540c1d0fa62c5089279e6a2df09d724377c9e128009000100626f6e64000000000c0002807b7c1cbada23931bc96bede28fb7ba266b38a00721faf3ab71905f6e8570885b7de40c41e3fe5dea90f8c155081f271836e2671cffd78bc94c8c5d44949de9f7e8fa89c44c48cc68207ff98d0874dec444255b47b3cdf6"], 0x3c}}, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) [ 833.522787] BTRFS info (device loop2): unrecognized mount option 'NZ' 00:04:35 executing program 5 (fault-call:10 fault-nth:14): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:04:35 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf33", 0x23, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 833.575475] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 833.597252] BTRFS error (device loop2): open_ctree failed [ 833.643911] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 00:04:35 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf33", 0x23, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 833.827203] FAULT_INJECTION: forcing a failure. [ 833.827203] name failslab, interval 1, probability 0, space 0, times 0 [ 833.838809] CPU: 1 PID: 14762 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 833.846703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 833.856054] Call Trace: [ 833.858644] dump_stack+0x1b2/0x283 [ 833.862281] should_fail.cold+0x10a/0x154 [ 833.866438] should_failslab+0xd6/0x130 [ 833.870414] kmem_cache_alloc+0x28e/0x3c0 [ 833.874563] alloc_vfsmnt+0x23/0x7f0 [ 833.878275] ? clone_mnt+0x67/0xff0 [ 833.881897] clone_mnt+0x6c/0xff0 [ 833.885349] ? ida_simple_get+0x112/0x190 [ 833.889493] copy_tree+0xd6/0xa20 [ 833.892940] ? copy_mnt_ns+0x102/0xa30 [ 833.896828] copy_mnt_ns+0x167/0xa30 [ 833.900543] ? create_new_namespaces+0x30/0x720 [ 833.905205] ? do_mount+0x2a00/0x2a00 [ 833.909006] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 833.914032] ? kmem_cache_alloc+0x35f/0x3c0 [ 833.918370] create_new_namespaces+0xc9/0x720 [ 833.922865] ? security_capable+0x88/0xb0 [ 833.927019] copy_namespaces+0x27b/0x310 [ 833.931091] copy_process.part.0+0x2600/0x6f00 [ 833.935678] ? trace_hardirqs_on+0x10/0x10 [ 833.939913] ? check_preemption_disabled+0x35/0x240 [ 833.944929] ? check_preemption_disabled+0x35/0x240 [ 833.949946] ? finish_task_switch+0x178/0x610 [ 833.954451] ? __cleanup_sighand+0x40/0x40 [ 833.958684] ? _raw_spin_unlock_irq+0x5a/0x80 [ 833.963178] ? finish_task_switch+0x14d/0x610 [ 833.967670] ? switch_mm_irqs_off+0x2d2/0xeb0 [ 833.972166] _do_fork+0x184/0xc80 [ 833.975618] ? fork_idle+0x270/0x270 [ 833.979329] ? io_schedule_timeout+0x140/0x140 [ 833.983906] ? fput+0xb/0x140 [ 833.987013] ? do_syscall_64+0x4c/0x640 [ 833.990985] ? sys_vfork+0x20/0x20 [ 833.994524] do_syscall_64+0x1d5/0x640 [ 833.998412] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 834.003625] RIP: 0033:0x45de59 [ 834.006811] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 834.014513] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 834.021777] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 834.029041] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 834.036311] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000e [ 834.043574] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:04:36 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf3372", 0x24, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 834.309347] BTRFS info (device loop2): unrecognized mount option 'NZ' [ 834.378474] BTRFS error (device loop2): open_ctree failed 00:04:36 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf3372", 0x24, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:04:36 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e4000010000000000000004000000000000200000000000000000001000000000002000000000000000010000000100000001000000100000001000000000000000000100000000000122badb145de474f84c86b8fd41337fd", 0x6c, 0x10320}, {&(0x7f0000000280)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000002800)=ANY=[@ANYBLOB="4eda9e"]) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x0, &(0x7f0000000100)}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = open(&(0x7f00000001c0)='./file0\x00', 0xa440, 0x110) r2 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x0, 0x1, 0x1, 0x1f, 0x0, 0x400000000}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r2, r3, &(0x7f0000000240)=0x202, 0x4000000000dc) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000001700)='NLBL_UNLBL\x00') setsockopt$netlink_NETLINK_NO_ENOBUFS(r3, 0x10e, 0x5, &(0x7f0000000680)=0x8, 0x4) r5 = socket(0x11, 0x800000003, 0x8) sendmsg$NLBL_UNLABEL_C_STATICADD(r3, &(0x7f0000000640)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001780)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c7fc5db6cdef069691c1538af5784cc33cbb0d4e80385acf560eb3aece760751d023b69a4cc8e519643edf017aa42ee890b77e13bd5ff194db428aca06f6667a4d49a6404d7067e4aabab05b075f3d5476a93659168c63788d138bc3d7d7d5a67b53ab72c", @ANYRES16=r5, @ANYBLOB="00022dbd7000fedbdf250300000008000400e0000002"], 0x1c}, 0x1, 0x0, 0x0, 0x8}, 0x20008004) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000006c0)={&(0x7f0000001940)=ANY=[@ANYBLOB="000000002509eae5f1c5a6558f5e41c38022e68b6aa734a36c2882ffa1915a3194388323d0cc9e0dc58a05130ff60f38072c5bf69c4b1644f151e5e9968e62485548d1e65cb71f44e8e62565157656f3b80c6fdc569bb073d32fdc9236f3556e056fe4ab40a822494dfc42d74d3ace54cee82b26a2e370ce36910c26519b0db6e3039bb525ff34f2ce00"/153, @ANYRES16=r4, @ANYBLOB="040001000000080200fe88000000000000000000000000000108000500ac1e0001140006006272696467655f736c6176655f31000014000600636169663000000000000000000000001400020020010000000000000000000000000000080004007f000001080004007f000001"], 0x7c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc001) sendmsg$NLBL_UNLABEL_C_ACCEPT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000001800)={0x120, r4, 0x8, 0x70bd26, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:dpkg_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ip6_vti0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'erspan0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @NLBL_UNLABEL_A_SECCTX={0x29, 0x7, 'system_u:object_r:pinentry_exec_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:dpkg_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @remote}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @loopback}, @NLBL_UNLABEL_A_SECCTX={0x24, 0x7, 'system_u:object_r:apm_bios_t:s0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}]}, 0x120}, 0x1, 0x0, 0x0, 0x80000}, 0x40001) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, r4, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @remote}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x2a}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40040d0}, 0x4004080) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) 00:04:36 executing program 5 (fault-call:10 fault-nth:15): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:04:36 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf3372", 0x24, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 834.558575] BTRFS info (device loop2): unrecognized mount option 'Nڞ' [ 834.636856] BTRFS error (device loop2): open_ctree failed [ 834.682808] FAULT_INJECTION: forcing a failure. [ 834.682808] name failslab, interval 1, probability 0, space 0, times 0 [ 834.694269] CPU: 1 PID: 14810 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 834.702188] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 834.711521] Call Trace: [ 834.714093] dump_stack+0x1b2/0x283 [ 834.717716] should_fail.cold+0x10a/0x154 [ 834.721866] should_failslab+0xd6/0x130 [ 834.725838] kmem_cache_alloc+0x28e/0x3c0 [ 834.730072] alloc_vfsmnt+0x23/0x7f0 [ 834.733779] clone_mnt+0x6c/0xff0 [ 834.737229] ? ida_simple_get+0x112/0x190 [ 834.741374] copy_tree+0xd6/0xa20 [ 834.744821] ? copy_mnt_ns+0x102/0xa30 [ 834.748705] copy_mnt_ns+0x167/0xa30 [ 834.752418] ? create_new_namespaces+0x30/0x720 [ 834.757169] ? do_mount+0x2a00/0x2a00 [ 834.760964] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 834.765977] ? kmem_cache_alloc+0x35f/0x3c0 [ 834.770326] create_new_namespaces+0xc9/0x720 [ 834.774816] ? security_capable+0x88/0xb0 [ 834.778962] copy_namespaces+0x27b/0x310 [ 834.783017] copy_process.part.0+0x2600/0x6f00 [ 834.787593] ? retint_kernel+0x2d/0x2d [ 834.791475] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 834.796491] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 834.801246] ? retint_kernel+0x2d/0x2d [ 834.805134] ? __cleanup_sighand+0x40/0x40 [ 834.809366] ? _raw_spin_unlock_irq+0x5a/0x80 [ 834.813856] ? finish_task_switch+0x14d/0x610 [ 834.818369] ? switch_mm_irqs_off+0x2d2/0xeb0 [ 834.822860] _do_fork+0x184/0xc80 [ 834.826312] ? fork_idle+0x270/0x270 [ 834.830022] ? io_schedule_timeout+0x140/0x140 [ 834.834597] ? fput+0xb/0x140 [ 834.837703] ? do_syscall_64+0x4c/0x640 [ 834.841670] ? sys_vfork+0x20/0x20 [ 834.845207] do_syscall_64+0x1d5/0x640 [ 834.849097] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 834.854277] RIP: 0033:0x45de59 [ 834.857458] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 834.865156] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 834.872416] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 834.879682] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 834.886945] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000f [ 834.894208] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 [ 834.920710] print_req_error: I/O error, dev loop2, sector 24 00:04:36 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 835.012069] BTRFS info (device loop2): unrecognized mount option 'Nڞ' [ 835.056603] BTRFS error (device loop2): open_ctree failed [ 835.062762] FAT-fs (loop0): invalid media value (0x80) [ 835.085207] FAT-fs (loop0): Can't find a valid FAT filesystem 00:04:36 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e4000010000000000000004000000000000200000000000000000001000000000002000000000000000010000000100000001000000100000001000000000000000000100000000000122badb145de474f84c86b8fd41337fd", 0x6c, 0x10320}, {&(0x7f0000000280)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000002800)=ANY=[@ANYBLOB="4eda9e"]) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = open(&(0x7f00000001c0)='./file0\x00', 0xa440, 0x110) r2 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x0, 0x1, 0x1, 0x1f, 0x0, 0x400000000}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r2, r3, &(0x7f0000000240)=0x202, 0x4000000000dc) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000001700)='NLBL_UNLBL\x00') r5 = socket(0x11, 0x800000003, 0x8) sendmsg$NLBL_UNLABEL_C_STATICADD(r3, &(0x7f0000000640)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001780)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c7fc5db6cdef069691c1538af5784cc33cbb0d4e80385acf560eb3aece760751d023b69a4cc8e519643edf017aa42ee890b77e13bd5ff194db428aca06f6667a4d49a6404d7067e4aabab05b075f3d5476a93659168c63788d138bc3d7d7d5a67b53ab72c", @ANYRES16=r5, @ANYBLOB="00022dbd7000fedbdf250300000008000400e0000002"], 0x1c}, 0x1, 0x0, 0x0, 0x8}, 0x20008004) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000001940)=ANY=[@ANYBLOB="000000002509eae5f1c5a6558f5e41c38022e68b6aa734a36c2882ffa1915a3194388323d0cc9e0dc58a05130ff60f38072c5bf69c4b1644f151e5e9968e62485548d1e65cb71f44e8e62565157656f3b80c6fdc569bb073d32fdc9236f3556e056fe4ab40a822494dfc42d74d3ace54cee82b26a2e370ce36910c26519b0db6e3039bb525ff34f2ce00"/153, @ANYRES16=r4, @ANYBLOB="040001000000080200fe88000000000000000000000000000108000500ac1e0001140006006272696467655f736c6176655f31000014000600636169663000000000000000000000001400020020010000000000000000000000000000080004007f000001080004007f000001"], 0x7c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc001) sendmsg$NLBL_UNLABEL_C_ACCEPT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000800)=ANY=[@ANYBLOB="cfde17819b7a6889c3bc7ae5dacf876f289da8d95bb5bab7f171a3168caad1aee6d5580d71c6615d6436623708bc91ab9b2c582b7abbc6f624ad6bd2f7c7b2770b4b0004f509ffb31b231d551c4afccd75fa731aa083", @ANYRES16=r4, @ANYBLOB="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"], 0x120}, 0x1, 0x0, 0x0, 0x80000}, 0x40001) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, r4, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @remote}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x2a}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40040d0}, 0x4004080) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) 00:04:36 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 835.249352] BTRFS info (device loop2): unrecognized mount option 'Nڞ' [ 835.272945] FAT-fs (loop0): invalid media value (0x80) [ 835.285247] FAT-fs (loop0): Can't find a valid FAT filesystem 00:04:37 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 835.316674] BTRFS error (device loop2): open_ctree failed 00:04:37 executing program 5 (fault-call:10 fault-nth:16): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) [ 835.415243] FAT-fs (loop0): invalid media value (0x80) [ 835.430736] FAT-fs (loop0): Can't find a valid FAT filesystem 00:04:37 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 835.593391] FAULT_INJECTION: forcing a failure. [ 835.593391] name failslab, interval 1, probability 0, space 0, times 0 [ 835.604878] CPU: 0 PID: 14855 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 835.612770] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 835.622120] Call Trace: [ 835.624715] dump_stack+0x1b2/0x283 [ 835.628343] should_fail.cold+0x10a/0x154 [ 835.632492] should_failslab+0xd6/0x130 [ 835.636466] __kmalloc_track_caller+0x2bc/0x400 [ 835.641128] ? kstrdup_const+0x35/0x60 [ 835.645012] kstrdup+0x36/0x70 [ 835.648202] kstrdup_const+0x35/0x60 [ 835.651910] alloc_vfsmnt+0xe0/0x7f0 [ 835.655620] clone_mnt+0x6c/0xff0 [ 835.659071] ? is_subdir+0x223/0x38a [ 835.662812] copy_tree+0x33e/0xa20 [ 835.666357] copy_mnt_ns+0x167/0xa30 [ 835.670070] ? create_new_namespaces+0x30/0x720 [ 835.674735] ? do_mount+0x2a00/0x2a00 [ 835.678107] FAT-fs (loop0): bogus number of reserved sectors [ 835.678533] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 835.678545] ? kmem_cache_alloc+0x35f/0x3c0 [ 835.692756] FAT-fs (loop0): Can't find a valid FAT filesystem [ 835.693737] create_new_namespaces+0xc9/0x720 [ 835.693749] ? security_capable+0x88/0xb0 [ 835.693762] copy_namespaces+0x27b/0x310 [ 835.693773] copy_process.part.0+0x2600/0x6f00 [ 835.693785] ? get_pid_task+0xb8/0x130 [ 835.693797] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 835.693814] ? __cleanup_sighand+0x40/0x40 [ 835.693830] ? lock_downgrade+0x740/0x740 [ 835.693844] _do_fork+0x184/0xc80 [ 835.693866] ? fork_idle+0x270/0x270 [ 835.693875] ? fput+0xb/0x140 [ 835.693883] ? SyS_write+0x14d/0x210 [ 835.693892] ? SyS_read+0x210/0x210 [ 835.693902] ? SyS_clock_settime+0x1a0/0x1a0 [ 835.693913] ? do_syscall_64+0x4c/0x640 [ 835.693920] ? sys_vfork+0x20/0x20 [ 835.693930] do_syscall_64+0x1d5/0x640 [ 835.693945] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 835.693952] RIP: 0033:0x45de59 [ 835.693957] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 835.693966] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 835.693971] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 835.693995] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 835.694000] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000010 [ 835.694006] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:04:37 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 835.987395] BTRFS info (device loop2): unrecognized mount option 'Nڞ' 00:04:37 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 836.046158] BTRFS error (device loop2): open_ctree failed [ 836.053274] FAT-fs (loop0): bogus number of reserved sectors [ 836.066558] FAT-fs (loop0): Can't find a valid FAT filesystem 00:04:37 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e4000010000000000000004000000000000200000000000000000001000000000002000000000000000010000000100000001000000100000001000000000000000000100000000000122badb145de474f84c86b8fd41337fd", 0x6c, 0x10320}, {&(0x7f0000000280)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000002800)=ANY=[@ANYBLOB="4eda9e"]) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = open(&(0x7f00000001c0)='./file0\x00', 0xa440, 0x110) r2 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x0, 0x1, 0x1, 0x1f, 0x0, 0x400000000}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r2, r3, &(0x7f0000000240)=0x202, 0x4000000000dc) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000001700)='NLBL_UNLBL\x00') r5 = socket(0x11, 0x800000003, 0x8) sendmsg$NLBL_UNLABEL_C_STATICADD(r3, &(0x7f0000000640)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001780)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c7fc5db6cdef069691c1538af5784cc33cbb0d4e80385acf560eb3aece760751d023b69a4cc8e519643edf017aa42ee890b77e13bd5ff194db428aca06f6667a4d49a6404d7067e4aabab05b075f3d5476a93659168c63788d138bc3d7d7d5a67b53ab72c", @ANYRES16=r5, @ANYBLOB="00022dbd7000fedbdf250300000008000400e0000002"], 0x1c}, 0x1, 0x0, 0x0, 0x8}, 0x20008004) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000001940)=ANY=[@ANYBLOB="000000002509eae5f1c5a6558f5e41c38022e68b6aa734a36c2882ffa1915a3194388323d0cc9e0dc58a05130ff60f38072c5bf69c4b1644f151e5e9968e62485548d1e65cb71f44e8e62565157656f3b80c6fdc569bb073d32fdc9236f3556e056fe4ab40a822494dfc42d74d3ace54cee82b26a2e370ce36910c26519b0db6e3039bb525ff34f2ce00"/153, @ANYRES16=r4, @ANYBLOB="040001000000080200fe88000000000000000000000000000108000500ac1e0001140006006272696467655f736c6176655f31000014000600636169663000000000000000000000001400020020010000000000000000000000000000080004007f000001080004007f000001"], 0x7c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc001) sendmsg$NLBL_UNLABEL_C_ACCEPT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000001800)={0x120, r4, 0x8, 0x70bd26, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:dpkg_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ip6_vti0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'erspan0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @NLBL_UNLABEL_A_SECCTX={0x29, 0x7, 'system_u:object_r:pinentry_exec_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:dpkg_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @remote}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @loopback}, @NLBL_UNLABEL_A_SECCTX={0x24, 0x7, 'system_u:object_r:apm_bios_t:s0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}]}, 0x120}, 0x1, 0x0, 0x0, 0x80000}, 0x40001) signalfd(r0, &(0x7f0000000680)={[0xfffffffffffffffb]}, 0x8) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, r4, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @remote}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x2a}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40040d0}, 0x4004080) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) [ 836.165568] FAT-fs (loop0): bogus number of reserved sectors [ 836.181009] FAT-fs (loop0): Can't find a valid FAT filesystem [ 836.193777] BTRFS info (device loop2): unrecognized mount option 'Nڞ' 00:04:38 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{0x0}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 836.259396] BTRFS error (device loop2): open_ctree failed 00:04:38 executing program 5 (fault-call:10 fault-nth:17): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) [ 836.340286] FAT-fs (loop0): bogus number of reserved sectors [ 836.362486] FAT-fs (loop0): Can't find a valid FAT filesystem 00:04:38 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{0x0}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 836.509944] FAULT_INJECTION: forcing a failure. [ 836.509944] name failslab, interval 1, probability 0, space 0, times 0 [ 836.521487] CPU: 1 PID: 14910 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 836.529375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 836.538724] Call Trace: [ 836.541316] dump_stack+0x1b2/0x283 [ 836.544969] should_fail.cold+0x10a/0x154 [ 836.549119] should_failslab+0xd6/0x130 [ 836.553093] kmem_cache_alloc+0x28e/0x3c0 [ 836.557238] alloc_vfsmnt+0x23/0x7f0 [ 836.560947] clone_mnt+0x6c/0xff0 [ 836.564399] copy_tree+0x33e/0xa20 [ 836.567942] copy_mnt_ns+0x167/0xa30 [ 836.571656] ? create_new_namespaces+0x30/0x720 [ 836.576318] ? do_mount+0x2a00/0x2a00 [ 836.580113] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 836.585124] ? kmem_cache_alloc+0x35f/0x3c0 [ 836.589443] create_new_namespaces+0xc9/0x720 [ 836.593935] ? security_capable+0x88/0xb0 [ 836.598083] copy_namespaces+0x27b/0x310 [ 836.602140] copy_process.part.0+0x2600/0x6f00 [ 836.606719] ? get_pid_task+0xb8/0x130 [ 836.610603] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 836.615539] ? __cleanup_sighand+0x40/0x40 [ 836.619782] ? lock_downgrade+0x740/0x740 [ 836.624049] _do_fork+0x184/0xc80 [ 836.627515] ? fork_idle+0x270/0x270 [ 836.631224] ? fput+0xb/0x140 [ 836.634321] ? SyS_write+0x14d/0x210 [ 836.638027] ? SyS_read+0x210/0x210 [ 836.641649] ? SyS_clock_settime+0x1a0/0x1a0 [ 836.646051] ? do_syscall_64+0x4c/0x640 [ 836.650018] ? sys_vfork+0x20/0x20 [ 836.653556] do_syscall_64+0x1d5/0x640 [ 836.657444] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 836.662629] RIP: 0033:0x45de59 [ 836.665807] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 836.673509] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 836.680781] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 836.688045] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 836.695307] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000011 [ 836.702572] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 [ 836.797753] FAT-fs (loop0): bogus number of reserved sectors [ 836.813001] FAT-fs (loop0): Can't find a valid FAT filesystem 00:04:38 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{0x0}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:04:38 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 836.957666] FAT-fs (loop0): bogus number of reserved sectors [ 836.966673] FAT-fs (loop0): Can't find a valid FAT filesystem [ 836.989818] BTRFS info (device loop2): unrecognized mount option 'Nڞ' [ 837.076180] FAT-fs (loop0): bogus number of reserved sectors [ 837.091158] BTRFS error (device loop2): open_ctree failed [ 837.101314] FAT-fs (loop0): Can't find a valid FAT filesystem 00:04:38 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e4000010000000000000004000000000000200000000000000000001000000000002000000000000000010000000100000001000000100000001000000000000000000100000000000122badb145de474f84c86b8fd41337fd", 0x6c, 0x10320}, {&(0x7f0000000280)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000002800)=ANY=[@ANYBLOB="4eda9e"]) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = open(&(0x7f00000001c0)='./file0\x00', 0xa440, 0x110) r2 = socket$inet6(0xa, 0x3, 0x6) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000680)={@mcast1, 0x400, 0x0, 0x1, 0x0, 0x401f, 0x4, 0x400000000}, 0x20) r4 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r2, r4, &(0x7f0000000240)=0x202, 0x4000000000dc) r5 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000001700)='NLBL_UNLBL\x00') r6 = socket(0x11, 0x800000003, 0x8) sendmsg$NLBL_UNLABEL_C_STATICADD(r4, &(0x7f0000000640)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001780)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c7fc5db6cdef069691c1538af5784cc33cbb0d4e80385acf560eb3aece760751d023b69a4cc8e519643edf017aa42ee890b77e13bd5ff194db428aca06f6667a4d49a6404d7067e4aabab05b075f3d5476a93659168c63788d138bc3d7d7d5a67b53ab72c", @ANYRES16=r6, @ANYBLOB="00022dbd7000fedbdf250300000008000400e0000002"], 0x1c}, 0x1, 0x0, 0x0, 0x8}, 0x20008004) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000001940)=ANY=[@ANYBLOB="000000002509eae5f1c5a6558f5e41c38022e68b6aa734a36c2882ffa1915a3194388323d0cc9e0dc58a05130ff60f38072c5bf69c4b1644f151e5e9968e62485548d1e65cb71f44e8e62565157656f3b80c6fdc569bb073d32fdc9236f3556e056fe4ab40a822494dfc42d74d3ace54cee82b26a2e370ce36910c26519b0db6e3039bb525ff34f2ce00"/153, @ANYRES16=r5, @ANYBLOB="040001000000080200fe88000000000000000000000000000108000500ac1e0001140006006272696467655f736c6176655f31000014000600636169663000000000000000000000001400020020010000000000000000000000000000080004007f000001080004007f000001"], 0x7c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc001) sendmsg$NLBL_UNLABEL_C_ACCEPT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000001800)={0x120, r5, 0x8, 0x70bd26, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:dpkg_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ip6_vti0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'erspan0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @NLBL_UNLABEL_A_SECCTX={0x29, 0x7, 'system_u:object_r:pinentry_exec_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:dpkg_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @remote}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @loopback}, @NLBL_UNLABEL_A_SECCTX={0x24, 0x7, 'system_u:object_r:apm_bios_t:s0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}]}, 0x120}, 0x1, 0x0, 0x0, 0x80000}, 0x40001) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="000229060000000000000000000008000400ac1414bb08000500ac1e010108000400ac14142a"], 0x2c}, 0x1, 0x0, 0x0, 0x40040d0}, 0x4004080) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) 00:04:38 executing program 5 (fault-call:10 fault-nth:18): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:04:38 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 837.281818] BTRFS info (device loop2): unrecognized mount option 'Nڞ' [ 837.310518] FAT-fs (loop0): bogus number of reserved sectors [ 837.341511] BTRFS error (device loop2): open_ctree failed [ 837.342745] FAT-fs (loop0): Can't find a valid FAT filesystem [ 837.398271] FAULT_INJECTION: forcing a failure. [ 837.398271] name failslab, interval 1, probability 0, space 0, times 0 [ 837.409702] CPU: 0 PID: 14959 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 837.417590] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 837.426953] Call Trace: [ 837.429534] dump_stack+0x1b2/0x283 [ 837.433143] should_fail.cold+0x10a/0x154 [ 837.437301] should_failslab+0xd6/0x130 [ 837.441272] __kmalloc_track_caller+0x2bc/0x400 [ 837.445919] ? kstrdup_const+0x35/0x60 [ 837.449788] kstrdup+0x36/0x70 [ 837.452960] kstrdup_const+0x35/0x60 [ 837.456652] alloc_vfsmnt+0xe0/0x7f0 [ 837.460346] clone_mnt+0x6c/0xff0 [ 837.463779] copy_tree+0x33e/0xa20 [ 837.467303] copy_mnt_ns+0x167/0xa30 [ 837.471002] ? create_new_namespaces+0x30/0x720 [ 837.475666] ? do_mount+0x2a00/0x2a00 [ 837.479451] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 837.484446] ? kmem_cache_alloc+0x35f/0x3c0 [ 837.488746] create_new_namespaces+0xc9/0x720 [ 837.493221] ? security_capable+0x88/0xb0 [ 837.497350] copy_namespaces+0x27b/0x310 [ 837.501407] copy_process.part.0+0x2600/0x6f00 [ 837.505971] ? _raw_spin_unlock_irq+0x24/0x80 [ 837.510446] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 837.515441] ? _raw_spin_unlock_irq+0x5a/0x80 [ 837.519918] ? finish_task_switch+0x178/0x610 [ 837.524390] ? finish_task_switch+0x14d/0x610 [ 837.528872] ? __cleanup_sighand+0x40/0x40 [ 837.533088] ? lock_downgrade+0x740/0x740 [ 837.537221] _do_fork+0x184/0xc80 [ 837.540672] ? fork_idle+0x270/0x270 [ 837.544366] ? fput+0xb/0x140 [ 837.547452] ? SyS_write+0x14d/0x210 [ 837.551144] ? SyS_read+0x210/0x210 [ 837.554769] ? SyS_clock_settime+0x1a0/0x1a0 [ 837.559162] ? do_syscall_64+0x4c/0x640 [ 837.563131] ? sys_vfork+0x20/0x20 [ 837.566657] do_syscall_64+0x1d5/0x640 [ 837.570528] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 837.575709] RIP: 0033:0x45de59 [ 837.578880] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 837.586565] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 837.593831] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 837.601088] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 837.608353] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000012 [ 837.615624] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:04:39 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 837.799019] FAT-fs (loop0): bogus number of reserved sectors [ 837.812400] FAT-fs (loop0): Can't find a valid FAT filesystem 00:04:39 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400", 0xc}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:04:39 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400", 0xc}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 837.980946] FAT-fs (loop0): bogus number of reserved sectors [ 837.991115] FAT-fs (loop0): Can't find a valid FAT filesystem 00:04:39 executing program 5 (fault-call:10 fault-nth:19): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) [ 838.089582] FAT-fs (loop0): bogus number of reserved sectors [ 838.097764] FAT-fs (loop0): Can't find a valid FAT filesystem [ 838.128748] print_req_error: I/O error, dev loop2, sector 0 00:04:39 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400", 0xc}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 838.134605] print_req_error: I/O error, dev loop2, sector 0 [ 838.140438] Buffer I/O error on dev loop2, logical block 0, async page read [ 838.165454] BTRFS info (device loop2): unrecognized mount option 'Nڞ' [ 838.168703] print_req_error: I/O error, dev loop0, sector 1 [ 838.178097] Buffer I/O error on dev loop0, logical block 1, async page read [ 838.186893] print_req_error: I/O error, dev loop0, sector 2 [ 838.192616] Buffer I/O error on dev loop0, logical block 2, async page read [ 838.201519] print_req_error: I/O error, dev loop0, sector 3 [ 838.207381] Buffer I/O error on dev loop0, logical block 3, async page read [ 838.214498] print_req_error: I/O error, dev loop0, sector 4 [ 838.220288] Buffer I/O error on dev loop0, logical block 4, async page read [ 838.227529] print_req_error: I/O error, dev loop0, sector 5 [ 838.233238] Buffer I/O error on dev loop0, logical block 5, async page read [ 838.240500] print_req_error: I/O error, dev loop0, sector 6 [ 838.246413] Buffer I/O error on dev loop0, logical block 6, async page read [ 838.253833] Buffer I/O error on dev loop0, logical block 7, async page read [ 838.269382] BTRFS error (device loop2): open_ctree failed [ 838.288719] FAT-fs (loop0): bogus number of reserved sectors [ 838.347221] FAULT_INJECTION: forcing a failure. [ 838.347221] name failslab, interval 1, probability 0, space 0, times 0 [ 838.359032] CPU: 0 PID: 15002 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 838.366930] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 838.370770] FAT-fs (loop0): Can't find a valid FAT filesystem [ 838.376275] Call Trace: [ 838.376293] dump_stack+0x1b2/0x283 [ 838.376310] should_fail.cold+0x10a/0x154 [ 838.376326] should_failslab+0xd6/0x130 [ 838.376336] kmem_cache_alloc+0x28e/0x3c0 [ 838.376349] alloc_vfsmnt+0x23/0x7f0 [ 838.376358] clone_mnt+0x6c/0xff0 [ 838.376372] copy_tree+0x33e/0xa20 [ 838.376387] copy_mnt_ns+0x167/0xa30 [ 838.376400] ? create_new_namespaces+0x30/0x720 [ 838.419674] ? do_mount+0x2a00/0x2a00 [ 838.423479] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 838.428491] ? kmem_cache_alloc+0x35f/0x3c0 [ 838.432815] create_new_namespaces+0xc9/0x720 [ 838.437308] ? security_capable+0x88/0xb0 [ 838.441457] copy_namespaces+0x27b/0x310 [ 838.445520] copy_process.part.0+0x2600/0x6f00 [ 838.450103] ? get_pid_task+0xb8/0x130 [ 838.453987] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 838.458927] ? __cleanup_sighand+0x40/0x40 [ 838.463161] ? lock_downgrade+0x740/0x740 [ 838.467325] _do_fork+0x184/0xc80 [ 838.470781] ? fork_idle+0x270/0x270 [ 838.474494] ? fput+0xb/0x140 [ 838.477595] ? SyS_write+0x14d/0x210 [ 838.481304] ? SyS_read+0x210/0x210 [ 838.484930] ? SyS_clock_settime+0x1a0/0x1a0 [ 838.489336] ? do_syscall_64+0x4c/0x640 [ 838.493306] ? sys_vfork+0x20/0x20 [ 838.496849] do_syscall_64+0x1d5/0x640 [ 838.500740] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 838.505922] RIP: 0033:0x45de59 [ 838.509103] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 838.516803] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 838.524073] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 838.531335] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 838.538598] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 838.545860] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:04:40 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e4000010000000000000004000000000000200000000000000000001000000000002000000000000000010000000100000001000000100000001000000000000000000100000000000122badb145de474f84c86b8fd41337fd", 0x6c, 0x10320}, {&(0x7f0000000280)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="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"]) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = open(&(0x7f00000001c0)='./file0\x00', 0xa440, 0x110) r2 = socket$inet6(0xa, 0x3, 0x6) mount$9p_fd(0x0, &(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='9p\x00', 0x802005, &(0x7f0000000800)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@version_9p2000='version=9p2000'}, {@dfltuid={'dfltuid', 0x3d, 0xee01}}, {@access_uid={'access'}}, {@loose='loose'}, {@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '-\xeb)]'}}, {@nodevmap='nodevmap'}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'system_u:object_r:apm_bios_t:s0\x00'}}]}}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x0, 0x1, 0x1, 0x1f, 0x0, 0x400000000}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r2, r3, &(0x7f0000000240)=0x202, 0x4000000000dc) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000001700)='NLBL_UNLBL\x00') r5 = socket(0x11, 0x800000003, 0x8) sendmsg$NLBL_UNLABEL_C_STATICADD(r3, &(0x7f0000000640)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001780)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c7fc5db6cdef069691c1538af5784cc33cbb0d4e80385acf560eb3aece760751d023b69a4cc8e519643edf017aa42ee890b77e13bd5ff194db428aca06f6667a4d49a6404d7067e4aabab05b075f3d5476a93659168c63788d138bc3d7d7d5a67b53ab72c", @ANYRES16=r5, @ANYBLOB="00022dbd7000fedbdf250300000008000400e0000002"], 0x1c}, 0x1, 0x0, 0x0, 0x8}, 0x20008004) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000001940)=ANY=[@ANYBLOB="000000002509eae5f1c5a6558f5e41c38022e68b6aa734a36c2882ffa1915a3194388323d0cc9e0dc58a05130ff60f38072c5bf69c4b1644f151e5e9968e62485548d1e65cb71f44e8e62565157656f3b80c6fdc569bb073d32fdc9236f3556e056fe4ab40a822494dfc42d74d3ace54cee82b26a2e370ce36910c26519b0db6e3039bb525ff34f2ce00"/153, @ANYRES16=r4, @ANYBLOB="040001000000080200fe88000000000000000000000000000108000500ac1e0001140006006272696467655f736c6176655f31000014000600636169663000000000000000000000001400020020010000000000000000000000000000080004007f000001080004007f000001"], 0x7c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc001) sendmsg$NLBL_UNLABEL_C_ACCEPT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000001800)={0x120, r4, 0x8, 0x70bd26, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:dpkg_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ip6_vti0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'erspan0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @NLBL_UNLABEL_A_SECCTX={0x29, 0x7, 'system_u:object_r:pinentry_exec_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:dpkg_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @remote}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @loopback}, @NLBL_UNLABEL_A_SECCTX={0x24, 0x7, 'system_u:object_r:apm_bios_t:s0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}]}, 0x120}, 0x1, 0x0, 0x0, 0x80000}, 0x40001) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, r4, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @remote}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x2a}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40040d0}, 0x4004080) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) 00:04:40 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240", 0x12}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 838.742210] BTRFS info (device loop2): unrecognized mount option 'N kGR4>m[@0c7 GrKx [ 838.742210] v ˸_zCN!@ĺ'vh @0ҧbe Zw@G [ 838.742210] 9!?' [ 838.773949] FAT-fs (loop0): invalid media value (0x00) [ 838.794001] FAT-fs (loop0): Can't find a valid FAT filesystem 00:04:40 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240", 0x12}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 838.906643] BTRFS error (device loop2): open_ctree failed [ 838.917612] FAT-fs (loop0): invalid media value (0x00) [ 838.932328] FAT-fs (loop0): Can't find a valid FAT filesystem 00:04:40 executing program 5 (fault-call:10 fault-nth:20): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:04:40 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240", 0x12}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 839.103555] FAT-fs (loop0): invalid media value (0x00) [ 839.112432] FAT-fs (loop0): Can't find a valid FAT filesystem [ 839.164434] FAULT_INJECTION: forcing a failure. [ 839.164434] name failslab, interval 1, probability 0, space 0, times 0 [ 839.176088] CPU: 1 PID: 15044 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 839.183978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 839.193326] Call Trace: [ 839.195917] dump_stack+0x1b2/0x283 [ 839.199548] should_fail.cold+0x10a/0x154 [ 839.203698] should_failslab+0xd6/0x130 [ 839.207673] __kmalloc_track_caller+0x2bc/0x400 [ 839.212461] ? kstrdup_const+0x35/0x60 [ 839.216344] ? lock_downgrade+0x740/0x740 [ 839.220487] kstrdup+0x36/0x70 [ 839.223765] kstrdup_const+0x35/0x60 [ 839.227474] alloc_vfsmnt+0xe0/0x7f0 [ 839.231186] clone_mnt+0x6c/0xff0 [ 839.234637] copy_tree+0x33e/0xa20 [ 839.238269] copy_mnt_ns+0x167/0xa30 [ 839.241982] ? create_new_namespaces+0x30/0x720 [ 839.246652] ? do_mount+0x2a00/0x2a00 [ 839.250450] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 839.255461] ? kmem_cache_alloc+0x35f/0x3c0 [ 839.259884] create_new_namespaces+0xc9/0x720 [ 839.264379] ? security_capable+0x88/0xb0 [ 839.268527] copy_namespaces+0x27b/0x310 [ 839.272585] copy_process.part.0+0x2600/0x6f00 [ 839.277165] ? trace_hardirqs_on+0x10/0x10 [ 839.281484] ? check_preemption_disabled+0x35/0x240 [ 839.286513] ? check_preemption_disabled+0x35/0x240 [ 839.291531] ? finish_task_switch+0x178/0x610 [ 839.296034] ? __cleanup_sighand+0x40/0x40 [ 839.300271] ? _raw_spin_unlock_irq+0x5a/0x80 [ 839.304764] ? finish_task_switch+0x14d/0x610 [ 839.309255] ? switch_mm_irqs_off+0x2d2/0xeb0 [ 839.313752] _do_fork+0x184/0xc80 [ 839.317207] ? fork_idle+0x270/0x270 [ 839.320914] ? io_schedule_timeout+0x140/0x140 [ 839.325495] ? fput+0xb/0x140 [ 839.328602] ? do_syscall_64+0x4c/0x640 [ 839.332570] ? sys_vfork+0x20/0x20 [ 839.336133] do_syscall_64+0x1d5/0x640 [ 839.340023] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 839.345206] RIP: 0033:0x45de59 [ 839.348387] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 839.356096] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 839.363356] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 839.370619] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 839.377880] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 839.385143] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:04:41 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004", 0x15}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 839.530579] BTRFS info (device loop2): unrecognized mount option 'N kGR4>m[@0c7 GrKx [ 839.530579] v ˸_zCN!@ĺ'vh @0ҧbe Zw@G [ 839.530579] 9!?' [ 839.537980] FAT-fs (loop0): invalid media value (0x00) [ 839.556858] FAT-fs (loop0): Can't find a valid FAT filesystem 00:04:41 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004", 0x15}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 839.656372] BTRFS error (device loop2): open_ctree failed [ 839.681319] FAT-fs (loop0): invalid media value (0x00) [ 839.692961] FAT-fs (loop0): Can't find a valid FAT filesystem 00:04:41 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004", 0x15}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:04:41 executing program 5 (fault-call:10 fault-nth:21): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:04:41 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f8", 0x16}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 839.834561] FAT-fs (loop0): invalid media value (0x00) [ 839.865165] FAT-fs (loop0): Can't find a valid FAT filesystem [ 839.947419] FAT-fs (loop0): bogus number of FAT sectors [ 839.952813] FAT-fs (loop0): Can't find a valid FAT filesystem [ 840.063472] FAULT_INJECTION: forcing a failure. [ 840.063472] name failslab, interval 1, probability 0, space 0, times 0 [ 840.075054] CPU: 1 PID: 15087 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 840.082947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 840.092295] Call Trace: [ 840.094885] dump_stack+0x1b2/0x283 [ 840.098517] should_fail.cold+0x10a/0x154 [ 840.102767] should_failslab+0xd6/0x130 [ 840.106746] kmem_cache_alloc+0x28e/0x3c0 [ 840.110893] alloc_vfsmnt+0x23/0x7f0 [ 840.114618] clone_mnt+0x6c/0xff0 [ 840.118069] copy_tree+0x33e/0xa20 [ 840.121612] copy_mnt_ns+0x167/0xa30 [ 840.125327] ? create_new_namespaces+0x30/0x720 [ 840.129994] ? do_mount+0x2a00/0x2a00 [ 840.133793] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 840.138810] ? kmem_cache_alloc+0x35f/0x3c0 [ 840.143134] create_new_namespaces+0xc9/0x720 [ 840.147630] ? security_capable+0x88/0xb0 [ 840.151778] copy_namespaces+0x27b/0x310 [ 840.155836] copy_process.part.0+0x2600/0x6f00 [ 840.160413] ? mark_held_locks+0xa6/0xf0 [ 840.164467] ? retint_kernel+0x2d/0x2d [ 840.168363] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 840.173376] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 840.178140] ? __cleanup_sighand+0x40/0x40 [ 840.182463] ? lock_downgrade+0x740/0x740 [ 840.186610] _do_fork+0x184/0xc80 [ 840.190067] ? fork_idle+0x270/0x270 [ 840.193777] ? fput+0xb/0x140 [ 840.196879] ? SyS_write+0x14d/0x210 [ 840.200593] ? SyS_read+0x210/0x210 [ 840.204217] ? SyS_clock_settime+0x1a0/0x1a0 [ 840.208626] ? do_syscall_64+0x4c/0x640 00:04:41 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f8", 0x16}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 840.212442] FAT-fs (loop0): bogus number of FAT sectors [ 840.212595] ? sys_vfork+0x20/0x20 [ 840.212610] do_syscall_64+0x1d5/0x640 [ 840.218059] FAT-fs (loop0): Can't find a valid FAT filesystem [ 840.221489] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 840.221498] RIP: 0033:0x45de59 [ 840.221502] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 840.247274] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 840.254526] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 840.261781] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 840.269033] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 840.276288] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 [ 840.365242] print_req_error: 1 callbacks suppressed [ 840.365248] print_req_error: I/O error, dev loop0, sector 1 [ 840.376119] Buffer I/O error on dev loop0, logical block 1, async page read [ 840.383449] print_req_error: I/O error, dev loop0, sector 2 [ 840.389288] Buffer I/O error on dev loop0, logical block 2, async page read [ 840.402325] print_req_error: I/O error, dev loop0, sector 3 [ 840.409022] print_req_error: I/O error, dev loop0, sector 4 [ 840.414903] print_req_error: I/O error, dev loop0, sector 5 [ 840.421048] print_req_error: I/O error, dev loop0, sector 6 [ 840.427653] print_req_error: I/O error, dev loop0, sector 7 00:04:42 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f8", 0x16}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 840.514080] FAT-fs (loop0): bogus number of FAT sectors [ 840.528802] FAT-fs (loop0): Can't find a valid FAT filesystem 00:04:42 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, 0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:04:42 executing program 5 (fault-call:10 fault-nth:22): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:04:42 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, 0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:04:42 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, 0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 840.990174] FAULT_INJECTION: forcing a failure. [ 840.990174] name failslab, interval 1, probability 0, space 0, times 0 [ 841.001584] CPU: 1 PID: 15124 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 841.009473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 841.018821] Call Trace: [ 841.021411] dump_stack+0x1b2/0x283 [ 841.025039] should_fail.cold+0x10a/0x154 [ 841.029187] should_failslab+0xd6/0x130 [ 841.033160] __kmalloc_track_caller+0x2bc/0x400 [ 841.037823] ? kstrdup_const+0x35/0x60 [ 841.041712] kstrdup+0x36/0x70 [ 841.044903] kstrdup_const+0x35/0x60 [ 841.048612] alloc_vfsmnt+0xe0/0x7f0 [ 841.052324] clone_mnt+0x6c/0xff0 [ 841.055782] copy_tree+0x33e/0xa20 [ 841.059322] copy_mnt_ns+0x167/0xa30 [ 841.063039] ? create_new_namespaces+0x30/0x720 [ 841.067699] ? do_mount+0x2a00/0x2a00 [ 841.071498] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 841.076511] ? kmem_cache_alloc+0x35f/0x3c0 [ 841.080833] create_new_namespaces+0xc9/0x720 [ 841.085321] ? security_capable+0x88/0xb0 [ 841.089472] copy_namespaces+0x27b/0x310 [ 841.093530] copy_process.part.0+0x2600/0x6f00 [ 841.098107] ? get_pid_task+0xb8/0x130 [ 841.101990] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 841.106924] ? __cleanup_sighand+0x40/0x40 [ 841.111153] ? lock_downgrade+0x740/0x740 [ 841.115303] _do_fork+0x184/0xc80 [ 841.118753] ? fork_idle+0x270/0x270 [ 841.122463] ? fput+0xb/0x140 [ 841.125563] ? SyS_write+0x14d/0x210 [ 841.129273] ? SyS_read+0x210/0x210 [ 841.132892] ? SyS_clock_settime+0x1a0/0x1a0 [ 841.137307] ? do_syscall_64+0x4c/0x640 [ 841.141279] ? sys_vfork+0x20/0x20 [ 841.144827] do_syscall_64+0x1d5/0x640 [ 841.148720] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 841.153910] RIP: 0033:0x45de59 [ 841.157090] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 841.164793] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 841.172058] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 841.179325] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 841.186587] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 841.193850] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:04:43 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:04:43 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:04:43 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:04:43 executing program 5 (fault-call:10 fault-nth:23): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:04:43 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 841.878065] FAULT_INJECTION: forcing a failure. [ 841.878065] name failslab, interval 1, probability 0, space 0, times 0 [ 841.889375] CPU: 1 PID: 15159 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 841.897257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 841.906598] Call Trace: [ 841.909186] dump_stack+0x1b2/0x283 [ 841.912819] should_fail.cold+0x10a/0x154 [ 841.916969] should_failslab+0xd6/0x130 [ 841.920941] kmem_cache_alloc+0x28e/0x3c0 [ 841.925086] alloc_vfsmnt+0x23/0x7f0 [ 841.928810] clone_mnt+0x6c/0xff0 [ 841.932351] copy_tree+0x33e/0xa20 [ 841.935889] copy_mnt_ns+0x167/0xa30 [ 841.939613] ? create_new_namespaces+0x30/0x720 [ 841.944277] ? do_mount+0x2a00/0x2a00 [ 841.948078] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 841.953094] ? kmem_cache_alloc+0x35f/0x3c0 [ 841.957417] create_new_namespaces+0xc9/0x720 [ 841.961909] ? security_capable+0x88/0xb0 [ 841.966057] copy_namespaces+0x27b/0x310 [ 841.970118] copy_process.part.0+0x2600/0x6f00 [ 841.974699] ? get_pid_task+0xb8/0x130 [ 841.978588] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 841.983515] ? mark_held_locks+0xa6/0xf0 [ 841.987583] ? __cleanup_sighand+0x40/0x40 [ 841.991817] ? lock_downgrade+0x740/0x740 [ 841.995967] _do_fork+0x184/0xc80 [ 841.999421] ? fork_idle+0x270/0x270 [ 842.003131] ? fput+0xb/0x140 [ 842.006231] ? SyS_write+0x14d/0x210 [ 842.009936] ? SyS_read+0x210/0x210 [ 842.013556] ? do_syscall_64+0x4c/0x640 [ 842.017526] ? sys_vfork+0x20/0x20 [ 842.021064] do_syscall_64+0x1d5/0x640 [ 842.024953] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 842.030134] RIP: 0033:0x45de59 [ 842.033312] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 842.041018] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 842.048284] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 842.055545] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 842.062816] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000017 [ 842.070081] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:04:43 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:04:44 executing program 0: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0) 00:04:44 executing program 0: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0) 00:04:44 executing program 0: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0) 00:04:44 executing program 5 (fault-call:10 fault-nth:24): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:04:44 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, 0x0, 0x0) 00:04:44 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, 0x0, 0x0) [ 842.765100] FAULT_INJECTION: forcing a failure. [ 842.765100] name failslab, interval 1, probability 0, space 0, times 0 [ 842.776519] CPU: 0 PID: 15197 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 842.784529] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 842.793886] Call Trace: [ 842.796475] dump_stack+0x1b2/0x283 [ 842.800113] should_fail.cold+0x10a/0x154 [ 842.804261] should_failslab+0xd6/0x130 [ 842.808237] __kmalloc_track_caller+0x2bc/0x400 [ 842.812901] ? kstrdup_const+0x35/0x60 [ 842.816787] ? lock_downgrade+0x740/0x740 [ 842.820935] kstrdup+0x36/0x70 [ 842.824123] kstrdup_const+0x35/0x60 [ 842.827841] alloc_vfsmnt+0xe0/0x7f0 [ 842.831553] clone_mnt+0x6c/0xff0 [ 842.835006] copy_tree+0x33e/0xa20 [ 842.838552] copy_mnt_ns+0x167/0xa30 [ 842.842266] ? create_new_namespaces+0x30/0x720 [ 842.846931] ? do_mount+0x2a00/0x2a00 [ 842.850727] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 842.855739] ? kmem_cache_alloc+0x35f/0x3c0 [ 842.860150] create_new_namespaces+0xc9/0x720 [ 842.864644] ? security_capable+0x88/0xb0 [ 842.868792] copy_namespaces+0x27b/0x310 [ 842.872853] copy_process.part.0+0x2600/0x6f00 [ 842.877457] ? trace_hardirqs_on+0x10/0x10 [ 842.881691] ? check_preemption_disabled+0x35/0x240 [ 842.886705] ? check_preemption_disabled+0x35/0x240 [ 842.891720] ? finish_task_switch+0x178/0x610 [ 842.896223] ? __cleanup_sighand+0x40/0x40 [ 842.900455] ? _raw_spin_unlock_irq+0x5a/0x80 [ 842.904947] ? finish_task_switch+0x14d/0x610 [ 842.909435] ? switch_mm_irqs_off+0x2d2/0xeb0 [ 842.913930] _do_fork+0x184/0xc80 [ 842.917385] ? fork_idle+0x270/0x270 [ 842.921095] ? io_schedule_timeout+0x140/0x140 [ 842.925674] ? exit_to_usermode_loop+0x18b/0x200 [ 842.930425] ? preempt_count_add+0xd4/0x170 [ 842.934746] ? do_syscall_64+0x4c/0x640 [ 842.938715] ? sys_vfork+0x20/0x20 [ 842.942253] do_syscall_64+0x1d5/0x640 [ 842.946150] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 842.951333] RIP: 0033:0x45de59 [ 842.954514] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 842.962218] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 842.969495] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 842.976760] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 842.984023] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000018 [ 842.991287] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:04:44 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, 0x0, 0x0) 00:04:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e4000010000000000000004000000000000200000000000000000001000000000002000000000000000010000000100000001000000100000001000000000000000000100000000000122badb145de474f84c86b8fd41337fd", 0x6c, 0x10320}, {&(0x7f0000000280)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000002800)=ANY=[@ANYBLOB="4eda9e"]) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = open(&(0x7f00000001c0)='./file0\x00', 0xa440, 0x110) r2 = socket$inet6(0xa, 0x3, 0x6) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000680)={@mcast1, 0x400, 0x0, 0x1, 0x0, 0x401f, 0x4, 0x400000000}, 0x20) r4 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r2, r4, &(0x7f0000000240)=0x202, 0x4000000000dc) r5 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000001700)='NLBL_UNLBL\x00') r6 = socket(0x11, 0x800000003, 0x8) sendmsg$NLBL_UNLABEL_C_STATICADD(r4, &(0x7f0000000640)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001780)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c7fc5db6cdef069691c1538af5784cc33cbb0d4e80385acf560eb3aece760751d023b69a4cc8e519643edf017aa42ee890b77e13bd5ff194db428aca06f6667a4d49a6404d7067e4aabab05b075f3d5476a93659168c63788d138bc3d7d7d5a67b53ab72c", @ANYRES16=r6, @ANYBLOB="00022dbd7000fedbdf250300000008000400e0000002"], 0x1c}, 0x1, 0x0, 0x0, 0x8}, 0x20008004) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000001940)=ANY=[@ANYBLOB="000000002509eae5f1c5a6558f5e41c38022e68b6aa734a36c2882ffa1915a3194388323d0cc9e0dc58a05130ff60f38072c5bf69c4b1644f151e5e9968e62485548d1e65cb71f44e8e62565157656f3b80c6fdc569bb073d32fdc9236f3556e056fe4ab40a822494dfc42d74d3ace54cee82b26a2e370ce36910c26519b0db6e3039bb525ff34f2ce00"/153, @ANYRES16=r5, @ANYBLOB="040001000000080200fe88000000000000000000000000000108000500ac1e0001140006006272696467655f736c6176655f31000014000600636169663000000000000000000000001400020020010000000000000000000000000000080004007f000001080004007f000001"], 0x7c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc001) sendmsg$NLBL_UNLABEL_C_ACCEPT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000001800)={0x120, r5, 0x8, 0x70bd26, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:dpkg_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ip6_vti0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'erspan0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @NLBL_UNLABEL_A_SECCTX={0x29, 0x7, 'system_u:object_r:pinentry_exec_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:dpkg_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @remote}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @loopback}, @NLBL_UNLABEL_A_SECCTX={0x24, 0x7, 'system_u:object_r:apm_bios_t:s0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}]}, 0x120}, 0x1, 0x0, 0x0, 0x80000}, 0x40001) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="000229060000000000000000000008000400ac1414bb08000500ac1e010108000400ac14142a"], 0x2c}, 0x1, 0x0, 0x0, 0x40040d0}, 0x4004080) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) [ 843.325713] BTRFS info (device loop0): unrecognized mount option 'Nڞ' 00:04:45 executing program 5 (fault-call:10 fault-nth:25): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) [ 843.405814] BTRFS error (device loop0): open_ctree failed [ 843.643445] FAULT_INJECTION: forcing a failure. [ 843.643445] name failslab, interval 1, probability 0, space 0, times 0 [ 843.654849] CPU: 0 PID: 15230 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 843.662745] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 843.672094] Call Trace: [ 843.674683] dump_stack+0x1b2/0x283 [ 843.678317] should_fail.cold+0x10a/0x154 [ 843.682466] should_failslab+0xd6/0x130 [ 843.686437] kmem_cache_alloc+0x28e/0x3c0 [ 843.690582] alloc_vfsmnt+0x23/0x7f0 [ 843.694290] clone_mnt+0x6c/0xff0 [ 843.697737] ? copy_tree+0x27a/0xa20 [ 843.701448] copy_tree+0x33e/0xa20 [ 843.704994] copy_mnt_ns+0x167/0xa30 [ 843.708709] ? create_new_namespaces+0x30/0x720 [ 843.713373] ? do_mount+0x2a00/0x2a00 [ 843.717170] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 843.722183] ? kmem_cache_alloc+0x35f/0x3c0 [ 843.726501] create_new_namespaces+0xc9/0x720 [ 843.731015] ? security_capable+0x88/0xb0 [ 843.735163] copy_namespaces+0x27b/0x310 [ 843.739226] copy_process.part.0+0x2600/0x6f00 [ 843.743809] ? get_pid_task+0xb8/0x130 [ 843.747696] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 843.752633] ? __cleanup_sighand+0x40/0x40 [ 843.756866] ? lock_downgrade+0x740/0x740 [ 843.761130] _do_fork+0x184/0xc80 [ 843.764583] ? fork_idle+0x270/0x270 [ 843.768293] ? fput+0xb/0x140 [ 843.771394] ? SyS_write+0x14d/0x210 [ 843.775101] ? SyS_read+0x210/0x210 [ 843.778723] ? do_syscall_64+0x4c/0x640 [ 843.782691] ? sys_vfork+0x20/0x20 [ 843.786237] do_syscall_64+0x1d5/0x640 [ 843.790151] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 843.795335] RIP: 0033:0x45de59 [ 843.798518] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 843.806217] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 843.813478] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 843.820740] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 843.828005] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000019 [ 843.835271] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:04:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000500)="597d766800000000000000000000000000000000000000000000000000000000fcb2096bad154c2da9a086564f36bcc3000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045010000000000000000000000010000000000000000000001000000000000720000000000001000000010000000100000000000000000000000000000000000000000000000000000000000000000122badb145de474f84c86b8fd41337fdfcb2096bad154c2da9a086564f36bcc3", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e4000010000000000000004000000000000200000000000000000001000000000002000000000000000010000000100000001000000100000001000000000000000000100000000000122badb145de474f84c86b8fd41337fd", 0x6c, 0x10320}, {&(0x7f0000000280)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000002800)=ANY=[@ANYBLOB="4eda9e"]) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = open(&(0x7f00000001c0)='./file0\x00', 0xa440, 0x110) r2 = socket$inet6(0xa, 0x3, 0x6) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000680)={@mcast1, 0x400, 0x0, 0x1, 0x0, 0x401f, 0x4, 0x400000000}, 0x20) r4 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r2, r4, &(0x7f0000000240)=0x202, 0x4000000000dc) r5 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000001700)='NLBL_UNLBL\x00') r6 = socket(0x11, 0x800000003, 0x8) sendmsg$NLBL_UNLABEL_C_STATICADD(r4, &(0x7f0000000640)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001780)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c7fc5db6cdef069691c1538af5784cc33cbb0d4e80385acf560eb3aece760751d023b69a4cc8e519643edf017aa42ee890b77e13bd5ff194db428aca06f6667a4d49a6404d7067e4aabab05b075f3d5476a93659168c63788d138bc3d7d7d5a67b53ab72c", @ANYRES16=r6, @ANYBLOB="00022dbd7000fedbdf250300000008000400e0000002"], 0x1c}, 0x1, 0x0, 0x0, 0x8}, 0x20008004) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000001940)=ANY=[@ANYBLOB="000000002509eae5f1c5a6558f5e41c38022e68b6aa734a36c2882ffa1915a3194388323d0cc9e0dc58a05130ff60f38072c5bf69c4b1644f151e5e9968e62485548d1e65cb71f44e8e62565157656f3b80c6fdc569bb073d32fdc9236f3556e056fe4ab40a822494dfc42d74d3ace54cee82b26a2e370ce36910c26519b0db6e3039bb525ff34f2ce00"/153, @ANYRES16=r5, @ANYBLOB="040001000000080200fe88000000000000000000000000000108000500ac1e0001140006006272696467655f736c6176655f31000014000600636169663000000000000000000000001400020020010000000000000000000000000000080004007f000001080004007f000001"], 0x7c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc001) sendmsg$NLBL_UNLABEL_C_ACCEPT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000001800)={0x120, r5, 0x8, 0x70bd26, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:dpkg_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ip6_vti0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'erspan0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @NLBL_UNLABEL_A_SECCTX={0x29, 0x7, 'system_u:object_r:pinentry_exec_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:dpkg_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @remote}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @loopback}, @NLBL_UNLABEL_A_SECCTX={0x24, 0x7, 'system_u:object_r:apm_bios_t:s0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}]}, 0x120}, 0x1, 0x0, 0x0, 0x80000}, 0x40001) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="000229060000000000000000000008000400ac1414bb08000500ac1e010108000400ac14142a"], 0x2c}, 0x1, 0x0, 0x0, 0x40040d0}, 0x4004080) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) [ 844.273059] BTRFS info (device loop0): unrecognized mount option 'Nڞ' 00:04:46 executing program 5 (fault-call:10 fault-nth:26): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) [ 844.329727] BTRFS error (device loop0): open_ctree failed 00:04:46 executing program 1: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x15) ioctl$TCSETS2(r0, 0x5412, &(0x7f0000000000)={0x7d, 0x0, 0x0, 0x0, 0x0, "90c56925e14413db683c18650adc25373636f0"}) r1 = socket(0x11, 0x800000003, 0x8) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="10002cbddf250200000008000100000000000c009967040020e70000000000000c000500"/46], 0x34}, 0x1, 0x0, 0x0, 0x854}, 0x8880) r4 = socket(0x11, 0x800000003, 0x8) bind(r4, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r5 = socket(0x11, 0x800000003, 0x8) bind(r5, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x74, r3, 0x20, 0x70bd2b, 0x25dfdbff, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x6}, @NBD_ATTR_SOCKETS={0x3c, 0x7, 0x0, 0x1, [{0x8}, {0x8, 0x1, r4}, {0x8}, {0x8}, {0x8}, {0x8}, {0x8, 0x1, r5}]}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x22}]}, 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x20000000) [ 844.522868] FAULT_INJECTION: forcing a failure. [ 844.522868] name failslab, interval 1, probability 0, space 0, times 0 [ 844.534275] CPU: 1 PID: 15250 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 844.542168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 844.551517] Call Trace: [ 844.554108] dump_stack+0x1b2/0x283 [ 844.557736] should_fail.cold+0x10a/0x154 [ 844.561886] should_failslab+0xd6/0x130 [ 844.565859] __kmalloc_track_caller+0x2bc/0x400 [ 844.570526] ? kstrdup_const+0x35/0x60 [ 844.574409] kstrdup+0x36/0x70 [ 844.577628] kstrdup_const+0x35/0x60 [ 844.581340] alloc_vfsmnt+0xe0/0x7f0 [ 844.585050] clone_mnt+0x6c/0xff0 [ 844.588512] copy_tree+0x33e/0xa20 [ 844.592068] copy_mnt_ns+0x167/0xa30 [ 844.595785] ? create_new_namespaces+0x30/0x720 [ 844.600453] ? do_mount+0x2a00/0x2a00 [ 844.604252] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 844.609265] ? kmem_cache_alloc+0x35f/0x3c0 [ 844.613588] create_new_namespaces+0xc9/0x720 [ 844.618082] ? security_capable+0x88/0xb0 [ 844.622229] copy_namespaces+0x27b/0x310 [ 844.626290] copy_process.part.0+0x2600/0x6f00 [ 844.631012] ? get_pid_task+0xb8/0x130 [ 844.634897] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 844.639833] ? __cleanup_sighand+0x40/0x40 [ 844.644062] ? lock_downgrade+0x740/0x740 [ 844.648205] _do_fork+0x184/0xc80 [ 844.651655] ? fork_idle+0x270/0x270 [ 844.655362] ? fput+0xb/0x140 [ 844.658462] ? SyS_write+0x14d/0x210 [ 844.662171] ? SyS_read+0x210/0x210 [ 844.665795] ? do_syscall_64+0x4c/0x640 [ 844.669762] ? sys_vfork+0x20/0x20 [ 844.673298] do_syscall_64+0x1d5/0x640 [ 844.677184] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 844.682368] RIP: 0033:0x45de59 [ 844.685551] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 844.693253] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 844.700518] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 844.707779] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 844.715043] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000001a [ 844.722308] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 [ 844.953035] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=15283 comm=syz-executor.1 00:04:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e4000010000000000000004000000000000200000000000000000001000000000002000000000000000010000000100000001000000100000001000000000000000000100000000000122badb145de474f84c86b8fd41337fd", 0x6c, 0x10320}, {&(0x7f0000000280)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000002800)=ANY=[@ANYBLOB="4eda9e"]) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = open(&(0x7f00000001c0)='./file0\x00', 0xa440, 0x110) r2 = socket$inet6(0xa, 0x3, 0x6) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000680)={@mcast1, 0x400, 0x0, 0x1, 0x0, 0x401f, 0x4, 0x400000000}, 0x20) r4 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r2, r4, &(0x7f0000000240)=0x202, 0x4000000000dc) r5 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000001700)='NLBL_UNLBL\x00') r6 = socket(0x11, 0x800000003, 0x8) sendmsg$NLBL_UNLABEL_C_STATICADD(r4, &(0x7f0000000640)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001780)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c7fc5db6cdef069691c1538af5784cc33cbb0d4e80385acf560eb3aece760751d023b69a4cc8e519643edf017aa42ee890b77e13bd5ff194db428aca06f6667a4d49a6404d7067e4aabab05b075f3d5476a93659168c63788d138bc3d7d7d5a67b53ab72c", @ANYRES16=r6, @ANYBLOB="00022dbd7000fedbdf250300000008000400e0000002"], 0x1c}, 0x1, 0x0, 0x0, 0x8}, 0x20008004) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000001940)=ANY=[@ANYBLOB="000000002509eae5f1c5a6558f5e41c38022e68b6aa734a36c2882ffa1915a3194388323d0cc9e0dc58a05130ff60f38072c5bf69c4b1644f151e5e9968e62485548d1e65cb71f44e8e62565157656f3b80c6fdc569bb073d32fdc9236f3556e056fe4ab40a822494dfc42d74d3ace54cee82b26a2e370ce36910c26519b0db6e3039bb525ff34f2ce00"/153, @ANYRES16=r5, @ANYBLOB="040001000000080200fe88000000000000000000000000000108000500ac1e0001140006006272696467655f736c6176655f31000014000600636169663000000000000000000000001400020020010000000000000000000000000000080004007f000001080004007f000001"], 0x7c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc001) sendmsg$NLBL_UNLABEL_C_ACCEPT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000001800)={0x120, r5, 0x8, 0x70bd26, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:dpkg_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ip6_vti0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'erspan0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @NLBL_UNLABEL_A_SECCTX={0x29, 0x7, 'system_u:object_r:pinentry_exec_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:dpkg_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @remote}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @loopback}, @NLBL_UNLABEL_A_SECCTX={0x24, 0x7, 'system_u:object_r:apm_bios_t:s0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}]}, 0x120}, 0x1, 0x0, 0x0, 0x80000}, 0x40001) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="000229060000000000000000000008000400ac1414bb08000500ac1e010108000400ac14142a"], 0x2c}, 0x1, 0x0, 0x0, 0x40040d0}, 0x4004080) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) 00:04:46 executing program 5 (fault-call:10 fault-nth:27): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) [ 845.209106] BTRFS info (device loop0): unrecognized mount option 'Nڞ' [ 845.259441] BTRFS error (device loop0): open_ctree failed [ 845.440920] FAULT_INJECTION: forcing a failure. [ 845.440920] name failslab, interval 1, probability 0, space 0, times 0 [ 845.452343] CPU: 0 PID: 15402 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 845.460238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 845.469586] Call Trace: [ 845.472179] dump_stack+0x1b2/0x283 [ 845.475814] should_fail.cold+0x10a/0x154 [ 845.479962] should_failslab+0xd6/0x130 [ 845.484024] kmem_cache_alloc+0x28e/0x3c0 [ 845.488171] alloc_vfsmnt+0x23/0x7f0 [ 845.491893] clone_mnt+0x6c/0xff0 [ 845.495349] copy_tree+0x33e/0xa20 [ 845.498894] copy_mnt_ns+0x167/0xa30 [ 845.502616] ? create_new_namespaces+0x30/0x720 [ 845.507284] ? do_mount+0x2a00/0x2a00 [ 845.511084] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 845.516099] ? kmem_cache_alloc+0x35f/0x3c0 [ 845.520422] create_new_namespaces+0xc9/0x720 [ 845.524913] ? security_capable+0x88/0xb0 [ 845.529065] copy_namespaces+0x27b/0x310 [ 845.533125] copy_process.part.0+0x2600/0x6f00 [ 845.537707] ? __schedule+0x893/0x1de0 [ 845.541606] ? __cleanup_sighand+0x40/0x40 [ 845.545849] _do_fork+0x184/0xc80 [ 845.549301] ? fork_idle+0x270/0x270 [ 845.553014] ? fput+0xb/0x140 [ 845.556118] ? SyS_write+0x14d/0x210 [ 845.559826] ? SyS_read+0x210/0x210 [ 845.563453] ? do_syscall_64+0x4c/0x640 [ 845.567424] ? sys_vfork+0x20/0x20 [ 845.570964] do_syscall_64+0x1d5/0x640 [ 845.574857] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 845.580053] RIP: 0033:0x45de59 [ 845.583282] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 845.590984] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 845.598253] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 845.605513] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 845.612774] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000001b [ 845.620039] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 [ 845.659788] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=15272 comm=syz-executor.1 00:04:47 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e4000010000000000000004000000000000200000000000000000001000000000002000000000000000010000000100000001000000100000001000000000000000000100000000000122badb145de474f84c86b8fd41337fd", 0x6c, 0x10320}, {&(0x7f0000000280)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000002800)=ANY=[@ANYBLOB="4eda9e"]) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = open(&(0x7f00000001c0)='./file0\x00', 0xa440, 0x110) r2 = socket$inet6(0xa, 0x3, 0x6) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000680)={@mcast1, 0x400, 0x0, 0x1, 0x0, 0x401f, 0x4, 0x400000000}, 0x20) r4 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r2, r4, &(0x7f0000000240)=0x202, 0x4000000000dc) r5 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000001700)='NLBL_UNLBL\x00') r6 = socket(0x11, 0x800000003, 0x8) sendmsg$NLBL_UNLABEL_C_STATICADD(r4, &(0x7f0000000640)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001780)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c7fc5db6cdef069691c1538af5784cc33cbb0d4e80385acf560eb3aece760751d023b69a4cc8e519643edf017aa42ee890b77e13bd5ff194db428aca06f6667a4d49a6404d7067e4aabab05b075f3d5476a93659168c63788d138bc3d7d7d5a67b53ab72c", @ANYRES16=r6, @ANYBLOB="00022dbd7000fedbdf250300000008000400e0000002"], 0x1c}, 0x1, 0x0, 0x0, 0x8}, 0x20008004) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000001940)=ANY=[@ANYBLOB="000000002509eae5f1c5a6558f5e41c38022e68b6aa734a36c2882ffa1915a3194388323d0cc9e0dc58a05130ff60f38072c5bf69c4b1644f151e5e9968e62485548d1e65cb71f44e8e62565157656f3b80c6fdc569bb073d32fdc9236f3556e056fe4ab40a822494dfc42d74d3ace54cee82b26a2e370ce36910c26519b0db6e3039bb525ff34f2ce00"/153, @ANYRES16=r5, @ANYBLOB="040001000000080200fe88000000000000000000000000000108000500ac1e0001140006006272696467655f736c6176655f31000014000600636169663000000000000000000000001400020020010000000000000000000000000000080004007f000001080004007f000001"], 0x7c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc001) sendmsg$NLBL_UNLABEL_C_ACCEPT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000001800)={0x120, r5, 0x8, 0x70bd26, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:dpkg_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ip6_vti0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'erspan0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @NLBL_UNLABEL_A_SECCTX={0x29, 0x7, 'system_u:object_r:pinentry_exec_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:dpkg_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @remote}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @loopback}, @NLBL_UNLABEL_A_SECCTX={0x24, 0x7, 'system_u:object_r:apm_bios_t:s0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}]}, 0x120}, 0x1, 0x0, 0x0, 0x80000}, 0x40001) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="000229060000000000000000000008000400ac1414bb08000500ac1e010108000400ac14142a"], 0x2c}, 0x1, 0x0, 0x0, 0x40040d0}, 0x4004080) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) 00:04:47 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000500)="597d766800000000000000000000000000000000000000000000000000000000fcb2096bad154c2da9a086564f36bcc3000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045010000000000000000000000010000000000000000000001000000000000720000000000001000000010000000100000000000000000000000000000000000000000000000000000000000000000122badb145de474f84c86b8fd41337fdfcb2096bad154c2da9a086564f36bcc3", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e4000010000000000000004000000000000200000000000000000001000000000002000000000000000010000000100000001000000100000001000000000000000000100000000000122badb145de474f84c86b8fd41337fd", 0x6c, 0x10320}, {&(0x7f0000000280)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000002800)=ANY=[@ANYBLOB="4eda9e"]) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = open(&(0x7f00000001c0)='./file0\x00', 0xa440, 0x110) r2 = socket$inet6(0xa, 0x3, 0x6) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000680)={@mcast1, 0x400, 0x0, 0x1, 0x0, 0x401f, 0x4, 0x400000000}, 0x20) r4 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r2, r4, &(0x7f0000000240)=0x202, 0x4000000000dc) r5 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000001700)='NLBL_UNLBL\x00') r6 = socket(0x11, 0x800000003, 0x8) sendmsg$NLBL_UNLABEL_C_STATICADD(r4, &(0x7f0000000640)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001780)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c7fc5db6cdef069691c1538af5784cc33cbb0d4e80385acf560eb3aece760751d023b69a4cc8e519643edf017aa42ee890b77e13bd5ff194db428aca06f6667a4d49a6404d7067e4aabab05b075f3d5476a93659168c63788d138bc3d7d7d5a67b53ab72c", @ANYRES16=r6, @ANYBLOB="00022dbd7000fedbdf250300000008000400e0000002"], 0x1c}, 0x1, 0x0, 0x0, 0x8}, 0x20008004) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000001940)=ANY=[@ANYBLOB="000000002509eae5f1c5a6558f5e41c38022e68b6aa734a36c2882ffa1915a3194388323d0cc9e0dc58a05130ff60f38072c5bf69c4b1644f151e5e9968e62485548d1e65cb71f44e8e62565157656f3b80c6fdc569bb073d32fdc9236f3556e056fe4ab40a822494dfc42d74d3ace54cee82b26a2e370ce36910c26519b0db6e3039bb525ff34f2ce00"/153, @ANYRES16=r5, @ANYBLOB="040001000000080200fe88000000000000000000000000000108000500ac1e0001140006006272696467655f736c6176655f31000014000600636169663000000000000000000000001400020020010000000000000000000000000000080004007f000001080004007f000001"], 0x7c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc001) sendmsg$NLBL_UNLABEL_C_ACCEPT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000001800)={0x120, r5, 0x8, 0x70bd26, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:dpkg_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ip6_vti0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'erspan0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @NLBL_UNLABEL_A_SECCTX={0x29, 0x7, 'system_u:object_r:pinentry_exec_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:dpkg_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @remote}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @loopback}, @NLBL_UNLABEL_A_SECCTX={0x24, 0x7, 'system_u:object_r:apm_bios_t:s0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}]}, 0x120}, 0x1, 0x0, 0x0, 0x80000}, 0x40001) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="000229060000000000000000000008000400ac1414bb08000500ac1e010108000400ac14142a"], 0x2c}, 0x1, 0x0, 0x0, 0x40040d0}, 0x4004080) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) 00:04:47 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf33", 0x23, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:04:47 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf33", 0x23, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:04:47 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf33", 0x23, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:04:47 executing program 5 (fault-call:10 fault-nth:28): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:04:47 executing program 0 (fault-call:1 fault-nth:0): r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:04:47 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf33", 0x23, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:04:47 executing program 1: setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f00000001c0)={0x0, 0x1, 0x8, "4d0b553a706d7285"}, 0x10) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)="bd1fd1d492e14f61f723384b61e3c6cbb664ad7852e2322d40eef4f6b6450d1494a45300c4f4ba7676e21a814cab0b35e0391643451d97b40f92084389c11d54e63c51e574965466cc92e8b289212bf78b0b33330baff598c12db5eeb4f2d5e46f20015d7dd881c6e93918169266c26983b7fc3be79c6f6b9583", 0x7a, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binderN(&(0x7f0000000200)='/dev/binder#\x00', 0x0, 0x2) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000400)={0x7c, 0x0, &(0x7f0000000300)=[@enter_looper, @enter_looper, @request_death={0x400c630e, 0x3}, @reply_sg={0x40486312, {0x2, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x48, 0x18, &(0x7f0000000240)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r0, @ANYBLOB="000000000000000000000000852a646600000000", @ANYRES32=r0, @ANYBLOB="00000000000000000000efff842a646600000000", @ANYRES32=r0, @ANYBLOB='\x00'/12], &(0x7f00000002c0)={0x0, 0x18, 0x30}}, 0x1000}, @register_looper, @increfs_done={0x40106308, 0x2}], 0x4c, 0x0, &(0x7f0000000380)="dfacdc256f6bfe4df89a24f2fe1096123080d638a0d51c8d92059f8b6088c8fd5f6abf579e81aff9e59e1a40aa457e5f23369ec21a3aaeb1d91188637669406e613a7022638c37b8cd7d80b4"}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000480)='nl80211\x00') sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x20, r2, 0x4, 0x70bd2d, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@broadcast}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x20040034) socket$can_raw(0x1d, 0x3, 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') [ 846.204487] FAULT_INJECTION: forcing a failure. [ 846.204487] name failslab, interval 1, probability 0, space 0, times 0 [ 846.236326] CPU: 1 PID: 15434 Comm: syz-executor.0 Not tainted 4.14.198-syzkaller #0 [ 846.244233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 846.253584] Call Trace: [ 846.256175] dump_stack+0x1b2/0x283 [ 846.259811] should_fail.cold+0x10a/0x154 [ 846.263962] should_failslab+0xd6/0x130 [ 846.267937] kmem_cache_alloc+0x28e/0x3c0 [ 846.272087] getname_flags+0xc8/0x550 [ 846.275886] ? vfs_write+0x319/0x4d0 [ 846.279600] SyS_mkdirat+0x83/0x270 [ 846.283225] ? SyS_mknod+0x30/0x30 [ 846.286762] ? SyS_clock_settime+0x1a0/0x1a0 [ 846.291165] ? do_syscall_64+0x4c/0x640 [ 846.295141] ? SyS_mknod+0x30/0x30 [ 846.298708] do_syscall_64+0x1d5/0x640 [ 846.302599] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 846.307782] RIP: 0033:0x45de59 [ 846.310962] RSP: 002b:00007f83d73a4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 846.318663] RAX: ffffffffffffffda RBX: 0000000000020fc0 RCX: 000000000045de59 [ 846.325927] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000005 [ 846.333189] RBP: 00007f83d73a4ca0 R08: 0000000000000000 R09: 0000000000000000 [ 846.340455] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 846.347721] R13: 00007ffe5e353c9f R14: 00007f83d73a59c0 R15: 000000000118bf2c [ 846.405166] FAULT_INJECTION: forcing a failure. [ 846.405166] name failslab, interval 1, probability 0, space 0, times 0 [ 846.416629] CPU: 0 PID: 15441 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 846.424522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 846.433869] Call Trace: [ 846.436455] dump_stack+0x1b2/0x283 [ 846.440121] should_fail.cold+0x10a/0x154 [ 846.444261] should_failslab+0xd6/0x130 [ 846.448231] __kmalloc_track_caller+0x2bc/0x400 [ 846.452893] ? kstrdup_const+0x35/0x60 [ 846.456780] ? lock_downgrade+0x740/0x740 [ 846.460927] kstrdup+0x36/0x70 [ 846.464125] kstrdup_const+0x35/0x60 [ 846.467861] alloc_vfsmnt+0xe0/0x7f0 [ 846.471573] clone_mnt+0x6c/0xff0 [ 846.475027] copy_tree+0x33e/0xa20 [ 846.478567] copy_mnt_ns+0x167/0xa30 [ 846.482279] ? create_new_namespaces+0x30/0x720 [ 846.486944] ? do_mount+0x2a00/0x2a00 [ 846.490743] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 846.495757] ? kmem_cache_alloc+0x35f/0x3c0 [ 846.500078] create_new_namespaces+0xc9/0x720 [ 846.504572] ? security_capable+0x88/0xb0 [ 846.508735] copy_namespaces+0x27b/0x310 [ 846.512796] copy_process.part.0+0x2600/0x6f00 [ 846.517385] ? __schedule+0x893/0x1de0 [ 846.521290] ? __cleanup_sighand+0x40/0x40 [ 846.525535] _do_fork+0x184/0xc80 [ 846.528988] ? fork_idle+0x270/0x270 [ 846.532700] ? fput+0xb/0x140 [ 846.535811] ? SyS_write+0x14d/0x210 [ 846.539520] ? SyS_read+0x210/0x210 [ 846.543145] ? SyS_clock_settime+0x1a0/0x1a0 [ 846.547548] ? do_syscall_64+0x4c/0x640 [ 846.551520] ? sys_vfork+0x20/0x20 [ 846.555057] do_syscall_64+0x1d5/0x640 [ 846.558946] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 846.564127] RIP: 0033:0x45de59 [ 846.567310] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 846.575015] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 846.582308] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 846.589572] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 846.596830] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000001c 00:04:48 executing program 0 (fault-call:1 fault-nth:1): r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 846.604179] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:04:48 executing program 1: setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f00000001c0)={0x0, 0x1, 0x8, "4d0b553a706d7285"}, 0x10) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)="bd1fd1d492e14f61f723384b61e3c6cbb664ad7852e2322d40eef4f6b6450d1494a45300c4f4ba7676e21a814cab0b35e0391643451d97b40f92084389c11d54e63c51e574965466cc92e8b289212bf78b0b33330baff598c12db5eeb4f2d5e46f20015d7dd881c6e93918169266c26983b7fc3be79c6f6b9583", 0x7a, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binderN(&(0x7f0000000200)='/dev/binder#\x00', 0x0, 0x2) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000400)={0x7c, 0x0, &(0x7f0000000300)=[@enter_looper, @enter_looper, @request_death={0x400c630e, 0x3}, @reply_sg={0x40486312, {0x2, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x48, 0x18, &(0x7f0000000240)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r0, @ANYBLOB="000000000000000000000000852a646600000000", @ANYRES32=r0, @ANYBLOB="00000000000000000000efff842a646600000000", @ANYRES32=r0, @ANYBLOB='\x00'/12], &(0x7f00000002c0)={0x0, 0x18, 0x30}}, 0x1000}, @register_looper, @increfs_done={0x40106308, 0x2}], 0x4c, 0x0, &(0x7f0000000380)="dfacdc256f6bfe4df89a24f2fe1096123080d638a0d51c8d92059f8b6088c8fd5f6abf579e81aff9e59e1a40aa457e5f23369ec21a3aaeb1d91188637669406e613a7022638c37b8cd7d80b4"}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000480)='nl80211\x00') sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x20, r2, 0x4, 0x70bd2d, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@broadcast}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x20040034) socket$can_raw(0x1d, 0x3, 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') [ 846.772279] FAULT_INJECTION: forcing a failure. [ 846.772279] name failslab, interval 1, probability 0, space 0, times 0 [ 846.799936] CPU: 0 PID: 15448 Comm: syz-executor.0 Not tainted 4.14.198-syzkaller #0 [ 846.807844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 846.817199] Call Trace: [ 846.819793] dump_stack+0x1b2/0x283 [ 846.823425] should_fail.cold+0x10a/0x154 [ 846.827582] should_failslab+0xd6/0x130 [ 846.831557] kmem_cache_alloc+0x28e/0x3c0 [ 846.835704] __d_alloc+0x2a/0xa20 [ 846.839156] ? d_lookup+0x172/0x220 [ 846.842791] d_alloc+0x46/0x240 [ 846.846077] __lookup_hash+0x101/0x270 [ 846.849962] filename_create+0x156/0x3f0 [ 846.854021] ? kern_path_mountpoint+0x40/0x40 [ 846.858515] ? vfs_write+0x319/0x4d0 [ 846.862226] SyS_mkdirat+0x95/0x270 [ 846.865849] ? SyS_mknod+0x30/0x30 [ 846.869388] ? SyS_clock_settime+0x1a0/0x1a0 [ 846.873798] ? do_syscall_64+0x4c/0x640 [ 846.877774] ? SyS_mknod+0x30/0x30 [ 846.881315] do_syscall_64+0x1d5/0x640 [ 846.885205] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 846.890386] RIP: 0033:0x45de59 [ 846.893568] RSP: 002b:00007f83d73a4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 846.901273] RAX: ffffffffffffffda RBX: 0000000000020fc0 RCX: 000000000045de59 [ 846.908540] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000005 [ 846.915805] RBP: 00007f83d73a4ca0 R08: 0000000000000000 R09: 0000000000000000 [ 846.923069] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 846.930334] R13: 00007ffe5e353c9f R14: 00007f83d73a59c0 R15: 000000000118bf2c 00:04:48 executing program 5 (fault-call:10 fault-nth:29): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:04:48 executing program 0 (fault-call:1 fault-nth:2): r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:04:48 executing program 1: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x7ff, 0x2, &(0x7f0000000100)=[{&(0x7f00000001c0)="1d4124f84f011f12926ed461c4fc13fd1db2eae3f4113c58bc2a79185c6166f5987c24c9879fb606b6d09db8861adcdac13157f9ec766e2cede709d76811a4e1faf4b070de5cc339f8c5d574bd77f0fe9845661ceb2708ae553d0dd6d94a835d610acacdea34727453ee228f04ee06493851490bc79d222d6908d5527fa55db67dcbea96fdf178f3831a1b75ef1e17d06d6d2fc8eb6dcbeb8a4d66", 0x9b, 0x81}, {&(0x7f00000002c0)="3f3bf824cc298ff38d2207de9daa944b2c735ed7a602719e96476c9bb6c6e90247078cdc4080247a2aaf68afc166db0f9f18df47952ad82ebac260649f80f2d61268106159a44765c410925c245ba8cc811da9be51297c38da42ebe3d0e3e267591a9e7fed8d97c025375565bc9f8fbf17efaafd082e08e50bb5676cd806e341331e0e213cef78106c9c16aa76422e9563025cd6d88b637f08e812ff130c923bc0b82cd2da6539eb09955193d5f1aaf57ef3f1688cf989ca2f34edd2", 0xbc, 0x3ff}], 0x480, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f64656c616c6c6f632c6e6f75696433322c64656c616c2c6f632c6a71666d743d765f667376316d6f756e742d516f2ceba63cc36965722c6e6f626c6f6340e56b5f76616c69646974792c00"/86]) r3 = dup3(r1, r2, 0x80000) ioctl$CHAR_RAW_FRASET(r3, 0x1264, &(0x7f0000000140)=0x7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0xfe0fcd35d12e613a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x10, 0xffffffffffffffff, 0x1) chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setregid(0x0, 0x0) r4 = accept(r1, &(0x7f0000000400)=@isdn, &(0x7f0000000480)=0x80) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_SET_KEY(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)={0x24, r8, 0x172ba168118a5975, 0x0, 0x0, {{}, {@val={0x8, 0x3, r7}, @void}}, [@NL80211_ATTR_KEY_IDX={0x5}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_ASSOCIATE(r4, &(0x7f0000000780)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000740)={&(0x7f00000007c0)={0x138, 0x0, 0x2, 0x70bd2d, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r7}, @void}}, [@NL80211_ATTR_HT_CAPABILITY_MASK={0x1e, 0x94, {0x300, 0x0, 0x3, 0x0, {0x7, 0x7, 0x0, 0x8, 0x0, 0x1, 0x1, 0x1, 0x1}, 0x1, 0x1000}}, @NL80211_ATTR_FILS_KEK={0xc, 0xf2, "663fbaad4bc4af22"}, @NL80211_ATTR_DISABLE_HT={0x4}, @crypto_settings=[@NL80211_ATTR_CONTROL_PORT_OVER_NL80211={0x4}, @NL80211_ATTR_CIPHER_SUITE_GROUP={0x8, 0x4a, 0xfac08}, @NL80211_ATTR_CIPHER_SUITE_GROUP={0x8, 0x4a, 0xfac09}], @NL80211_ATTR_VHT_CAPABILITY_MASK={0x10, 0xb0, {0x100, {0x9d08, 0x583f, 0x9, 0x7b64}}}, @chandef_params=[@NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x3b}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x3}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x5}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x5f4}], @crypto_settings=[@NL80211_ATTR_CIPHER_SUITE_GROUP={0x8, 0x4a, 0xfac09}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_WPA_VERSIONS={0x8}, @NL80211_ATTR_CONTROL_PORT_ETHERTYPE={0x6, 0x66, 0x5}, @NL80211_ATTR_SAE_PASSWORD={0x60, 0x115, "42c0bca572a9f051502c3260eb25bfe1ffe9057ffec7b9b9d6086b16ea88ea806ae64fd22b8242cb1b8f0ac1db3f40439d95d66b74f0ec1be52b3ca70c9fdc5770d436a9294db55221f78108ebc77ed9c1ab596993c57afb2671a496"}, @NL80211_ATTR_AKM_SUITES={0x14, 0x4c, [0xfac0f, 0xfac0b, 0xfac12, 0xfac12]}], @NL80211_ATTR_VHT_CAPABILITY_MASK={0x10, 0xb0, {0x4, {0xd8f9, 0x20, 0x7af, 0x87fd}}}]}, 0x138}, 0x1, 0x0, 0x0, 0x1}, 0x4000) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 847.063969] FAULT_INJECTION: forcing a failure. [ 847.063969] name failslab, interval 1, probability 0, space 0, times 0 [ 847.098779] CPU: 1 PID: 15462 Comm: syz-executor.0 Not tainted 4.14.198-syzkaller #0 [ 847.106692] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 847.116041] Call Trace: [ 847.118632] dump_stack+0x1b2/0x283 [ 847.122258] should_fail.cold+0x10a/0x154 [ 847.126394] should_failslab+0xd6/0x130 [ 847.130352] kmem_cache_alloc+0x28e/0x3c0 [ 847.134511] __d_alloc+0x2a/0xa20 [ 847.137951] ? d_lookup+0x172/0x220 [ 847.141567] d_alloc+0x46/0x240 [ 847.144978] __lookup_hash+0x101/0x270 [ 847.148867] filename_create+0x156/0x3f0 [ 847.152921] ? kern_path_mountpoint+0x40/0x40 [ 847.157407] ? vfs_write+0x319/0x4d0 [ 847.161115] SyS_mkdirat+0x95/0x270 [ 847.164734] ? SyS_mknod+0x30/0x30 [ 847.168267] ? SyS_clock_settime+0x1a0/0x1a0 [ 847.172664] ? do_syscall_64+0x4c/0x640 [ 847.176627] ? SyS_mknod+0x30/0x30 [ 847.180161] do_syscall_64+0x1d5/0x640 [ 847.184037] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 847.189229] RIP: 0033:0x45de59 [ 847.192407] RSP: 002b:00007f83d73a4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 847.200101] RAX: ffffffffffffffda RBX: 0000000000020fc0 RCX: 000000000045de59 [ 847.207360] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000005 [ 847.214615] RBP: 00007f83d73a4ca0 R08: 0000000000000000 R09: 0000000000000000 [ 847.221872] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 847.229125] R13: 00007ffe5e353c9f R14: 00007f83d73a59c0 R15: 000000000118bf2c [ 847.287329] FAULT_INJECTION: forcing a failure. [ 847.287329] name failslab, interval 1, probability 0, space 0, times 0 [ 847.298690] CPU: 0 PID: 15474 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 847.306580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 847.315925] Call Trace: [ 847.318515] dump_stack+0x1b2/0x283 [ 847.322142] should_fail.cold+0x10a/0x154 [ 847.326291] should_failslab+0xd6/0x130 [ 847.330263] kmem_cache_alloc+0x28e/0x3c0 [ 847.334405] alloc_vfsmnt+0x23/0x7f0 [ 847.338102] clone_mnt+0x6c/0xff0 [ 847.341539] copy_tree+0x33e/0xa20 [ 847.345064] copy_mnt_ns+0x167/0xa30 [ 847.348773] ? create_new_namespaces+0x30/0x720 [ 847.353438] ? do_mount+0x2a00/0x2a00 [ 847.357250] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 847.362263] ? kmem_cache_alloc+0x35f/0x3c0 [ 847.366582] create_new_namespaces+0xc9/0x720 [ 847.371078] ? security_capable+0x88/0xb0 [ 847.375229] copy_namespaces+0x27b/0x310 [ 847.379286] copy_process.part.0+0x2600/0x6f00 [ 847.383868] ? get_pid_task+0xb8/0x130 [ 847.387762] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 847.392688] ? __schedule+0x893/0x1de0 [ 847.396577] ? __cleanup_sighand+0x40/0x40 [ 847.400807] ? lock_downgrade+0x740/0x740 [ 847.404961] _do_fork+0x184/0xc80 [ 847.408416] ? fork_idle+0x270/0x270 [ 847.412131] ? fput+0xb/0x140 [ 847.415234] ? SyS_write+0x14d/0x210 [ 847.418944] ? SyS_read+0x210/0x210 [ 847.422572] ? do_syscall_64+0x4c/0x640 [ 847.426544] ? sys_vfork+0x20/0x20 [ 847.430083] do_syscall_64+0x1d5/0x640 00:04:49 executing program 0 (fault-call:1 fault-nth:3): r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 847.433974] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 847.439159] RIP: 0033:0x45de59 [ 847.442344] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 847.450050] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 847.457318] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 847.464583] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 847.471850] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000001d [ 847.479127] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:04:49 executing program 1: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x7ff, 0x2, &(0x7f0000000100)=[{&(0x7f00000001c0)="1d4124f84f011f12926ed461c4fc13fd1db2eae3f4113c58bc2a79185c6166f5987c24c9879fb606b6d09db8861adcdac13157f9ec766e2cede709d76811a4e1faf4b070de5cc339f8c5d574bd77f0fe9845661ceb2708ae553d0dd6d94a835d610acacdea34727453ee228f04ee06493851490bc79d222d6908d5527fa55db67dcbea96fdf178f3831a1b75ef1e17d06d6d2fc8eb6dcbeb8a4d66", 0x9b, 0x81}, {&(0x7f00000002c0)="3f3bf824cc298ff38d2207de9daa944b2c735ed7a602719e96476c9bb6c6e90247078cdc4080247a2aaf68afc166db0f9f18df47952ad82ebac260649f80f2d61268106159a44765c410925c245ba8cc811da9be51297c38da42ebe3d0e3e267591a9e7fed8d97c025375565bc9f8fbf17efaafd082e08e50bb5676cd806e341331e0e213cef78106c9c16aa76422e9563025cd6d88b637f08e812ff130c923bc0b82cd2da6539eb09955193d5f1aaf57ef3f1688cf989ca2f34edd2", 0xbc, 0x3ff}], 0x480, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f64656c616c6c6f632c6e6f75696433322c64656c616c2c6f632c6a71666d743d765f667376316d6f756e742d516f2ceba63cc36965722c6e6f626c6f6340e56b5f76616c69646974792c00"/86]) r3 = dup3(r1, r2, 0x80000) ioctl$CHAR_RAW_FRASET(r3, 0x1264, &(0x7f0000000140)=0x7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0xfe0fcd35d12e613a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x10, 0xffffffffffffffff, 0x1) chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setregid(0x0, 0x0) r4 = accept(r1, &(0x7f0000000400)=@isdn, &(0x7f0000000480)=0x80) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_SET_KEY(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)={0x24, r8, 0x172ba168118a5975, 0x0, 0x0, {{}, {@val={0x8, 0x3, r7}, @void}}, [@NL80211_ATTR_KEY_IDX={0x5}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_ASSOCIATE(r4, &(0x7f0000000780)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000740)={&(0x7f00000007c0)={0x138, 0x0, 0x2, 0x70bd2d, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r7}, @void}}, [@NL80211_ATTR_HT_CAPABILITY_MASK={0x1e, 0x94, {0x300, 0x0, 0x3, 0x0, {0x7, 0x7, 0x0, 0x8, 0x0, 0x1, 0x1, 0x1, 0x1}, 0x1, 0x1000}}, @NL80211_ATTR_FILS_KEK={0xc, 0xf2, "663fbaad4bc4af22"}, @NL80211_ATTR_DISABLE_HT={0x4}, @crypto_settings=[@NL80211_ATTR_CONTROL_PORT_OVER_NL80211={0x4}, @NL80211_ATTR_CIPHER_SUITE_GROUP={0x8, 0x4a, 0xfac08}, @NL80211_ATTR_CIPHER_SUITE_GROUP={0x8, 0x4a, 0xfac09}], @NL80211_ATTR_VHT_CAPABILITY_MASK={0x10, 0xb0, {0x100, {0x9d08, 0x583f, 0x9, 0x7b64}}}, @chandef_params=[@NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x3b}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x3}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x5}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x5f4}], @crypto_settings=[@NL80211_ATTR_CIPHER_SUITE_GROUP={0x8, 0x4a, 0xfac09}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_WPA_VERSIONS={0x8}, @NL80211_ATTR_CONTROL_PORT_ETHERTYPE={0x6, 0x66, 0x5}, @NL80211_ATTR_SAE_PASSWORD={0x60, 0x115, "42c0bca572a9f051502c3260eb25bfe1ffe9057ffec7b9b9d6086b16ea88ea806ae64fd22b8242cb1b8f0ac1db3f40439d95d66b74f0ec1be52b3ca70c9fdc5770d436a9294db55221f78108ebc77ed9c1ab596993c57afb2671a496"}, @NL80211_ATTR_AKM_SUITES={0x14, 0x4c, [0xfac0f, 0xfac0b, 0xfac12, 0xfac12]}], @NL80211_ATTR_VHT_CAPABILITY_MASK={0x10, 0xb0, {0x4, {0xd8f9, 0x20, 0x7af, 0x87fd}}}]}, 0x138}, 0x1, 0x0, 0x0, 0x1}, 0x4000) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 847.609704] FAULT_INJECTION: forcing a failure. [ 847.609704] name failslab, interval 1, probability 0, space 0, times 0 [ 847.635136] CPU: 0 PID: 15478 Comm: syz-executor.0 Not tainted 4.14.198-syzkaller #0 [ 847.643053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 847.652544] Call Trace: [ 847.655142] dump_stack+0x1b2/0x283 [ 847.658857] should_fail.cold+0x10a/0x154 [ 847.663014] ? mempool_free+0x1d0/0x1d0 [ 847.666993] should_failslab+0xd6/0x130 [ 847.671012] kmem_cache_alloc+0x40/0x3c0 [ 847.675080] ? mempool_free+0x1d0/0x1d0 [ 847.679072] mempool_alloc+0x10e/0x2d0 [ 847.682970] ? remove_element.isra.0+0x1b0/0x1b0 [ 847.687737] ? lock_downgrade+0x740/0x740 [ 847.691898] bio_alloc_bioset+0x41b/0x830 [ 847.696056] ? bvec_alloc+0x2d0/0x2d0 [ 847.699863] ? __find_get_block+0x817/0xc40 [ 847.704203] submit_bh_wbc+0xf5/0x6f0 [ 847.708100] __bread_gfp+0x11c/0x2e0 [ 847.711823] fat12_ent_bread+0x133/0x3b0 [ 847.715889] ? fat12_ent_blocknr+0x89/0x1c0 [ 847.720219] fat_alloc_clusters+0x49a/0xd10 [ 847.724556] ? hashtab_stat+0x1d0/0x1d0 [ 847.728542] ? fat_ent_write+0x190/0x190 [ 847.732611] ? __lock_acquire+0x5fc/0x3f20 [ 847.736852] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 847.742309] ? security_compute_sid.part.0+0xa5c/0xfe0 [ 847.747589] ? memset+0x20/0x40 [ 847.750874] ? security_compute_sid.part.0+0xaa1/0xfe0 [ 847.756171] ? trace_hardirqs_on+0x10/0x10 [ 847.760409] ? vfat_mkdir+0xca/0x3c0 [ 847.764130] ? vfat_mkdir+0xca/0x3c0 [ 847.767847] ? __mutex_lock+0x360/0x1310 [ 847.772024] fat_alloc_new_dir+0xc0/0xc20 [ 847.776180] ? fat_add_entries+0xfc0/0xfc0 [ 847.780422] ? mark_held_locks+0xa6/0xf0 [ 847.784500] ? current_kernel_time64+0x17c/0x230 [ 847.789264] ? timespec_trunc+0xb7/0x120 [ 847.793331] ? put_timespec64+0xf0/0xf0 [ 847.797310] ? current_kernel_time64+0x154/0x230 [ 847.802078] vfat_mkdir+0xec/0x3c0 [ 847.805625] ? vfat_rename+0xd90/0xd90 [ 847.809526] ? security_inode_mkdir+0xca/0x100 [ 847.814312] vfs_mkdir+0x463/0x6e0 [ 847.817860] SyS_mkdirat+0x1fd/0x270 [ 847.821583] ? SyS_mknod+0x30/0x30 [ 847.825130] ? SyS_clock_settime+0x1a0/0x1a0 [ 847.829559] ? do_syscall_64+0x4c/0x640 [ 847.833541] ? SyS_mknod+0x30/0x30 [ 847.837089] do_syscall_64+0x1d5/0x640 [ 847.840986] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 847.846183] RIP: 0033:0x45de59 [ 847.849386] RSP: 002b:00007f83d73a4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 847.857099] RAX: ffffffffffffffda RBX: 0000000000020fc0 RCX: 000000000045de59 [ 847.864453] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000005 [ 847.871727] RBP: 00007f83d73a4ca0 R08: 0000000000000000 R09: 0000000000000000 [ 847.879002] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 847.886278] R13: 00007ffe5e353c9f R14: 00007f83d73a59c0 R15: 000000000118bf2c 00:04:49 executing program 5 (fault-call:10 fault-nth:30): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:04:49 executing program 0 (fault-call:1 fault-nth:4): r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 848.061583] FAULT_INJECTION: forcing a failure. [ 848.061583] name failslab, interval 1, probability 0, space 0, times 0 [ 848.073266] CPU: 1 PID: 15492 Comm: syz-executor.0 Not tainted 4.14.198-syzkaller #0 [ 848.081154] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 848.090628] Call Trace: [ 848.093230] dump_stack+0x1b2/0x283 [ 848.096874] should_fail.cold+0x10a/0x154 [ 848.101147] should_failslab+0xd6/0x130 [ 848.105134] kmem_cache_alloc+0x40/0x3c0 [ 848.109203] radix_tree_node_alloc.constprop.0+0x1b0/0x2f0 [ 848.114834] radix_tree_extend+0x158/0x3e0 [ 848.119075] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 848.124551] __radix_tree_create+0x3a2/0x4b0 [ 848.128971] ? o2cb_cluster_disconnect+0x100/0x100 [ 848.133912] page_cache_tree_insert+0x98/0x2a0 [ 848.138502] ? file_check_and_advance_wb_err+0x370/0x370 [ 848.144161] ? __add_to_page_cache_locked+0x1ed/0x840 [ 848.149364] __add_to_page_cache_locked+0x1fd/0x840 [ 848.154391] ? page_cache_tree_insert+0x2a0/0x2a0 [ 848.159241] ? lock_downgrade+0x740/0x740 [ 848.163396] add_to_page_cache_lru+0xcf/0x2b0 [ 848.167957] ? add_to_page_cache_locked+0x40/0x40 [ 848.172803] ? alloc_pages_current+0x15d/0x260 [ 848.177476] pagecache_get_page+0x300/0xab0 [ 848.181878] __getblk_slow+0x1dd/0x7a0 [ 848.185782] __getblk_gfp+0x6b/0x70 [ 848.189433] fat_alloc_new_dir+0x1c0/0xc20 [ 848.193675] ? fat_add_entries+0xfc0/0xfc0 [ 848.197917] ? mark_held_locks+0xa6/0xf0 [ 848.201986] ? current_kernel_time64+0x17c/0x230 [ 848.206750] ? timespec_trunc+0xb7/0x120 [ 848.210820] ? put_timespec64+0xf0/0xf0 [ 848.214794] ? current_kernel_time64+0x154/0x230 [ 848.219559] vfat_mkdir+0xec/0x3c0 [ 848.223103] ? vfat_rename+0xd90/0xd90 [ 848.227004] ? security_inode_mkdir+0xca/0x100 [ 848.231681] vfs_mkdir+0x463/0x6e0 [ 848.235230] SyS_mkdirat+0x1fd/0x270 [ 848.239145] ? SyS_mknod+0x30/0x30 [ 848.242687] ? SyS_clock_settime+0x1a0/0x1a0 [ 848.247099] ? do_syscall_64+0x4c/0x640 [ 848.251075] ? SyS_mknod+0x30/0x30 [ 848.254620] do_syscall_64+0x1d5/0x640 [ 848.258514] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 848.263792] RIP: 0033:0x45de59 [ 848.266985] RSP: 002b:00007f83d73a4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 848.274698] RAX: ffffffffffffffda RBX: 0000000000020fc0 RCX: 000000000045de59 [ 848.282122] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000005 [ 848.289395] RBP: 00007f83d73a4ca0 R08: 0000000000000000 R09: 0000000000000000 [ 848.296667] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 848.303941] R13: 00007ffe5e353c9f R14: 00007f83d73a59c0 R15: 000000000118bf2c [ 848.410589] FAULT_INJECTION: forcing a failure. [ 848.410589] name failslab, interval 1, probability 0, space 0, times 0 [ 848.422101] CPU: 0 PID: 15499 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 848.429999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 848.439356] Call Trace: [ 848.441954] dump_stack+0x1b2/0x283 [ 848.445593] should_fail.cold+0x10a/0x154 [ 848.449751] should_failslab+0xd6/0x130 [ 848.453730] __kmalloc_track_caller+0x2bc/0x400 [ 848.458416] ? kstrdup_const+0x35/0x60 [ 848.462307] ? lock_downgrade+0x740/0x740 [ 848.466471] kstrdup+0x36/0x70 [ 848.469668] kstrdup_const+0x35/0x60 [ 848.473387] alloc_vfsmnt+0xe0/0x7f0 [ 848.477107] clone_mnt+0x6c/0xff0 [ 848.480568] copy_tree+0x33e/0xa20 [ 848.484119] copy_mnt_ns+0x167/0xa30 [ 848.487840] ? create_new_namespaces+0x30/0x720 [ 848.492514] ? do_mount+0x2a00/0x2a00 [ 848.496322] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 848.501342] ? kmem_cache_alloc+0x35f/0x3c0 [ 848.505674] create_new_namespaces+0xc9/0x720 [ 848.510175] ? security_capable+0x88/0xb0 [ 848.514333] copy_namespaces+0x27b/0x310 [ 848.518404] copy_process.part.0+0x2600/0x6f00 [ 848.522995] ? __schedule+0x893/0x1de0 [ 848.527024] ? __cleanup_sighand+0x40/0x40 [ 848.531268] _do_fork+0x184/0xc80 [ 848.534730] ? fork_idle+0x270/0x270 [ 848.538449] ? fput+0xb/0x140 [ 848.541559] ? SyS_write+0x14d/0x210 [ 848.545275] ? SyS_read+0x210/0x210 [ 848.548910] ? do_syscall_64+0x4c/0x640 [ 848.552885] ? sys_vfork+0x20/0x20 [ 848.556433] do_syscall_64+0x1d5/0x640 [ 848.560341] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 848.565642] RIP: 0033:0x45de59 [ 848.568833] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 848.576543] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 848.583814] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 848.591166] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 848.598440] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000001e [ 848.605709] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:04:50 executing program 5 (fault-call:10 fault-nth:31): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:04:50 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x408c02, 0x0) [ 849.092490] FAULT_INJECTION: forcing a failure. [ 849.092490] name failslab, interval 1, probability 0, space 0, times 0 [ 849.104197] CPU: 0 PID: 15514 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 849.112200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 849.121565] Call Trace: [ 849.124165] dump_stack+0x1b2/0x283 [ 849.127807] should_fail.cold+0x10a/0x154 [ 849.132095] should_failslab+0xd6/0x130 [ 849.136079] kmem_cache_alloc+0x28e/0x3c0 00:04:50 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file2\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000340)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf33729236d97f2f746a4d3ec86d78aae8592a5c5cc64d0bd5c4895c017aba79370fd8c6580ada567b96a545cd0d7cbdbca1288ab73fafef2791e5903513be5819dbe3760fcb6862925743a9d67cc53605f2b06f36e9b0b38198e4a54fc86a169e4ae9262793e24b38d2bc3aab64600427a70d79f91ee28b7713df21177d1f198b2d87e03a2954cefd3d51aa639653bda1e6f988f6b5d12bd5937005a1bb6e403b3bda68a3e9515d96451a09cd3d08", 0xd0, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="696f00686172312c00823470b5a0fd14a5b3a4121fb48e6e6a49e6e7e773bc9ab573686b82cba0f29a8ce0f44804f197dc60f4a99c5cb87fb76d46c24fca93165925b74db3093fee244378c03ef424969367267cad90ed0b90bf0080068d598d43a84c5d098a00dadc14b6c31867988e292980b9f9a1acbb2c0d87a8af2d47"]) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000080)='./file2\x00', 0x0, 0x18}, 0x10) r1 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x9, 0x10000) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f00000001c0)={0x1000, 0x5, 0xfeff, 0xe01, 0x101, 0x8}) [ 849.140239] alloc_vfsmnt+0x23/0x7f0 [ 849.143961] clone_mnt+0x6c/0xff0 [ 849.147424] copy_tree+0x33e/0xa20 [ 849.151422] copy_mnt_ns+0x167/0xa30 [ 849.155147] ? create_new_namespaces+0x30/0x720 [ 849.159909] ? do_mount+0x2a00/0x2a00 [ 849.163824] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 849.168845] ? kmem_cache_alloc+0x35f/0x3c0 [ 849.173175] create_new_namespaces+0xc9/0x720 [ 849.177676] ? security_capable+0x88/0xb0 [ 849.181833] copy_namespaces+0x27b/0x310 [ 849.185902] copy_process.part.0+0x2600/0x6f00 [ 849.190494] ? _raw_spin_unlock_irq+0x24/0x80 [ 849.194996] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 849.200016] ? _raw_spin_unlock_irq+0x5a/0x80 [ 849.204528] ? finish_task_switch+0x178/0x610 [ 849.209030] ? finish_task_switch+0x14d/0x610 [ 849.213669] ? __cleanup_sighand+0x40/0x40 [ 849.217909] ? lock_downgrade+0x740/0x740 [ 849.222069] _do_fork+0x184/0xc80 [ 849.225638] ? fork_idle+0x270/0x270 [ 849.229358] ? fput+0xb/0x140 [ 849.232470] ? SyS_write+0x14d/0x210 [ 849.236363] ? SyS_read+0x210/0x210 [ 849.239997] ? do_syscall_64+0x4c/0x640 [ 849.243999] ? sys_vfork+0x20/0x20 [ 849.247546] do_syscall_64+0x1d5/0x640 [ 849.251447] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 849.256638] RIP: 0033:0x45de59 [ 849.259831] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 849.267546] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 849.268397] FAT-fs (loop0): Unrecognized mount option "io" or missing value [ 849.274928] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 849.274934] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 849.274938] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000001f [ 849.274944] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:04:51 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x93) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000200)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r0, 0x8008f512, &(0x7f00000000c0)) r2 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r2, &(0x7f0000000040)='./file1\x00', 0x0) [ 849.475978] FAT-fs (loop0): Unrecognized mount option "io" or missing value [ 849.676692] print_req_error: I/O error, dev loop0, sector 1 [ 849.682461] buffer_io_error: 5 callbacks suppressed [ 849.682467] Buffer I/O error on dev loop0, logical block 1, async page read [ 849.695486] print_req_error: I/O error, dev loop0, sector 2 [ 849.701215] Buffer I/O error on dev loop0, logical block 2, async page read [ 849.708642] print_req_error: I/O error, dev loop0, sector 7 [ 849.714371] Buffer I/O error on dev loop0, logical block 7, async page read 00:04:51 executing program 5 (fault-call:10 fault-nth:32): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) [ 849.947139] FAULT_INJECTION: forcing a failure. [ 849.947139] name failslab, interval 1, probability 0, space 0, times 0 [ 849.958545] CPU: 1 PID: 15539 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 849.966585] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 849.975945] Call Trace: [ 849.978674] dump_stack+0x1b2/0x283 [ 849.982315] should_fail.cold+0x10a/0x154 [ 849.986488] should_failslab+0xd6/0x130 [ 849.990470] __kmalloc_track_caller+0x2bc/0x400 [ 849.995237] ? kstrdup_const+0x35/0x60 [ 849.999129] ? lock_downgrade+0x740/0x740 [ 850.003283] kstrdup+0x36/0x70 [ 850.006611] kstrdup_const+0x35/0x60 [ 850.010334] alloc_vfsmnt+0xe0/0x7f0 [ 850.014051] clone_mnt+0x6c/0xff0 [ 850.017515] copy_tree+0x33e/0xa20 [ 850.021165] copy_mnt_ns+0x167/0xa30 [ 850.024888] ? create_new_namespaces+0x30/0x720 [ 850.029560] ? do_mount+0x2a00/0x2a00 [ 850.033367] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 850.038387] ? kmem_cache_alloc+0x35f/0x3c0 [ 850.042717] create_new_namespaces+0xc9/0x720 [ 850.047217] ? security_capable+0x88/0xb0 [ 850.051376] copy_namespaces+0x27b/0x310 [ 850.055444] copy_process.part.0+0x2600/0x6f00 [ 850.060043] ? trace_hardirqs_on+0x10/0x10 [ 850.064288] ? check_preemption_disabled+0x35/0x240 [ 850.069313] ? check_preemption_disabled+0x35/0x240 [ 850.074340] ? finish_task_switch+0x178/0x610 [ 850.078868] ? __cleanup_sighand+0x40/0x40 [ 850.083228] ? _raw_spin_unlock_irq+0x5a/0x80 [ 850.087730] ? finish_task_switch+0x14d/0x610 [ 850.092225] ? switch_mm_irqs_off+0x2d2/0xeb0 [ 850.096727] _do_fork+0x184/0xc80 [ 850.100186] ? fork_idle+0x270/0x270 [ 850.103901] ? io_schedule_timeout+0x140/0x140 [ 850.108501] ? fput+0xb/0x140 [ 850.111618] ? do_syscall_64+0x4c/0x640 [ 850.115595] ? sys_vfork+0x20/0x20 [ 850.119143] do_syscall_64+0x1d5/0x640 [ 850.123039] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 850.128365] RIP: 0033:0x45de59 [ 850.131642] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 850.139661] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 00:04:51 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e4000010000000000000004000000000000200000000000000000001000000000002000000000000000010000000100000001000000100000001000000000000000000100000000000122badb145de474f84c86b8fd41337fd", 0x6c, 0x10320}, {&(0x7f0000000280)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000002800)=ANY=[@ANYBLOB="4eda9e"]) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = open(&(0x7f00000001c0)='./file0\x00', 0xa440, 0x110) r2 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x0, 0x1, 0x1, 0x1f, 0x0, 0x400000000}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r2, r3, &(0x7f0000000240)=0x202, 0x4000000000dc) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000001700)='NLBL_UNLBL\x00') socket(0x11, 0x800000003, 0x8) sendmsg$NLBL_UNLABEL_C_STATICADD(r3, &(0x7f0000000640)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001780)={&(0x7f0000000800)=ANY=[@ANYBLOB="1c7fc5db6cdef069691c1538af5784cc33cbb0d4e80385acf560eb3aece760751d023b69a4cc8e519643edf017aa42ee890b77e13bd5ff194db428aca06f6667a4d49a6404d7067e4aabab05b075f3d5476a93659168c63788d138bc3d7d7d5a67b53ab72c", @ANYRESOCT=r3, @ANYBLOB="00022dbd7000fedbdf258e9fc6611cde03950af60e000400e0000004"], 0x1c}, 0x1, 0x0, 0x0, 0x8}, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000001940)=ANY=[@ANYBLOB="000000002509eae5f1c5a6558f5e41c38022e68b6aa734a36c2882ffa1915a3194388323d0cc9e0dc58a05130ff60f38072c5bf69c4b1644f151e5e9968e62485548d1e65cb71f44e8e62565157656f3b80c6fdc569bb073d32fdc9236f3556e056fe4ab40a822494dfc42d74d3ace54cee82b26a2e370ce36910c26519b0db6e3039bb525ff34f2ce00"/153, @ANYRES16=r4, @ANYBLOB="040001000000080200fe88000000000000000000000000000108000500ac1e0001140006006272696467655f736c6176655f31000014000600636169663000000000000000000000001400020020010000000000000000000000000000080004007f000001080004007f000001"], 0x7c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc001) sendmsg$NLBL_UNLABEL_C_ACCEPT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000001800)={0x120, r4, 0x8, 0x70bd26, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:dpkg_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ip6_vti0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'erspan0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @NLBL_UNLABEL_A_SECCTX={0x29, 0x7, 'system_u:object_r:pinentry_exec_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:dpkg_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @remote}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @loopback}, @NLBL_UNLABEL_A_SECCTX={0x24, 0x7, 'system_u:object_r:apm_bios_t:s0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}]}, 0x120}, 0x1, 0x0, 0x0, 0x80000}, 0x40001) ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, &(0x7f0000000680)) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f00000006c0)=ANY=[@ANYBLOB="19e4cbd774ff0b5aed2c000000", @ANYRES16=r4, @ANYBLOB="000229bd7000fcdbdf250600000008000400ac1414bb08000500ac1e010108000400ac14142a"], 0x2c}, 0x1, 0x0, 0x0, 0x40040d0}, 0x4004080) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) [ 850.146940] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 850.154245] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 850.161524] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000020 [ 850.168797] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 [ 850.416453] print_req_error: I/O error, dev loop0, sector 1 [ 850.422392] Buffer I/O error on dev loop0, logical block 1, async page read [ 850.430820] print_req_error: I/O error, dev loop0, sector 2 [ 850.436789] Buffer I/O error on dev loop0, logical block 2, async page read [ 850.444039] print_req_error: I/O error, dev loop0, sector 7 [ 850.449930] Buffer I/O error on dev loop0, logical block 7, async page read 00:04:52 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x10000001) 00:04:52 executing program 5 (fault-call:10 fault-nth:33): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:04:52 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='\t\x00']) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 850.691330] FAT-fs (loop0): Unrecognized mount option " " or missing value [ 850.768324] FAT-fs (loop0): Unrecognized mount option " " or missing value [ 850.825181] FAULT_INJECTION: forcing a failure. [ 850.825181] name failslab, interval 1, probability 0, space 0, times 0 [ 850.836735] CPU: 0 PID: 15578 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 850.844630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 850.853989] Call Trace: [ 850.856592] dump_stack+0x1b2/0x283 [ 850.860242] should_fail.cold+0x10a/0x154 [ 850.864399] should_failslab+0xd6/0x130 [ 850.868378] kmem_cache_alloc+0x28e/0x3c0 [ 850.872535] alloc_vfsmnt+0x23/0x7f0 [ 850.876372] clone_mnt+0x6c/0xff0 [ 850.879834] copy_tree+0x33e/0xa20 [ 850.883384] copy_mnt_ns+0x167/0xa30 [ 850.887114] ? create_new_namespaces+0x30/0x720 [ 850.891786] ? do_mount+0x2a00/0x2a00 [ 850.895595] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 850.900614] ? kmem_cache_alloc+0x35f/0x3c0 [ 850.904943] create_new_namespaces+0xc9/0x720 [ 850.909442] ? security_capable+0x88/0xb0 [ 850.913601] copy_namespaces+0x27b/0x310 [ 850.917722] copy_process.part.0+0x2600/0x6f00 [ 850.922317] ? get_pid_task+0xb8/0x130 [ 850.926217] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 850.931164] ? __cleanup_sighand+0x40/0x40 [ 850.935414] ? lock_downgrade+0x740/0x740 [ 850.939592] _do_fork+0x184/0xc80 [ 850.943074] ? fork_idle+0x270/0x270 [ 850.946798] ? fput+0xb/0x140 [ 850.949908] ? SyS_write+0x14d/0x210 [ 850.953730] ? SyS_read+0x210/0x210 [ 850.957364] ? do_syscall_64+0x4c/0x640 [ 850.961345] ? sys_vfork+0x20/0x20 [ 850.964890] do_syscall_64+0x1d5/0x640 [ 850.968978] entry_SYSCALL_64_after_hwframe+0x46/0xbb 00:04:52 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f00000001c0)={0x5, 0x20, [], 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 850.974170] RIP: 0033:0x45de59 [ 850.977362] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 850.985077] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 850.992366] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 850.999642] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 851.006914] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000021 [ 851.014191] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 [ 851.116965] BTRFS info (device loop2): unrecognized mount option 'Nڞ' 00:04:52 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) r1 = socket(0x11, 0x800000003, 0x8) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f00000002c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x400, 0x70bd2d, 0x25dfdbff, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004044}, 0x8000) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 851.215339] BTRFS error (device loop2): open_ctree failed 00:04:53 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000500)="597d766800000000000000000000000000000000000000000000000000000000fcb2096bad154c2da9a086564f36bcc3000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045010000000000000000000000010000000000000000000001000000000000720000000000001000000010000000100000000000000000000000000000000000000000000000000000000000000000122badb145de474f84c86b8fd41337fdfcb2096bad154c2da9a086564f36bcc3", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e4000010000000000000004000000000000200000000000000000001000000000002000000000000000010000000100000001000000100000001000000000000000000100000000000122badb145de474f84c86b8fd41337fd", 0x6c, 0x10320}, {&(0x7f0000000280)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000002800)=ANY=[@ANYBLOB="4eda9e"]) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = open(&(0x7f00000001c0)='./file0\x00', 0xa440, 0x110) r2 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x0, 0x1, 0x1, 0x1f, 0x0, 0x400000000}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r2, r3, &(0x7f0000000240)=0x202, 0x4000000000dc) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000001700)='NLBL_UNLBL\x00') r5 = socket(0x11, 0x800000003, 0x8) sendmsg$NLBL_UNLABEL_C_STATICADD(r3, &(0x7f0000000640)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001780)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c7fc5db6cdef069691c1538af5784cc33cbb0d4e80385acf560eb3aece760751d023b69a4cc8e519643edf017aa42ee890b77e13bd5ff194db428aca06f6667a4d49a6404d7067e4aabab05b075f3d5476a93659168c63788d138bc3d7d7d5a67b53ab72c", @ANYRES16=r5, @ANYBLOB="00022dbd7000fedbdf250300000008000400e0000002"], 0x1c}, 0x1, 0x0, 0x0, 0x8}, 0x20008004) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000001940)=ANY=[@ANYBLOB="000000002509eae5f1c5a6558f5e41c38022e68b6aa734a36c2882ffa1915a3194388323d0cc9e0dc58a05130ff60f38072c5bf69c4b1644f151e5e9968e62485548d1e65cb71f44e8e62565157656f3b80c6fdc569bb073d32fdc9236f3556e056fe4ab40a822494dfc42d74d3ace54cee82b26a2e370ce36910c26519b0db6e3039bb525ff34f2ce00"/153, @ANYRES16=r4, @ANYBLOB="040001000000080200fe88000000000000000000000000000108000500ac1e0001140006006272696467655f736c6176655f31000014000600636169663000000000000000000000001400020020010000000000000000000000000000080004007f000001080004007f000001"], 0x7c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc001) sendmsg$NLBL_UNLABEL_C_ACCEPT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000001800)={0x120, r4, 0x8, 0x70bd26, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:dpkg_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ip6_vti0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'erspan0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @NLBL_UNLABEL_A_SECCTX={0x29, 0x7, 'system_u:object_r:pinentry_exec_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:dpkg_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @remote}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @loopback}, @NLBL_UNLABEL_A_SECCTX={0x24, 0x7, 'system_u:object_r:apm_bios_t:s0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}]}, 0x120}, 0x1, 0x0, 0x0, 0x80000}, 0x40001) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="0002296fd48cb402db361d1add001f4b915b4f4f58be97936f3b3f54e8db5cbd7000fcdbdf250600000008000400ac1414bb08000500ac1e0101e480ac64ac14142aa050d2ac172eea5957936bf01f92ffab26b0d98fcbc37e74a7f95f81d09131a12d6b22dad8422ad0457bdc70a545512ff2f27ab069ad10c3c0268b34198c1d1ff332379a"], 0x2c}, 0x1, 0x0, 0x0, 0x40040d0}, 0x4004080) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) 00:04:53 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="727365743d6370313235312c00bc9ef8b668"]) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) r1 = socket(0x11, 0x800000003, 0x8) fstat(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioprio_set$uid(0x3, r2, 0x2004) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) setsockopt$packet_buf(r1, 0x107, 0x6, &(0x7f00000002c0)="fab00ac96e66a50797820e6fa74e7806211357e5786f1c05cda3758eb6d164e8fdb70b0c1b4d256b582e72336293a2282239a2cac40723bd0931f8e82a99a7f2c3137da9caed34525fc671837fd2c70413ff2a2bf343c1b88a4f608fbd5eb9200aa1b95adce742700d877d5fb7a784cb9f88a88a42c2b7ed6fe71ca25f27b22e8d2c13e921ed7eebf66ccdf33317fa2286f7a19f5add1ef50263d1f2e74a5e5341eb1f0036c87481772de24b063c84516b9ac438938c90d1e7c69bd4a707632d79af20e7c6c3fb347d43d6d6eb082c152a1b0db493725b9950f4ee", 0xdb) [ 851.461266] BTRFS info (device loop2): unrecognized mount option 'Nڞ' [ 851.488775] FAT-fs (loop0): Unrecognized mount option "rset=cp1251" or missing value 00:04:53 executing program 5 (fault-call:10 fault-nth:34): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) [ 851.525788] BTRFS error (device loop2): open_ctree failed [ 851.596165] FAT-fs (loop0): Unrecognized mount option "rset=cp1251" or missing value [ 851.714239] FAULT_INJECTION: forcing a failure. [ 851.714239] name failslab, interval 1, probability 0, space 0, times 0 [ 851.725873] CPU: 0 PID: 15634 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 851.733775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 851.743134] Call Trace: [ 851.745728] dump_stack+0x1b2/0x283 [ 851.749366] should_fail.cold+0x10a/0x154 [ 851.753531] should_failslab+0xd6/0x130 [ 851.757631] __kmalloc_track_caller+0x2bc/0x400 [ 851.762303] ? kstrdup_const+0x35/0x60 [ 851.766194] ? lock_downgrade+0x740/0x740 [ 851.770348] kstrdup+0x36/0x70 [ 851.773543] kstrdup_const+0x35/0x60 [ 851.777273] alloc_vfsmnt+0xe0/0x7f0 [ 851.780994] clone_mnt+0x6c/0xff0 [ 851.784473] copy_tree+0x33e/0xa20 [ 851.788026] copy_mnt_ns+0x167/0xa30 [ 851.791750] ? create_new_namespaces+0x30/0x720 [ 851.796426] ? do_mount+0x2a00/0x2a00 [ 851.800237] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 851.805349] ? kmem_cache_alloc+0x35f/0x3c0 [ 851.809679] create_new_namespaces+0xc9/0x720 00:04:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x42, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=@newtfilter={0x48, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {}, {0xfff2}}, [@filter_kind_options=@f_flower={{0xb, 0x1, 'flower\x00'}, {0x18, 0x2, [@TCA_FLOWER_KEY_IPV6_DST={0x14, 0x10, @loopback}]}}]}, 0x48}}, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f00000002c0)={0x148, 0x0, 0x1, 0x70bd26, 0x25dfdbff, {}, [@ETHTOOL_A_PAUSE_AUTONEG={0x5, 0x2, 0x1}, @ETHTOOL_A_PAUSE_RX={0x5}, @ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @ETHTOOL_A_PAUSE_HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_PAUSE_HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}]}, @ETHTOOL_A_PAUSE_RX={0x5}, @ETHTOOL_A_PAUSE_RX={0x5, 0x3, 0x1}, @ETHTOOL_A_PAUSE_AUTONEG={0x5}]}, 0x148}, 0x1, 0x0, 0x0, 0x4000001}, 0x10) r3 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r3, &(0x7f0000000040)='./file1\x00', 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r4, 0xc0305302, &(0x7f00000000c0)={0x6, 0x6, 0x5501, 0x6, 0xaa}) [ 851.814182] ? security_capable+0x88/0xb0 [ 851.818338] copy_namespaces+0x27b/0x310 [ 851.822406] copy_process.part.0+0x2600/0x6f00 [ 851.826999] ? get_pid_task+0xb8/0x130 [ 851.830894] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 851.835949] ? __cleanup_sighand+0x40/0x40 [ 851.840192] ? lock_downgrade+0x740/0x740 [ 851.844350] _do_fork+0x184/0xc80 [ 851.847825] ? fork_idle+0x270/0x270 [ 851.851656] ? fput+0xb/0x140 [ 851.854774] ? SyS_write+0x14d/0x210 [ 851.858612] ? SyS_read+0x210/0x210 [ 851.862248] ? do_syscall_64+0x4c/0x640 [ 851.866228] ? sys_vfork+0x20/0x20 [ 851.869777] do_syscall_64+0x1d5/0x640 [ 851.873681] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 851.878875] RIP: 0033:0x45de59 [ 851.882069] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 851.889786] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 851.897064] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 851.904425] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 851.911787] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000022 [ 851.919060] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 [ 851.922253] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 852.106500] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 00:04:53 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@fat=@errors_continue='errors=continue'}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 852.263474] BTRFS info (device loop2): unrecognized mount option 'Nڞ' 00:04:54 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) getsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 852.339406] BTRFS error (device loop2): open_ctree failed 00:04:54 executing program 5 (fault-call:10 fault-nth:35): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) [ 852.608197] FAULT_INJECTION: forcing a failure. [ 852.608197] name failslab, interval 1, probability 0, space 0, times 0 [ 852.619755] CPU: 1 PID: 15683 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 852.627654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 852.637014] Call Trace: [ 852.639610] dump_stack+0x1b2/0x283 [ 852.643248] should_fail.cold+0x10a/0x154 [ 852.647406] should_failslab+0xd6/0x130 [ 852.651386] kmem_cache_alloc+0x28e/0x3c0 [ 852.655653] alloc_vfsmnt+0x23/0x7f0 [ 852.659554] clone_mnt+0x6c/0xff0 [ 852.663019] copy_tree+0x33e/0xa20 [ 852.666569] copy_mnt_ns+0x167/0xa30 [ 852.670290] ? create_new_namespaces+0x30/0x720 [ 852.674962] ? do_mount+0x2a00/0x2a00 [ 852.678772] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 852.683796] ? kmem_cache_alloc+0x35f/0x3c0 [ 852.688143] create_new_namespaces+0xc9/0x720 [ 852.692643] ? security_capable+0x88/0xb0 [ 852.696805] copy_namespaces+0x27b/0x310 [ 852.700878] copy_process.part.0+0x2600/0x6f00 [ 852.705473] ? trace_hardirqs_on+0x10/0x10 [ 852.709719] ? check_preemption_disabled+0x35/0x240 [ 852.714744] ? check_preemption_disabled+0x35/0x240 [ 852.719887] ? finish_task_switch+0x178/0x610 [ 852.724397] ? __cleanup_sighand+0x40/0x40 [ 852.728642] ? _raw_spin_unlock_irq+0x5a/0x80 [ 852.733143] ? finish_task_switch+0x14d/0x610 [ 852.737752] ? switch_mm_irqs_off+0x2d2/0xeb0 [ 852.742274] _do_fork+0x184/0xc80 [ 852.745735] ? fork_idle+0x270/0x270 [ 852.749457] ? io_schedule_timeout+0x140/0x140 [ 852.754045] ? fput+0xb/0x140 [ 852.757161] ? do_syscall_64+0x4c/0x640 [ 852.761137] ? sys_vfork+0x20/0x20 [ 852.764684] do_syscall_64+0x1d5/0x640 [ 852.768578] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 852.773918] RIP: 0033:0x45de59 [ 852.777105] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 852.785019] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 852.792280] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 852.799539] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 00:04:54 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) ioctl$MON_IOCX_GETX(r1, 0x4018920a, &(0x7f00000002c0)={&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f00000001c0)=""/100, 0x64}) [ 852.806838] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000023 [ 852.814101] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:04:54 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e4000010000000000000004000000000000200000000000000000001000000000002000000000000000010000000100000001000000100000001000000000000000000100000000000122badb145de474f84c86b8fd41337fd", 0x6c, 0x10320}, {&(0x7f0000000280)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000002800)=ANY=[@ANYBLOB="4eda9e"]) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = open(&(0x7f00000001c0)='./file0\x00', 0xa440, 0x110) r2 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x0, 0x1, 0x1, 0x1f, 0x0, 0x400000000}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r2, r3, &(0x7f0000000240)=0x202, 0x4000000000dc) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000001700)='NLBL_UNLBL\x00') r5 = socket(0x11, 0x800000003, 0x8) sendmsg$NLBL_UNLABEL_C_STATICADD(r3, &(0x7f0000000640)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001780)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c7fc5db6cdef069691c1538af5784cc33cbb0d4e80385acf560eb3aece760751d023b69a4cc8e519643edf017aa42ee890b77e13bd5ff194db428aca06f6667a4d49a6404d7067e4aabab05b075f3d5476a93659168c63788d138bc3d7d7d5a67b53ab72c", @ANYRES16=r5, @ANYBLOB="00022dbd7000fedbdf250300000008000400e0000002"], 0x1c}, 0x1, 0x0, 0x0, 0x8}, 0x20008004) r6 = socket(0x11, 0x800000003, 0x8) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f0000000680)=ANY=[@ANYBLOB="000000002509eae5f1c5a6558f5e41c38022e68b6aa734a36c2882ffa1915a3194388323d0cc9e0dc58a05130ff60f38072c5bf69c4b1644f151e5e9968e62485548d1e65cb71f44e8e62565157656f3b80c6fdc569bb073d32fdc9236f3556e056fe4ab40a822494dfc42d74d3ace54cee82b26a2e370ce36910c26519b0db6e3039bb525ff34f2ce00"/153, @ANYRES16=r4, @ANYRES64=r6], 0x7c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc001) sendmsg$NLBL_UNLABEL_C_ACCEPT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000001800)={0x120, r4, 0x8, 0x70bd26, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:dpkg_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ip6_vti0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'erspan0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @NLBL_UNLABEL_A_SECCTX={0x29, 0x7, 'system_u:object_r:pinentry_exec_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:dpkg_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @remote}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @loopback}, @NLBL_UNLABEL_A_SECCTX={0x24, 0x7, 'system_u:object_r:apm_bios_t:s0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}]}, 0x120}, 0x1, 0x0, 0x0, 0x80000}, 0x40001) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='- \x00\x00', @ANYRES16=r4, @ANYBLOB="000229bd7000fcdbdf250600000008000400ac1414bb08000500ac1e010108000400ac14142a"], 0x2c}, 0x1, 0x0, 0x0, 0x40040d0}, 0x4004080) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) 00:04:54 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f00000000c0)="e3e3e04d476b3e5d3027ff80b72640264eacd3b4bf3372920bed6ef3559ad8eace9189ad6e9628aea20c7e8a0f2c6500"/60, 0x3c, 0x600}, {0x0, 0x44, 0xff}], 0x0, &(0x7f00000001c0)={[{@iocharset={'iocharset', 0x3d, 'cp857'}}, {@numtail='nonumtail=0'}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000002c0)) [ 853.019078] BTRFS info (device loop2): unrecognized mount option 'Nڞ' [ 853.115924] BTRFS error (device loop2): open_ctree failed [ 853.169705] FAT-fs (loop0): Directory bread(block 6) failed [ 853.181411] FAT-fs (loop0): Directory bread(block 6) failed 00:04:54 executing program 0: socket$phonet(0x23, 0x2, 0x1) r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:04:54 executing program 5 (fault-call:10 fault-nth:36): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:04:55 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x40050, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) r1 = socket(0x11, 0x800000003, 0x8) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) sendto(r1, &(0x7f0000000380)="adeac63958757895def4fb54945eff753dd5acd8f042576f9401fd1ebc3e66419600f840f0db48c62c07599bb4cf82490476579657f2a66310a605cca5d3254141d3debbd23b27e06bac3642385774a4ab8fd2257c2092ad076f3f0ff989f16b5681de5cd53e36bcf86b1722bd0b1cf0fca10b456ec28ac58401f49e5bd02f3fbb6f4cd82a78496460e22aad0691b9ddba28523ab1a426db9a0403796bd778639a859a1330c580dc9a04aa00e97147bd76306e404fb288c02c41f6cf3b32ae0cacf4f631580737fa4a10d7918c", 0xcd, 0x80, &(0x7f00000001c0)=@pptp={0x18, 0x2, {0x3, @private=0xa010102}}, 0x80) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f00000002c0)={0x1f, {{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x20}}}}, 0x88) [ 853.479241] FAULT_INJECTION: forcing a failure. [ 853.479241] name failslab, interval 1, probability 0, space 0, times 0 [ 853.490677] CPU: 0 PID: 15726 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 853.498575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 853.508029] Call Trace: [ 853.510620] dump_stack+0x1b2/0x283 [ 853.514244] should_fail.cold+0x10a/0x154 [ 853.518389] should_failslab+0xd6/0x130 [ 853.522373] __kmalloc_track_caller+0x2bc/0x400 00:04:55 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='net_prio.prioidx\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) getdents(r2, &(0x7f0000000480)=""/232, 0xe8) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x7fffffff) userfaultfd(0x80800) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000280)="88548410001c00001c0073a3c3bdf12fbb2427080000000008007809140b2a3a08026811a5d1e5ccb87ac6ea8475000000005fc02afd274484c828c48cafc76cc930a76ec2cc277f77ca76f1b50c55b50c924aaad7d94d1bebc22674b64cc04a66d025ae7c2301c287ef00fad53f7da72f9f7b581e4b628594745bddfcfcbed1551cf3be4824a1a4", 0x88, 0xe000}], 0x0, &(0x7f0000000080)=ANY=[]) r4 = dup(r1) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x800, 0x0) sendmsg$WG_CMD_GET_DEVICE(r5, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000780)={0x134, 0x0, 0x2, 0x70bd2d, 0x0, {}, [@WGDEVICE_A_PEERS={0x120, 0x8, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0xf75}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @local}}]}, {0x4}, {0xf4, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0xb0, 0x9, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3e}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}]}, {0x34, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g='\xd1s(\x99\xf6\x11\xcd\x89\x94\x03M\x7fA=\xc9Wc\x0eT\x93\xc2\x85\xac\xa4\x00e\xcbc\x11\xbeik'}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @rand_addr=0x64010101}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x1}]}]}]}, 0x134}}, 0x20000800) getpeername(0xffffffffffffffff, &(0x7f0000000580)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000600)=0x80) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000e00)={0x0, 0xfffb, 0x10, 0x4, 0x2}, &(0x7f0000000e40)=0x18) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000e80)={0x0, 0xb, 0x1, 0x5, 0x0}, &(0x7f0000000ec0)=0x10) sendmsg$inet_sctp(r6, &(0x7f0000001040)={&(0x7f0000000640)=@in={0x2, 0x4e23, @broadcast}, 0x10, &(0x7f0000000dc0)=[{&(0x7f0000000680)="9ca472cd2d37f929e7c3cd08a710b256a475183cdc18e572de046f01bdf31ae02f22955859f510aff0b8a5453e0d8924ad51af79e6348b39d4d313c11fe179cc90fdd298bc625244fa4cf47f280aad54e70f8a0ba32a9a70d8d574269113390e91bd286fb40c85fa7e67fe3184b74994dca812838129ae93f4cd91c3a42fe9ec15921faf302500d10cca64035583429db9b9c86721baf11ba5168629db23ae122a79f24cb3", 0xa5}, {&(0x7f0000000cc0)="e41e0b61a11ffcb28ee84c7026a69f375ae520fce52f281ee829f932ff057d1babf9b2a17b3840ead88b299e9e889fc08ee2d3480c47a6502bd3f0f65afd1104ccfef2674b95776c8a361b913f8bba80b8642da79ba669d4022f10e3394e26120e02785afb9a049c5c080a4a65a0cefd857355a0b34cf8fd0b42f46747da24f35915cffdaafdd8e4ab44376a8d297ea03f90222bfe54c5ffc0b16af0cb12a5f04e395355f85fa209597c37d124d3854bb2dfd4f2e1efc5d6579cf4d78e6c1e96e2fb9a04d5f163cbe9df12dcf66b3e392b6281bbd53766901a273ce36cc6e7d00896cc836217d85d97afa010f416d44f1d07a9be", 0xf4}, {&(0x7f0000000740)="f64ca1c22e57f7b3582a06cf1799b390a01e047c846634406b33479cea50fe3bd56d417320a9c51ac58b860cfceddc5d", 0x30}], 0x3, &(0x7f0000000f00)=[@dstaddrv4={0x18, 0x84, 0x7, @dev={0xac, 0x14, 0x14, 0x25}}, @prinfo={0x18, 0x84, 0x5, {0x30, 0x1ff}}, @sndrcv={0x30, 0x84, 0x1, {0x839, 0x2, 0x2, 0xddf, 0x97, 0x1, 0xa38f, 0xffffffff, r7}}, @dstaddrv6={0x20, 0x84, 0x8, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @sndrcv={0x30, 0x84, 0x1, {0x7, 0xbdef, 0x8206, 0xffffffff, 0x0, 0xfff, 0xad6, 0x3, r8}}, @init={0x18, 0x84, 0x0, {0x3, 0x8000, 0x0, 0x3}}, @init={0x18, 0x84, 0x0, {0x3, 0x7ff, 0x8, 0x8}}, @sndinfo={0x20, 0x84, 0x2, {0x7, 0x8001, 0x1, 0x8}}, @dstaddrv4={0x18, 0x84, 0x7, @broadcast}], 0x118, 0x4000}, 0xc880) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="680080000d92c0a87f8c645d6ce1e8f7724fc7953b277c27bbe17b7bce02f8977e751980d2215f9a0f5100000000000000000020000000007c50fb7c384be84b72fdc8e86a7c9b6d51b075e34ee1deb8d17bfe3e233fe18f6114f3ea93b88f364a134802b12b", @ANYRES16, @ANYBLOB="00082dbd7000fbdbdf250000000014000200776731000000000000000000000000001400020077673100000000000000000000000000060006004e22000024000300a05ca84f6c9c8e3853e2fd7a70ae0fb20fa152600cb00845174f08076f8d7843"], 0x68}, 0x1, 0x0, 0x0, 0x4000014}, 0x40000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f0000000040)=[@in6={0xa, 0x8, 0x1ff, @remote, 0xc49f}, @in6={0xa, 0x4e24, 0x4, @private2, 0xffffff31}, @in={0x2, 0x4e23, @broadcast}, @in={0x2, 0x4e22, @multicast1}], 0x58) ioctl$KVM_GET_LAPIC(r2, 0x8400ae8e, &(0x7f00000008c0)={"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"}) [ 853.527038] ? kstrdup_const+0x35/0x60 [ 853.530924] ? lock_downgrade+0x740/0x740 [ 853.535068] kstrdup+0x36/0x70 [ 853.538255] kstrdup_const+0x35/0x60 [ 853.541965] alloc_vfsmnt+0xe0/0x7f0 [ 853.545677] clone_mnt+0x6c/0xff0 [ 853.549130] copy_tree+0x33e/0xa20 [ 853.552674] copy_mnt_ns+0x167/0xa30 [ 853.556390] ? create_new_namespaces+0x30/0x720 [ 853.561082] ? do_mount+0x2a00/0x2a00 [ 853.564879] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 853.569892] ? kmem_cache_alloc+0x35f/0x3c0 [ 853.574210] create_new_namespaces+0xc9/0x720 [ 853.578701] ? security_capable+0x88/0xb0 [ 853.582859] copy_namespaces+0x27b/0x310 [ 853.586916] copy_process.part.0+0x2600/0x6f00 [ 853.591497] ? get_pid_task+0xb8/0x130 [ 853.595381] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 853.600320] ? __cleanup_sighand+0x40/0x40 [ 853.604551] ? lock_downgrade+0x740/0x740 [ 853.608703] _do_fork+0x184/0xc80 [ 853.612160] ? fork_idle+0x270/0x270 [ 853.615869] ? fput+0xb/0x140 [ 853.618973] ? SyS_write+0x14d/0x210 [ 853.622682] ? SyS_read+0x210/0x210 [ 853.626303] ? SyS_clock_settime+0x1a0/0x1a0 [ 853.630708] ? do_syscall_64+0x4c/0x640 [ 853.634676] ? sys_vfork+0x20/0x20 [ 853.638215] do_syscall_64+0x1d5/0x640 [ 853.642115] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 853.647297] RIP: 0033:0x45de59 [ 853.650478] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 853.658180] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 853.665442] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 853.672706] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 853.679968] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000024 [ 853.687243] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 [ 853.720297] print_req_error: I/O error, dev loop0, sector 0 [ 853.799194] BTRFS info (device loop2): unrecognized mount option 'Nڞ' 00:04:55 executing program 0: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r1 = socket(0x11, 0x800000003, 0x8) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r2 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file1\x00', 0x0, 0x0, &(0x7f00000016c0), 0x40, &(0x7f0000000080)=ANY=[@ANYRES32=r1]) mkdirat(r2, &(0x7f0000000040)='./file1\x00', 0x0) r3 = open(&(0x7f00000000c0)='./file1\x00', 0x6f4401, 0x0) mount(&(0x7f0000000400)=@sr0='/dev/sr0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000001500)='nfsd\x00', 0x22b400c, &(0x7f0000001540)='vfat\x00') timer_create(0x4, &(0x7f0000000200)={0x0, 0x2, 0x2, @thr={&(0x7f0000000000)="a0826d5908091ec6", &(0x7f00000004c0)="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"}}, &(0x7f0000000240)) ioctl$DRM_IOCTL_MODESET_CTL(r3, 0x40086408, &(0x7f00000001c0)={0x4, 0x1000}) [ 853.866273] BTRFS error (device loop2): open_ctree failed 00:04:55 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x40050, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) r1 = socket(0x11, 0x800000003, 0x8) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) sendto(r1, &(0x7f0000000380)="adeac63958757895def4fb54945eff753dd5acd8f042576f9401fd1ebc3e66419600f840f0db48c62c07599bb4cf82490476579657f2a66310a605cca5d3254141d3debbd23b27e06bac3642385774a4ab8fd2257c2092ad076f3f0ff989f16b5681de5cd53e36bcf86b1722bd0b1cf0fca10b456ec28ac58401f49e5bd02f3fbb6f4cd82a78496460e22aad0691b9ddba28523ab1a426db9a0403796bd778639a859a1330c580dc9a04aa00e97147bd76306e404fb288c02c41f6cf3b32ae0cacf4f631580737fa4a10d7918c", 0xcd, 0x80, &(0x7f00000001c0)=@pptp={0x18, 0x2, {0x3, @private=0xa010102}}, 0x80) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f00000002c0)={0x1f, {{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x20}}}}, 0x88) [ 853.917418] FAT-fs (loop0): Unrecognized mount option "" or missing value 00:04:55 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f00000000c0)="e3e3e04d476b3e5d3027ff80b72640264eacd3b4bf3372920bed6ef3559ad8eace9189ad6e9628aea20c7e8a0f2c6500"/60, 0x3c, 0x600}, {0x0, 0x44, 0xff}], 0x0, &(0x7f00000001c0)={[{@iocharset={'iocharset', 0x3d, 'cp857'}}, {@numtail='nonumtail=0'}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000002c0)) 00:04:55 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e4000010000000000000004000000000000200000000000000000001000000000002000000000000000010000000100000001000000100000001000000000000000000100000000000122badb145de474f84c86b8fd41337fd", 0x6c, 0x10320}, {&(0x7f0000000280)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="00006598fa7200"]) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) syz_mount_image$iso9660(&(0x7f0000000680)='iso9660\x00', &(0x7f00000006c0)='./file0/../file0\x00', 0x7f6, 0x3, &(0x7f0000000740)=[{&(0x7f0000000700)="e8e93e59046c0b206d6c", 0xa, 0x8}, {&(0x7f0000000800)="71c6db8d98a7b7d3b01954a2292937f722b5e4f5811e74290c200061fe55f87b599b7638e2638db41967c1e16ea727a8eb700ed023206b20d207762025c720226de859a7a562988eec8478c6eec6ff09cbae12e4b69a1fc09fdfa29e1f137cc06be85ff57c809e31b2ffbfca5b20648a77ea5066ff88f0cd7f6f0b2dcaa6f9c937e5ae5df02fcbfa2a3f2ddcbd16419d48a5b2e82e3ba7905c48ed303fabbf4e44809e139f511bba331833e49962b623ef081daa8656755fe5bc1f080415c0900f03c52b3e5c8d6e3fcd95bc27535e7bc894a89d4e8318c19212e2e9fe963d8cf5693314c185c83fb3a98b54582336ce2a", 0xf1, 0xb887}, {&(0x7f0000000900)="b686cd53285ada2dafe80ffe8c0a045a9ba475c86e11cdf8060a4aaab42cc0a64c3204c72c2e316890971b3eda0f8dd6e451ed4a9f2811859656e373226bc67c13cd0e45652736eaa4a0c6aba7bdd00399345698373db286a6aaa08f533e8f07dea43aea9d324b8c5f6bd681ae7bf6f80890b352a40bdbee9c60a2fc162287a9901e34ddc7ce34468e8d262cc52d9fd86e836111453c2255b8551208259d97ddf01d413c6dd2e223a6f5211a2e41", 0xae, 0x3}], 0x20000, &(0x7f0000000a80)=ANY=[@ANYBLOB="686964652c236865636b3d72656c6178656421636865636b3d72856c61784b642c6d7f703d6e6f726d616c2c6d61643d00"/58, @ANYRESHEX=0x0, @ANYBLOB=',norock,euid>', @ANYRESDEC=0x0, @ANYBLOB=',smackfsfloor=ip6_vti0\x00,euid<', @ANYRESDEC, @ANYBLOB="2c6673636f6e7464788d3d73797dfe837b34c5b6b72fa5817361646d5f752c00"]) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = open(&(0x7f00000001c0)='./file0\x00', 0xa440, 0x110) r2 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x0, 0x1, 0x1, 0x1f, 0x0, 0x400000000}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r2, r3, &(0x7f0000000240)=0x202, 0x4000000000dc) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000001700)='NLBL_UNLBL\x00') r5 = socket(0x11, 0x800000003, 0x8) sendmsg$NLBL_UNLABEL_C_STATICADD(r3, &(0x7f0000000640)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001780)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c7fc5db6cdef069691c1538af5784cc33cbb0d4e80385acf560eb3aece760751d023b69a4cc8e519643edf017aa42ee890b77e13bd5ff194db428aca06f6667a4d49a6404d7067e4aabab05b075f3d5476a93659168c63788d138bc3d7d7d5a67b53ab72c", @ANYRES16=r5, @ANYBLOB="11022dbd8223fedb273603000000000400e0000002"], 0x1c}, 0x1, 0x0, 0x0, 0x8}, 0x20008004) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000001940)=ANY=[@ANYBLOB="000000002509eae5f1c5a6558f5e41c38022e68b6aa734a36c2882ffa1915a3194388323d0cc9e0dc58a05130ff60f38072c5bf69c4b1644f151e5e9968e62485548d1e65cb71f44e8e62565157656f3b80c6fdc569bb073d32fdc9236f3556e056fe4ab40a822494dfc42d74d3ace50cee82b26a2e370ce36910c26519b0db6e3039bb525ff34f2ce00"/153, @ANYRES16=r4, @ANYBLOB="0400010000000802010001000000000000000000000000000108000500ac1e000114000600627269645b235f736c6176655f31000014000600636169663000000000000000000000001400020020010000000000000000000000000000a7ceb1221d20999445bfa00800040007"], 0x7c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc001) sendmsg$NLBL_UNLABEL_C_ACCEPT(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000001800)={0x10c, 0x0, 0x400, 0x70bd26, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:dpkg_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ip6_vti0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'erspan0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @NLBL_UNLABEL_A_SECCTX={0x29, 0x7, 'system_u:object_r:pinentry_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @private1={0xfc, 0x1, [], 0x1}}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @local}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @loopback}, @NLBL_UNLABEL_A_SECCTX={0x24, 0x7, 'system_u:object_r:apm_bios_t:s0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5}]}, 0x10c}, 0x1, 0x0, 0x0, 0x80000}, 0x40001) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, r4, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @remote}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x2a}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40040d0}, 0x4004080) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) [ 854.009405] FAT-fs (loop0): Unrecognized mount option "" or missing value 00:04:55 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="696f636861727365743d6370313235312c003c95adfe3a0afdeb"]) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='/sys/kernel/debug/bluetooth/6lowpan_enable\x00', 0xfffffffffffffffe) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:04:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x42, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=@newtfilter={0x48, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {}, {0xfff2}}, [@filter_kind_options=@f_flower={{0xb, 0x1, 'flower\x00'}, {0x18, 0x2, [@TCA_FLOWER_KEY_IPV6_DST={0x14, 0x10, @loopback}]}}]}, 0x48}}, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f00000002c0)={0x148, 0x0, 0x1, 0x70bd26, 0x25dfdbff, {}, [@ETHTOOL_A_PAUSE_AUTONEG={0x5, 0x2, 0x1}, @ETHTOOL_A_PAUSE_RX={0x5}, @ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @ETHTOOL_A_PAUSE_HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_PAUSE_HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}]}, @ETHTOOL_A_PAUSE_RX={0x5}, @ETHTOOL_A_PAUSE_RX={0x5, 0x3, 0x1}, @ETHTOOL_A_PAUSE_AUTONEG={0x5}]}, 0x148}, 0x1, 0x0, 0x0, 0x4000001}, 0x10) r3 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r3, &(0x7f0000000040)='./file1\x00', 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r4, 0xc0305302, &(0x7f00000000c0)={0x6, 0x6, 0x5501, 0x6, 0xaa}) 00:04:55 executing program 5 (fault-call:10 fault-nth:37): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) [ 854.142890] BTRFS info (device loop2): disk space caching is enabled [ 854.181448] BTRFS info (device loop2): has skinny extents 00:04:55 executing program 0: mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f0000000080)={0x9, 0x6, 0x5, 0xfffffffc, 0x3, 0xffffff96}) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(r1, 0xc01864b0, &(0x7f0000000000)={0x3, 0x3f, 0x9, 0x9, 0x1}) [ 854.191611] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 854.343111] FAULT_INJECTION: forcing a failure. [ 854.343111] name failslab, interval 1, probability 0, space 0, times 0 [ 854.354486] CPU: 1 PID: 15801 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 854.362373] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 854.371726] Call Trace: [ 854.374319] dump_stack+0x1b2/0x283 [ 854.377951] should_fail.cold+0x10a/0x154 [ 854.382102] should_failslab+0xd6/0x130 [ 854.386076] __kmalloc_track_caller+0x2bc/0x400 [ 854.390746] ? kstrdup_const+0x35/0x60 [ 854.394631] ? lock_downgrade+0x740/0x740 [ 854.398779] kstrdup+0x36/0x70 [ 854.401971] kstrdup_const+0x35/0x60 [ 854.405683] alloc_vfsmnt+0xe0/0x7f0 [ 854.409398] clone_mnt+0x6c/0xff0 [ 854.412852] copy_tree+0x33e/0xa20 [ 854.416395] copy_mnt_ns+0x167/0xa30 [ 854.420110] ? create_new_namespaces+0x30/0x720 [ 854.424777] ? do_mount+0x2a00/0x2a00 [ 854.428581] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 854.433593] ? kmem_cache_alloc+0x35f/0x3c0 [ 854.437916] create_new_namespaces+0xc9/0x720 [ 854.442409] ? security_capable+0x88/0xb0 [ 854.446563] copy_namespaces+0x27b/0x310 [ 854.450625] copy_process.part.0+0x2600/0x6f00 [ 854.455204] ? finish_task_switch+0x178/0x610 [ 854.459702] ? lock_downgrade+0x740/0x740 [ 854.463848] ? _raw_spin_unlock_irq+0x24/0x80 [ 854.468348] ? __cleanup_sighand+0x40/0x40 [ 854.472585] ? retint_kernel+0x2d/0x2d [ 854.476654] _do_fork+0x184/0xc80 [ 854.480105] ? fork_idle+0x270/0x270 [ 854.483854] ? retint_kernel+0x2d/0x2d [ 854.487736] ? sys_vfork+0x20/0x20 [ 854.491278] ? sys_vfork+0x20/0x20 [ 854.494815] do_syscall_64+0x1d5/0x640 [ 854.498703] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 854.503888] RIP: 0033:0x45de59 [ 854.507070] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 854.514771] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 854.522033] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 854.529297] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 854.536568] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000025 [ 854.543832] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:04:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x42, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=@newtfilter={0x48, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {}, {0xfff2}}, [@filter_kind_options=@f_flower={{0xb, 0x1, 'flower\x00'}, {0x18, 0x2, [@TCA_FLOWER_KEY_IPV6_DST={0x14, 0x10, @loopback}]}}]}, 0x48}}, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f00000002c0)={0x148, 0x0, 0x1, 0x70bd26, 0x25dfdbff, {}, [@ETHTOOL_A_PAUSE_AUTONEG={0x5, 0x2, 0x1}, @ETHTOOL_A_PAUSE_RX={0x5}, @ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @ETHTOOL_A_PAUSE_HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_PAUSE_HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}]}, @ETHTOOL_A_PAUSE_RX={0x5}, @ETHTOOL_A_PAUSE_RX={0x5, 0x3, 0x1}, @ETHTOOL_A_PAUSE_AUTONEG={0x5}]}, 0x148}, 0x1, 0x0, 0x0, 0x4000001}, 0x10) r3 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r3, &(0x7f0000000040)='./file1\x00', 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r4, 0xc0305302, &(0x7f00000000c0)={0x6, 0x6, 0x5501, 0x6, 0xaa}) 00:04:56 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="696f636861727365743d6370313235312c73686f72746e616d653d77696e39352c75dc7fa75a2479e799bd1fbd6f"]) r1 = socket(0x11, 0x800000003, 0x8) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/btrfs-control\x00', 0x4a2000, 0x0) r4 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$sock_bt_bnep_BNEPCONNADD(r3, 0x400442c8, &(0x7f0000000500)=ANY=[@ANYRES32=r4, @ANYBLOB="0780000000009f4c324a2213add9b71205ef2862b38175dde9df37bcb40a524bd89f3e0edf5bc160e57ef23dc1e17bd15ac3caf7df8be5ce4e7eeb310960fe71d5684d5e53c92af9fef5e0bf2493311c5da98ab68fc3d5a6ae642356780c389be7d2505c90a1c437990733c451270440d5839c2be4c54f81c69a751bec69b5b9af02c35316bac94017341a0df6358a2659ba1cae46990586d7ebd35f1de9c7c1755ee3a0d7be6d90048b37d6a9eeb0d51562e2f9e9137ebdf2c280002ca06bbc817ac8da553caabedf65af3d01d28b4464de9a5a6d40c669578422f47f43bfd96c5090aae32debe5edfc3b7dddcaa0575fb7e08026225598c651315e6d8f3ef8ba36c6804b8fc85db4257ebb339e9ed8fb134f5f44a411064c1fabf4a8dc52542203f500000000000000000000000000a6a067a0cff8f1040d1de40fef84a856a5a59eeb30e6e335042dd49946"]) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) ioctl$SNDRV_PCM_IOCTL_UNLINK(r2, 0x4161, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000080)=0x10000, 0x4) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 854.710923] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 854.743030] attempt to access beyond end of device [ 854.751047] loop2: rw=4096, want=2064, limit=267 [ 854.780089] BTRFS error (device loop2): failed to read chunk root [ 854.798548] FAT-fs (loop0): Unrecognized mount option "uZ$y白o" or missing value 00:04:56 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) rt_sigpending(&(0x7f00000000c0), 0x8) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 854.846030] BTRFS error (device loop2): open_ctree failed 00:04:56 executing program 5 (fault-call:10 fault-nth:38): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:04:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x42, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=@newtfilter={0x48, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {}, {0xfff2}}, [@filter_kind_options=@f_flower={{0xb, 0x1, 'flower\x00'}, {0x18, 0x2, [@TCA_FLOWER_KEY_IPV6_DST={0x14, 0x10, @loopback}]}}]}, 0x48}}, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f00000002c0)={0x148, 0x0, 0x1, 0x70bd26, 0x25dfdbff, {}, [@ETHTOOL_A_PAUSE_AUTONEG={0x5, 0x2, 0x1}, @ETHTOOL_A_PAUSE_RX={0x5}, @ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @ETHTOOL_A_PAUSE_HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_PAUSE_HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}]}, @ETHTOOL_A_PAUSE_RX={0x5}, @ETHTOOL_A_PAUSE_RX={0x5, 0x3, 0x1}, @ETHTOOL_A_PAUSE_AUTONEG={0x5}]}, 0x148}, 0x1, 0x0, 0x0, 0x4000001}, 0x10) r3 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r3, &(0x7f0000000040)='./file1\x00', 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r4, 0xc0305302, &(0x7f00000000c0)={0x6, 0x6, 0x5501, 0x6, 0xaa}) 00:04:56 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e4000010000000000000004000000000000200000000000000000001000000000002000000000000000010000000100000001000000100000001000000000000000000100000000000122badb145de474f84c86b8fd41337fd", 0x6c, 0x10320}, {&(0x7f0000000280)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="ff401aa38346245d7101ba7f19dec7eef74d0c2919539e923605651de6f508b05bc81703edb8e5d945fdedcf486a9717474162ea1129b8b670945f838c9ee05478c22ac83710c9a06b19cc4b6eb0c4052254b106d8d5d355be6530f89e37"]) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = open(&(0x7f00000001c0)='./file0\x00', 0xa440, 0x110) r2 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x0, 0x1, 0x1, 0x1f, 0x0, 0x400000000}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') syz_mount_image$ocfs2(&(0x7f0000000780)='ocfs2\x00', &(0x7f0000000800)='./file0\x00', 0x81, 0x3, &(0x7f0000000b00)=[{&(0x7f0000000840)="5bf35192a1b2d5694edb77170919fc1f2b467e820af388b291a667fe7f961b4b6025fcea9d3187fdb2a658b086a1e6405a18468d45fb815c2b455650d1029de22d7de972cc0d23946124ad9e825775d8a37919fb1992c9d330807a17c7f927c217959b1295d5f96549e904e1350bbe7d1cd224d1f1463eea4ac1efb31400e6738f92e4321a881e039cc4e8166a193468", 0x90, 0x2}, {&(0x7f0000000900)="0930c762ca882f662fb6002ceccc9ef1658b31ab8c0002dadd4fd34b32389e204b195260e710b93e3bb437949cb19eb89bcac6a14b2d04adfebad0f15b61ba8673196aa97d09a4a62cc8b0b5c9d5d904e744c9194a6404a9f7d24cf2cc7accff27b3fd1fd739249b3ae9a9d09b3f29aa39a81135bdefcb1cd8ee8e0201223c759f89d9cb4c4a73732fb152e2f35f8640beb145e43263b133835bfa452d6de9971ff724a75b227e72f97913cbb0332f67bf01429b1fcc0215b25de7c0fa358ba653ad46ac582c79ce313106e93a3049cbfd5ac2329390db2ff53f48b994c620003c631dde", 0xe4, 0x7}, {&(0x7f0000000a00)="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", 0xfe, 0x3f}], 0x200000, &(0x7f0000000b80)={[{'bbr\x00'}, {'{-[{\\:{'}, {}, {'bbr\x00'}, {'btrfs\x00'}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, 'btrfs\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) sendfile(r2, r3, &(0x7f0000000240)=0x202, 0x4000000000dc) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000001700)='NLBL_UNLBL\x00') r5 = socket(0x11, 0x800000003, 0x8) sendmsg$NLBL_UNLABEL_C_STATICADD(r3, &(0x7f0000000640)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001780)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c7fc5db6cdef069691c1538af5784cc33cbb0d4e80385acf560eb3aece760751d023b69a4cc8e519643edf017aa42ee890b77e13bd5ff194db428aca06f6667a4d49a6404d7067e4aabab05b075f3d5476a93659168c63788d138bc3d7d7d5a67b53ab72c", @ANYRES16=r5, @ANYBLOB="00022dbd7000fedbdf250300000008000400e0000002"], 0x1c}, 0x1, 0x0, 0x0, 0x8}, 0x20008004) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000001940)=ANY=[@ANYBLOB="000000002509eae5f1c5a6558f5e41c38022e68b6aa734a36c2882ffa1915a3194388323d0cc9e0dc58a05130ff60f38072c5bf69c4b1644f151e5e9968e62485548d1e65cb71f44e8e62565157656f3b80c6fdc569bb073d32fdc9236f3556e056fe4ab40a822494dfc42d74d3ace54cee82b26a2e370ce36910c26519b0db6e3039bb525ff34f2ce00"/153, @ANYRES16=r4, @ANYBLOB="040001000000080200fe88000000000000000000000000000108000500ac1e0001140006006272696467655f736c6176655f31000014000600636169663000000000000000000000001400020020010000000000000000000000000000080004007f000001080004007f000001"], 0x7c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc001) sendmsg$NLBL_UNLABEL_C_ACCEPT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000001800)=ANY=[@ANYBLOB="14010001", @ANYRES16=r4, @ANYBLOB="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"], 0x114}, 0x1, 0x0, 0x0, 0x80000}, 0x40001) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000680)={0x48, r4, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @remote}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x2a}}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'wlan1\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x40040d0}, 0x4004881) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) ioctl$KVM_GET_NR_MMU_PAGES(r3, 0xae45, 0x51) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) [ 855.072264] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 855.145303] BTRFS error (device loop2): superblock checksum mismatch [ 855.202497] FAULT_INJECTION: forcing a failure. [ 855.202497] name failslab, interval 1, probability 0, space 0, times 0 [ 855.205029] BTRFS error (device loop2): open_ctree failed [ 855.219435] CPU: 1 PID: 15866 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 855.227317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 855.236668] Call Trace: [ 855.239262] dump_stack+0x1b2/0x283 [ 855.242896] should_fail.cold+0x10a/0x154 [ 855.247044] should_failslab+0xd6/0x130 [ 855.251023] __kmalloc_track_caller+0x2bc/0x400 [ 855.255690] ? kstrdup_const+0x35/0x60 [ 855.259574] kstrdup+0x36/0x70 [ 855.262764] kstrdup_const+0x35/0x60 [ 855.266476] alloc_vfsmnt+0xe0/0x7f0 [ 855.270189] clone_mnt+0x6c/0xff0 [ 855.273645] copy_tree+0x33e/0xa20 [ 855.277187] copy_mnt_ns+0x167/0xa30 [ 855.280901] ? create_new_namespaces+0x30/0x720 [ 855.285568] ? do_mount+0x2a00/0x2a00 [ 855.289368] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 855.294383] ? kmem_cache_alloc+0x35f/0x3c0 [ 855.298706] create_new_namespaces+0xc9/0x720 [ 855.303196] ? security_capable+0x88/0xb0 [ 855.307347] copy_namespaces+0x27b/0x310 [ 855.311409] copy_process.part.0+0x2600/0x6f00 [ 855.315991] ? get_pid_task+0xb8/0x130 [ 855.319881] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 855.324817] ? __cleanup_sighand+0x40/0x40 [ 855.329048] ? lock_downgrade+0x740/0x740 [ 855.333196] _do_fork+0x184/0xc80 [ 855.336651] ? fork_idle+0x270/0x270 [ 855.340361] ? fput+0xb/0x140 [ 855.343463] ? SyS_write+0x14d/0x210 [ 855.347173] ? SyS_read+0x210/0x210 [ 855.350798] ? SyS_clock_settime+0x1a0/0x1a0 [ 855.355207] ? do_syscall_64+0x4c/0x640 [ 855.359179] ? sys_vfork+0x20/0x20 [ 855.362718] do_syscall_64+0x1d5/0x640 [ 855.366610] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 855.371802] RIP: 0033:0x45de59 [ 855.374984] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 855.382690] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 855.389963] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 855.397225] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 855.404488] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000026 [ 855.411749] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 [ 855.541865] BTRFS error (device loop2): superblock checksum mismatch 00:04:57 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e4000010000000000000004000000000000200000000000000000001000000000002000000000000000010000000100000001000000100000001000000000000000000100000000000122badb145de474f84c86b8fd41337fd", 0x6c, 0x10320}, {&(0x7f0000000280)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="00006598fa7200"]) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) syz_mount_image$iso9660(&(0x7f0000000680)='iso9660\x00', &(0x7f00000006c0)='./file0/../file0\x00', 0x7f6, 0x3, &(0x7f0000000740)=[{&(0x7f0000000700)="e8e93e59046c0b206d6c", 0xa, 0x8}, {&(0x7f0000000800)="71c6db8d98a7b7d3b01954a2292937f722b5e4f5811e74290c200061fe55f87b599b7638e2638db41967c1e16ea727a8eb700ed023206b20d207762025c720226de859a7a562988eec8478c6eec6ff09cbae12e4b69a1fc09fdfa29e1f137cc06be85ff57c809e31b2ffbfca5b20648a77ea5066ff88f0cd7f6f0b2dcaa6f9c937e5ae5df02fcbfa2a3f2ddcbd16419d48a5b2e82e3ba7905c48ed303fabbf4e44809e139f511bba331833e49962b623ef081daa8656755fe5bc1f080415c0900f03c52b3e5c8d6e3fcd95bc27535e7bc894a89d4e8318c19212e2e9fe963d8cf5693314c185c83fb3a98b54582336ce2a", 0xf1, 0xb887}, {&(0x7f0000000900)="b686cd53285ada2dafe80ffe8c0a045a9ba475c86e11cdf8060a4aaab42cc0a64c3204c72c2e316890971b3eda0f8dd6e451ed4a9f2811859656e373226bc67c13cd0e45652736eaa4a0c6aba7bdd00399345698373db286a6aaa08f533e8f07dea43aea9d324b8c5f6bd681ae7bf6f80890b352a40bdbee9c60a2fc162287a9901e34ddc7ce34468e8d262cc52d9fd86e836111453c2255b8551208259d97ddf01d413c6dd2e223a6f5211a2e41", 0xae, 0x3}], 0x20000, &(0x7f0000000a80)=ANY=[@ANYBLOB="686964652c236865636b3d72656c6178656421636865636b3d72856c61784b642c6d7f703d6e6f726d616c2c6d61643d00"/58, @ANYRESHEX=0x0, @ANYBLOB=',norock,euid>', @ANYRESDEC=0x0, @ANYBLOB=',smackfsfloor=ip6_vti0\x00,euid<', @ANYRESDEC, @ANYBLOB="2c6673636f6e7464788d3d73797dfe837b34c5b6b72fa5817361646d5f752c00"]) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = open(&(0x7f00000001c0)='./file0\x00', 0xa440, 0x110) r2 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x0, 0x1, 0x1, 0x1f, 0x0, 0x400000000}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r2, r3, &(0x7f0000000240)=0x202, 0x4000000000dc) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000001700)='NLBL_UNLBL\x00') r5 = socket(0x11, 0x800000003, 0x8) sendmsg$NLBL_UNLABEL_C_STATICADD(r3, &(0x7f0000000640)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001780)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c7fc5db6cdef069691c1538af5784cc33cbb0d4e80385acf560eb3aece760751d023b69a4cc8e519643edf017aa42ee890b77e13bd5ff194db428aca06f6667a4d49a6404d7067e4aabab05b075f3d5476a93659168c63788d138bc3d7d7d5a67b53ab72c", @ANYRES16=r5, @ANYBLOB="11022dbd8223fedb273603000000000400e0000002"], 0x1c}, 0x1, 0x0, 0x0, 0x8}, 0x20008004) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000001940)=ANY=[@ANYBLOB="000000002509eae5f1c5a6558f5e41c38022e68b6aa734a36c2882ffa1915a3194388323d0cc9e0dc58a05130ff60f38072c5bf69c4b1644f151e5e9968e62485548d1e65cb71f44e8e62565157656f3b80c6fdc569bb073d32fdc9236f3556e056fe4ab40a822494dfc42d74d3ace50cee82b26a2e370ce36910c26519b0db6e3039bb525ff34f2ce00"/153, @ANYRES16=r4, @ANYBLOB="0400010000000802010001000000000000000000000000000108000500ac1e000114000600627269645b235f736c6176655f31000014000600636169663000000000000000000000001400020020010000000000000000000000000000a7ceb1221d20999445bfa00800040007"], 0x7c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc001) sendmsg$NLBL_UNLABEL_C_ACCEPT(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000001800)={0x10c, 0x0, 0x400, 0x70bd26, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:dpkg_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ip6_vti0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'erspan0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @NLBL_UNLABEL_A_SECCTX={0x29, 0x7, 'system_u:object_r:pinentry_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @private1={0xfc, 0x1, [], 0x1}}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @local}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @loopback}, @NLBL_UNLABEL_A_SECCTX={0x24, 0x7, 'system_u:object_r:apm_bios_t:s0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5}]}, 0x10c}, 0x1, 0x0, 0x0, 0x80000}, 0x40001) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, r4, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @remote}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x2a}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40040d0}, 0x4004080) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) [ 855.595138] BTRFS error (device loop2): open_ctree failed 00:04:57 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e4000010000000000000004000000000000200000000000000000001000000000002000000000000000010000000100000001000000100000001000000000000000000100000000000122badb145de474f84c86b8fd41337fd", 0x6c, 0x10320}, {&(0x7f0000000280)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000002800)=ANY=[@ANYBLOB="4eda9e"]) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = open(&(0x7f00000001c0)='./file0\x00', 0xa440, 0x110) r2 = socket$inet6(0xa, 0x3, 0x6) sendto$inet(0xffffffffffffffff, &(0x7f0000000740)="4a22e316356a88b1d4baa54f284b0c64ce425d95469a0befbcff0cc552f012483eebb8dd458f94e0c868a624de05d6e433ad22f565d63a0b187306c2c4a7da8700547047bf8ac27c307293e91a4ee6f8edbd242fd54801b921bf17cb2444e51865dd8064634039ef123c29be19c59399ea62c3558c26fd9832d637539a", 0x7d, 0x4004000, &(0x7f0000000800)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x0, 0x1, 0x1, 0x1f, 0x0, 0x400000000}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r2, r3, &(0x7f0000000240)=0x202, 0x4000000000dc) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000001700)='NLBL_UNLBL\x00') r5 = socket(0x11, 0x800000003, 0x8) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, &(0x7f0000000700)=0x80) sendmsg$NLBL_UNLABEL_C_STATICADD(r3, &(0x7f0000000640)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001780)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c7fc5db6cdef069691c1538af5784cc33cbb0d4e80385acf560eb3aece760751d023b69a4cc8e519643edf017aa42ee890b77e13bd5ff194db428aca06f6667a4d49a6404d7067e4aabab05b075f3d5476a93659168c63788d138bc3d7d7d5a67b53ab72c", @ANYRES16=r5, @ANYBLOB="00022dbd7000fedbdf250300000008000400e0000002"], 0x1c}, 0x1, 0x0, 0x0, 0x8}, 0x20008004) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000001940)=ANY=[@ANYBLOB="000000002509eae5f1c5a6558f5e41c38022e68b6aa734a36c2882ffa1915a3194388323d0cc9e0dc58a05130ff60f38072c5bf69c4b1644f151e5e9968e62485548d1e65cb71f44e8e62565157656f3b80c6fdc569bb073d32fdc9236f3556e056fe4ab40a822494dfc42d74d3ace54cee82b26a2e370ce36910c26519b0db6e3039bb525ff34f2ce00"/153, @ANYRES16=r4, @ANYBLOB="040001000000080200fe88000000000000000000000000000108000500ac1e0001140006006272696467655f736c6176655f31000014000600636169663000000000000000000000001400020020010000000000000000000000000000080004007f000001080004007f000001"], 0x7c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc001) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, r4, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @remote}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x2a}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40040d0}, 0x4004080) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) 00:04:57 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e4000010000000000000004000000000000200000000000000000001000000000002000000000000000010000000100000001000000100000001000000000000000000100000000000122badb145de474f84c86b8fd41337fd", 0x6c, 0x10320}, {&(0x7f0000000280)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="ff401aa38346245d7101ba7f19dec7eef74d0c2919539e923605651de6f508b05bc81703edb8e5d945fdedcf486a9717474162ea1129b8b670945f838c9ee05478c22ac83710c9a06b19cc4b6eb0c4052254b106d8d5d355be6530f89e37"]) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = open(&(0x7f00000001c0)='./file0\x00', 0xa440, 0x110) r2 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x0, 0x1, 0x1, 0x1f, 0x0, 0x400000000}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') syz_mount_image$ocfs2(&(0x7f0000000780)='ocfs2\x00', &(0x7f0000000800)='./file0\x00', 0x81, 0x3, &(0x7f0000000b00)=[{&(0x7f0000000840)="5bf35192a1b2d5694edb77170919fc1f2b467e820af388b291a667fe7f961b4b6025fcea9d3187fdb2a658b086a1e6405a18468d45fb815c2b455650d1029de22d7de972cc0d23946124ad9e825775d8a37919fb1992c9d330807a17c7f927c217959b1295d5f96549e904e1350bbe7d1cd224d1f1463eea4ac1efb31400e6738f92e4321a881e039cc4e8166a193468", 0x90, 0x2}, {&(0x7f0000000900)="0930c762ca882f662fb6002ceccc9ef1658b31ab8c0002dadd4fd34b32389e204b195260e710b93e3bb437949cb19eb89bcac6a14b2d04adfebad0f15b61ba8673196aa97d09a4a62cc8b0b5c9d5d904e744c9194a6404a9f7d24cf2cc7accff27b3fd1fd739249b3ae9a9d09b3f29aa39a81135bdefcb1cd8ee8e0201223c759f89d9cb4c4a73732fb152e2f35f8640beb145e43263b133835bfa452d6de9971ff724a75b227e72f97913cbb0332f67bf01429b1fcc0215b25de7c0fa358ba653ad46ac582c79ce313106e93a3049cbfd5ac2329390db2ff53f48b994c620003c631dde", 0xe4, 0x7}, {&(0x7f0000000a00)="447bb9526d5f7ee6e905f4dcaa4982aad352e4e74d5901b78e8d9b4ecd5210c4c8e7411402aecc18e9dac258e0f645c87ac876289f11e5874a15f4dae37f642bbc88bc166c6e67b0288e8b94ff629826394f1ccb7d7f89c213ae7547574b90f1d5577948b08e247432c080f75c8b060daea2991d439cff8b0b7b34762d62ae43e0524f066be07b2cc0499f713565db55c39ce6add96e3eca66e7c4c7a1ef2eadf432f9c1748be02d90a964d36faae3842f8b4cf2def5c920e4b37399d39f7e98621595ddd97427a1b1f2555fd4148f0cf921963d6fafd631f12bd92b9270a6af7961ad0bf5f52e245db5712999f977b089f42eb8fb5da4c2c0b22aab278f", 0xfe, 0x3f}], 0x200000, &(0x7f0000000b80)={[{'bbr\x00'}, {'{-[{\\:{'}, {}, {'bbr\x00'}, {'btrfs\x00'}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, 'btrfs\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) sendfile(r2, r3, &(0x7f0000000240)=0x202, 0x4000000000dc) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000001700)='NLBL_UNLBL\x00') r5 = socket(0x11, 0x800000003, 0x8) sendmsg$NLBL_UNLABEL_C_STATICADD(r3, &(0x7f0000000640)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001780)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c7fc5db6cdef069691c1538af5784cc33cbb0d4e80385acf560eb3aece760751d023b69a4cc8e519643edf017aa42ee890b77e13bd5ff194db428aca06f6667a4d49a6404d7067e4aabab05b075f3d5476a93659168c63788d138bc3d7d7d5a67b53ab72c", @ANYRES16=r5, @ANYBLOB="00022dbd7000fedbdf250300000008000400e0000002"], 0x1c}, 0x1, 0x0, 0x0, 0x8}, 0x20008004) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000001940)=ANY=[@ANYBLOB="000000002509eae5f1c5a6558f5e41c38022e68b6aa734a36c2882ffa1915a3194388323d0cc9e0dc58a05130ff60f38072c5bf69c4b1644f151e5e9968e62485548d1e65cb71f44e8e62565157656f3b80c6fdc569bb073d32fdc9236f3556e056fe4ab40a822494dfc42d74d3ace54cee82b26a2e370ce36910c26519b0db6e3039bb525ff34f2ce00"/153, @ANYRES16=r4, @ANYBLOB="040001000000080200fe88000000000000000000000000000108000500ac1e0001140006006272696467655f736c6176655f31000014000600636169663000000000000000000000001400020020010000000000000000000000000000080004007f000001080004007f000001"], 0x7c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc001) sendmsg$NLBL_UNLABEL_C_ACCEPT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000001800)=ANY=[@ANYBLOB="14010001", @ANYRES16=r4, @ANYBLOB="080026bd7000ffdbdf25010000002500070073797374656d5f753a6f626a6563745f723a64706b675f657865635f743a733000000000140006006970365f767469300000000000000000080005007f00000114000300200100000000000000000000000000022900070073797374656d5f753a6f626a6563745f723a70696e656e7472795f657865635f743a7330000000002500070073797374656d5f753a6f626a6563745f723a64706b675f657865635f743a73300000000014000300fe8000000000000000000000000000bb14000300000000000000000000000000000000012400070073797374656d5f753a6f626a6563745f723a61706d5f62696f735f743a7330000500010001000000"], 0x114}, 0x1, 0x0, 0x0, 0x80000}, 0x40001) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000680)={0x48, r4, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @remote}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x2a}}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'wlan1\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x40040d0}, 0x4004881) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) ioctl$KVM_GET_NR_MMU_PAGES(r3, 0xae45, 0x51) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) [ 855.750353] BTRFS info (device loop2): unrecognized mount option 'Nڞ' [ 855.815488] BTRFS error (device loop2): open_ctree failed 00:04:57 executing program 5 (fault-call:10 fault-nth:39): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:04:57 executing program 1: sendmsg$NLBL_MGMT_C_REMOVE(0xffffffffffffffff, &(0x7f0000003700)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000036c0)={&(0x7f00000034c0)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16, @ANYBLOB="00012cbd7000fbdbdf250200000014000500ff010000000000000000000000000001140000000000000000bb"], 0x3c}, 0x1, 0x0, 0x0, 0x4040801}, 0x40000) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) syz_emit_ethernet(0x3e, &(0x7f0000003b40)=ANY=[@ANYBLOB="981846f6f24ced6da474af3985477c033cc44ea9fc2cc496b134939764cbe3a98ed9d00d731b2c1b9041f7e1aa74e5d43c60a00cb6a331f59afcaac4de33621b73e161b2cac7bca684ccc042895443ca9d2a802c4e3cf9a4c6910c12d2bd4f02efc1f50243bc8daa9c809f3b383a6fb05a0b3de01cb88896f7b7853604d16b83ad49e52b99797bc4ea186aa260e431ae013a3a49e9e77a76d916e57c3acb1f058b584af2bd0cd2d49714c5a77eec533e428ce5134a70867b6851215f17830653d1a22e8d2476923ada09cf562935170ac0d4679906ece4c21a4518c915ddb56750", @ANYBLOB="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"], 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9c, 0x20100) recvmsg$can_raw(r2, &(0x7f0000003640)={0x0, 0x0, &(0x7f0000003540)=[{&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f0000000040)=""/140, 0x8c}, {&(0x7f0000000100)=""/87, 0x57}, {&(0x7f0000000180)=""/94, 0x5e}, {&(0x7f00000012c0)=""/4096, 0x1000}, {&(0x7f00000022c0)=""/4096, 0x1000}, {&(0x7f00000032c0)=""/111, 0x6f}, {&(0x7f0000003340)=""/236, 0xec}, {&(0x7f0000003740)=""/242, 0xf2}, {&(0x7f0000000200)=""/45, 0x2d}], 0xa, &(0x7f0000003600)}, 0x3) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000003440)='/dev/mISDNtimer\x00', 0x80000, 0x0) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(r2, 0x80184132, &(0x7f0000003480)) [ 856.075521] FAULT_INJECTION: forcing a failure. [ 856.075521] name failslab, interval 1, probability 0, space 0, times 0 [ 856.086891] CPU: 0 PID: 15905 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 856.094785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 856.104133] Call Trace: [ 856.106724] dump_stack+0x1b2/0x283 [ 856.110355] should_fail.cold+0x10a/0x154 [ 856.114502] should_failslab+0xd6/0x130 [ 856.118495] __kmalloc_track_caller+0x2bc/0x400 00:04:57 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x0, 0x1, 0x0, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) dup3(r1, r2, 0x0) dup2(r0, r3) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r4, 0xc0305615, &(0x7f0000000000)={0x0, {0x8, 0x6}}) [ 856.123159] ? kstrdup_const+0x35/0x60 [ 856.127167] ? lock_downgrade+0x740/0x740 [ 856.131313] kstrdup+0x36/0x70 [ 856.134503] kstrdup_const+0x35/0x60 [ 856.138213] alloc_vfsmnt+0xe0/0x7f0 [ 856.141925] clone_mnt+0x6c/0xff0 [ 856.145381] copy_tree+0x33e/0xa20 [ 856.148923] copy_mnt_ns+0x167/0xa30 [ 856.152638] ? create_new_namespaces+0x30/0x720 [ 856.157303] ? do_mount+0x2a00/0x2a00 [ 856.161105] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 856.166120] ? kmem_cache_alloc+0x35f/0x3c0 [ 856.170445] create_new_namespaces+0xc9/0x720 [ 856.174935] ? security_capable+0x88/0xb0 [ 856.179084] copy_namespaces+0x27b/0x310 [ 856.183151] copy_process.part.0+0x2600/0x6f00 [ 856.187729] ? get_pid_task+0x96/0x130 [ 856.191614] ? trace_hardirqs_on+0x10/0x10 [ 856.195846] ? retint_kernel+0x2d/0x2d [ 856.199733] ? check_preemption_disabled+0x35/0x240 [ 856.204740] ? check_preemption_disabled+0x35/0x240 [ 856.209742] ? finish_task_switch+0x178/0x610 [ 856.214228] ? __cleanup_sighand+0x40/0x40 [ 856.218471] ? _raw_spin_unlock_irq+0x5a/0x80 [ 856.222964] ? finish_task_switch+0x14d/0x610 [ 856.227437] ? switch_mm_irqs_off+0x2d2/0xeb0 [ 856.231916] _do_fork+0x184/0xc80 [ 856.235354] ? fork_idle+0x270/0x270 [ 856.239048] ? io_schedule_timeout+0x140/0x140 [ 856.243612] ? fput+0xb/0x140 [ 856.246706] ? do_syscall_64+0x4c/0x640 [ 856.250660] ? sys_vfork+0x20/0x20 [ 856.254182] do_syscall_64+0x1d5/0x640 [ 856.258056] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 856.263225] RIP: 0033:0x45de59 [ 856.266391] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 856.274093] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 856.281343] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 856.288608] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 856.295858] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000027 [ 856.303126] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:04:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000200)=@filter={'filter\x00', 0xe, 0x4, 0x3f0, 0x108, 0x0, 0x250, 0x0, 0x0, 0x318, 0x320, 0x320, 0x320, 0x318, 0x4, 0x0, {[{{@ipv6={@empty, @local, [], [], 'geneve1\x00', 'bond_slave_0\x00'}, 0x0, 0x110, 0x158, 0x0, {}, [@common=@unspec=@physdev={{0x68, 'physdev\x00'}, {'veth0_macvtap\x00', {}, 'team0\x00', {}, 0x0, 0x4}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@rand_addr=0x64010101, 'veth0_virt_wifi\x00'}}}, {{@uncond, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@inet=@length={{0x28, 'length\x00'}, {0x0, 0x0, 0x1}}]}, @common=@unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00'}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x450) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) ioctl$DRM_IOCTL_GET_MAGIC(0xffffffffffffffff, 0x80046402, &(0x7f0000000180)=0x2) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) sendmsg$BATADV_CMD_SET_VLAN(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x6800ab09}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="020028bd7000ffdbdf251200000005002d00f76b5a69ca48a7eb1f09e04b341c6ad901000000050033000000000008002c000000000008003900070000000800310003000000050033000200000023002e00000000000a000900"], 0x60}}, 0x8000) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind(0xffffffffffffffff, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, &(0x7f00000001c0)=0x9) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r4, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r4, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) connect$pppl2tp(r3, &(0x7f0000000680)=@pppol2tp={0x18, 0x1, {0x0, r4, {0x2, 0x4e25, @multicast2}, 0x3, 0x0, 0x1, 0x4}}, 0x26) [ 856.533995] BTRFS info (device loop2): unrecognized mount option 'Nڞ' [ 856.545286] ip6_tables: ip6tables: counters copy to user failed while replacing table [ 856.585722] BTRFS error (device loop2): open_ctree failed 00:04:58 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000500)="597d766800000000000000000000000000000000000000000000000000000000fcb2096bad154c2da9a086564f36bcc3000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045010000000000000000000000010000000000000000000001000000000000720000000000001000000010000000100000000000000000000000000000000000000000000000000000000000000000122badb145de474f84c86b8fd41337fdfcb2096bad154c2da9a086564f36bcc3", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e4000010000000000000004000000000000200000000000000000001000000000002000000000000000010000000100000001000000100000001000000000000000000100000000000122badb145de474f84c86b8fd41337fd", 0x6c, 0x10320}, {&(0x7f0000000280)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000002800)=ANY=[@ANYBLOB="4efa9e"]) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, &(0x7f0000000800)}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = open(&(0x7f00000001c0)='./file0\x00', 0xa440, 0x110) r2 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x0, 0x1, 0x1, 0x1f, 0x0, 0x400000000}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r2, r3, &(0x7f0000000240)=0x202, 0x4000000000dc) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000001700)='NLBL_UNLBL\x00') r5 = socket(0x28, 0x800000003, 0x8) sendmsg$NLBL_UNLABEL_C_STATICADD(r3, &(0x7f0000000640)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001780)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c7fc5db6cdef069691c1538af5784cc33cbb0d4e80385acf560eb3aece760751d023b69a4cc8e519643edf017aa42ee890b77e13bd5ff194db428aca06f6667a4d49a6404d7067e4aabab05b075f3d5476a93659168c63788d138bc3d7d7d5a67b53ab72c", @ANYRES16=r5, @ANYBLOB="00022dbd7000fedbdf250300000008000400e0000002"], 0x1c}, 0x1, 0x0, 0x0, 0x8}, 0x20008004) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000001940)=ANY=[@ANYBLOB="000000002509eae5f1c5a6558f5e41c38022e68b6aa734a36c2882ffa1915a3194388323d0cc9e0dc58a05130ff60f38072c5bf69c4b1644f151e5e9968e62485548d1e65cb71f44e8e62565157656f3b80c6fdc569bb073d32fdc9236f3556e056fe4ab40a822494dfc42d74d3ace54cee82b26a2e370ce36910c26519b0db6e3039bb525ff34f2ce00"/153, @ANYRES16=r4, @ANYBLOB="040001000000080200fe88000000000000000000000000040108000500ac1e0001140006006272696467655f736c6176655f31000014000400636169663000000000000000000000001400020020010000000000000000000000000000080004007f000001080004007f000001"], 0x7c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc001) sendmsg$NLBL_UNLABEL_C_ACCEPT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)={0x124, r4, 0x8, 0x70bd26, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_SECCTX={0x2a, 0x7, 'system_u:object_r:ldconfig_cache_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ip6_vti0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'erspan0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @loopback}, @NLBL_UNLABEL_A_SECCTX={0x29, 0x7, 'system_u:object_r:pinentry_exec_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:dpkg_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @remote}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @loopback}, @NLBL_UNLABEL_A_SECCTX={0x24, 0x7, 'system_u:object_r:apm_bios_t:s0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}]}, 0x124}, 0x1, 0x0, 0x0, 0x80000}, 0x40001) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r4, 0x200, 0x70bd29, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x40040d0}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) 00:04:58 executing program 5 (fault-call:10 fault-nth:40): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) [ 856.796671] BTRFS info (device loop2): unrecognized mount option 'N' [ 856.839494] ip6_tables: ip6tables: counters copy to user failed while replacing table [ 856.865377] BTRFS error (device loop2): open_ctree failed [ 856.912062] BTRFS info (device loop2): unrecognized mount option 'N' [ 856.954996] BTRFS error (device loop2): open_ctree failed [ 856.998942] FAULT_INJECTION: forcing a failure. [ 856.998942] name failslab, interval 1, probability 0, space 0, times 0 [ 857.010361] CPU: 1 PID: 15953 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 857.018248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 857.027602] Call Trace: [ 857.030193] dump_stack+0x1b2/0x283 [ 857.033824] should_fail.cold+0x10a/0x154 [ 857.037976] should_failslab+0xd6/0x130 [ 857.041950] __kmalloc_track_caller+0x2bc/0x400 [ 857.046619] ? kstrdup_const+0x35/0x60 [ 857.050505] kstrdup+0x36/0x70 [ 857.053697] kstrdup_const+0x35/0x60 [ 857.057411] alloc_vfsmnt+0xe0/0x7f0 [ 857.061129] clone_mnt+0x6c/0xff0 [ 857.064579] ? copy_tree+0x27a/0xa20 [ 857.068292] copy_tree+0x33e/0xa20 [ 857.071842] copy_mnt_ns+0x167/0xa30 [ 857.075563] ? create_new_namespaces+0x30/0x720 [ 857.080240] ? do_mount+0x2a00/0x2a00 [ 857.084036] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 857.089049] ? kmem_cache_alloc+0x35f/0x3c0 [ 857.093370] create_new_namespaces+0xc9/0x720 [ 857.097861] ? security_capable+0x88/0xb0 [ 857.102007] copy_namespaces+0x27b/0x310 [ 857.106072] copy_process.part.0+0x2600/0x6f00 [ 857.110657] ? trace_hardirqs_on+0x10/0x10 [ 857.114892] ? check_preemption_disabled+0x35/0x240 [ 857.119905] ? check_preemption_disabled+0x35/0x240 [ 857.124925] ? finish_task_switch+0x178/0x610 [ 857.129426] ? __cleanup_sighand+0x40/0x40 [ 857.133681] ? _raw_spin_unlock_irq+0x5a/0x80 [ 857.138177] ? finish_task_switch+0x14d/0x610 [ 857.142672] ? switch_mm_irqs_off+0x2d2/0xeb0 [ 857.147171] _do_fork+0x184/0xc80 [ 857.150625] ? fork_idle+0x270/0x270 [ 857.154337] ? io_schedule_timeout+0x140/0x140 [ 857.158914] ? fput+0xb/0x140 [ 857.162020] ? do_syscall_64+0x4c/0x640 [ 857.165989] ? sys_vfork+0x20/0x20 [ 857.169532] do_syscall_64+0x1d5/0x640 [ 857.173419] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 857.178600] RIP: 0033:0x45de59 [ 857.181790] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 857.189510] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 857.196771] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 857.204033] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 857.211321] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000028 [ 857.218571] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:04:59 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000500)="597d766800000000000000000000000000000000000000000000000000000000fcb2096bad154c2da9a086564f36bcc3000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045010000000000000000000000010000000000000000000001000000000000720000000000001000000010000000100000000000000000000000000000000000000000000000000000000000000000122badb145de474f84c86b8fd41337fdfcb2096bad154c2da9a086564f36bcc3", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e4000010000000000000004000000000000200000000000000000001000000000002000000000000000010000000100000001000000100000001000000000000000000100000000000122badb145de474f84c86b8fd41337fd", 0x6c, 0x10320}, {&(0x7f0000000280)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000002800)=ANY=[@ANYBLOB="4eda9e"]) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = open(&(0x7f00000001c0)='./file0\x00', 0xa440, 0x110) r2 = socket$inet6(0xa, 0x3, 0x6) sendto$inet(0xffffffffffffffff, &(0x7f0000000740)="4a22e316356a88b1d4baa54f284b0c64ce425d95469a0befbcff0cc552f012483eebb8dd458f94e0c868a624de05d6e433ad22f565d63a0b187306c2c4a7da8700547047bf8ac27c307293e91a4ee6f8edbd242fd54801b921bf17cb2444e51865dd8064634039ef123c29be19c59399ea62c3558c26fd9832d637539a", 0x7d, 0x4004000, &(0x7f0000000800)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x0, 0x1, 0x1, 0x1f, 0x0, 0x400000000}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r2, r3, &(0x7f0000000240)=0x202, 0x4000000000dc) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000001700)='NLBL_UNLBL\x00') r5 = socket(0x11, 0x800000003, 0x8) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, &(0x7f0000000700)=0x80) sendmsg$NLBL_UNLABEL_C_STATICADD(r3, &(0x7f0000000640)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001780)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c7fc5db6cdef069691c1538af5784cc33cbb0d4e80385acf560eb3aece760751d023b69a4cc8e519643edf017aa42ee890b77e13bd5ff194db428aca06f6667a4d49a6404d7067e4aabab05b075f3d5476a93659168c63788d138bc3d7d7d5a67b53ab72c", @ANYRES16=r5, @ANYBLOB="00022dbd7000fedbdf250300000008000400e0000002"], 0x1c}, 0x1, 0x0, 0x0, 0x8}, 0x20008004) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000001940)=ANY=[@ANYBLOB="000000002509eae5f1c5a6558f5e41c38022e68b6aa734a36c2882ffa1915a3194388323d0cc9e0dc58a05130ff60f38072c5bf69c4b1644f151e5e9968e62485548d1e65cb71f44e8e62565157656f3b80c6fdc569bb073d32fdc9236f3556e056fe4ab40a822494dfc42d74d3ace54cee82b26a2e370ce36910c26519b0db6e3039bb525ff34f2ce00"/153, @ANYRES16=r4, @ANYBLOB="040001000000080200fe88000000000000000000000000000108000500ac1e0001140006006272696467655f736c6176655f31000014000600636169663000000000000000000000001400020020010000000000000000000000000000080004007f000001080004007f000001"], 0x7c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc001) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, r4, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @remote}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x2a}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40040d0}, 0x4004080) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) 00:04:59 executing program 2: r0 = syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e4000010000000000000004000000000000200000000000000000001000000000002000000000000000010000000100000001000000100000001000000000000000000100000000000122badb145de474f84c86b8fd41337fd", 0x6c, 0x10320}, {&(0x7f0000000280)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000002800)=ANY=[@ANYBLOB="4eda9e"]) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, &(0x7f0000000100)}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = open(&(0x7f00000001c0)='./file0\x00', 0xa440, 0x110) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x0, 0x1, 0x1, 0x1f, 0x0, 0x400000000}, 0x20) r4 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r3, r4, &(0x7f0000000240)=0x202, 0x4000000000dc) r5 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000001700)='NLBL_UNLBL\x00') r6 = socket(0x11, 0x800000003, 0x8) sendmsg$NLBL_UNLABEL_C_STATICADD(r4, &(0x7f0000000640)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001780)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c7fc5db6cdef069691c1538af5784cc33cbb0d4e80385acf560eb3aece760751d023b69a4cc8e519643edf017aa42ee890b77e13bd5ff194db428aca06f6667a4d49a6404d7067e4aabab05b075f3d5476a93659168c63788d138bc3d7d7d5a67b53ab72c", @ANYRES16=r6, @ANYBLOB="00022dbd7000fedbdf250300000008000400e0000002"], 0x1c}, 0x1, 0x0, 0x0, 0x8}, 0x20008004) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000000800)=ANY=[@ANYBLOB="000000002509eae5f1c5a6558f5e41c38022e68b6aa734a36c2882ffa1915a3194388323d0cc9e0dc58a05130ff60f38072c5bf69c4b1644f151e5e9968e62485548d1e65cb71f44e8e62565157656f3b80c6fdc569bb073d32fdc9236f3556e056fe4ab40a822494dfc42d74d3ace54cee82b26a2e370ce36910c26519b0db6e3039bb525ff34f2ce00"/153, @ANYRES16=r5, @ANYBLOB="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"], 0x7c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc001) sendmsg$NLBL_UNLABEL_C_ACCEPT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000001800)={0x120, r5, 0x8, 0x70bd26, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:dpkg_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ip6_vti0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_to_bond\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @NLBL_UNLABEL_A_SECCTX={0x29, 0x7, 'system_u:object_r:pinentry_exec_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:dpkg_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @remote}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @loopback}, @NLBL_UNLABEL_A_SECCTX={0x24, 0x7, 'system_u:object_r:apm_bios_t:s0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}]}, 0x120}, 0x1, 0x0, 0x0, 0x80000}, 0x40001) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000680)={r2, 0x8001, 0x5a88c229, 0xfffffffffffff001}) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r7, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, r5, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @remote}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x2a}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40040d0}, 0x4004080) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) 00:04:59 executing program 1: write$P9_RMKDIR(0xffffffffffffffff, &(0x7f00000001c0)={0x14, 0x49, 0x2, {0x4, 0x2, 0xfffffffffffffffb}}, 0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=""/212, 0xd4}}], 0x1, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x800, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x2) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/snmp6\x00') r3 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r4 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x8) bind(r5, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r6, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r6, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000380)={0x9, 0x100000001, 0x8, 0x0, 0x0, [{{r3}, 0x3}, {{r2}, 0x4400}, {{r4}, 0x2}, {{}, 0xd891}, {{r5}, 0x101}, {{r0}, 0x7ff}, {{r6}, 0x4}, {{r1}}]}) preadv(r2, &(0x7f00000017c0), 0x11c, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) [ 857.423607] BTRFS info (device loop2): unrecognized mount option 'Nڞ' [ 857.485005] BTRFS error (device loop2): open_ctree failed [ 857.573875] BTRFS info (device loop2): unrecognized mount option 'Nڞ' [ 857.635030] BTRFS error (device loop2): open_ctree failed 00:04:59 executing program 5 (fault-call:10 fault-nth:41): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:04:59 executing program 2: r0 = syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e4000010000000000000004000000000000200000000000000000001000000000002000000000000000010000000100000001000000100000001000000000000000000100000000000122badb145de474f84c86b8fd41337fd", 0x6c, 0x10320}, {&(0x7f0000000280)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000002800)=ANY=[@ANYBLOB="4eda9e"]) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, &(0x7f0000000100)}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = open(&(0x7f00000001c0)='./file0\x00', 0xa440, 0x110) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x0, 0x1, 0x1, 0x1f, 0x0, 0x400000000}, 0x20) r4 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r3, r4, &(0x7f0000000240)=0x202, 0x4000000000dc) r5 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000001700)='NLBL_UNLBL\x00') r6 = socket(0x11, 0x800000003, 0x8) sendmsg$NLBL_UNLABEL_C_STATICADD(r4, &(0x7f0000000640)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001780)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c7fc5db6cdef069691c1538af5784cc33cbb0d4e80385acf560eb3aece760751d023b69a4cc8e519643edf017aa42ee890b77e13bd5ff194db428aca06f6667a4d49a6404d7067e4aabab05b075f3d5476a93659168c63788d138bc3d7d7d5a67b53ab72c", @ANYRES16=r6, @ANYBLOB="00022dbd7000fedbdf250300000008000400e0000002"], 0x1c}, 0x1, 0x0, 0x0, 0x8}, 0x20008004) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000000800)=ANY=[@ANYBLOB="000000002509eae5f1c5a6558f5e41c38022e68b6aa734a36c2882ffa1915a3194388323d0cc9e0dc58a05130ff60f38072c5bf69c4b1644f151e5e9968e62485548d1e65cb71f44e8e62565157656f3b80c6fdc569bb073d32fdc9236f3556e056fe4ab40a822494dfc42d74d3ace54cee82b26a2e370ce36910c26519b0db6e3039bb525ff34f2ce00"/153, @ANYRES16=r5, @ANYBLOB="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"], 0x7c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc001) sendmsg$NLBL_UNLABEL_C_ACCEPT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000001800)={0x120, r5, 0x8, 0x70bd26, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:dpkg_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ip6_vti0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_to_bond\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @NLBL_UNLABEL_A_SECCTX={0x29, 0x7, 'system_u:object_r:pinentry_exec_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:dpkg_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @remote}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @loopback}, @NLBL_UNLABEL_A_SECCTX={0x24, 0x7, 'system_u:object_r:apm_bios_t:s0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}]}, 0x120}, 0x1, 0x0, 0x0, 0x80000}, 0x40001) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000680)={r2, 0x8001, 0x5a88c229, 0xfffffffffffff001}) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r7, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, r5, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @remote}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x2a}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40040d0}, 0x4004080) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) [ 857.747118] print_req_error: I/O error, dev loop2, sector 0 00:04:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) getsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040), &(0x7f0000000180)=0x8) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_MCAST_FLOOD={0x5, 0x1b, 0x1}]}}}]}, 0x44}}, 0x0) [ 857.832551] BTRFS info (device loop2): unrecognized mount option 'Nڞ' [ 857.895837] FAULT_INJECTION: forcing a failure. [ 857.895837] name failslab, interval 1, probability 0, space 0, times 0 [ 857.907230] CPU: 1 PID: 16000 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 857.915126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 857.924476] Call Trace: [ 857.927064] dump_stack+0x1b2/0x283 [ 857.930696] should_fail.cold+0x10a/0x154 [ 857.934847] should_failslab+0xd6/0x130 [ 857.938823] __kmalloc_track_caller+0x2bc/0x400 [ 857.943491] ? kstrdup_const+0x35/0x60 [ 857.947377] ? lock_downgrade+0x740/0x740 [ 857.951521] kstrdup+0x36/0x70 [ 857.954710] kstrdup_const+0x35/0x60 [ 857.958419] alloc_vfsmnt+0xe0/0x7f0 [ 857.962129] clone_mnt+0x6c/0xff0 [ 857.965580] ? copy_tree+0x27a/0xa20 [ 857.969291] copy_tree+0x33e/0xa20 [ 857.972835] copy_mnt_ns+0x167/0xa30 [ 857.976556] ? create_new_namespaces+0x30/0x720 [ 857.981225] ? do_mount+0x2a00/0x2a00 [ 857.985027] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 857.990038] ? kmem_cache_alloc+0x35f/0x3c0 [ 857.994358] create_new_namespaces+0xc9/0x720 [ 857.998849] ? security_capable+0x88/0xb0 [ 858.002997] copy_namespaces+0x27b/0x310 [ 858.007055] copy_process.part.0+0x2600/0x6f00 [ 858.011636] ? get_pid_task+0xb8/0x130 [ 858.015523] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 858.020460] ? __cleanup_sighand+0x40/0x40 [ 858.024698] ? lock_downgrade+0x740/0x740 [ 858.028850] _do_fork+0x184/0xc80 [ 858.032303] ? fork_idle+0x270/0x270 [ 858.036021] ? fput+0xb/0x140 [ 858.039124] ? SyS_write+0x14d/0x210 [ 858.042833] ? SyS_read+0x210/0x210 [ 858.046458] ? SyS_clock_settime+0x1a0/0x1a0 [ 858.050866] ? do_syscall_64+0x4c/0x640 [ 858.054837] ? sys_vfork+0x20/0x20 [ 858.058376] do_syscall_64+0x1d5/0x640 [ 858.062266] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 858.067450] RIP: 0033:0x45de59 [ 858.070632] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 858.078333] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 858.085597] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 858.092863] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 858.100127] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000029 [ 858.107406] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:04:59 executing program 1: syz_mount_image$msdos(&(0x7f0000000280)='msdos\x00', &(0x7f0000000040)='./file1\x00', 0x1, 0x0, &(0x7f0000000300), 0x2041c98, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000180)="f7cf46e190590fca7b1bc8e2ff1b9e5489415470438464e71b4937abef25a9fa5b4050e3b0c15a624a8f98336b48d1fc85270591e1727afd3eeca8e77aa1acc76572a937971a0596d1bf002d73118152e40855c4bb33dbf6c858027f477b95067dbd32d9163f771c96c921068212f8fb48463d52b2beb8292cd53742c81fcece985c74b7dfa0bfe5cecf72df6d03dd336607b25af34c8b02d3702f9f1149f93271279347d7ec0d69f8418e5e263b6cf296cfda34fb588053e2c42b8c04c7503180948040b614f8391b0c08f1731a9074bf20c3394a", 0xd5}, {&(0x7f0000000340)="7aa557339f7897003de08389800a7cf54266513a2b61220be69e77c6109f74e6e7a8320a3e802b50fb078eea970509a1f91faf6ead97f2768d6d11599faed1e638ef9acfc88ccc100f0ac90178aa35337c477e5bfc7a30510982dcdec9f35783d94ea618f912e6b940d14f82997c73e55bd94f5ab89ca119600b67d044d24cb22ae983b9ff849a64b30300c14b2a932a25ac3ad9511393502fadc6f59e31c6fa31ee49b8157a6eb55e246abcc90622c6c535c778a46dceb8e6db4c74e4b6ef0f78869b190300"/208, 0xfffffcc5}, {&(0x7f0000000440)="7a77dae6069dacc6bb787fc27ac63658dca46847f60122552f00d032213baf5a5ee03b5d4a636efc2cf7035c9e59ed0bb4caac6192e15b96731b763fffa2a545e4ba60761ec507dd21925b40f360ed6c0f5850b7a16e107e8fcb32d1cbe9b9e0bdc101da411a040000000000000097a0a04600010000000000000b8d7082e6934cc0114ae04d4b620000c21c9528069971b3d1bb160601931ca46bebb7a828b83e5aa912b8705b3179f13e85513215e15da490cf2faaeb94cd33df526c383c17a9bf7093da54a69421e8aeb6a8914e9c015fbb964682", 0xd6}, {&(0x7f0000000c00)="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", 0x68a}, {&(0x7f0000001700)="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"}], 0x4) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) [ 858.255415] BTRFS error (device loop2): open_ctree failed 00:05:00 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) r4 = epoll_create1(0x0) bind$ax25(r0, &(0x7f0000000240)={{0x3, @bcast, 0x8001}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) dup3(0xffffffffffffffff, r4, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) [ 858.298968] audit: type=1804 audit(1602893099.999:71): pid=16007 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir645455088/syzkaller.vDLZuP/1555/bus" dev="sda1" ino=16537 res=1 00:05:00 executing program 2: r0 = gettid() r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x41) io_submit(0x0, 0x1, &(0x7f0000000380)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) capset(&(0x7f00000000c0)={0x19980330}, &(0x7f0000000100)) write$binfmt_script(r1, &(0x7f00000003c0)=ANY=[@ANYRES64, @ANYBLOB="81f0f0057b6c80a85bddf9deb3d5856b6964d2450f91d31b9cf8dbb3277f1aee19f5107bacefd716537d517a758dc0f653576586581ed3f9ee574fe8f65085d592ecd348e603465caa1175443d3590002c269d3aadc500fa5a8bfc2a550e7198916be30871448665dae7cf666cc0f6bda396c35565fc19d950fe469e4251b59ebde876fbc7c1da7f887b5479a4af099ab891689acd54bebc9a09dcea9737c00221741611159a25bece6723c8d46dbf3e80b64129fbd5924f1887ab4be3932887c4f5c83dec4a5759f0ee9b3cb41a0c2829cfe2091c75442210ccec0068413594af677654191eb96d2f466f1b4d36a9d21fe1db", @ANYRES16=r1, @ANYRESOCT=r0, @ANYRES64=r1, @ANYBLOB="4309b0dcb2b0110ba92c99b806c65409ebcfb6fc1d43c1e9fb8a9c49846c0796a44f823bacc03bcd33f63af8293a4fedf01737b7361970960b3d769691089747a6fb63811d85baa0fb35a90de6b462435d74302dcf0aabcb950368ef3d8e71d6dcc709323e30a8032342ec43ccc336287c5196c32d3304fe674094413a"], 0x191) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) close(r1) clone(0x500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 858.479603] capability: warning: `syz-executor.2' uses 32-bit capabilities (legacy support in use) 00:05:00 executing program 5 (fault-call:10 fault-nth:42): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) [ 858.604156] ptrace attach of "/root/syz-executor.2"[16015] was attempted by "/root/syz-executor.2"[16018] [ 858.763305] FAULT_INJECTION: forcing a failure. [ 858.763305] name failslab, interval 1, probability 0, space 0, times 0 [ 858.774869] CPU: 1 PID: 16029 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 858.782756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 858.792108] Call Trace: [ 858.794786] dump_stack+0x1b2/0x283 [ 858.798426] should_fail.cold+0x10a/0x154 [ 858.802579] should_failslab+0xd6/0x130 [ 858.806553] kmem_cache_alloc+0x28e/0x3c0 [ 858.810716] alloc_vfsmnt+0x23/0x7f0 [ 858.814427] clone_mnt+0x6c/0xff0 [ 858.817886] copy_tree+0x33e/0xa20 [ 858.821433] copy_mnt_ns+0x167/0xa30 [ 858.825145] ? create_new_namespaces+0x30/0x720 [ 858.829808] ? do_mount+0x2a00/0x2a00 [ 858.833608] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 858.838621] ? kmem_cache_alloc+0x35f/0x3c0 [ 858.842941] create_new_namespaces+0xc9/0x720 [ 858.847438] ? security_capable+0x88/0xb0 [ 858.851585] copy_namespaces+0x27b/0x310 [ 858.855647] copy_process.part.0+0x2600/0x6f00 [ 858.860368] ? get_pid_task+0xb8/0x130 [ 858.864256] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 858.869196] ? __cleanup_sighand+0x40/0x40 [ 858.873428] ? lock_downgrade+0x740/0x740 [ 858.877577] _do_fork+0x184/0xc80 [ 858.881033] ? fork_idle+0x270/0x270 [ 858.884746] ? fput+0xb/0x140 [ 858.887865] ? SyS_write+0x14d/0x210 [ 858.891570] ? SyS_read+0x210/0x210 [ 858.895195] ? SyS_clock_settime+0x1a0/0x1a0 [ 858.899600] ? do_syscall_64+0x4c/0x640 [ 858.903570] ? sys_vfork+0x20/0x20 [ 858.907115] do_syscall_64+0x1d5/0x640 [ 858.911008] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 858.916196] RIP: 0033:0x45de59 [ 858.919380] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 858.927082] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 858.934346] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 858.941611] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 858.948878] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000002a [ 858.956148] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:05:00 executing program 2: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r1 = syz_open_procfs(0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x16, 0x7, &(0x7f0000000c00)=ANY=[@ANYBLOB="18000000ff07000000000000010000001816000044034d3cf6d96bb60decb21296a055c08293693d4339487d3bdfda3c4b1b1c022ae8f5f88fcd120902002bcfd2eace03b82759ec08c6a70d13ab012984e9b151eca76dd2f780406640885f1d027c2224cc03e736486fc86c18aaae57455825de5f361081f325c6ecef", @ANYRES32=r1, @ANYBLOB="000000000000000018180000", @ANYRES32=r1], &(0x7f0000000440)='GPL\x00', 0x9, 0x34, &(0x7f00000009c0)=""/52, 0x40f00, 0x1, [], 0x0, 0x1, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a40)={0x2, 0xe, 0x401, 0x4}, 0x10, 0xffffffffffffffff}, 0x78) fsetxattr$system_posix_acl(r2, &(0x7f0000000b00)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010000000000000002000400", @ANYRES32=0xee00, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=0x0, @ANYBLOB='*e\x00\x00', @ANYRES32=0x0, @ANYBLOB="10000400000000002000020000000000"], 0x44, 0x2) write$FUSE_OPEN(r1, &(0x7f0000000200)={0x20, 0x0, 0x0, {0x0, 0x8}}, 0x20) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000cc0)) connect$rxrpc(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x800, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000340)={'filter\x00', 0x0, 0x0, 0x0, [], 0x3, &(0x7f0000000100)=[{}, {}], 0x0, [{}, {}, {}]}, 0xa8) sendmmsg(0xffffffffffffffff, &(0x7f0000003bc0), 0x0, 0x4040084) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000400)={&(0x7f0000000280)='./file0\x00', r1}, 0x10) r3 = signalfd4(r0, &(0x7f0000000000)={[0xffffffff]}, 0x8, 0x800) mount(&(0x7f0000000e00)=ANY=[@ANYBLOB="0e41536a5e5518e0c0f1e55375d4864eac77cb915e468fa30e79bf207d3726b368f6ce85b89d893fd48612e90000030a5267c4818dbc8917f345f1513022f0a8f3d205d6e43386fd90749db25bd564efd85140e37198d6d79d6e64b8eca7929f6f6d9a4967ccf3a12dc8c8ff95acb9c41c576ee368d6063570480436e44f2e259e5586ed3d984b041e9bb029af19c4f83c835f53503f524c183868077fd38e9bb795d8324748c6330b3fc5b43b2c6e32a324587f12a9b6963e644d788396c948554a0b189bdf50c29019f35c0176c033a463df4279ec262f00"/230], &(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)='ext3\x00', 0x100080, &(0x7f0000000dc0)='\\.\x00') umount2(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$VIDIOC_S_CTRL(r3, 0xc008561c, &(0x7f0000000bc0)={0x7f, 0x401}) fchmod(0xffffffffffffffff, 0x9) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r4, 0xc4c85513, &(0x7f00000004c0)={{0x2, 0x2, 0x80000000, 0xfffffffd, '\x00', 0xfffffff9}, 0x1, [0x1ff, 0x0, 0x7, 0x59d7, 0x80000000, 0x6, 0x401, 0x9, 0x2, 0x80, 0x80, 0x0, 0x5, 0x10000, 0x10001, 0x0, 0x3, 0x200, 0x1, 0x7, 0x7, 0x8c, 0x0, 0xb9e, 0x0, 0xfffffffffffffff9, 0xffffffffffff8001, 0xfff, 0x3f, 0x0, 0x10001, 0x0, 0x800000014000, 0xe54, 0x7, 0x0, 0x40, 0x1, 0xcd, 0x1, 0xea58, 0x5, 0xdbff, 0xffffffffffffff01, 0x84, 0xfff, 0xc6b5, 0x5, 0x1e6, 0x0, 0x100000004, 0x7, 0x6, 0x5, 0xd1, 0x3ff, 0x1, 0x8, 0xaae, 0x8000, 0x8, 0x8, 0xff, 0x81, 0x80, 0x20, 0x5, 0x5, 0x0, 0x400, 0x10000, 0x2, 0x6, 0xffff, 0x7fffffff, 0x0, 0x184, 0x8000, 0x4, 0x0, 0x9, 0x31fb, 0x7, 0x7, 0x11, 0x5, 0x3, 0x81, 0x7f, 0x1d, 0x5, 0x5, 0x1f, 0x100000001, 0x82, 0x0, 0x9, 0x401, 0xe514, 0x7f, 0xfffffffffffffff5, 0x2, 0x0, 0x7, 0x7, 0x7fff, 0x0, 0x100000000, 0x8, 0x5, 0x0, 0x41, 0x1, 0x5, 0x9, 0x22, 0xfffffffffffffc01, 0x5, 0x1000, 0x576, 0x0, 0x2, 0x1, 0x84, 0x803, 0xfffffffffffffffd, 0x7, 0x4]}) 00:05:00 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) ioctl$KVM_GET_DEBUGREGS(r1, 0x8080aea1, &(0x7f00000001c0)) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="9feb010018000000000000003e0000680bb6bc0007000000000000000000000800000000000000000000000f017bd5bd7189f161cb22000000f5000000000100000400000000000000000000000000000000000000000000000f4bf221326c53a8f3b30000000000cfeed92c1e3c4b6e9c2fa8a407b7ff53f8e31348ef5b2ef11e20706603cfb02e26cd8a4f11b0bb828cfc70e14d12428ca86f1c7b046affcc759e44746112fab69ecf645930f104abd7ab180cbb3c5147d9eeadac7b994e68a124c90c57ecb257b490d41a30c0cc62cfeddc1c5a39b2e06a4e98fd2dfaf101ea9de8622002096004c5c921e9620a222ff18ccdfabb2ab72b229fee0dc3f993ddaeea610000000000000000000000000000000022db5e42b5cfa2e27279e06d677960f62bf2d2e72e6f2e8a015659b84546e4c6f87da2cb23e34455330e3fa029d6"], 0x0, 0x5f}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r3, &(0x7f0000000080)={0x80000002}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r3, 0x8934, &(0x7f0000000140)={'erspan0\x00'}) 00:05:01 executing program 2: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r1 = syz_open_procfs(0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x16, 0x7, &(0x7f0000000c00)=ANY=[@ANYBLOB="18000000ff07000000000000010000001816000044034d3cf6d96bb60decb21296a055c08293693d4339487d3bdfda3c4b1b1c022ae8f5f88fcd120902002bcfd2eace03b82759ec08c6a70d13ab012984e9b151eca76dd2f780406640885f1d027c2224cc03e736486fc86c18aaae57455825de5f361081f325c6ecef", @ANYRES32=r1, @ANYBLOB="000000000000000018180000", @ANYRES32=r1], &(0x7f0000000440)='GPL\x00', 0x9, 0x34, &(0x7f00000009c0)=""/52, 0x40f00, 0x1, [], 0x0, 0x1, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a40)={0x2, 0xe, 0x401, 0x4}, 0x10, 0xffffffffffffffff}, 0x78) fsetxattr$system_posix_acl(r2, &(0x7f0000000b00)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010000000000000002000400", @ANYRES32=0xee00, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=0x0, @ANYBLOB='*e\x00\x00', @ANYRES32=0x0, @ANYBLOB="10000400000000002000020000000000"], 0x44, 0x2) write$FUSE_OPEN(r1, &(0x7f0000000200)={0x20, 0x0, 0x0, {0x0, 0x8}}, 0x20) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000cc0)) connect$rxrpc(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x800, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000340)={'filter\x00', 0x0, 0x0, 0x0, [], 0x3, &(0x7f0000000100)=[{}, {}], 0x0, [{}, {}, {}]}, 0xa8) sendmmsg(0xffffffffffffffff, &(0x7f0000003bc0), 0x0, 0x4040084) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000400)={&(0x7f0000000280)='./file0\x00', r1}, 0x10) r3 = signalfd4(r0, &(0x7f0000000000)={[0xffffffff]}, 0x8, 0x800) mount(&(0x7f0000000e00)=ANY=[@ANYBLOB="0e41536a5e5518e0c0f1e55375d4864eac77cb915e468fa30e79bf207d3726b368f6ce85b89d893fd48612e90000030a5267c4818dbc8917f345f1513022f0a8f3d205d6e43386fd90749db25bd564efd85140e37198d6d79d6e64b8eca7929f6f6d9a4967ccf3a12dc8c8ff95acb9c41c576ee368d6063570480436e44f2e259e5586ed3d984b041e9bb029af19c4f83c835f53503f524c183868077fd38e9bb795d8324748c6330b3fc5b43b2c6e32a324587f12a9b6963e644d788396c948554a0b189bdf50c29019f35c0176c033a463df4279ec262f00"/230], &(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)='ext3\x00', 0x100080, &(0x7f0000000dc0)='\\.\x00') umount2(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$VIDIOC_S_CTRL(r3, 0xc008561c, &(0x7f0000000bc0)={0x7f, 0x401}) fchmod(0xffffffffffffffff, 0x9) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r4, 0xc4c85513, &(0x7f00000004c0)={{0x2, 0x2, 0x80000000, 0xfffffffd, '\x00', 0xfffffff9}, 0x1, [0x1ff, 0x0, 0x7, 0x59d7, 0x80000000, 0x6, 0x401, 0x9, 0x2, 0x80, 0x80, 0x0, 0x5, 0x10000, 0x10001, 0x0, 0x3, 0x200, 0x1, 0x7, 0x7, 0x8c, 0x0, 0xb9e, 0x0, 0xfffffffffffffff9, 0xffffffffffff8001, 0xfff, 0x3f, 0x0, 0x10001, 0x0, 0x800000014000, 0xe54, 0x7, 0x0, 0x40, 0x1, 0xcd, 0x1, 0xea58, 0x5, 0xdbff, 0xffffffffffffff01, 0x84, 0xfff, 0xc6b5, 0x5, 0x1e6, 0x0, 0x100000004, 0x7, 0x6, 0x5, 0xd1, 0x3ff, 0x1, 0x8, 0xaae, 0x8000, 0x8, 0x8, 0xff, 0x81, 0x80, 0x20, 0x5, 0x5, 0x0, 0x400, 0x10000, 0x2, 0x6, 0xffff, 0x7fffffff, 0x0, 0x184, 0x8000, 0x4, 0x0, 0x9, 0x31fb, 0x7, 0x7, 0x11, 0x5, 0x3, 0x81, 0x7f, 0x1d, 0x5, 0x5, 0x1f, 0x100000001, 0x82, 0x0, 0x9, 0x401, 0xe514, 0x7f, 0xfffffffffffffff5, 0x2, 0x0, 0x7, 0x7, 0x7fff, 0x0, 0x100000000, 0x8, 0x5, 0x0, 0x41, 0x1, 0x5, 0x9, 0x22, 0xfffffffffffffc01, 0x5, 0x1000, 0x576, 0x0, 0x2, 0x1, 0x84, 0x803, 0xfffffffffffffffd, 0x7, 0x4]}) 00:05:01 executing program 5 (fault-call:10 fault-nth:43): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:05:01 executing program 2: openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x2, 0x0) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f00001320000012000000000000000020000000040000611cad49840300001e000000000000000010ec03020001005265497345724673", 0x3c, 0x10000}, {&(0x7f00000002c0)="0000000000000000000000001200d50b5c378019c7daaf547e", 0x19, 0x2012000}], 0x0, &(0x7f0000011100)) [ 859.589866] REISERFS (device loop2): found reiserfs format "3.5" with standard journal [ 859.622584] REISERFS (device loop2): using ordered data mode [ 859.653995] FAULT_INJECTION: forcing a failure. [ 859.653995] name failslab, interval 1, probability 0, space 0, times 0 [ 859.657489] reiserfs: using flush barriers [ 859.669591] CPU: 0 PID: 16056 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 859.677472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 859.683142] REISERFS warning (device loop2): sh-462 check_advise_trans_params: bad transaction max size (126). FSCK? [ 859.686816] Call Trace: [ 859.686834] dump_stack+0x1b2/0x283 [ 859.686852] should_fail.cold+0x10a/0x154 [ 859.686865] should_failslab+0xd6/0x130 [ 859.711879] kmem_cache_alloc+0x28e/0x3c0 [ 859.714704] REISERFS warning (device loop2): sh-2022 reiserfs_fill_super: unable to initialize journal space [ 859.716025] alloc_vfsmnt+0x23/0x7f0 [ 859.716038] clone_mnt+0x6c/0xff0 [ 859.733127] copy_tree+0x33e/0xa20 [ 859.736673] copy_mnt_ns+0x167/0xa30 [ 859.740385] ? create_new_namespaces+0x30/0x720 [ 859.745048] ? do_mount+0x2a00/0x2a00 [ 859.748844] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 859.753855] ? kmem_cache_alloc+0x35f/0x3c0 [ 859.758170] create_new_namespaces+0xc9/0x720 [ 859.762658] ? security_capable+0x88/0xb0 [ 859.766802] copy_namespaces+0x27b/0x310 [ 859.770860] copy_process.part.0+0x2600/0x6f00 [ 859.775447] ? _raw_spin_unlock_irq+0x50/0x80 [ 859.779939] ? _raw_spin_unlock_irq+0x5a/0x80 [ 859.784425] ? finish_task_switch+0x178/0x610 [ 859.788912] ? finish_task_switch+0x14d/0x610 [ 859.793415] ? __cleanup_sighand+0x40/0x40 [ 859.797646] ? lock_downgrade+0x740/0x740 [ 859.801796] _do_fork+0x184/0xc80 [ 859.805248] ? fork_idle+0x270/0x270 [ 859.808960] ? fput+0xb/0x140 [ 859.812062] ? SyS_write+0x14d/0x210 [ 859.815769] ? SyS_read+0x210/0x210 [ 859.819393] ? SyS_clock_settime+0x1a0/0x1a0 [ 859.823797] ? do_syscall_64+0x4c/0x640 [ 859.827763] ? sys_vfork+0x20/0x20 [ 859.831285] do_syscall_64+0x1d5/0x640 [ 859.835159] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 859.840327] RIP: 0033:0x45de59 [ 859.843495] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 859.851182] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 859.858434] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 859.865690] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 859.872937] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000002b [ 859.880184] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:05:01 executing program 2: openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x2, 0x0) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f00001320000012000000000000000020000000040000611cad49840300001e000000000000000010ec03020001005265497345724673", 0x3c, 0x10000}, {&(0x7f00000002c0)="0000000000000000000000001200d50b5c378019c7daaf547e", 0x19, 0x2012000}], 0x0, &(0x7f0000011100)) [ 860.127330] REISERFS (device loop2): found reiserfs format "3.5" with standard journal [ 860.162008] REISERFS (device loop2): using ordered data mode [ 860.184228] reiserfs: using flush barriers [ 860.201251] REISERFS warning (device loop2): sh-462 check_advise_trans_params: bad transaction max size (126). FSCK? 00:05:01 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="696f63e401001bf43be8c5007c743d6370313235310fb16c000100"]) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000240)={0x0, 0xffffffffffff28a8, 0x8}) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000e00)={0x0, 0x0, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f00000002c0)={r4, 0x918, 0x5}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r3, 0xc400941d, &(0x7f00000003c0)={r4, 0x8, 0x20}) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000e00)={0x0, 0x0, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f00000002c0)={r6, 0x918, 0x5}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r5, 0xc400941d, &(0x7f00000003c0)={r6, 0x8, 0x20}) ioctl$BTRFS_IOC_BALANCE_V2(r1, 0xc4009420, &(0x7f0000000640)={0x8, 0x1, {0x380000000000000, @struct={0x48602ca2, 0x5}, r2, 0x9, 0x2a00000, 0x0, 0x3, 0xdf1, 0x440, @usage=0x4000000000, 0xfffffffd, 0x7fff, [0x6, 0x6, 0x80, 0x0, 0x1, 0x6]}, {0x9, @usage=0x119, r4, 0x4, 0x7fff, 0x7f, 0x100, 0x4, 0x8, @struct={0x400, 0x1}, 0x7fffffff, 0x3, [0x1, 0x2, 0xf45, 0x62f0188c, 0x48ba]}, {0x40, @struct={0x6, 0x7}, r6, 0x5, 0x8, 0x4, 0x5, 0x0, 0x402, @struct={0x8, 0xc0}, 0x1ff, 0x2, [0x7, 0x10001, 0xffffffffffffffff, 0x7fe3b3cf, 0x3, 0x36]}, {0x8000000000000000, 0x6, 0x20}}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 860.228718] REISERFS warning (device loop2): sh-2022 reiserfs_fill_super: unable to initialize journal space 00:05:02 executing program 5 (fault-call:10 fault-nth:44): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:05:02 executing program 2: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x1fb}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) socket$inet6_icmp(0xa, 0x2, 0x3a) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000006c0)) setfsuid(0x0) ptrace$poke(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x4, 0x400000) getsockopt$inet_buf(r3, 0x0, 0x9, &(0x7f0000000180)=""/186, &(0x7f0000000040)=0xba) [ 860.332737] FAT-fs (loop0): Unrecognized mount option "ioc" or missing value 00:05:02 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) socket$l2tp6(0xa, 0x2, 0x73) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 860.510622] FAULT_INJECTION: forcing a failure. [ 860.510622] name failslab, interval 1, probability 0, space 0, times 0 [ 860.521985] CPU: 0 PID: 16084 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 860.529872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 860.539224] Call Trace: [ 860.541812] dump_stack+0x1b2/0x283 [ 860.545477] should_fail.cold+0x10a/0x154 [ 860.549619] should_failslab+0xd6/0x130 [ 860.553587] __kmalloc_track_caller+0x2bc/0x400 [ 860.558252] ? kstrdup_const+0x35/0x60 [ 860.562135] ? lock_downgrade+0x740/0x740 [ 860.566366] kstrdup+0x36/0x70 [ 860.569557] kstrdup_const+0x35/0x60 [ 860.573269] alloc_vfsmnt+0xe0/0x7f0 [ 860.576978] ? clone_mnt+0x34/0xff0 [ 860.580600] clone_mnt+0x6c/0xff0 [ 860.584055] copy_tree+0x33e/0xa20 [ 860.587601] copy_mnt_ns+0x167/0xa30 [ 860.591314] ? create_new_namespaces+0x30/0x720 [ 860.595976] ? do_mount+0x2a00/0x2a00 [ 860.599774] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 860.604784] ? kmem_cache_alloc+0x35f/0x3c0 [ 860.609103] create_new_namespaces+0xc9/0x720 [ 860.613594] ? security_capable+0x88/0xb0 [ 860.617744] copy_namespaces+0x27b/0x310 [ 860.621804] copy_process.part.0+0x2600/0x6f00 [ 860.626383] ? finish_task_switch+0x178/0x610 [ 860.630877] ? lock_downgrade+0x740/0x740 [ 860.635025] ? _raw_spin_unlock_irq+0x24/0x80 [ 860.639530] ? __cleanup_sighand+0x40/0x40 [ 860.643769] _do_fork+0x184/0xc80 [ 860.647220] ? fork_idle+0x270/0x270 [ 860.650930] ? retint_kernel+0x2d/0x2d [ 860.654813] ? SyS_read+0x210/0x210 [ 860.658436] ? do_syscall_64+0x4c/0x640 [ 860.662401] ? sys_vfork+0x20/0x20 [ 860.665941] do_syscall_64+0x1d5/0x640 [ 860.669831] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 860.675011] RIP: 0033:0x45de59 [ 860.678191] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 860.685899] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 860.693166] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 860.700428] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 860.707690] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000002c [ 860.714954] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:05:02 executing program 0: prctl$PR_GET_SECUREBITS(0x1b) r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x20020, &(0x7f0000000000)=ANY=[@ANYRES16=0x0, @ANYRES32]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000400)='netdevsim\x00') r1 = socket(0x11, 0x800000003, 0x8) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r1, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f0000000180)={0x148, 0x0, 0x20, 0xfff, 0x25dfdbfe, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x7}, {0x6, 0x11, 0x5}, {0x8, 0x15, 0xfffffffe}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x2}, {0x6, 0x11, 0x6}, {0x8, 0x15, 0x2}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x9}, {0x6, 0x11, 0x6}, {0x8, 0x15, 0x7}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8, 0xb, 0x1}, {0x6, 0x11, 0x200}, {0x8, 0x15, 0x80}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x6}, {0x6, 0x11, 0x1}, {0x8, 0x15, 0x1000}}]}, 0x148}, 0x1, 0x0, 0x0, 0x40c4804}, 0x40040c0) r2 = accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f00000003c0)={0x0, 0x8, 0x30}, 0xc) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) open(&(0x7f0000000080)='./file0\x00', 0x1080c0, 0x191) 00:05:02 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="696f6b00000000000000000000001a4cb4b8bc000000"]) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 861.057399] FAT-fs (loop0): Unrecognized mount option "iok" or missing value 00:05:02 executing program 5 (fault-call:10 fault-nth:45): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) [ 861.162739] FAT-fs (loop0): Unrecognized mount option "iok" or missing value [ 861.228794] print_req_error: I/O error, dev loop0, sector 0 [ 861.398651] FAULT_INJECTION: forcing a failure. [ 861.398651] name failslab, interval 1, probability 0, space 0, times 0 [ 861.410002] CPU: 0 PID: 16116 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 861.417894] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 861.427240] Call Trace: [ 861.429832] dump_stack+0x1b2/0x283 [ 861.433463] should_fail.cold+0x10a/0x154 [ 861.437614] should_failslab+0xd6/0x130 [ 861.441589] kmem_cache_alloc+0x28e/0x3c0 [ 861.445734] alloc_vfsmnt+0x23/0x7f0 [ 861.449442] clone_mnt+0x6c/0xff0 [ 861.452895] copy_tree+0x33e/0xa20 [ 861.456440] copy_mnt_ns+0x167/0xa30 [ 861.460239] ? create_new_namespaces+0x30/0x720 [ 861.464900] ? do_mount+0x2a00/0x2a00 [ 861.468696] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 861.473708] ? kmem_cache_alloc+0x35f/0x3c0 [ 861.478030] create_new_namespaces+0xc9/0x720 [ 861.482530] ? security_capable+0x88/0xb0 [ 861.486678] copy_namespaces+0x27b/0x310 [ 861.490738] copy_process.part.0+0x2600/0x6f00 [ 861.495318] ? trace_hardirqs_on+0x10/0x10 [ 861.499549] ? check_preemption_disabled+0x35/0x240 [ 861.504567] ? check_preemption_disabled+0x35/0x240 [ 861.509590] ? finish_task_switch+0x178/0x610 [ 861.514089] ? __cleanup_sighand+0x40/0x40 [ 861.518321] ? _raw_spin_unlock_irq+0x5a/0x80 [ 861.522811] ? finish_task_switch+0x14d/0x610 [ 861.527298] ? switch_mm_irqs_off+0x2d2/0xeb0 [ 861.531794] _do_fork+0x184/0xc80 [ 861.535247] ? fork_idle+0x270/0x270 [ 861.538954] ? io_schedule_timeout+0x140/0x140 [ 861.543532] ? fput+0xb/0x140 [ 861.546640] ? do_syscall_64+0x4c/0x640 [ 861.550610] ? sys_vfork+0x20/0x20 [ 861.554151] do_syscall_64+0x1d5/0x640 [ 861.558044] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 861.563230] RIP: 0033:0x45de59 [ 861.566410] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 861.574114] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 861.581382] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 861.588646] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 861.595909] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000002d [ 861.603177] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:05:03 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) socket$l2tp6(0xa, 0x2, 0x73) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:05:03 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) socket$l2tp6(0xa, 0x2, 0x73) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:05:03 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) r1 = socket(0x11, 0x800000003, 0x8) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)={0x188, 0x2, 0x1, 0x101, 0x0, 0x0, {0xc, 0x0, 0x6}, [@CTA_LABELS={0x14, 0x16, 0x1, 0x0, [0x101, 0x20, 0x7, 0x20]}, @CTA_MARK={0x8, 0x8, 0x1, 0x0, 0x7}, @CTA_TUPLE_REPLY={0x18, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}]}, @CTA_TUPLE_MASTER={0x10, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}]}, @CTA_SEQ_ADJ_REPLY={0x54, 0x10, 0x0, 0x1, [@CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x3}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0xff}, @CTA_SEQADJ_OFFSET_BEFORE={0x6f, 0x2, 0x1, 0x0, 0x1}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x4}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x6}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SEQADJ_OFFSET_BEFORE={0x8}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x4}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0xffffffff}, @CTA_SEQADJ_OFFSET_AFTER={0x8}]}, @CTA_TUPLE_MASTER={0x18, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @CTA_TUPLE_REPLY={0x50, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3f}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x2, 0x1, @private=0xa010102}, {0x8, 0x2, @local}}}]}, @CTA_PROTOINFO={0x38, 0x4, 0x0, 0x1, @CTA_PROTOINFO_DCCP={0x34, 0x2, 0x0, 0x1, [@CTA_PROTOINFO_DCCP_HANDSHAKE_SEQ={0xc, 0x3, 0x1, 0x0, 0xb86}, @CTA_PROTOINFO_DCCP_STATE={0x5, 0x1, 0x7}, @CTA_PROTOINFO_DCCP_STATE={0x5, 0x1, 0x1}, @CTA_PROTOINFO_DCCP_ROLE={0x5}, @CTA_PROTOINFO_DCCP_HANDSHAKE_SEQ={0xc, 0x3, 0x1, 0x0, 0x1f}]}}, @CTA_LABELS={0x18, 0x16, 0x1, 0x0, [0x404, 0xfffffff7, 0x1000, 0xa3, 0x4]}, @CTA_SEQ_ADJ_REPLY={0x24, 0x10, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x6d7b4cd6}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x6}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0xdc}]}]}, 0x188}, 0x1, 0x0, 0x0, 0xc040}, 0x4040000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) epoll_create1(0x0) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000480)={0x3}, 0x8) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) socket$isdn(0x22, 0x3, 0x22) 00:05:03 executing program 5 (fault-call:10 fault-nth:46): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:05:04 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) socket$l2tp6(0xa, 0x2, 0x73) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 862.433171] FAULT_INJECTION: forcing a failure. [ 862.433171] name failslab, interval 1, probability 0, space 0, times 0 [ 862.444562] CPU: 1 PID: 16136 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 862.452450] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 862.461805] Call Trace: [ 862.464397] dump_stack+0x1b2/0x283 [ 862.468030] should_fail.cold+0x10a/0x154 [ 862.472186] should_failslab+0xd6/0x130 [ 862.476161] __kmalloc_track_caller+0x2bc/0x400 [ 862.480834] ? kstrdup_const+0x35/0x60 [ 862.484718] kstrdup+0x36/0x70 [ 862.487910] kstrdup_const+0x35/0x60 [ 862.491621] alloc_vfsmnt+0xe0/0x7f0 [ 862.495341] clone_mnt+0x6c/0xff0 [ 862.498796] copy_tree+0x33e/0xa20 [ 862.502345] copy_mnt_ns+0x167/0xa30 [ 862.506063] ? create_new_namespaces+0x30/0x720 [ 862.510727] ? do_mount+0x2a00/0x2a00 [ 862.514526] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 862.519539] ? kmem_cache_alloc+0x35f/0x3c0 [ 862.523861] create_new_namespaces+0xc9/0x720 [ 862.528350] ? security_capable+0x88/0xb0 [ 862.532493] copy_namespaces+0x27b/0x310 [ 862.536551] copy_process.part.0+0x2600/0x6f00 [ 862.541144] ? trace_hardirqs_on+0x10/0x10 [ 862.545379] ? check_preemption_disabled+0x35/0x240 [ 862.550393] ? check_preemption_disabled+0x35/0x240 [ 862.555408] ? finish_task_switch+0x178/0x610 [ 862.559910] ? __cleanup_sighand+0x40/0x40 [ 862.564141] ? _raw_spin_unlock_irq+0x5a/0x80 [ 862.568637] ? finish_task_switch+0x14d/0x610 [ 862.573126] ? switch_mm_irqs_off+0x2d2/0xeb0 [ 862.577624] _do_fork+0x184/0xc80 [ 862.581081] ? fork_idle+0x270/0x270 [ 862.584792] ? io_schedule_timeout+0x140/0x140 [ 862.589374] ? fput+0xb/0x140 [ 862.592481] ? do_syscall_64+0x4c/0x640 [ 862.596449] ? sys_vfork+0x20/0x20 [ 862.599988] do_syscall_64+0x1d5/0x640 [ 862.603879] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 862.609062] RIP: 0033:0x45de59 [ 862.612243] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 862.619944] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 00:05:04 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000140)=[{0x6, 0x1, 0x0, 0xe7}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) setsockopt$inet_int(r0, 0x0, 0x16, &(0x7f0000000040)=0xce, 0x4) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010001fff000005000012000000000000", @ANYRES32, @ANYBLOB="0000008000401800280012800a00010076786c616e00000018000280140011"], 0x3}}, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(r3, 0xca289435, &(0x7f0000000240)={0x0, 0x80, @start={0x0, 0x1, "b6bf2d9a4bdc717fd2635994be43e54bf3248ae80fcddf931b5a96602126e51aa7640bedd3b0fa3a99f189c20f21ffbc8565b12c6f8b54d31db3f5926ffc32475b106b9cdb19007c0f314377e863f6b1ef4c3a961257377eb6ec3378a1051db44dc5be8c8c3941d2b0c9fb7f6e3c64ee87732dbb01f61e292372f620d0080dd0e54bed7e6d86d887d7c193f681626dfbe620d4b4b13557cda661f87ac2c68d97298c9315d16d57b0bad45bce1624e81df693f0831332d6783643ce0244bcfa4f1b5e076642176f3b7600e0a9d43ad690c9e70467db260945151bdd02868a328dac914e46dc0b5f7e7baf6acbc7dea619e8caacde9c559c6f5c71ccf3869ce1892e130e155b087ebdf90bf1c90f5f81740e15e832092b79b0587d0f1edc9d6188813db8f37e1f0b93f29e879c81fc0e114765638ca52e70c98cbf10106f99688afe96c9ccffdaf1e81b8b823692ab0d8e30e54c917b8829f0207f822ea93a4a3eafd63e9df7f100b373f94eec9b91fc703e0dbf2f7657e265079c589c292d2ed65b341558116c2e85cc02e9a47462925c4c689017a527f2086a0d841492194f2c56f4c500cf6b4201bbc33c847f5449448a1c1b1c652c2aa4fb38ec015e85a9becd7bda7fe5a580bf79dcb07022c7c9c698277fa3be87b262e762236d6aecbebe7382c12a9f28c9a92b71b2da5c0a068d33be95f88b64877e8b69fb1b6663087b6a8a3032f3e34e2feb3771feb08a45328707dcd2632353491bb0aec2bf4ee1fb5643cbdc0200452c72ed8836fbf51875a73a5572f7229527664f632c3d0472a95f87a9dc3e135fb2e8cf4d599cffebc846bfdf443cf0230b3f0f4867554694c44e5e7f976eed07fc53791441718f863e6239be4d6bd6851b0e0a5a701380aca4d44afb93df70927c57905e68be28e9b33b0d6085e4663f4c39c29459a1a6aaee6cb8056c30a6a3013aae846d7888ca3f78908bd85806eaf9eeef3cde8a9c09970a49a9a755a6fedb6df6b85a3dc2743031fb36dc7503cea33170fc80782f97ae1285a6ec29970f89237b59a5d0d8e8a4df48367260f7f56f0a23eb74a0eaa2301ac6d46665e2144253e737123f4e81ff0e5a0e4464c95b8572b93ab5bbaad960918e6e1fead25ec949fb5982fd96dfaae25aaaa6030c455a4850f00fc12d83c507f681317d57a111d6d11a2a0ae31e5a730b664632db83bb24b4c3d4f67d891adb55d43b4cbaae1d1731d857c7d7baa2da379189c3e79d60796297f0dfd218077b1a2d3d6c766977ba96a7dc6c2191f40937d7a0c14f3a1e3b67a0cd0226b2e84a05da605fd54e5ad7bbf92604af35dad4b84980f45a96c481bddc2ea7c3c67a16b72d82ca58ba5df23ddcd86f860d47a4c9781ffe380c0577c693e1886c99cf6447534748a4899ba61b1570e30b8be417a29c4b131ca07996a890ebbe20043e99", "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"}, [0x8, 0x0, 0x5394, 0x9, 0x1, 0x7, 0x3f, 0x2a0c, 0x7, 0x1, 0x7, 0x7ff, 0x46e, 0x0, 0x0, 0x1000, 0xff, 0x3, 0xeb0f, 0x8, 0x2, 0x10000, 0x4f, 0x5, 0x8b, 0x8, 0x0, 0x5a3, 0x5, 0x54e, 0x57c2, 0x0, 0x5, 0x2, 0x3, 0x4, 0x100000001, 0x2815eaf1, 0x5, 0x2, 0x1f, 0x92c, 0x7, 0x7, 0x0, 0x0, 0x0, 0x9, 0x7, 0x1, 0x4, 0x8, 0x9, 0x1, 0x1ff, 0x4, 0x9, 0x6, 0x6, 0x7, 0x10001, 0x1, 0x2, 0x3f]}) socket(0x10, 0x803, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x0) io_destroy(0x0) [ 862.627210] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 862.634475] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 862.641741] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000002e [ 862.649008] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:05:04 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) socket$l2tp6(0xa, 0x2, 0x73) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:05:04 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x108) 00:05:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) ioctl$TIOCSBRK(r2, 0x5427) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @remote}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r3, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) ioctl$FS_IOC_FSGETXATTR(r3, 0x801c581f, &(0x7f0000000080)={0x8, 0x9, 0x6a1, 0x20, 0x8}) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="b700000000000000eb6a608a30650000000000000087000000000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x1, 0xb579, &(0x7f000000cf3d)=""/195}, 0x48) 00:05:04 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f00000002c0), 0xffffffffffffffff, 0x2}}, 0x18) 00:05:04 executing program 5 (fault-call:10 fault-nth:47): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:05:04 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x9f9}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x20}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000200)=0x1ff, 0x4) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) getsockopt$CAN_RAW_JOIN_FILTERS(0xffffffffffffffff, 0x65, 0x6, &(0x7f0000000080), &(0x7f0000000240)=0x4) r5 = creat(&(0x7f0000000180)='./bus\x00', 0x9) ftruncate(0xffffffffffffffff, 0x3) lseek(r5, 0x0, 0x2) r6 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x5) sendfile(r5, r6, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000680)='./bus\x00', 0x1c7) recvfrom$inet6(r4, &(0x7f0000000140)=""/7, 0x7, 0x10003, &(0x7f00000001c0)={0xa, 0x4e24, 0x9, @local, 0x71250026}, 0x1c) 00:05:04 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x101000, 0x0) setsockopt$PNPIPE_INITSTATE(r1, 0x113, 0x4, &(0x7f00000001c0), 0x4) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 863.336771] FAULT_INJECTION: forcing a failure. [ 863.336771] name failslab, interval 1, probability 0, space 0, times 0 [ 863.348031] CPU: 0 PID: 16185 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 863.355908] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 863.365254] Call Trace: [ 863.367847] dump_stack+0x1b2/0x283 [ 863.371481] should_fail.cold+0x10a/0x154 [ 863.375897] should_failslab+0xd6/0x130 [ 863.379877] __kmalloc_track_caller+0x2bc/0x400 [ 863.384546] ? kstrdup_const+0x35/0x60 [ 863.388434] ? lock_downgrade+0x740/0x740 [ 863.392579] kstrdup+0x36/0x70 [ 863.395768] kstrdup_const+0x35/0x60 [ 863.399477] alloc_vfsmnt+0xe0/0x7f0 [ 863.403185] clone_mnt+0x6c/0xff0 [ 863.406636] copy_tree+0x33e/0xa20 [ 863.410179] copy_mnt_ns+0x167/0xa30 [ 863.413896] ? create_new_namespaces+0x30/0x720 [ 863.418561] ? do_mount+0x2a00/0x2a00 [ 863.422359] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 863.427370] ? kmem_cache_alloc+0x35f/0x3c0 [ 863.431694] create_new_namespaces+0xc9/0x720 [ 863.436201] ? security_capable+0x88/0xb0 [ 863.440352] copy_namespaces+0x27b/0x310 [ 863.444409] copy_process.part.0+0x2600/0x6f00 [ 863.448988] ? get_pid_task+0xb8/0x130 [ 863.452873] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 863.457808] ? __cleanup_sighand+0x40/0x40 [ 863.462040] ? lock_downgrade+0x740/0x740 [ 863.466190] _do_fork+0x184/0xc80 [ 863.469649] ? fork_idle+0x270/0x270 [ 863.473361] ? fput+0xb/0x140 [ 863.476463] ? SyS_write+0x14d/0x210 [ 863.480173] ? SyS_read+0x210/0x210 [ 863.483795] ? SyS_clock_settime+0x1a0/0x1a0 [ 863.488196] ? do_syscall_64+0x4c/0x640 [ 863.492162] ? sys_vfork+0x20/0x20 [ 863.495704] do_syscall_64+0x1d5/0x640 [ 863.499599] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 863.504777] RIP: 0033:0x45de59 [ 863.507955] RSP: 002b:00007f98c986bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 863.515657] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 863.522918] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 863.530177] RBP: 00007f98c986bca0 R08: 0000000000000000 R09: 0000000000000000 [ 863.537454] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000002f [ 863.544721] R13: 00007ffe34e0cc1f R14: 00007f98c986c9c0 R15: 000000000118c1cc [ 863.563118] audit: type=1800 audit(1602893105.259:72): pid=16188 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="bus" dev="sda1" ino=15944 res=0 00:05:05 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) r1 = socket(0x11, 0x800000003, 0x8) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f00000000c0)=0x9, 0x8) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:05:05 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000000)=0x5, 0x4) setsockopt$inet6_int(r0, 0x29, 0x24, &(0x7f0000000040)=0xffffffff, 0x4) syz_emit_ethernet(0x4a, &(0x7f00000002c0)={@random="fdd600ceef6e", @random="21d209dc46ff", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x14, 0x3a, 0x0, @dev, @mcast2, {[], @ndisc_ns={0x87, 0x0, 0x0, @private0}}}}}}, 0x0) 00:05:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010080, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) timer_create(0x0, &(0x7f0000000440)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) r2 = gettid() ioctl$KVM_GET_SREGS(r1, 0x8138ae83, &(0x7f00000002c0)) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = syz_open_dev$rtc(&(0x7f00000001c0)='/dev/rtc#\x00', 0xe63, 0x8000) ioctl$int_out(r3, 0x2, &(0x7f0000000200)) tkill(r2, 0x40) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast2, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private1}, 0x0, @in=@multicast2}}, &(0x7f0000000140)=0xe8) ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f0000000180)={0x1000, 0x3f, {r2}, {r4}, 0x1, 0x8000}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) r5 = gettid() socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) tkill(r5, 0x1000000000016) 00:05:05 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='iocharsetcp1251,\x00']) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 863.873202] FAT-fs (loop0): Unrecognized mount option "iocharsetcp1251" or missing value 00:05:05 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0xf00}]}}}]}, 0x3c}}, 0x0) 00:05:05 executing program 5 (fault-call:10 fault-nth:48): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) [ 863.946797] FAT-fs (loop0): Unrecognized mount option "iocharsetcp1251" or missing value 00:05:05 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000000000000000000000020000030000000000000008050000000f0000000000000c050000000000"], 0x0, 0xfffffffffffffd1b}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket(0x11, 0x800000003, 0x8) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x4e20, 0x89, @local, 0x3}, {0xa, 0x4e22, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x5}, 0x400, [0x11b1, 0x6, 0x3ff, 0x20, 0x0, 0x0, 0x3f, 0x1]}, 0x5c) ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 00:05:05 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x10000, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) ioctl$SNDCTL_DSP_POST(0xffffffffffffffff, 0x5008, 0x0) [ 864.002364] audit: type=1800 audit(1602893105.700:73): pid=16218 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="bus" dev="sda1" ino=15944 res=0 [ 864.035406] print_req_error: I/O error, dev loop0, sector 0 00:05:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x403, 0xc00}, {&(0x7f0000010d00)="ed4100006f776e2135e77af7d8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x29b, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[]) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000940)=0x14) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f00000001c0)={0xa, 0x2, 0xc4}) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000005c0)={0x0, 0x2c, &(0x7f0000000580)=[@in6={0xa, 0x4e23, 0x2, @ipv4={[], [], @remote}, 0x7fffffff}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xe}}]}, &(0x7f0000000600)=0x10) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000980)={r0, @broadcast, @broadcast}, 0xc) getsockname$ax25(0xffffffffffffffff, &(0x7f0000000140)={{0x3, @netrom}, [@remote, @rose, @null, @remote, @netrom, @rose, @bcast, @netrom]}, &(0x7f00000000c0)=0x48) [ 864.171521] FAULT_INJECTION: forcing a failure. [ 864.171521] name failslab, interval 1, probability 0, space 0, times 0 [ 864.183016] CPU: 0 PID: 16231 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 864.190905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 864.200256] Call Trace: [ 864.202851] dump_stack+0x1b2/0x283 [ 864.206480] should_fail.cold+0x10a/0x154 [ 864.210628] should_failslab+0xd6/0x130 [ 864.214597] kmem_cache_alloc+0x28e/0x3c0 [ 864.218744] alloc_vfsmnt+0x23/0x7f0 [ 864.222455] clone_mnt+0x6c/0xff0 [ 864.225908] copy_tree+0x33e/0xa20 [ 864.229449] copy_mnt_ns+0x167/0xa30 [ 864.233168] ? create_new_namespaces+0x30/0x720 [ 864.237836] ? do_mount+0x2a00/0x2a00 [ 864.241633] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 864.246643] ? kmem_cache_alloc+0x35f/0x3c0 [ 864.250962] create_new_namespaces+0xc9/0x720 [ 864.255453] ? security_capable+0x88/0xb0 [ 864.259603] copy_namespaces+0x27b/0x310 [ 864.263660] copy_process.part.0+0x2600/0x6f00 [ 864.268241] ? get_pid_task+0xb8/0x130 [ 864.272126] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 864.277062] ? __cleanup_sighand+0x40/0x40 [ 864.281292] ? lock_downgrade+0x740/0x740 [ 864.285440] _do_fork+0x184/0xc80 [ 864.288888] ? fork_idle+0x270/0x270 [ 864.292599] ? fput+0xb/0x140 [ 864.295698] ? SyS_write+0x14d/0x210 [ 864.299405] ? SyS_read+0x210/0x210 [ 864.303030] ? SyS_clock_settime+0x1a0/0x1a0 [ 864.303433] EXT4-fs error (device loop2): ext4_orphan_get:1266: comm syz-executor.2: bad orphan inode 17 [ 864.307430] ? do_syscall_64+0x4c/0x640 [ 864.307441] ? sys_vfork+0x20/0x20 [ 864.307452] do_syscall_64+0x1d5/0x640 [ 864.307466] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 864.307474] RIP: 0033:0x45de59 [ 864.307478] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 864.307488] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 864.307493] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 864.307498] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 864.307503] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000030 [ 864.307508] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:05:06 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file2\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000080)={[{@rodir='rodir'}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 864.557835] FAT-fs (loop0): bogus number of reserved sectors [ 864.566750] ext4_test_bit(bit=16, block=4) = 1 [ 864.571943] FAT-fs (loop0): Can't find a valid FAT filesystem [ 864.612655] is_bad_inode(inode)=0 [ 864.618878] NEXT_ORPHAN(inode)=3407148108 [ 864.633873] max_ino=32 00:05:06 executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000001c0)={0x0, 0xffffff01}, &(0x7f0000000200)=0x8) r1 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r1, &(0x7f0000000040)='./file1\x00', 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x83) [ 864.654584] i_nlink=164 [ 864.657418] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 00:05:06 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x10000, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) ioctl$SNDCTL_DSP_POST(0xffffffffffffffff, 0x5008, 0x0) 00:05:06 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="696f63685e886d59e2806172723300000070263235312c00"]) ioctl$USBDEVFS_GETDRIVER(0xffffffffffffffff, 0x41045508, &(0x7f00000002c0)={0x1, "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"}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) mkdirat(r0, &(0x7f00000001c0)='./file1\x00', 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$KDDISABIO(r1, 0x4b37) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1/file0\x00', 0xc6a00, 0x104) 00:05:06 executing program 5 (fault-call:10 fault-nth:49): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:05:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000080)='/dev/input/mice\x00', 0x2802) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x397, &(0x7f0000000180)={0x0, 0xff90}}, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="34000000100005070000fa00000000000000001a", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c00010076657468"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="44000000100081050000000000507291450938a8", @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000b0001006970766c616e00000c000200060001000200000008000500", @ANYRES32=r5], 0x44}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r8}}, 0x20}}, 0x0) [ 864.896722] FAT-fs (loop0): Unrecognized mount option "ioch^mYarr3" or missing value [ 865.040214] FAULT_INJECTION: forcing a failure. [ 865.040214] name failslab, interval 1, probability 0, space 0, times 0 [ 865.051609] CPU: 0 PID: 16286 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 865.059499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 865.068862] Call Trace: [ 865.071451] dump_stack+0x1b2/0x283 [ 865.075082] should_fail.cold+0x10a/0x154 [ 865.079228] should_failslab+0xd6/0x130 [ 865.079232] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 865.091669] kmem_cache_alloc+0x28e/0x3c0 [ 865.095818] alloc_vfsmnt+0x23/0x7f0 [ 865.099528] clone_mnt+0x6c/0xff0 [ 865.102984] copy_tree+0x33e/0xa20 [ 865.106527] copy_mnt_ns+0x167/0xa30 [ 865.110244] ? create_new_namespaces+0x30/0x720 [ 865.114913] ? do_mount+0x2a00/0x2a00 [ 865.118711] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 865.123724] ? kmem_cache_alloc+0x35f/0x3c0 [ 865.128044] create_new_namespaces+0xc9/0x720 [ 865.132542] ? security_capable+0x88/0xb0 [ 865.136690] copy_namespaces+0x27b/0x310 [ 865.140762] copy_process.part.0+0x2600/0x6f00 [ 865.145348] ? trace_hardirqs_on+0x10/0x10 [ 865.149580] ? check_preemption_disabled+0x35/0x240 [ 865.154594] ? check_preemption_disabled+0x35/0x240 [ 865.159607] ? finish_task_switch+0x178/0x610 [ 865.164107] ? __cleanup_sighand+0x40/0x40 [ 865.168342] ? _raw_spin_unlock_irq+0x5a/0x80 [ 865.172837] ? finish_task_switch+0x14d/0x610 [ 865.177328] ? switch_mm_irqs_off+0x2d2/0xeb0 [ 865.181823] _do_fork+0x184/0xc80 [ 865.185275] ? fork_idle+0x270/0x270 [ 865.188984] ? io_schedule_timeout+0x140/0x140 [ 865.193564] ? fput+0xb/0x140 [ 865.196669] ? do_syscall_64+0x4c/0x640 [ 865.200640] ? sys_vfork+0x20/0x20 [ 865.204176] do_syscall_64+0x1d5/0x640 [ 865.208071] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 865.213382] RIP: 0033:0x45de59 [ 865.216563] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 865.224265] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 865.231526] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 865.238787] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 865.246063] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000031 [ 865.253323] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 [ 865.274619] FAT-fs (loop0): Unrecognized mount option "ioch^mYarr3" or missing value 00:05:07 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f00000003c0), 0x12) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f00000002c0)) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14) lsetxattr$trusted_overlay_origin(&(0x7f0000000300)='./file1\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x3) 00:05:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000080)='/dev/input/mice\x00', 0x2802) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x397, &(0x7f0000000180)={0x0, 0xff90}}, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="34000000100005070000fa00000000000000001a", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c00010076657468"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="44000000100081050000000000507291450938a8", @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000b0001006970766c616e00000c000200060001000200000008000500", @ANYRES32=r5], 0x44}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r8}}, 0x20}}, 0x0) 00:05:07 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f00000000c0), 0x2) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 865.541949] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 00:05:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="34000000100001040000cdcc000080ffff000000", @ANYRES32=r2, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r1, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f0000000380)={0x12c, 0x0, 0x8, 0x70bd2b, 0x9, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_REKEY_DATA={0x1c, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "da0f6513ad9c12f2"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "1c3cc44e2e3e4f2c"}]}, @NL80211_ATTR_REKEY_DATA={0x64, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "f49f68bf026b2027"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "e052f85b9abe1cbb"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "d60a2ff1a3d4a4fb"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="f10439832b76e48d992b13d5cfc7e50e"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="54ee8c7a5f40415af2b2e9ed15da265d"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="f8be5c5e66258de0ebef742f54f70ae6"}]}, @NL80211_ATTR_REKEY_DATA={0x90, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x3ff}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x81}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="e28505ad1aa733513c79079fd179038c"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x1f}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x10000}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="524913c5c13062ed8edfe12b044a4789"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="9dc31980cb968769e1d567960ab2df7d"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="6b306f35e84407c84de498a12a5236a4"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="c33fb5d950d68738a4bde4dd8011ef1b08c5da0d7b55f7d5"}]}]}, 0x12c}, 0x1, 0x0, 0x0, 0x4004851}, 0x854) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x14, 0x2, 0x0, 0x1, {{0x8}, {0x8}}}}}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x48}}, 0x0) 00:05:08 executing program 5 (fault-call:10 fault-nth:50): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:05:08 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x200, 0x0) accept$unix(r1, &(0x7f00000001c0), &(0x7f00000002c0)=0x6e) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f0000000300)={0x0, 0x0, [0xffff, 0x4, 0x1, 0x5]}) 00:05:08 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x8) bind(r1, &(0x7f0000000280)=@l2tp6={0xa, 0x0, 0x7fffffff, @private2, 0x3, 0x2}, 0x80) read$FUSE(0xffffffffffffffff, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000000c0)='./file0\x00', r4, r5) read$FUSE(0xffffffffffffffff, &(0x7f0000002640)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000004680)={0x160, 0x0, r2, [{{0x6, 0x3, 0xff, 0x7, 0x0, 0x10000, {0x5, 0x9, 0x4, 0x3, 0x4, 0x400, 0x7, 0x369, 0x8, 0x8000, 0x5af, 0xee01, 0xee01, 0x40, 0x100}}, {0x3, 0xcb26, 0xa, 0x0, '/dev/vcsa\x00'}}, {{0x3, 0x0, 0x7, 0x1f, 0x1, 0x4, {0x3, 0x100000001, 0xfffffffffffffff8, 0x949, 0xe2, 0xffff, 0x859, 0x9, 0x7ff, 0x4000, 0x0, r4, r6, 0x0, 0x1}}, {0x6, 0x2, 0xa, 0x1ff, '/dev/vcsa\x00'}}]}, 0x160) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x11ba00, 0x0) ioctl$KVM_GET_FPU(r7, 0x81a0ae8c, &(0x7f0000000300)) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e21, 0x8000000, @ipv4={[], [], @local}, 0x3}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x4b, &(0x7f00000005c0)=0x1, 0x4) sendmsg$inet6(r0, &(0x7f0000000100)={&(0x7f00000000c0)={0xa, 0x4e24, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="24000000000000002900000032000000fc00"/32, @ANYRES32=0x0, @ANYBLOB="1cd78481bc8cb3e8187e88829114a7c64f670e78f7e7820429ab411f36ecbae69da3bcf4f7c45c0288213ab2392c27502d0562e4d54537dd789b7a29c983dfc64d582807a300118e36b69f157d5fe009b99d2b57e9b4d6ea5a97a224b48de34cc7a0ac0b3ca2f28908dd122302f269897e473a3df4d8fe00"/129], 0x28}, 0x0) [ 867.096999] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 867.151477] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16358 comm=syz-executor.1 00:05:08 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="696f636861727365743d6370313235312c00e79c38dad42a2329a0cee97b707a61380a3ba42bd8770d108144315a975d0cb192de6a14cde116a957004b6aa10442791a56906b2d11808ff0dfb290048e710458b1d00e47c6"]) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000800)={0x5, 0x401, {}, {0xffffffffffffffff}, 0x401, 0x6}) setuid(r1) write$vhost_msg(0xffffffffffffffff, &(0x7f00000006c0)={0x1, {&(0x7f0000000540)=""/97, 0x61, &(0x7f00000005c0)=""/232, 0x3, 0x1}}, 0x48) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) listxattr(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000740)=""/177, 0xb1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000480)={0xffffffffffffffff, 0x0, 0x6e, 0x90, &(0x7f00000001c0)="c80ca2cc14882f0ce7032bf7b70ee881738fc8da3bc351d0fa98cdfd1d6ddaab3fd8d7f43f322b788c5aa43e3398b815de8d5bba8eb844b853932c67a07f2588e90b484b3ee65df3ed6fda7e9c00b124db6c710c298a380a65491197e06a2dc85471dbe77a226d92331225f9c29a", &(0x7f00000002c0)=""/144, 0x9, 0x0, 0x27, 0xfb, &(0x7f00000000c0)="05544827ef09d49d881590735c850497cf39a08b92bd1a71d8c08c2aa3784148e6177a6514f435", &(0x7f0000000380)="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"}, 0x40) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x40) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) syz_open_procfs(r2, &(0x7f0000000840)='net/ptype\x00') [ 867.224517] FAULT_INJECTION: forcing a failure. [ 867.224517] name failslab, interval 1, probability 0, space 0, times 0 [ 867.236597] CPU: 0 PID: 16362 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 867.244580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 867.253942] Call Trace: [ 867.256531] dump_stack+0x1b2/0x283 [ 867.260162] should_fail.cold+0x10a/0x154 [ 867.264313] should_failslab+0xd6/0x130 [ 867.268294] kmem_cache_alloc+0x28e/0x3c0 [ 867.272442] alloc_vfsmnt+0x23/0x7f0 [ 867.276153] clone_mnt+0x6c/0xff0 [ 867.279603] copy_tree+0x33e/0xa20 [ 867.283143] copy_mnt_ns+0x167/0xa30 [ 867.286855] ? create_new_namespaces+0x30/0x720 [ 867.291524] ? do_mount+0x2a00/0x2a00 [ 867.295320] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 867.300332] ? kmem_cache_alloc+0x35f/0x3c0 [ 867.304664] create_new_namespaces+0xc9/0x720 [ 867.309152] ? security_capable+0x88/0xb0 [ 867.313296] copy_namespaces+0x27b/0x310 [ 867.317355] copy_process.part.0+0x2600/0x6f00 [ 867.321935] ? get_pid_task+0xb8/0x130 [ 867.325817] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 867.330751] ? __cleanup_sighand+0x40/0x40 [ 867.334986] ? lock_downgrade+0x740/0x740 [ 867.339142] _do_fork+0x184/0xc80 [ 867.342601] ? fork_idle+0x270/0x270 [ 867.346312] ? fput+0xb/0x140 [ 867.349411] ? SyS_write+0x14d/0x210 [ 867.353122] ? SyS_read+0x210/0x210 [ 867.356745] ? do_syscall_64+0x4c/0x640 [ 867.360712] ? sys_vfork+0x20/0x20 [ 867.364246] do_syscall_64+0x1d5/0x640 [ 867.368134] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 867.373318] RIP: 0033:0x45de59 [ 867.376500] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 867.384202] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 867.391466] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 867.398727] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 867.405994] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000032 [ 867.413257] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:05:09 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="696f6380617f73658c3d6370313235312c00"]) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) connect$nfc_llcp(r1, &(0x7f0000000580)={0x27, 0x1, 0x1, 0x7, 0x57, 0x0, "f1cd801d8ea648f3e0dabbbff791a921717da68cafe11f51b91d5434b80c6cd7fbd9079cf7f2de52b9156777086db3e33570ae02ea1bf20e0e90f69f0da86a", 0x23}, 0x60) [ 867.542820] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 867.558014] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16350 comm=syz-executor.1 [ 867.584833] print_req_error: I/O error, dev loop0, sector 0 00:05:09 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0xb, 0x0, 0x0, 0x1049003, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000186000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f00007a3000/0x2000)=nil) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0x40, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)={0x14, r3, 0x711, 0x0, 0x0, {0x8}}, 0x14}}, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x30, r3, 0x400, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_HARD_IFINDEX={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r1, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x60, 0x1411, 0x1, 0x70bd25, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_RES_MRN={0x8, 0x3e, 0x4}, @RDMA_NLDEV_ATTR_STAT_COUNTER_ID={0x8, 0x4f, 0x3}, @RDMA_NLDEV_ATTR_RES_MRN={0x8, 0x3e, 0xc}, @RDMA_NLDEV_ATTR_STAT_RES={0x8, 0x4b, 0x3b}, @RDMA_NLDEV_ATTR_STAT_RES={0x8, 0x4b, 0x9}, @RDMA_NLDEV_ATTR_STAT_RES={0x8, 0x4b, 0x1a}, @RDMA_NLDEV_ATTR_STAT_RES={0x8, 0x4b, 0x28}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x2}, @RDMA_NLDEV_ATTR_STAT_MODE={0x8}, @RDMA_NLDEV_ATTR_RES_MRN={0x8, 0x3e, 0x4}]}, 0x60}, 0x1, 0x0, 0x0, 0x4800}, 0x25055c08768376c5) bind(0xffffffffffffffff, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000004c0)={0x0, 0x1}, &(0x7f0000000540)=0x8) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x60fe01, 0x8) r5 = gettid() pipe(&(0x7f0000000440)={0xffffffffffffffff}) ioctl$TUNSETSNDBUF(r6, 0x400454d4, &(0x7f0000000480)=0xd5d) process_vm_writev(r5, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x3de, &(0x7f0000c22fa0)=[{&(0x7f0000000040)=""/15, 0x2d77744}], 0x1, 0x0) r7 = dup2(r4, r0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r7, &(0x7f0000000100)="972156d3b296299e9755f7aa77cca56083a34c7d2ec17f7f03d9ece4722addd3106e0b4bd606910b83e5dc2d5a2914e7e05cae67d793a44a5a91aee04732092b65057cf01f0abfcb3e3e7222551cf6ec6617537f08bd383e771a00bddf54485e9f509059bbe9529984801f945e66a8e337c621a094133f64e80b37b3eab49425fbb27484b4de8c556ff5c4f6f1386e829e24ffeb147c4d0c26897fa7062931cc2d0909254e80055fecbf2b5853e91e0c5c4c8397d7b80d5e"}, 0x20) [ 867.585961] FAT-fs (loop0): Unrecognized mount option "iocase=cp1251" or missing value 00:05:09 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="34000000100001040000cdcc000080ffff000000", @ANYRES32=r2, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r1, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f0000000380)={0x12c, 0x0, 0x8, 0x70bd2b, 0x9, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_REKEY_DATA={0x1c, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "da0f6513ad9c12f2"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "1c3cc44e2e3e4f2c"}]}, @NL80211_ATTR_REKEY_DATA={0x64, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "f49f68bf026b2027"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "e052f85b9abe1cbb"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "d60a2ff1a3d4a4fb"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="f10439832b76e48d992b13d5cfc7e50e"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="54ee8c7a5f40415af2b2e9ed15da265d"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="f8be5c5e66258de0ebef742f54f70ae6"}]}, @NL80211_ATTR_REKEY_DATA={0x90, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x3ff}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x81}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="e28505ad1aa733513c79079fd179038c"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x1f}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x10000}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="524913c5c13062ed8edfe12b044a4789"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="9dc31980cb968769e1d567960ab2df7d"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="6b306f35e84407c84de498a12a5236a4"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="c33fb5d950d68738a4bde4dd8011ef1b08c5da0d7b55f7d5"}]}]}, 0x12c}, 0x1, 0x0, 0x0, 0x4004851}, 0x854) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x14, 0x2, 0x0, 0x1, {{0x8}, {0x8}}}}}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x48}}, 0x0) [ 867.689190] FAT-fs (loop0): Unrecognized mount option "iocase=cp1251" or missing value [ 867.713859] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 00:05:09 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000180)=0x2032, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r2 = socket$packet(0x11, 0x3, 0x300) copy_file_range(r2, &(0x7f0000000140)=0x9, r0, &(0x7f00000001c0)=0x6, 0x8, 0x0) poll(&(0x7f0000000040)=[{r2}], 0x1, 0x100) dup2(r1, r2) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000140), 0x0, 0x20008004) [ 867.736381] print_req_error: I/O error, dev loop0, sector 0 00:05:09 executing program 0: r0 = syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xaaaaaaaaaaaabb9, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x1038003, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000140)) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 867.763924] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16397 comm=syz-executor.1 00:05:09 executing program 5 (fault-call:10 fault-nth:51): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:05:09 executing program 1: bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, 0x0) mlockall(0x1) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000080), 0x4) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f00003b5000/0x800000)=nil, 0x801100, 0x0, 0x0, 0x0, 0x2) [ 868.109762] FAULT_INJECTION: forcing a failure. [ 868.109762] name failslab, interval 1, probability 0, space 0, times 0 [ 868.121218] CPU: 1 PID: 16417 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 868.129125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 868.138478] Call Trace: [ 868.141088] dump_stack+0x1b2/0x283 [ 868.144831] should_fail.cold+0x10a/0x154 [ 868.148979] should_failslab+0xd6/0x130 [ 868.152951] kmem_cache_alloc+0x28e/0x3c0 [ 868.157093] alloc_vfsmnt+0x23/0x7f0 [ 868.160801] clone_mnt+0x6c/0xff0 [ 868.164254] copy_tree+0x33e/0xa20 [ 868.167800] copy_mnt_ns+0x167/0xa30 [ 868.171515] ? create_new_namespaces+0x30/0x720 [ 868.176180] ? do_mount+0x2a00/0x2a00 [ 868.179978] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 868.184997] ? kmem_cache_alloc+0x35f/0x3c0 [ 868.189322] create_new_namespaces+0xc9/0x720 [ 868.193816] ? security_capable+0x88/0xb0 [ 868.197968] copy_namespaces+0x27b/0x310 [ 868.202027] copy_process.part.0+0x2600/0x6f00 [ 868.206616] ? get_pid_task+0xb8/0x130 [ 868.210507] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 868.215445] ? __cleanup_sighand+0x40/0x40 [ 868.219683] ? lock_downgrade+0x740/0x740 [ 868.223834] _do_fork+0x184/0xc80 [ 868.227284] ? fork_idle+0x270/0x270 [ 868.230999] ? fput+0xb/0x140 [ 868.234103] ? SyS_write+0x14d/0x210 [ 868.237809] ? SyS_read+0x210/0x210 [ 868.241433] ? SyS_clock_settime+0x1a0/0x1a0 [ 868.245839] ? do_syscall_64+0x4c/0x640 [ 868.249809] ? sys_vfork+0x20/0x20 [ 868.253779] do_syscall_64+0x1d5/0x640 [ 868.257673] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 868.262857] RIP: 0033:0x45de59 [ 868.266046] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 868.273748] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 868.281016] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 868.288292] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 868.295554] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000033 [ 868.302820] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:05:10 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000180)=0x2032, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r2 = socket$packet(0x11, 0x3, 0x300) copy_file_range(r2, &(0x7f0000000140)=0x9, r0, &(0x7f00000001c0)=0x6, 0x8, 0x0) poll(&(0x7f0000000040)=[{r2}], 0x1, 0x100) dup2(r1, r2) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000140), 0x0, 0x20008004) 00:05:10 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='iocharset=cp1,\x00']) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f00000000c0), 0x4) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:05:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000000, 0x100000001}, 0x0, 0x0, 0x0, 0x3, 0xbc81}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000080), 0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) getpid() dup2(r0, r1) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x3, 0x0) 00:05:10 executing program 5 (fault-call:10 fault-nth:52): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) [ 868.785410] FAT-fs (loop0): IO charset cp1 not found [ 868.828342] print_req_error: I/O error, dev loop0, sector 1 [ 868.834181] Buffer I/O error on dev loop0, logical block 1, async page read [ 868.844405] print_req_error: I/O error, dev loop0, sector 2 [ 868.850149] Buffer I/O error on dev loop0, logical block 2, async page read [ 868.857567] print_req_error: I/O error, dev loop0, sector 3 [ 868.863282] Buffer I/O error on dev loop0, logical block 3, async page read [ 868.870559] print_req_error: I/O error, dev loop0, sector 4 [ 868.876359] Buffer I/O error on dev loop0, logical block 4, async page read [ 868.883558] print_req_error: I/O error, dev loop0, sector 5 [ 868.889339] Buffer I/O error on dev loop0, logical block 5, async page read [ 868.896622] print_req_error: I/O error, dev loop0, sector 6 [ 868.902334] Buffer I/O error on dev loop0, logical block 6, async page read [ 868.910367] print_req_error: I/O error, dev loop0, sector 7 [ 868.916204] Buffer I/O error on dev loop0, logical block 7, async page read 00:05:10 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) syz_emit_ethernet(0x22, &(0x7f0000000780)={@local, @local, @val={@void}, {@can={0xc, {{0x4, 0x1}, 0x8, 0x2, 0x0, 0x0, "d2371ea98f201f08"}}}}, 0x0) socket(0x1d, 0x6, 0x6) 00:05:10 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0xa000, 0x0) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f00000001c0)={0x1, "af028834fcf9ced0603f00", 0x1, 0x9c, 0x2, 0xff06ff, 0x0, 0x2}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, &(0x7f0000000100)=""/75, &(0x7f0000000180)=0x4b) [ 868.941459] FAT-fs (loop0): IO charset cp1 not found 00:05:10 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)=ANY=[]) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 869.077790] FAULT_INJECTION: forcing a failure. [ 869.077790] name failslab, interval 1, probability 0, space 0, times 0 [ 869.089906] CPU: 0 PID: 16458 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 869.097799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 869.107149] Call Trace: [ 869.109733] dump_stack+0x1b2/0x283 [ 869.113359] should_fail.cold+0x10a/0x154 [ 869.117506] should_failslab+0xd6/0x130 [ 869.121475] __kmalloc_track_caller+0x2bc/0x400 [ 869.126139] ? kstrdup_const+0x35/0x60 [ 869.130026] ? lock_downgrade+0x740/0x740 [ 869.134168] kstrdup+0x36/0x70 [ 869.137357] kstrdup_const+0x35/0x60 [ 869.141068] alloc_vfsmnt+0xe0/0x7f0 [ 869.143551] FAT-fs (loop0): Unrecognized mount option "vfat" or missing value [ 869.144776] clone_mnt+0x6c/0xff0 [ 869.144791] copy_tree+0x33e/0xa20 [ 869.144806] copy_mnt_ns+0x167/0xa30 [ 869.144819] ? create_new_namespaces+0x30/0x720 [ 869.144830] ? do_mount+0x2a00/0x2a00 [ 869.171192] ? rcu_read_lock_sched_held+0x16c/0x1d0 00:05:10 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400026d0100020155f543b508b3781fdcfd7533c5bea0cbe325ba138161f07357de3a9d9ed2d8952b0ad6bb9784dc5505000000cd25f284e9806d88713ed9", 0x49}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 869.176207] ? kmem_cache_alloc+0x35f/0x3c0 [ 869.180532] create_new_namespaces+0xc9/0x720 [ 869.185023] ? security_capable+0x88/0xb0 [ 869.189184] copy_namespaces+0x27b/0x310 [ 869.193248] copy_process.part.0+0x2600/0x6f00 [ 869.197828] ? get_pid_task+0xb8/0x130 [ 869.201715] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 869.206646] ? __cleanup_sighand+0x40/0x40 [ 869.210885] ? lock_downgrade+0x740/0x740 [ 869.215036] _do_fork+0x184/0xc80 [ 869.218491] ? fork_idle+0x270/0x270 [ 869.222203] ? fput+0xb/0x140 00:05:10 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e0995d4c27ff73652640264e69b21703d3b4bf337292", 0x18, 0x600}, {0x0, 0x0, 0x1}], 0x4040, &(0x7f00000004c0)=ANY=[@ANYBLOB="696f636861725e00743d6370313235312c008e4dbec36e6c7903fe49527a953ec8e34b796473da5409d1cc4108c1ca2364950a3ee50bcd4ac35f6cee365950f6b705d77163fb6fcbef798e3ed9a41e675d2d6e48c6191b246cc14e23c3d8140c12023cf34273b3091d4a02a491ada97848dd3aefc2e22efd42fbf0923b23144c60dde49f0c43e38759b8e2282ea0d2a2fe4f9b2aa4895d060f5de0d10b9853a7e78553f95fd272b65d68933d38b9f5219c34f4add32b295f53b025787b1f3e572f57"]) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(0xffffffffffffffff, &(0x7f0000000080)={0xc, 0x8, 0xfa00, {&(0x7f00000002c0)}}, 0x10) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f00000000c0)={r0, 0x5, 0xa5, 0xcf14}) write$P9_RREMOVE(r1, &(0x7f00000001c0)={0x7, 0x7b, 0x1}, 0x7) [ 869.225308] ? SyS_write+0x14d/0x210 [ 869.229021] ? SyS_read+0x210/0x210 [ 869.232646] ? SyS_clock_settime+0x1a0/0x1a0 [ 869.237053] ? do_syscall_64+0x4c/0x640 [ 869.241024] ? sys_vfork+0x20/0x20 [ 869.244564] do_syscall_64+0x1d5/0x640 [ 869.248459] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 869.253643] RIP: 0033:0x45de59 [ 869.256824] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 869.264527] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 869.271799] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 869.279066] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 869.286328] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000034 [ 869.293591] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:05:11 executing program 0: sendmsg$RDMA_NLDEV_CMD_STAT_SET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0x18, 0x1410, 0x4, 0x70bd26, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_STAT_MODE={0x8}]}, 0x18}, 0x1, 0x0, 0x0, 0x24000012}, 0x80) r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="696f0000000003008606000000200000000000000000001324a9dc86111908296154d88e4b3147a8b71c9fbb63f9a1e3349d0e69d43d73876671f94f43c2263d1a87f31e4219b301849615570602144a8187d33ad41b809ceebe0dbb69e6440700000054fc3b6bd363c3cbdc33b9d103e9e824dc20d618fd65a0abe0a195189c714da1eff37390ce83b13b93b94ae57d1480369091dad0ceeab4f8e1d843fb197a7c9334c69b61d27eed39c6205d0a968d017f6ae8a3129e734bdb8423422c719a0000"]) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 869.407266] can: request_module (can-proto-6) failed. [ 869.426457] can: request_module (can-proto-6) failed. [ 869.449392] FAT-fs (loop0): Unrecognized mount option "io" or missing value 00:05:11 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) rmdir(&(0x7f0000000200)='./file1\x00') setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file1\x00', 0x8, 0x3) r1 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f00000005c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}, {&(0x7f0000001340)="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", 0x1000, 0x1}, {&(0x7f00000002c0)="e425746a2e5dfaee7000acf83bfe387f62aa63661d0e88079eed350abbddcaa5093844785fc05660d81d9b0acf84947292b78d5a50ad65fa975977f8c302fb8450c9d29bc68add3e8dc1c2457d7d", 0x4e, 0x8}, {&(0x7f0000000340)="b21be4567766092a8b6381c0223141ee9f30cf8f1d31903097d875782e4063775b1cbb910bf83a04abd16a047e0108e7e2da73ea1c489e74ac9edffb6196c8c1038c40037e71d410cd4907c9872dbc41948db344ca588d00d7a9fdee1d9314f1f6465d3d6e2544b05a8520a34197077cc167cc3745e8bba4954705b062", 0x7d, 0x80}, {&(0x7f00000004c0)="2c7ef39139b7746236db9cf335656a7789ba691027cefe2542df23fe5ffee9049b77993fe54079d29fc5d49402c5fb26dd8b97f710ca059fefba3a955b85496f797f0c9b0749ee42221b86de055291c10bfe99a94c645e47ea17027bfce58403f4185c31beab10cd054a532e6e4d21521248b89dd1381893c9e1522250b8ec54cd96cb18d491773d12802df928d5ec7485ba136c1908599b0d1361c470d787ef64058220eb4b789ce577af6752be03fb8a921f8a0ace1badd8c8b4f0ceef7a66dd3f549004a191f5232646f53e", 0xcd, 0x400}, {&(0x7f00000003c0)="0e1416a6ad0929ed4029b45a5c0c8a7bde6e3d332848ff6f20aaf53eaf900ed81ca3da62cbb35f44a6b718da83f914b96512afd40e291606e0dc60d00ad614a525e8d4f68c69d9740fc6e6072209d844e4181b5c881084e4d7c0460f21aef3610b7e0a0d55986dd496518f2c1f81c5d30b67943db8e2a249418f43726bba5a72e3a32a03bdc68066f7587ba63cc7f3b2d5bfccf344053010b90d1e977aec5b5e447cc0133773bdc2f5f062a0b10782f7ad83c226dc40925165e48fcccf4b7b7e", 0xc0}], 0x0, &(0x7f0000000080)={[{@shortname_mixed='shortname=mixed'}]}) mkdirat(r1, &(0x7f0000000040)='./file1\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000680)={0x3, 0x9, 0x1, 'queue1\x00', 0x5}) 00:05:11 executing program 1: sendmsg$NL80211_CMD_FLUSH_PMKSA(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", ""]}, 0x14}}, 0x84) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000140)={[0x1ff]}, 0x8, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_SET_KEY(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)={0x24, r4, 0x172ba168118a5975, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_KEY_IDX={0x5}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_SET_WOWLAN(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x100, 0x70bd29, 0x25dfdbfc, {{}, {@void, @val={0x8, 0x3, r3}, @void}}}, 0x1c}, 0x1, 0x0, 0x0, 0x4008000}, 0xf4) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000004c000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000001c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e78b3dd460810421", 0x21, 0x4e0}], 0x0, &(0x7f0000000240)={[{@dioread_lock='dioread_lock'}]}) 00:05:11 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) syz_emit_ethernet(0x22, &(0x7f0000000780)={@local, @local, @val={@void}, {@can={0xc, {{0x4, 0x1}, 0x8, 0x2, 0x0, 0x0, "d2371ea98f201f08"}}}}, 0x0) socket(0x1d, 0x6, 0x6) 00:05:11 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180)='nl80211\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_JOIN_OCB(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB='\t\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="210000000000000000006c00000008000300", @ANYRES32=r1, @ANYBLOB="080026009909000008009f00000000000800a100ea070000"], 0x34}}, 0x0) [ 869.601461] can: request_module (can-proto-6) failed. 00:05:11 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ttyS3\x00', 0x0, 0x0) prctl$PR_SVE_SET_VL(0x32, 0x2ca67) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000600)=0x14) [ 869.621900] FAT-fs (loop0): invalid media value (0x48) [ 869.640230] FAT-fs (loop0): Can't find a valid FAT filesystem 00:05:11 executing program 5 (fault-call:10 fault-nth:53): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:05:11 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(0xffffffffffffffff, 0xae45, 0x6) pipe2(0x0, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0xf88d443731e27508) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB]) mkdir(&(0x7f00000002c0)='./file1\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=.']) write$FUSE_STATFS(0xffffffffffffffff, &(0x7f0000005e40)={0x60, 0xffffffffffffffda, 0x0, {{0x3, 0x80000001, 0x5, 0x400000, 0x5, 0x3, 0x80000000, 0x2}}}, 0x60) connect$inet(0xffffffffffffffff, 0x0, 0x0) chdir(&(0x7f00000001c0)='./bus\x00') rename(&(0x7f0000000380)='./file0\x00', &(0x7f0000000440)='./bus/file0\x00') r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) sendmsg$nl_route_sched(r0, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000240)={&(0x7f0000000540)=@newtfilter={0x58c4, 0x2c, 0x2, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x8, 0xc}, {0x0, 0x3}, {0x10, 0x1ffc6}}, [@filter_kind_options=@f_rsvp={{0x9, 0x1, 'rsvp\x00'}, {0x587c, 0x2, [@TCA_RSVP_SRC={0x8, 0x3, @multicast1}, @TCA_RSVP_CLASSID={0x8, 0x1, {0x2, 0xc}}, @TCA_RSVP_ACT={0x24c, 0x6, [@m_bpf={0xbc, 0x1c, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x10, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_NAME={0xa, 0x6, './bus\x00'}]}, {0x86, 0x6, "6b1458063b5e9197f5e9c337a8275a374468eea62b68c503e792ec09066b33c255ad1b172832fd7fcb52326b518884ca6d01937f2f4b77db399c047b3f40d925f699f86516f6ca91a15fd832fe2695136f43d33f8807aa4aa966f8d4a4a7488031740e99ada7636367787d844579c8073def906163a5289419edb7a0a3747eb34b69"}, {0xc}, {0xc, 0x8, {0x8f4a7384b5f57da7, 0x1}}}}, @m_vlan={0x58, 0x7, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x88a8}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x9563, 0x4, 0x10000000, 0x3ff, 0x7df}, 0x3}}]}, {0x5, 0x6, "c7"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1, 0x3}}}}, @m_vlan={0x134, 0x20, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0xb0, 0x2, 0x0, 0x1, [@TCA_VLAN_PARMS={0x1c, 0x2, {{0x5b5d, 0x7, 0x4, 0x0, 0x2}, 0x1}}, @TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x940}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x7, 0xe2, 0x4, 0x0, 0x6}, 0x2}}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x88a8}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x3}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x10001, 0x7, 0x10000000, 0x79, 0x41}, 0x3}}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x9, 0x401, 0xffffffffffffffff, 0xffffffff, 0x2}, 0x3}}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x20, 0x2, 0x0, 0x8, 0x50}, 0x1}}]}, {0x5a, 0x6, "b87c540bd0568ecedf56947d247185ef28f08a5c91639559182126ee994ec88ada6b8d162a7c05ab46faa9c45442a6bcd26bc91a2b11d00deb27e6e4f96857de20d0165ebe01d7c7f0151c3fbecbf36997cee82695e5"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x2, 0x1}}}}]}, @TCA_RSVP_SRC={0x8, 0x3, @rand_addr=0x64010101}, @TCA_RSVP_SRC={0x8, 0x3, @dev={0xac, 0x14, 0x14, 0x27}}, @TCA_RSVP_ACT={0x2d4, 0x6, [@m_nat={0x17c, 0x1f, 0x0, 0x0, {{0x8, 0x1, 'nat\x00'}, {0xcc, 0x2, 0x0, 0x1, [@TCA_NAT_PARMS={0x28, 0x1, {{0xb83c, 0x101, 0x8, 0x6, 0x5}, @empty, @dev={0xac, 0x14, 0x14, 0x1d}, 0xffffffff}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x9, 0xffff, 0x7, 0x2, 0x6}, @empty, @local, 0xff000000, 0x1}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x7, 0xd87, 0x1, 0xfe, 0x73a4abde}, @dev={0xac, 0x14, 0x14, 0x3b}, @empty, 0x0, 0x1}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x5, 0xfffffff7, 0x30000000, 0x52d8, 0x5}, @multicast1, @empty, 0x0, 0x1}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x7, 0x2, 0x0, 0x7f}, @local, @broadcast, 0xff000000}}]}, {0x89, 0x6, "741983263028745f7fe6049e73be7f0be0ca52a5fc2110f087b8e039aec669a831d10434ef9873a3988c399e766e2142e470847b7670ad7913a39be972b15d3fdc6698c78796d8d67a015d84f68c5d296128b934580bfb9ef6b6affebbed5af5e60a5d214353c211a24d69a2689d1119295459aa81687a326aebd3939202457b41bbf00af7"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x3, 0x2}}}}, @m_tunnel_key={0x154, 0x1e, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x70, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_DST={0x14, 0x6, @empty}, @TCA_TUNNEL_KEY_ENC_IPV4_SRC={0x8, 0x3, @multicast2}, @TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0x5, @private2={0xfc, 0x2, [], 0x1}}, @TCA_TUNNEL_KEY_ENC_KEY_ID={0x8, 0x7, 0x3ff}, @TCA_TUNNEL_KEY_ENC_IPV4_SRC={0x8, 0x3, @local}, @TCA_TUNNEL_KEY_ENC_KEY_ID={0x8, 0x7, 0x8001}, @TCA_TUNNEL_KEY_ENC_IPV4_DST={0x8, 0x4, @private=0xa010101}, @TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0x5, @private0}, @TCA_TUNNEL_KEY_ENC_KEY_ID={0x8, 0x7, 0x2}]}, {0xb5, 0x6, "413b617fdd716246003ed31d81bdcc8e88dbbfc9abbebc3dcb0a36866c4b263af05e7e83318115b5c3e7fd3122ef2057ec14fea3750405eb52d5a96f11c598ab4d812edad9172a559c45eedf178b3b93aac204951b04c5b2013b294d6b47a6c31a2c8f89f53d848808e35778df546c46dc87e205f9260e825eb53f39802bdf87fbe5e2156636de37faca8bec2fc77dc919bce11ecd6f534e266e36dcd3cd6b414faaf5db646a75e8e52c55eb5f5aafdd64"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x3, 0x1}}}}]}, @TCA_RSVP_ACT={0x5338, 0x6, [@m_connmark={0xf0, 0xe, 0x0, 0x0, {{0xd, 0x1, 'connmark\x00'}, {0x90, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x4, 0xffffffff, 0x10000000, 0x2, 0xfffffffc}, 0x8001}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x3f, 0x7f, 0x4, 0x4, 0x401}}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x1, 0x6, 0x6, 0x6, 0x7}, 0x6}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0xffffffff, 0x6, 0x2, 0x10001, 0x9}, 0x9}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x3f, 0x3, 0x5, 0x3, 0x3}, 0x5}}]}, {0x33, 0x6, "d7c8e3d46a9d90e53ac148ae2dbe740fd1448c49b4bd0926421d0ad702c85f49c464ec8bd188599b4591ff3886adc8"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1, 0x3}}}}, @m_ct={0xcc, 0x20, 0x0, 0x0, {{0x7, 0x1, 'ct\x00'}, {0x38, 0x2, 0x0, 0x1, [@TCA_CT_NAT_IPV4_MAX={0x8, 0xa, @empty}, @TCA_CT_ZONE={0x6, 0x4, 0x6d}, @TCA_CT_ACTION={0x6, 0x3, 0xa}, @TCA_CT_LABELS={0x14, 0x7, "9676e48dfeebf1158628638675f82d28"}, @TCA_CT_ZONE={0x6, 0x4, 0x16aa}]}, {0x6d, 0x6, "12f90d0dc034484c144d1ef5644f43ae716926ef1343d7ae3d6830d2ae159726535d4d0d92044ce2abdf6875cc36f3ac2cedf18820288a52d3b9c04648909d184692b04386d5d27e4e8da4fdccf1f8772f2c54dfe6caaa478ee2a3dff004f9dd9ed2d2d5b8ef66c2e2"}, {0xc}, {0xc, 0x8, {0x2, 0x3}}}}, @m_sample={0x1038, 0x18, 0x0, 0x0, {{0xb, 0x1, 'sample\x00'}, {0xc, 0x2, 0x0, 0x1, [@TCA_SAMPLE_TRUNC_SIZE={0x8, 0x4, 0x1a51}]}, {0x1004, 0x6, "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"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x3}}}}, @m_ipt={0x194, 0xb, 0x0, 0x0, {{0x8, 0x1, 'ipt\x00'}, {0xf0, 0x2, 0x0, 0x1, [@TCA_IPT_TARG={0xbe, 0x6, {0x7, 'raw\x00', 0x4e, 0x400, "73696ec802ef1f569624cf45bac1c3ba56e7de3033c7289fe8971ca6215731dc0de5568837791250eac77749ea1671c60dc8528b9481aa9640da78a3fa54e1221cab23c1e8a8c69d87211d805aec860fc42a8ae033be9404952767002d96e72217f38056be6e2ce2dc3e48ca4daa624b6446e7868eb43b2cc136949fe1d0a9efa4b13b2c42b56c88866591259dfaa755cece9c9c"}}, @TCA_IPT_HOOK={0x8, 0x2, 0x1}, @TCA_IPT_TABLE={0x24, 0x1, 'raw\x00'}]}, {0x7f, 0x6, "f27894423b4daae34fe8f6243e0c5699ef4963aaa2dac3742dabdc872bb59884e7882dc16bd0bf95ec51bff9fc7e44d5672db9853f4348d65cbb7e18e49d495d2ab678c83cdfd3ab217e1b15a4572999124442967ff95c9b4e6379cc0c273dd8af69a01eb183789ab1cc26de92ac38334c91322401a2c15f5069bc"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2}}}}, @m_csum={0x1068, 0x1d, 0x0, 0x0, {{0x9, 0x1, 'csum\x00'}, {0x3c, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0xf5af, 0x8, 0x3, 0x9, 0x4}, 0x27}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x6, 0x1, 0x20000000, 0x0, 0x6e56}, 0x47}}]}, {0x1004, 0x6, "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"}, {0xc}, {0xc, 0x8, {0x2, 0x1}}}}, @m_ife={0x103c, 0x11, 0x0, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x14, 0x2, 0x0, 0x1, [@TCA_IFE_TYPE={0x6}, @TCA_IFE_TYPE={0x6, 0x5, 0x2}]}, {0x1004, 0x6, "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"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2}}}}, @m_pedit={0x1f08, 0x7, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x1e50, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0xec, 0x5, 0x0, 0x1, [{0xc, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}]}, {0x34, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}]}, {0xc, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}]}, {0xc, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}]}, {0xc, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}]}, {0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}]}, {0xc, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}]}, {0xc, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}]}, {0x34, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x4}]}, {0x24, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0xbdabb4faf06379c3}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}]}]}, @TCA_PEDIT_PARMS={0xe80, 0x2, {{{0x2d3, 0x6, 0x30000000, 0x0, 0x400}, 0x0, 0x7f, [{0x8, 0x9, 0x2, 0x2, 0x100, 0x7}, {0x3b8, 0x1f, 0xffffffff, 0x6, 0x0, 0x1}, {0xcc, 0x401, 0x5, 0xffff, 0x58f0, 0xffff}, {0x473, 0x3c, 0x40, 0x6, 0x200, 0x7}]}, [{0x7, 0x7ff, 0x0, 0x200, 0xee5b, 0x9}, {0x2, 0x3, 0x3, 0x2, 0x401, 0x8000}, {0x9, 0x6, 0x8, 0x72, 0x8, 0x9}, {0xcfa, 0x1000, 0x1, 0x0, 0x81, 0x5}, {0xba44, 0x3, 0x4, 0x2, 0x6, 0x101}, {0x40, 0x6, 0x9, 0x7, 0x400, 0xfff}, {0x1, 0x5, 0x0, 0x3, 0x0, 0xffff}, {0x8, 0x7fffffff, 0x3, 0x9, 0xffffffff, 0x6}, {0x0, 0x4, 0x7f, 0xfffffffd, 0x3, 0x9}, {0xfcd, 0xffff, 0x5, 0xea6f, 0x10000, 0xc1}, {0x8, 0x0, 0x5, 0xac7f, 0x6, 0x80000001}, {0x1f, 0x80000001, 0x4, 0x80, 0x8, 0x8001}, {0x0, 0x10000, 0x1, 0x9, 0x100, 0x6}, {0x8, 0x5, 0xffffffff, 0x0, 0x70, 0x7}, {0x8001, 0x7ff, 0x7, 0xfff, 0x2, 0xfffff000}, {0xc08, 0x101, 0x81, 0x80000000, 0x7, 0xfffffffe}, {0x5738, 0x9, 0x2, 0x3f, 0x9, 0x8000}, {0xfd0, 0x6, 0x1, 0x3ff, 0x3, 0xd9a}, {0x810, 0xf41c, 0x24a, 0x9, 0xffffff7a, 0xffffffff}, {0x7, 0xfff, 0x101, 0x8, 0x0, 0x486}, {0x100, 0x4, 0x714, 0x9, 0x3, 0x7}, {0x3, 0x0, 0x9, 0x8, 0x0, 0x800}, {0x40, 0x7fff, 0xfffffffa, 0x9, 0x8, 0x6}, {0x8, 0xdaf2, 0x1, 0x8, 0x4, 0xf26}, {0x6, 0x1ff, 0x57c48a84, 0x8000, 0xe7, 0x40e3a96}, {0x9, 0x0, 0xdb24, 0x3, 0x3, 0x101}, {0x2, 0x7, 0xff, 0x100, 0x1, 0x8}, {0x10, 0x2, 0xfffffffa, 0x1, 0x9, 0x4}, {0x5, 0x8, 0x52a, 0x5, 0xcde, 0x4c4a}, {0xca4, 0x7, 0x3, 0x3, 0x100, 0x1}, {0x1, 0x10000, 0x5, 0x80000001, 0x8305, 0x25f8}, {0x0, 0x9, 0x7, 0x1, 0x54, 0x6473}, {0x1, 0x4, 0xb25, 0xfd7, 0x0, 0x85}, {0x6, 0x5, 0x8, 0x4, 0x39}, {0x1000, 0x3, 0xff, 0x918, 0x20, 0x6}, {0x7, 0x2, 0x5, 0x6, 0x2, 0x4}, {0x9, 0x6, 0xfffffffb, 0x4, 0x400, 0x6}, {0x66, 0x6, 0x6, 0x3, 0x5, 0x3ff}, {0xfff, 0xe87, 0x0, 0x2fce, 0x400}, {0x5, 0x2, 0x4, 0x1, 0xf8ea, 0xbae}, {0xc092, 0x5, 0x0, 0x0, 0x5, 0x100}, {0x10b, 0x3, 0x1, 0xfffffff9, 0x6, 0x8}, {0x1, 0x7, 0xfffffffa, 0x4, 0x8, 0x7fffffff}, {0x8001, 0x7f, 0x401, 0x4, 0x2, 0x1}, {0x10001, 0x7, 0x1ff, 0x7, 0xffffff0c, 0x8}, {0x8195, 0x8001, 0x81, 0x7f, 0x1, 0xffffffff}, {0x20, 0x9, 0xc3, 0x7, 0x8000, 0x3}, {0xffffffff, 0x10000, 0x5, 0x0, 0xbe, 0x8}, {0x1, 0x6, 0xffff8000, 0xc7e, 0x0, 0x4}, {0x0, 0x8, 0x1000, 0x101, 0x2, 0x8}, {0x799a, 0x1, 0x9430, 0x5237, 0x401, 0x81}, {0x20000000, 0x9, 0x2400000, 0x4a, 0x3e, 0x1}, {0x1, 0xfe, 0x800, 0x7, 0xca}, {0x4, 0x6, 0x2, 0x3309, 0x6, 0x7ff}, {0x6, 0xffffffff, 0x1, 0x8, 0x5, 0x5}, {0x6, 0xa565, 0x10001, 0x80000001, 0x9, 0x10001}, {0xc26a, 0x7, 0x9, 0x6, 0x7, 0x24d3}, {0x9, 0x4e5c, 0x81, 0x9, 0x10000, 0x9}, {0x6, 0x0, 0x19bc, 0xf9d, 0x5, 0x3f}, {0x2, 0x3f, 0x7, 0xffff, 0x3, 0x1}, {0x7fff, 0x8, 0x0, 0x3, 0x2, 0xf02}, {0x0, 0x4, 0x80000000, 0x80, 0x8000, 0xffffffe0}, {0x6, 0xff, 0x6afb, 0x5, 0x0, 0x1da}, {0x3, 0x3, 0x1, 0x2, 0x0, 0x6}, {0x8, 0x0, 0xfff, 0x6, 0x0, 0x9}, {0x51c, 0x8, 0x10000, 0x7, 0x0, 0x8}, {0xffffffff, 0x53514f5c, 0x20, 0x4, 0xbd8, 0x40}, {0x1, 0x7ff, 0x6, 0x3, 0x5, 0x447c}, {0x832, 0x2, 0x100, 0x4, 0xe, 0x401}, {0x2, 0x9, 0x7, 0x6}, {0xa4, 0x5, 0x101, 0x7ff, 0x4, 0x4}, {0x80, 0x40, 0x4, 0x6, 0x4, 0x10000}, {0x80, 0x8, 0x2, 0x7, 0x9a}, {0xfff, 0x3ff, 0x2, 0x6, 0x9, 0x9057}, {0x9, 0xbfec, 0x81, 0x1, 0x6b6, 0x4}, {0xff, 0x5, 0x5, 0x20, 0x6, 0x2}, {0x2352b381, 0x9, 0x23b2, 0x7, 0x401, 0xa827}, {0x101, 0x7ff, 0x8, 0x1, 0x4beb216, 0x1}, {0x5, 0xfff, 0x4, 0x2, 0x7fff, 0x6950}, {0x81, 0x2, 0x7, 0xfffffff9, 0x7f, 0x7}, {0x5, 0x3, 0x6, 0xd1, 0x0, 0x1}, {0xfff, 0xfffffffc, 0x1, 0x0, 0x9, 0x9}, {0x5, 0x3ff, 0x80000000, 0xe1, 0x20, 0x3}, {0x8, 0x1f, 0x6d2, 0x401, 0x9, 0x4}, {0xfff, 0x8000, 0x20, 0xb, 0x8001, 0x40}, {0x7ff, 0x2, 0x81, 0x7, 0x2, 0x400}, {0x100000, 0x401, 0x80, 0x9, 0xfff, 0x4}, {0x0, 0x9, 0xe79350c, 0xfa4, 0x4, 0xd122}, {0xff7d, 0x3, 0x62100, 0x5585, 0x6, 0x1}, {0x1, 0xc3, 0xfffffff8, 0x8, 0xff, 0x3}, {0x0, 0x9, 0x40, 0x80000000, 0x81, 0x9}, {0xfffffffb, 0x7, 0x100, 0xffff, 0x3}, {0xffffffff, 0xfd, 0x101, 0xfffffbff, 0xff, 0x4}, {0x3, 0x1, 0x6, 0x8, 0x5, 0xa2a}, {0x9, 0xe4d7, 0x4, 0x1, 0x9}, {0x8001, 0xffff, 0x7ff, 0x0, 0xff, 0xe8}, {0xee, 0x3, 0x75, 0x400, 0x9, 0x3ff}, {0xfffffe01, 0xfff, 0x9, 0x1a4c, 0x84f, 0xffffff96}, {0x8000, 0x4, 0x4, 0xff, 0x4, 0xffff}, {0xffff, 0x5, 0x2, 0xfffffffa, 0x3ff, 0x6}, {0x0, 0xfff, 0x100, 0x101, 0xc8, 0x2}, {0x6, 0x100, 0x80000001, 0x430, 0x0, 0x7}, {0x200, 0x3f, 0x200, 0xfffffffe, 0x1, 0x2}, {0x7, 0x5, 0x6, 0x6, 0x1, 0x8}, {0x2, 0x70f, 0x1, 0xfffffffb, 0xffff, 0x68}, {0x7, 0x8, 0x78, 0x3, 0x1}, {0x7, 0x101, 0x4, 0x101, 0xffffffff, 0xfffffffa}, {0xd2d5, 0x9, 0x7f, 0x20, 0x81, 0x9}, {0x1, 0x1c, 0x80, 0x3a, 0xffffc1b4, 0x5}, {0x1d3, 0x3, 0x9, 0x8, 0x6, 0x10000}, {0x10000, 0x401, 0x7, 0x40, 0x6, 0x8}, {0x9, 0xfffffea3, 0xffffffff, 0x5, 0x1, 0xbd}, {0x3, 0x1, 0x6, 0xedb, 0x8, 0x8}, {0x0, 0x1, 0x5, 0x6, 0x3, 0x10}, {0x9, 0x7, 0xfcf7, 0x6, 0x10000, 0x5}, {0xfffffeff, 0x4, 0xfffffff7, 0xfffff800, 0x8, 0x6}, {0xdd0, 0x5, 0x177, 0xfffffff9, 0xffff, 0x7ff}, {0x80000001, 0x0, 0x9e40, 0x1, 0x101, 0x6}, {0x80000000, 0x5, 0x8000, 0x8, 0xaf7, 0x73}, {0x80000001, 0x2, 0xffff8001, 0x34b8166e, 0x100, 0x6}, {0x100, 0x6, 0x80, 0x80, 0x8, 0x9}, {0x4000, 0x0, 0x2, 0x5, 0x6946, 0x6aa}, {0x6, 0x7, 0x319, 0x9, 0x6, 0xf5}, {0x7, 0x6, 0x3086, 0x0, 0x5, 0xffffffff}, {0x6, 0xaae, 0x10001, 0x68b, 0x8001, 0x40}, {0x8, 0x4, 0x2, 0x8, 0xda14, 0x1}, {0x9, 0xd6, 0xffff, 0x3f, 0x6}, {0xffff, 0x0, 0x2, 0x0, 0x2b, 0x2}], [{0x4, 0x1}, {0x4}, {0x5, 0x1}, {0x2}, {0x7c2807728b36488b}, {0x2}, {0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x4, 0x1}, {0x4, 0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x3, 0x1}, {0x8477d3e8980e63a1}, {0x0, 0x1}, {0x1, 0x1}, {0x0, 0x1}, {0x0, 0xdec0b3ca48e5ce43}, {0x2}, {0x2}, {0x4}, {0x4}, {0x5}, {0x3}, {0x1, 0x1}, {0x1, 0x1}, {0x5}, {0x1, 0x1}, {0x1}, {0x1, 0x1}, {0x3, 0x1}, {0x2, 0x1}, {0x2}, {0x3}, {}, {0x5, 0x1}, {0x4, 0x1}, {0x3}, {0x3, 0x1}, {}, {0x1, 0x1}, {0x1, 0x1}, {0x2}, {0x8}, {}, {0x5, 0x1}, {0x0, 0x1}, {0x2, 0x1}, {0x1}, {0x2}, {0x1, 0x1}, {0x0, 0x1}, {0x4, 0x1}, {0x1}, {0x3, 0x948312a2b478d122}, {0x3, 0x1}, {0xdbb4ba5ca22dc38f}, {0x1}, {0x1}, {}, {0x3, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x5, 0x1}, {0x4}, {0x2, 0x1}, {}, {0x3, 0x1}, {0x3}, {0x4, 0x1}, {}, {}, {}, {0x6}, {0x0, 0x1}, {0x5}, {0x3, 0x1}, {0x5, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x2}, {0x3}, {0x2, 0x1}, {0x3}, {0x4}, {0x5}, {0x1, 0x1}, {0x4}, {0x4}, {0x3, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x4}, {0x5, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {}, {}, {0x1, 0x1}, {0x3}, {0x0, 0x1}, {0x1, 0x1}, {0x2, 0x1}, {0x3}, {0x1, 0x1}, {0x7}, {}, {0x5}, {0x1, 0x1}, {0x3}, {0x2}, {0x2}, {0x2, 0x1}, {0x1, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x5, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x5}, {0x5, 0x1}, {0x6520359ec8034ddf, 0x1}, {0x4, 0x1}, {0x3, 0x1}, {0x5}], 0x1}}, @TCA_PEDIT_PARMS_EX={0xee0, 0x4, {{{0x1b4d7987, 0x4fa, 0x5, 0x4, 0x6}, 0x54, 0x81, [{0x8000, 0x8, 0x2, 0x20, 0x0, 0x10000}, {0x54, 0x0, 0x10001, 0x5, 0x8cd, 0x8}, {0x5, 0x5, 0x3, 0x8001, 0x7ff, 0x8e}, {0x313, 0x6f1c, 0x19, 0x2, 0x7}, {0x7, 0x7, 0x10001, 0x3, 0xfffffffc, 0x7}, {0xff, 0x8, 0x81, 0x7fffffff, 0x3f, 0x7fffffff}, {0x87a6, 0x15, 0x2, 0x7, 0x9, 0x3}, {0x10000, 0x3, 0x200, 0x6, 0x4, 0x5}]}, [{0xe6, 0x2, 0x852, 0x4, 0x5, 0x2}, {0x50000, 0x1, 0x7fffffff, 0x1, 0x9, 0x8}, {0x6a293f5c, 0x9, 0x7fff, 0x1, 0x0, 0x8}, {0x3, 0x8, 0xdd, 0x5, 0x80000000, 0x7}, {0x7, 0x10000, 0x3, 0x5, 0x4, 0x400}, {0x1, 0x8, 0x6e6, 0x3, 0x649a018f, 0xffff}, {0x0, 0x2, 0x401, 0x3, 0x800, 0x3}, {0x6, 0x0, 0x2c, 0x1f, 0x40, 0x1}, {0x2, 0x8, 0x0, 0x6, 0x6, 0x6}, {0x10001, 0x4, 0x6, 0x7, 0xffffffff, 0x3}, {0x1ff, 0x0, 0x7, 0x1, 0x1, 0x800}, {0x0, 0x8, 0x3, 0x9, 0x1ff, 0x8ce2}, {0x10001, 0x3ff, 0x800, 0x0, 0x80000000, 0x495e}, {0x6, 0x0, 0x2, 0x1, 0xbef4, 0x7e51}, {0xfff, 0x4f78, 0x6, 0x6, 0x1}, {0x0, 0x2, 0x6, 0x2, 0x800, 0xd549}, {0x8, 0x6, 0x3cda, 0x0, 0x101, 0x2}, {0x100, 0x1, 0x5, 0x8, 0x2, 0x336}, {0x8, 0x8, 0xff, 0x3, 0x5, 0x9}, {0x4, 0xfffff8ec, 0x66, 0x2, 0x1, 0x5}, {0x2, 0x2, 0x9, 0x6, 0x8, 0x3ff}, {0xb, 0x8, 0xfc5, 0x1f, 0x6, 0x5}, {0x5, 0x4, 0x8, 0x9, 0x9, 0x6}, {0x3ff, 0x4e0b7448, 0xfffffffb, 0x9, 0x0, 0xffffff7f}, {0x10000, 0x5b6, 0x7aa, 0x3667, 0x0, 0x3ff}, {0x100, 0x8a3f, 0x3, 0x8, 0x100, 0xe752}, {0x5, 0x211f, 0x3f, 0x7, 0xffff, 0xfffffe01}, {0x7, 0x6, 0x7f, 0x5, 0xffffff0b, 0x3}, {0x1, 0x3, 0x3, 0x6, 0x7, 0x9}, {0x4, 0x0, 0x1f, 0xfffffff8, 0x0, 0x7}, {0x3f, 0x9, 0x0, 0x80000001, 0x100, 0x401}, {0xffff, 0x8, 0x71, 0x4, 0x20}, {0x40, 0x9, 0x4, 0x6, 0x2, 0x6}, {0x4, 0x64fe, 0x690, 0x7, 0x1, 0x4}, {0xd6, 0x5, 0x2, 0x0, 0x3, 0x1000}, {0x9d, 0x800, 0x1, 0x8, 0x7, 0x7}, {0xf2800000, 0x5, 0x1ff, 0x7, 0x9, 0x7}, {0x4, 0x6, 0xbce, 0x5, 0x1, 0x2}, {0x1, 0xfffff125, 0xf9, 0xb4, 0x2, 0x4}, {0x1, 0x5, 0xffff, 0x7fff, 0x8, 0x6}, {0x7, 0xfffff662, 0xfffffbff, 0x10, 0xffffffff, 0x33}, {0x96, 0x80000, 0x1, 0xd3, 0x8, 0x4}, {0x91f, 0x1, 0x7, 0xfffff000, 0x4, 0x8}, {0x9, 0x10000, 0x3, 0x7ff, 0x3ff, 0x3ff}, {0xff, 0x0, 0x7, 0x401, 0x0, 0x3f}, {0xfff, 0x5, 0x9, 0x4, 0x2ed2f465, 0x4}, {0x80000000, 0x81, 0x7, 0x0, 0x80, 0x8}, {0x5, 0x1f, 0x7fff, 0x0, 0x1, 0x4}, {0x3d7e, 0x0, 0x5, 0x7, 0x1000, 0x7}, {0x2, 0x1, 0xdb, 0x8, 0x400, 0x5}, {0xbfd9, 0x8, 0x8, 0x7, 0xc0c4779, 0x9}, {0x0, 0x0, 0x6164, 0x40, 0x3f, 0x59}, {0xffff, 0x10000, 0x9, 0x7, 0x8001, 0x2}, {0x2, 0xffff, 0x8, 0x7b7, 0x1, 0x9}, {0xffff69f1, 0x2f7e, 0x6, 0x80, 0x3, 0x9}, {0x2, 0x5, 0x3f, 0x2, 0x401, 0xae7}, {0xf4b2, 0x400, 0x37d, 0x8, 0x1ff, 0xe9}, {0x10001, 0x1ff, 0x4, 0x1ff, 0xfffffff8, 0x9}, {0x2, 0x3, 0x4aa6, 0x100, 0x9, 0x7}, {0x3, 0x4, 0x0, 0x8, 0xa8}, {0xfffffffe, 0x1, 0x1, 0x8, 0x0, 0x2}, {0x8001, 0xc7, 0x401, 0x1000, 0x1ff, 0xfffffff7}, {0x0, 0x7, 0x1, 0x401, 0x2, 0x6}, {0x7ff0, 0x0, 0x6, 0x1, 0x8000, 0x80000001}, {0x2, 0xff, 0x6b, 0x7, 0x3, 0x2}, {0x5, 0x1, 0x6, 0x7100000, 0x1ff, 0x3}, {0xb1, 0x0, 0x7d, 0x5, 0x2, 0x1ab31877}, {0xd192, 0x8, 0x3f, 0x8001, 0x10001, 0x4}, {0x8, 0x521e, 0x5132a7bf, 0x59b8000, 0x6, 0x7ff}, {0xfff, 0x7, 0xc4ef, 0x9, 0x9, 0x3}, {0x20, 0x128e6191, 0xad, 0xaf85, 0x80000000, 0xffffffff}, {0x0, 0xc25, 0x8, 0x3, 0x2, 0x80}, {0x6, 0x6, 0x4, 0xd60, 0x2, 0x7ff}, {0x6, 0xfff, 0x9, 0x379b, 0xce8d, 0xf44}, {0x5, 0x1, 0x0, 0x1, 0x32c, 0xfffffff8}, {0x3, 0x1f, 0xfffffff7, 0xffff8000, 0x8000, 0x7}, {0x0, 0x800, 0x6, 0xff, 0x101, 0x3}, {0x0, 0x7, 0x7, 0x0, 0xab4, 0x81}, {0x4, 0x7, 0x7, 0x19a, 0x9, 0x3f000000}, {0x7, 0x9, 0xfffffffb, 0x19, 0x7, 0x9}, {0x2, 0xa0, 0x3ff, 0x40, 0x56, 0x4}, {0x8, 0x4, 0x9, 0x1e5f, 0x2, 0x200}, {0x6ba, 0x100, 0x10001, 0xada1, 0x7ff, 0x6}, {0x2, 0x40, 0x3ff, 0x2, 0x3, 0x3}, {0x3, 0x4, 0x8, 0xe9, 0x4, 0x4}, {0x0, 0x4, 0x8, 0x8, 0x7fffffff, 0x6}, {0x10001, 0x5, 0x81, 0xffffffff, 0x2, 0x7fff}, {0x3bfc, 0x7, 0x8, 0x7f, 0x80000001, 0x80000001}, {0x10000, 0x2, 0x7, 0x200, 0x8, 0x4e16}, {0xfff, 0x9, 0x7, 0x6c, 0x9, 0x9}, {0x1ff, 0x1, 0x5, 0xfffffff8, 0x4, 0x1f}, {0x1, 0x9, 0x0, 0x1c, 0x6, 0x46ef}, {0x2, 0x9, 0x8, 0x2, 0x7fffffff, 0x7f}, {0x100, 0xf8ee, 0x5, 0x101, 0x1ff, 0x2}, {0x0, 0x1, 0x1, 0x6f0, 0x6}, {0x4, 0x2, 0x2, 0x200, 0xe42c, 0x8}, {0xffd6, 0xffffff20, 0x4, 0x81, 0x10001, 0xfc}, {0x6, 0x4, 0x56dc, 0x0, 0x5, 0x9}, {0x28, 0xfff, 0x4d, 0x746, 0xfff, 0x8}, {0x355, 0x3, 0x3ff, 0x8000, 0x0, 0x19ea}, {0x5, 0x9, 0x9, 0x1000, 0x0, 0x8}, {0x7, 0x0, 0x2, 0x9, 0x3, 0x20}, {0x8, 0x8, 0x4, 0x1, 0x6}, {0x1, 0xfff, 0x200, 0x1, 0xed0, 0x8}, {0x0, 0x6, 0x5d1, 0x8b, 0x144000}, {0x6, 0xfffffff9, 0x7, 0xffffffcc, 0x4, 0xef}, {0x0, 0x0, 0x7, 0x9000000, 0x6, 0x3f}, {0x3ff, 0x6, 0x2401570f, 0x5f9, 0x8fc5, 0x4}, {0x7fffffff, 0x200, 0x3, 0x7fffffff, 0x0, 0x8001}, {0x6b6, 0x9, 0x5, 0x7fff, 0xfb9, 0x100}, {0x3, 0x6, 0xff, 0x2, 0x2, 0x2}, {0xffffffb5, 0x2, 0x9c9d, 0x0, 0x3, 0x81}, {0x4, 0xffff1433, 0x3f, 0xffff8001, 0x9, 0x6}, {0x7f, 0x7, 0x7ff, 0x10000, 0x27561226, 0x10}, {0x4, 0x7f, 0x8, 0x6, 0x4, 0x5}, {0x6, 0x9, 0x81, 0x0, 0x9, 0x9}, {0x2, 0xff, 0x4, 0x100, 0x2, 0x80000001}, {0x6, 0x89, 0x2d, 0x9b, 0x2, 0x80000000}, {0x3, 0x8, 0x2, 0x1f, 0x2, 0x7}, {0x0, 0x9, 0x5ed, 0x80, 0x6, 0x7f}, {0x100, 0x10001, 0x6, 0x2, 0x8, 0x101}, {0x3, 0x8001, 0x70fb5542, 0x401, 0x6, 0x7}, {0x4e, 0x8, 0x40, 0x5, 0x1ff, 0x7f}, {0x3, 0x0, 0x1, 0x4, 0x4, 0x20}, {0x9a1, 0xffff, 0x6, 0x0, 0x9, 0x80000000}, {0x7ff, 0x2, 0x5, 0x5, 0x81, 0x8001}, {0x9d8, 0x4, 0xae6, 0x5, 0xff, 0x800}, {0x8, 0x7ff, 0x3, 0x8, 0x7, 0x6}], [{0x3}, {0x2}, {0x4, 0x1}, {0x1, 0x1}, {0x1}, {0x0, 0x1}, {0x5}, {0x4, 0x1}, {0x0, 0x1}, {}, {0x4}, {0x3}, {0x3, 0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x3}, {0x3, 0x1}, {0x4, 0x1}, {0x3}, {0x1, 0x1}, {0x2}, {0x1, 0x1}, {}, {}, {0x0, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x1}, {0x5}, {0x2}, {0x1}, {0x0, 0x1}, {0x4, 0x1}, {0x3}, {0x0, 0x1}, {0x0, 0x1}, {0x1}, {0x2}, {0x2}, {0x5, 0x1}, {0x0, 0x1}, {0x3}, {0x3}, {0x2}, {0x5}, {0x2, 0x1}, {0x5, 0x1}, {0x0, 0x1}, {0x3}, {0x1, 0x1}, {0x3, 0x1}, {0x2}, {0x1, 0x1}, {0x4, 0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x4, 0x1}, {0x2, 0x1}, {0x1, 0x1}, {0x4}, {0x3, 0x1}, {0x1, 0x1}, {0x4}, {0x5, 0x1}, {0x3}, {}, {0x1}, {0x3, 0x1}, {}, {0x3, 0x1}, {0x5}, {0x1}, {0x2}, {0x5}, {0x5, 0x3}, {0x2}, {0x4}, {0x5}, {0x5, 0x1}, {0x5}, {0x2}, {0x2}, {0x5}, {0x3}, {0x2}, {0x3, 0x1}, {0x2, 0x1}, {0x4, 0x1}, {0x4}, {0x4}, {0x2}, {0x1}, {0x3}, {0x2}, {0x5}, {0x3, 0x1}, {}, {0x5}, {0x2}, {}, {0x3, 0x1}, {0x3, 0x1}, {}, {0x1, 0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x6}, {0x6, 0x1}, {0x4}, {}, {0x1}, {0x5}, {0x2, 0x2}, {0x5}, {}, {}, {0x5, 0x1}, {0x6}, {0x1, 0x1}, {0x5}, {0x5, 0x1}, {0x4}, {0x5}, {0x2}]}}]}, {0x8f, 0x6, "1a9add4bfc7832ef7fcc33e7942f4165cb08eb87e6bf1dd69bcc080f55abd530a60986a607ee33ce9ae04dcfdbd00f8f9e40629aa992075c43017ff83ade258d870fa5286f45f5c6a9528b482a746b998a9186ce8590c2c4b30fb7d7f8fcc743dc586b8150545e8ca688968c503f1356b1f433e547ef2608ac3bd6de659fb5cdbe8155e053ebc7918ebebe"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x3, 0x2}}}}]}]}}, @TCA_CHAIN={0x8, 0xb, 0x401}, @TCA_RATE={0x6, 0x5, {0x9, 0x81}}, @TCA_CHAIN={0x8, 0xb, 0x1}]}, 0x58c4}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000010) r1 = dup(0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000340)) getrandom(&(0x7f0000000480)=""/158, 0x9e, 0x2) 00:05:11 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000180)={'filter\x00', 0x9a, "f0360ccfba2e7217c6779f5c0164797d4f4b6c89f99e73b44672768792e2116770dab279ad128142ee1041e0b7ef171f70b1ddc671899e7de9f14f9681312c414ba12b037085b8047b7909336ac57d1977c3f21bec67d78d5deb220e9061751e1ecb93bf4fcf536d2f82bc61c6346a56450a1acadbbe4698f7668d84a9360ccf17c752e81218ebb10394150afb1a7c869531d57f973c477ea8b0"}, &(0x7f0000000000)=0xbe) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='children\x00') preadv(r1, &(0x7f00000017c0), 0x3da, 0x0, 0x0) [ 869.889300] FAULT_INJECTION: forcing a failure. [ 869.889300] name failslab, interval 1, probability 0, space 0, times 0 [ 869.900877] CPU: 0 PID: 16525 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 869.908758] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 869.913930] overlayfs: missing 'lowerdir' [ 869.918129] Call Trace: [ 869.918147] dump_stack+0x1b2/0x283 [ 869.918165] should_fail.cold+0x10a/0x154 [ 869.918179] should_failslab+0xd6/0x130 [ 869.918191] __kmalloc_track_caller+0x2bc/0x400 [ 869.941231] ? kstrdup_const+0x35/0x60 [ 869.945120] ? lock_downgrade+0x740/0x740 [ 869.949265] kstrdup+0x36/0x70 [ 869.952453] kstrdup_const+0x35/0x60 [ 869.956162] alloc_vfsmnt+0xe0/0x7f0 [ 869.959882] clone_mnt+0x6c/0xff0 [ 869.963331] copy_tree+0x33e/0xa20 [ 869.966870] copy_mnt_ns+0x167/0xa30 [ 869.970583] ? create_new_namespaces+0x30/0x720 [ 869.975252] ? do_mount+0x2a00/0x2a00 [ 869.979060] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 869.984075] ? kmem_cache_alloc+0x35f/0x3c0 [ 869.988395] create_new_namespaces+0xc9/0x720 [ 869.992894] ? security_capable+0x88/0xb0 [ 869.997045] copy_namespaces+0x27b/0x310 [ 870.001145] copy_process.part.0+0x2600/0x6f00 [ 870.005731] ? get_pid_task+0xb8/0x130 [ 870.009634] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 870.014573] ? __cleanup_sighand+0x40/0x40 [ 870.019415] ? lock_downgrade+0x740/0x740 [ 870.023564] _do_fork+0x184/0xc80 [ 870.027016] ? fork_idle+0x270/0x270 [ 870.030725] ? fput+0xb/0x140 [ 870.033823] ? SyS_write+0x14d/0x210 [ 870.037530] ? SyS_read+0x210/0x210 [ 870.041149] ? SyS_clock_settime+0x1a0/0x1a0 [ 870.045555] ? do_syscall_64+0x4c/0x640 [ 870.049523] ? sys_vfork+0x20/0x20 [ 870.053058] do_syscall_64+0x1d5/0x640 [ 870.056948] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 870.062217] RIP: 0033:0x45de59 [ 870.065400] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 870.073101] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 870.080368] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 870.087642] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 870.094905] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000035 [ 870.102170] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 [ 870.205365] overlayfs: unrecognized mount option "@" or missing value [ 870.214737] overlayfs: failed to resolve '.0Lu_>@g': -2 00:05:12 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(0xffffffffffffffff, 0xae45, 0x6) pipe2(0x0, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0xf88d443731e27508) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB]) mkdir(&(0x7f00000002c0)='./file1\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=.']) write$FUSE_STATFS(0xffffffffffffffff, &(0x7f0000005e40)={0x60, 0xffffffffffffffda, 0x0, {{0x3, 0x80000001, 0x5, 0x400000, 0x5, 0x3, 0x80000000, 0x2}}}, 0x60) connect$inet(0xffffffffffffffff, 0x0, 0x0) chdir(&(0x7f00000001c0)='./bus\x00') rename(&(0x7f0000000380)='./file0\x00', &(0x7f0000000440)='./bus/file0\x00') r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) sendmsg$nl_route_sched(r0, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000240)={&(0x7f0000000540)=@newtfilter={0x58c4, 0x2c, 0x2, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x8, 0xc}, {0x0, 0x3}, {0x10, 0x1ffc6}}, [@filter_kind_options=@f_rsvp={{0x9, 0x1, 'rsvp\x00'}, {0x587c, 0x2, [@TCA_RSVP_SRC={0x8, 0x3, @multicast1}, @TCA_RSVP_CLASSID={0x8, 0x1, {0x2, 0xc}}, @TCA_RSVP_ACT={0x24c, 0x6, [@m_bpf={0xbc, 0x1c, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x10, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_NAME={0xa, 0x6, './bus\x00'}]}, {0x86, 0x6, "6b1458063b5e9197f5e9c337a8275a374468eea62b68c503e792ec09066b33c255ad1b172832fd7fcb52326b518884ca6d01937f2f4b77db399c047b3f40d925f699f86516f6ca91a15fd832fe2695136f43d33f8807aa4aa966f8d4a4a7488031740e99ada7636367787d844579c8073def906163a5289419edb7a0a3747eb34b69"}, {0xc}, {0xc, 0x8, {0x8f4a7384b5f57da7, 0x1}}}}, @m_vlan={0x58, 0x7, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x88a8}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x9563, 0x4, 0x10000000, 0x3ff, 0x7df}, 0x3}}]}, {0x5, 0x6, "c7"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1, 0x3}}}}, @m_vlan={0x134, 0x20, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0xb0, 0x2, 0x0, 0x1, [@TCA_VLAN_PARMS={0x1c, 0x2, {{0x5b5d, 0x7, 0x4, 0x0, 0x2}, 0x1}}, @TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x940}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x7, 0xe2, 0x4, 0x0, 0x6}, 0x2}}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x88a8}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x3}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x10001, 0x7, 0x10000000, 0x79, 0x41}, 0x3}}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x9, 0x401, 0xffffffffffffffff, 0xffffffff, 0x2}, 0x3}}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x20, 0x2, 0x0, 0x8, 0x50}, 0x1}}]}, {0x5a, 0x6, "b87c540bd0568ecedf56947d247185ef28f08a5c91639559182126ee994ec88ada6b8d162a7c05ab46faa9c45442a6bcd26bc91a2b11d00deb27e6e4f96857de20d0165ebe01d7c7f0151c3fbecbf36997cee82695e5"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x2, 0x1}}}}]}, @TCA_RSVP_SRC={0x8, 0x3, @rand_addr=0x64010101}, @TCA_RSVP_SRC={0x8, 0x3, @dev={0xac, 0x14, 0x14, 0x27}}, @TCA_RSVP_ACT={0x2d4, 0x6, [@m_nat={0x17c, 0x1f, 0x0, 0x0, {{0x8, 0x1, 'nat\x00'}, {0xcc, 0x2, 0x0, 0x1, [@TCA_NAT_PARMS={0x28, 0x1, {{0xb83c, 0x101, 0x8, 0x6, 0x5}, @empty, @dev={0xac, 0x14, 0x14, 0x1d}, 0xffffffff}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x9, 0xffff, 0x7, 0x2, 0x6}, @empty, @local, 0xff000000, 0x1}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x7, 0xd87, 0x1, 0xfe, 0x73a4abde}, @dev={0xac, 0x14, 0x14, 0x3b}, @empty, 0x0, 0x1}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x5, 0xfffffff7, 0x30000000, 0x52d8, 0x5}, @multicast1, @empty, 0x0, 0x1}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x7, 0x2, 0x0, 0x7f}, @local, @broadcast, 0xff000000}}]}, {0x89, 0x6, "741983263028745f7fe6049e73be7f0be0ca52a5fc2110f087b8e039aec669a831d10434ef9873a3988c399e766e2142e470847b7670ad7913a39be972b15d3fdc6698c78796d8d67a015d84f68c5d296128b934580bfb9ef6b6affebbed5af5e60a5d214353c211a24d69a2689d1119295459aa81687a326aebd3939202457b41bbf00af7"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x3, 0x2}}}}, @m_tunnel_key={0x154, 0x1e, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x70, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_DST={0x14, 0x6, @empty}, @TCA_TUNNEL_KEY_ENC_IPV4_SRC={0x8, 0x3, @multicast2}, @TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0x5, @private2={0xfc, 0x2, [], 0x1}}, @TCA_TUNNEL_KEY_ENC_KEY_ID={0x8, 0x7, 0x3ff}, @TCA_TUNNEL_KEY_ENC_IPV4_SRC={0x8, 0x3, @local}, @TCA_TUNNEL_KEY_ENC_KEY_ID={0x8, 0x7, 0x8001}, @TCA_TUNNEL_KEY_ENC_IPV4_DST={0x8, 0x4, @private=0xa010101}, @TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0x5, @private0}, @TCA_TUNNEL_KEY_ENC_KEY_ID={0x8, 0x7, 0x2}]}, {0xb5, 0x6, "413b617fdd716246003ed31d81bdcc8e88dbbfc9abbebc3dcb0a36866c4b263af05e7e83318115b5c3e7fd3122ef2057ec14fea3750405eb52d5a96f11c598ab4d812edad9172a559c45eedf178b3b93aac204951b04c5b2013b294d6b47a6c31a2c8f89f53d848808e35778df546c46dc87e205f9260e825eb53f39802bdf87fbe5e2156636de37faca8bec2fc77dc919bce11ecd6f534e266e36dcd3cd6b414faaf5db646a75e8e52c55eb5f5aafdd64"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x3, 0x1}}}}]}, @TCA_RSVP_ACT={0x5338, 0x6, [@m_connmark={0xf0, 0xe, 0x0, 0x0, {{0xd, 0x1, 'connmark\x00'}, {0x90, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x4, 0xffffffff, 0x10000000, 0x2, 0xfffffffc}, 0x8001}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x3f, 0x7f, 0x4, 0x4, 0x401}}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x1, 0x6, 0x6, 0x6, 0x7}, 0x6}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0xffffffff, 0x6, 0x2, 0x10001, 0x9}, 0x9}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x3f, 0x3, 0x5, 0x3, 0x3}, 0x5}}]}, {0x33, 0x6, "d7c8e3d46a9d90e53ac148ae2dbe740fd1448c49b4bd0926421d0ad702c85f49c464ec8bd188599b4591ff3886adc8"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1, 0x3}}}}, @m_ct={0xcc, 0x20, 0x0, 0x0, {{0x7, 0x1, 'ct\x00'}, {0x38, 0x2, 0x0, 0x1, [@TCA_CT_NAT_IPV4_MAX={0x8, 0xa, @empty}, @TCA_CT_ZONE={0x6, 0x4, 0x6d}, @TCA_CT_ACTION={0x6, 0x3, 0xa}, @TCA_CT_LABELS={0x14, 0x7, "9676e48dfeebf1158628638675f82d28"}, @TCA_CT_ZONE={0x6, 0x4, 0x16aa}]}, {0x6d, 0x6, "12f90d0dc034484c144d1ef5644f43ae716926ef1343d7ae3d6830d2ae159726535d4d0d92044ce2abdf6875cc36f3ac2cedf18820288a52d3b9c04648909d184692b04386d5d27e4e8da4fdccf1f8772f2c54dfe6caaa478ee2a3dff004f9dd9ed2d2d5b8ef66c2e2"}, {0xc}, {0xc, 0x8, {0x2, 0x3}}}}, @m_sample={0x1038, 0x18, 0x0, 0x0, {{0xb, 0x1, 'sample\x00'}, {0xc, 0x2, 0x0, 0x1, [@TCA_SAMPLE_TRUNC_SIZE={0x8, 0x4, 0x1a51}]}, {0x1004, 0x6, "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"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x3}}}}, @m_ipt={0x194, 0xb, 0x0, 0x0, {{0x8, 0x1, 'ipt\x00'}, {0xf0, 0x2, 0x0, 0x1, [@TCA_IPT_TARG={0xbe, 0x6, {0x7, 'raw\x00', 0x4e, 0x400, "73696ec802ef1f569624cf45bac1c3ba56e7de3033c7289fe8971ca6215731dc0de5568837791250eac77749ea1671c60dc8528b9481aa9640da78a3fa54e1221cab23c1e8a8c69d87211d805aec860fc42a8ae033be9404952767002d96e72217f38056be6e2ce2dc3e48ca4daa624b6446e7868eb43b2cc136949fe1d0a9efa4b13b2c42b56c88866591259dfaa755cece9c9c"}}, @TCA_IPT_HOOK={0x8, 0x2, 0x1}, @TCA_IPT_TABLE={0x24, 0x1, 'raw\x00'}]}, {0x7f, 0x6, "f27894423b4daae34fe8f6243e0c5699ef4963aaa2dac3742dabdc872bb59884e7882dc16bd0bf95ec51bff9fc7e44d5672db9853f4348d65cbb7e18e49d495d2ab678c83cdfd3ab217e1b15a4572999124442967ff95c9b4e6379cc0c273dd8af69a01eb183789ab1cc26de92ac38334c91322401a2c15f5069bc"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2}}}}, @m_csum={0x1068, 0x1d, 0x0, 0x0, {{0x9, 0x1, 'csum\x00'}, {0x3c, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0xf5af, 0x8, 0x3, 0x9, 0x4}, 0x27}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x6, 0x1, 0x20000000, 0x0, 0x6e56}, 0x47}}]}, {0x1004, 0x6, "902fcbd7b767d309017a5ec8e57dbc0bd82ecb0bad8aef89a6811f30e67566e20d64b86f42aad31385184dc9f84d2125962ee06645f61f7b1dc3ad689e4e7086e614c25a69a5ee7edcb8c36962d11d508b010d66a98ae36d49ade292ff96eeb28d9a286eb2e51fd4f93be219c5bf0eb2fc43bd4a983dd6b9f874462f60606dfce55a08d36b6da7cd833e38cb937ed4274a907f1cc7a8a54b966e93ae9f42a4aa0aeb992e4b4dc8e3179b0ef25f53b61b7a188876544c542e3995736b06b56807b6797a2755a493832d54d7308025d219e99113de989bc3d06eaf878ec79d39c551657b36fc8e7859024bd524970c7cdbbabc3711bc247fbb998c1395fdffbd7d44663977b37fa8e1a29fdd7b11798a4f777063896bbbfcfa7101a8f5af0895af8c2fed393890662ed271cfc99331daacc993f36daa6e6b0aa724f91e73e7f2d360c37195d3ce7c840c4260a70ff41c3e2282b380dae3d540d2e74943c8effe4ff976de4a8968b88b14c4a05b2742d13c5c70ea1164d6242b2b922a2b7d6f62e976717168261f688c517c5bcf5c22cc3dbc7a4759936469251158a5658519bd177021ec3b9bdf8c4295f4984927677f837db60d184a60f2200cb0ad5335f5d2b0771667ecf020597c6b1244dd0c2467eb80512b464e33373fbb61a06962a52775db48e27d9a743bd1698bc7157d5e21e2212f632b5488e5b5c3c387178499c30f182138fe8d4efea52ecbe5338a9b476ef57d9c877512ddb7fe105c47f74383ec308fe05f65a30d0560a7976a21900272f349192bc7ca1b6819e0961539a6990a4f5aa680ac8c8f5423e840d6bf4509972430b153b693529b069bceca6d35e1ad6eee5a6be7adedd7bb31af2ec184fbd67ec4828bd579f25f0d33f586d08d25dfa015df2cbc38eaa944795c22799e94f91856d7b65f459b864fffe5fa1dcda8b2527fd5b1ff81e345ddd4c20836a26949197e8895c57e4dd5f0788798e015190c1ea624bffd6935eb5befc9721344a8cff43460ff29c6da51f0b141a53d79214c46882496b3f500ba7ef32d34e736cd72065b65a92540c0d23ffc39665721082ccebb5eaf791c6bfc50d1b6e76a3ab43d28a1988c4be27c383aa236ebe8f2a3fee86fa5f12c08950b0cd541dd6cca5d6c7d446d79fa28737cb5e7355e085b5553d76f7f15b940241eb3ee052d21b58253c6866b62a52b4828e0377d3ed67cc24dfe5da865d35f74f53ae317e043f884591ed177c527e4a85ed963265f36573487066bfeba1c3ca7c5d1dcfc88b7ab3aee7394828a9b284292cd3e97cf0a6c72f5bd8aecaa84dbcaa7c9b0a6f5ee3a0ccb350500b094d5c1b62d27188af735f263c0f7c812fe7e0a619990d3afdab151767c08b789962195617e861b46e1752e1e40659d861e92522bce4b809ec70ab7dec78ee1b7fb1d1a12122359b24da54e3d93f2970089b18356c6d74561ced6a586e2dbd3a80f6c3d78acfd25ebdd3deb2c548f8d88ada45ee74b7f7f42104fde234f14b6f3256448516dad3ea383934039b560c108ee35f9dd087cfdb3bd293e77833b9bd39e9ef5e7e23b0589c7e4c59a75ff84f9b1a3d176f4c56b07da1eebb8ca9be51d78b1167206962b0f24c6e4b4e8fe31dc6935e9080571cd47ef38ca28d02096c58438a4c1a667f2362f51b5894919142e162b7c667b0d155614130496256edda23ed776d143977a142acfe77ab98f71e75e81ad7ce7dc55da0ef20c702842839e8bf1de18948e16a43cff91f28b5c3473c181cbdadadaa994e5766f4675181cfcccba18a22ab4469d6c6fbd095e9d3fe138de63f8e7d42b9055b7ee68bb1c885c7fd68673ce4d6f2576e8e3c32c079ad11245589967766f3830850ddf61b48eb64e88f64f998d24bdbb329c24ab73aa6ae8261fc6449be126da500546941a09e649af0739d941e355d5c5560c32e1ea15f0099b45b9982270c47c22ee3c0d8ccfdc2ddc0c182ab153fa7d1cd4276f8d12260dbc2248477398d9813362f855782b05ddb19ff03bcfd5a2458ca19750364f05a95658afab9514ecb1a57c10b47cba595e545c9ef84cebd2d76102f3ced4b101b2ccb1b55b77be0daf29054c315598cb06df86e00d3c8c32427a12db26fd9fda33b6aff59117ce4f77ee04860de7d09b0413981871aab400576b2cd061c3a0d89761e153d1aa34d8783bf20f5e4dd3b7fa949120005e23c5471baf60842e87db89382003a2fc4ad7c85e60cce49031f3a8a6d71f82bd51ae5ea44e45fe3bad49a1b4c59b192bebc7721064b38d2ba588033831ea9e4d2fcb298d99392c1a9297cc05ce101fa2b12c7b4c38e7068afa822d824843de84ffaeafa8767dc9953a743b15278b986cc2a3d8a16ce8de62b2766f5e2acf86eaf62b19bbe8c2b95e6761ffbab91beeee8cffe0bc0fdd3323d4eefb913893b5345cf8b14c1a7b95ae2d5d2bd5482209002609be8f2b9dd8ec4c621825d247e06a9b84f16311047d0ebecdb50fe5f8ad542bc5fc6a4b3372ec82d77ff45c16e7c7471f0501371d9b3bfefb186b8ea62dc7bfc804ed919bae0301784e68a578cee6d504bff2f4828045ab5564767c6d75db6d16d1b743f1e422b979b9a2ccaf1946394969bbeabc015851b2be8280b1c917a2c71da5196661fb08676144df7ae1b7975b847c6f01f26f6384ecfc2006152ea2e7b99148b6c28999691e3fd41c8045199a0f3f783f82d79d40dac7e9beb317b485bb8f0a2b0b80e4c26b8aaeb4b05528f440fd4de092484bd89536a3c5b1acc54731605002cb9fa716693893fbff44c45255edeff1c84914de8a414ad1b626f8d91b9f882708658a5b3937ee72d35dfaa42692b79b2aea125a1e3b6e19bb78441db7545b677da9139b7f54ff20c883f771519e029b69c1f22b2ed7a408acfbb3f8c48111ec9956955d4f750987f2189a962907e15f6f5f05b444001d00f08cf3842dc53f26d81911b134eb5689aa020daf90e49369ee83fded2f69985ec7e896b1386d42f8a4d1f456c6569af25c7d18fa334a767a2a02d39fc94297b025168f1097778bcd4fc6265e197d1c216538f4e90269f2cde4496423a13f437619cb1de2f9700b5dcfb3ca45e6b1e66c7c04c5122909d50866b9c986763125c8e09c1c9b05a5b0db0b38d14e11c7204113e178eed4cb997c1d5e37741c3849b39eb1703f9f8ed4f57cc3cb4160d2842955b6d4a882921d51bd42dac57061c387df9500d345927a96fedd6181b8490af404b2a45dd8a01615c5e40b13553970ee0f5482d72d617c36bf3db0edbc676a5a3c09f46544dffda69ac7b4c132989712871922582655a5b94bbcc11dda1747fd6a8b10e5e83ecabd3496e6c7c019e304ded5c70a1adc180555705b7ce18c807f260e079bb26f8bde34a2cc0cc154fdc7ba1b451de8c4e6247e2c7a22076ebb6596fb1a4f038cfa0c12fa1b8ad495eb92fcd24fc6a1455ad6ef9ec31ec66eee5dbd5214869ee32d0cb5216688c76763b0831fcce3b8427036036e202aca55ac078078f8a11774a6a34a6fbcbd4b31ce3670b5c832801d815b05b7c756b3f054caf8b84b807e18cd57cd1903a5084a913841093b90378cbd29d2a20445501f1574dc078a41d093720dde49b5f6b85c0ebca1caf9d6be28a2e2b46dfa754ce9347032d4a7d8c41d53447fd31b3b2e0738218035e21005cd07060b2522edf8210a6b6f82bd48eadef0d0a45e16e05848310376afa9c83943a547674832661bc03aab87d54619a91d7781c7479c8a5486942c7bda06cc1dc35c2534caff1c81cbdcf0e054b26f24c924558483e0bf22246fabf18a7f481442b2d22524ab50752b1e95940a82e0ab34af495aed8bf2875ecdb54553034df3e1dbd1deaa772cdf615abf2e9b19ff2e2ebd9a39d70dea6d6206d11d0f888f18a341f66970cdd63a6752336f649fca9b73ea66a56adb6995f7676d95159b45f08a759d0b975eea57efb60d3c071c649a0c9423e29b297b7776e8f510f9a28fe6816e7d45af97c7bed89e219d19b9cea157a4c041ece116ad969cd321a21346669912cf074a157b0db3318dd755dd65a2221fc548e5eb934fbca8ea01705503da6574eead05e0ce29633d36b51b0c816850596b2b725c889f8caf4a000aad747a255336be773559f1bfe0d1356f404bab1b6af7ece88b32b419dd630902add9c4ca83701146a1bbd66a22da36026f6787de00e7690ceb6c69592ffc6a5c159dbcc33904bab66a6d7f07ddf3c34cefb5bd7fbf1073abb63981dd2914db73b802c314533bc6b4f9145928c89dcc385e8b1b13af54f085fba26b25f94f06be2b4110f649da046888a1d7835425bfaa9b39281d972bbf71202552baa03a2d09ebd4a60a43989203c6f4d0247d686e099ab9038d24b9ed026ce2f88c0e0ed7654c39ec23b2aa77094295070160958c6d23925e34f0e0e80bf01dc59fec729712e615f1604bf1674d2b3cb3643085f18bb126964c72533763fc982b381fdf00aff1cbaa0b330ed826e7a872d4fce11ea8e27191cd6ad30adab264602ae0610618804519b221751c0ed68453bf854de6c74a98b7b49b27ce2727fa03086d9889e0cba8ab2c25672f9b72072da404b7d1b175bebb3444014c5740bef3143459ceca190d7919a4f4da72c738045dcd09698de3ddcbe76ad8bfa7731b39c8d3b9274c8073cecee5d5789cd571cd89ba8e59899ed675bf3fa4c8905b10ffa4399979c3f78f1a04ee75d5379e0087ac7aced54708190264a57d6fa0ed3356d6f59a78f698b35c45838e2abad8a74a4bc07d737730e7acd78958145272d78c6f6ef5ab27b2141cd4d1fb7747f5470d7cad287ab376802286842e8d91c8a3b29b5a417e931a98a705cab803cf2abb70c95abdf9b97d93224ecb74faba3d943e0ea81d8431ef490ba49d721d1f55c01792b7b7b6e47d226838776a5b08a22540fca986be3bca24fd2ca3492daff6515d403e22b3966133f9059851d98b231293dcee05c27e26f0e40f6b037982b0327dd4e569c90e16c429e31090dd65a47c52e2c1d70c1666a7a84e587c1e61624a855ba20abc96b40751ceb54ee164093fcafd8625eb6f275a99afc4fa5a32feda17dd98fde66879b40eda1462208c7020ddb1c055428e49cb2e56a06c3169b5465c1e74c2d3d682b4c60c997313255d43cc449ac73b9eb841ddf6b28ec09cf4495be1942ea04760db31b4ff906d986d4702aeb6da3265881d8b661f1631548599c73004c84a194d1e25cbbfb8ba70b223487fd8312345f369b6d5f8437e3d4f44969ea4348ba7c44e7dfb84867d0e3d1b5f04054fca9dfa6e82b32adfb88744558a71829b116f616171707fdbac2a4722897d203fd2a5610b3f2c137177c13495e68fbe0cada5f0b7be4ee275dd2be6105c5e35ec8249542f764b582d9fb3e9f83cd730a79e56ae1e5c437626a4455b6553f3f42cea873f60347735e4ea546b36e3cfb558d7602de28fdeb011519af1f2ee4c3666c8ff76f2cdb3ceeed4e8c5757dabbb2ae3256c14b3982e5f13a585ee0f2fd89b0f53495082ace11210e8972acd87d2f451da752e011d9a7a1f1cadf3ee947a0df297d67bdf2029d5c70b99f4f47d7c8c213a7e8b8231e38eb61f88dc70bdca7cbee3ccaa63a95ae9729317fc6f08fc4ca8532ca041402d0d96f014dbb304944f5b3dbce1224ff7fccd73564b980c2d7f02401d1df506e1b770812af7f0e4b2002f2c0809673c2882abd7e5b8ebe33b19f84f38835a0ba10d2bb45672a48fad423e9ceefc5c5bc0009433ecfea31416ecd1ff6cbc68eeb5"}, {0xc}, {0xc, 0x8, {0x2, 0x1}}}}, @m_ife={0x103c, 0x11, 0x0, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x14, 0x2, 0x0, 0x1, [@TCA_IFE_TYPE={0x6}, @TCA_IFE_TYPE={0x6, 0x5, 0x2}]}, {0x1004, 0x6, "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"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2}}}}, @m_pedit={0x1f08, 0x7, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x1e50, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0xec, 0x5, 0x0, 0x1, [{0xc, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}]}, {0x34, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}]}, {0xc, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}]}, {0xc, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}]}, {0xc, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}]}, {0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}]}, {0xc, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}]}, {0xc, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}]}, {0x34, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x4}]}, {0x24, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0xbdabb4faf06379c3}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}]}]}, @TCA_PEDIT_PARMS={0xe80, 0x2, {{{0x2d3, 0x6, 0x30000000, 0x0, 0x400}, 0x0, 0x7f, [{0x8, 0x9, 0x2, 0x2, 0x100, 0x7}, {0x3b8, 0x1f, 0xffffffff, 0x6, 0x0, 0x1}, {0xcc, 0x401, 0x5, 0xffff, 0x58f0, 0xffff}, {0x473, 0x3c, 0x40, 0x6, 0x200, 0x7}]}, [{0x7, 0x7ff, 0x0, 0x200, 0xee5b, 0x9}, {0x2, 0x3, 0x3, 0x2, 0x401, 0x8000}, {0x9, 0x6, 0x8, 0x72, 0x8, 0x9}, {0xcfa, 0x1000, 0x1, 0x0, 0x81, 0x5}, {0xba44, 0x3, 0x4, 0x2, 0x6, 0x101}, {0x40, 0x6, 0x9, 0x7, 0x400, 0xfff}, {0x1, 0x5, 0x0, 0x3, 0x0, 0xffff}, {0x8, 0x7fffffff, 0x3, 0x9, 0xffffffff, 0x6}, {0x0, 0x4, 0x7f, 0xfffffffd, 0x3, 0x9}, {0xfcd, 0xffff, 0x5, 0xea6f, 0x10000, 0xc1}, {0x8, 0x0, 0x5, 0xac7f, 0x6, 0x80000001}, {0x1f, 0x80000001, 0x4, 0x80, 0x8, 0x8001}, {0x0, 0x10000, 0x1, 0x9, 0x100, 0x6}, {0x8, 0x5, 0xffffffff, 0x0, 0x70, 0x7}, {0x8001, 0x7ff, 0x7, 0xfff, 0x2, 0xfffff000}, {0xc08, 0x101, 0x81, 0x80000000, 0x7, 0xfffffffe}, {0x5738, 0x9, 0x2, 0x3f, 0x9, 0x8000}, {0xfd0, 0x6, 0x1, 0x3ff, 0x3, 0xd9a}, {0x810, 0xf41c, 0x24a, 0x9, 0xffffff7a, 0xffffffff}, {0x7, 0xfff, 0x101, 0x8, 0x0, 0x486}, {0x100, 0x4, 0x714, 0x9, 0x3, 0x7}, {0x3, 0x0, 0x9, 0x8, 0x0, 0x800}, {0x40, 0x7fff, 0xfffffffa, 0x9, 0x8, 0x6}, {0x8, 0xdaf2, 0x1, 0x8, 0x4, 0xf26}, {0x6, 0x1ff, 0x57c48a84, 0x8000, 0xe7, 0x40e3a96}, {0x9, 0x0, 0xdb24, 0x3, 0x3, 0x101}, {0x2, 0x7, 0xff, 0x100, 0x1, 0x8}, {0x10, 0x2, 0xfffffffa, 0x1, 0x9, 0x4}, {0x5, 0x8, 0x52a, 0x5, 0xcde, 0x4c4a}, {0xca4, 0x7, 0x3, 0x3, 0x100, 0x1}, {0x1, 0x10000, 0x5, 0x80000001, 0x8305, 0x25f8}, {0x0, 0x9, 0x7, 0x1, 0x54, 0x6473}, {0x1, 0x4, 0xb25, 0xfd7, 0x0, 0x85}, {0x6, 0x5, 0x8, 0x4, 0x39}, {0x1000, 0x3, 0xff, 0x918, 0x20, 0x6}, {0x7, 0x2, 0x5, 0x6, 0x2, 0x4}, {0x9, 0x6, 0xfffffffb, 0x4, 0x400, 0x6}, {0x66, 0x6, 0x6, 0x3, 0x5, 0x3ff}, {0xfff, 0xe87, 0x0, 0x2fce, 0x400}, {0x5, 0x2, 0x4, 0x1, 0xf8ea, 0xbae}, {0xc092, 0x5, 0x0, 0x0, 0x5, 0x100}, {0x10b, 0x3, 0x1, 0xfffffff9, 0x6, 0x8}, {0x1, 0x7, 0xfffffffa, 0x4, 0x8, 0x7fffffff}, {0x8001, 0x7f, 0x401, 0x4, 0x2, 0x1}, {0x10001, 0x7, 0x1ff, 0x7, 0xffffff0c, 0x8}, {0x8195, 0x8001, 0x81, 0x7f, 0x1, 0xffffffff}, {0x20, 0x9, 0xc3, 0x7, 0x8000, 0x3}, {0xffffffff, 0x10000, 0x5, 0x0, 0xbe, 0x8}, {0x1, 0x6, 0xffff8000, 0xc7e, 0x0, 0x4}, {0x0, 0x8, 0x1000, 0x101, 0x2, 0x8}, {0x799a, 0x1, 0x9430, 0x5237, 0x401, 0x81}, {0x20000000, 0x9, 0x2400000, 0x4a, 0x3e, 0x1}, {0x1, 0xfe, 0x800, 0x7, 0xca}, {0x4, 0x6, 0x2, 0x3309, 0x6, 0x7ff}, {0x6, 0xffffffff, 0x1, 0x8, 0x5, 0x5}, {0x6, 0xa565, 0x10001, 0x80000001, 0x9, 0x10001}, {0xc26a, 0x7, 0x9, 0x6, 0x7, 0x24d3}, {0x9, 0x4e5c, 0x81, 0x9, 0x10000, 0x9}, {0x6, 0x0, 0x19bc, 0xf9d, 0x5, 0x3f}, {0x2, 0x3f, 0x7, 0xffff, 0x3, 0x1}, {0x7fff, 0x8, 0x0, 0x3, 0x2, 0xf02}, {0x0, 0x4, 0x80000000, 0x80, 0x8000, 0xffffffe0}, {0x6, 0xff, 0x6afb, 0x5, 0x0, 0x1da}, {0x3, 0x3, 0x1, 0x2, 0x0, 0x6}, {0x8, 0x0, 0xfff, 0x6, 0x0, 0x9}, {0x51c, 0x8, 0x10000, 0x7, 0x0, 0x8}, {0xffffffff, 0x53514f5c, 0x20, 0x4, 0xbd8, 0x40}, {0x1, 0x7ff, 0x6, 0x3, 0x5, 0x447c}, {0x832, 0x2, 0x100, 0x4, 0xe, 0x401}, {0x2, 0x9, 0x7, 0x6}, {0xa4, 0x5, 0x101, 0x7ff, 0x4, 0x4}, {0x80, 0x40, 0x4, 0x6, 0x4, 0x10000}, {0x80, 0x8, 0x2, 0x7, 0x9a}, {0xfff, 0x3ff, 0x2, 0x6, 0x9, 0x9057}, {0x9, 0xbfec, 0x81, 0x1, 0x6b6, 0x4}, {0xff, 0x5, 0x5, 0x20, 0x6, 0x2}, {0x2352b381, 0x9, 0x23b2, 0x7, 0x401, 0xa827}, {0x101, 0x7ff, 0x8, 0x1, 0x4beb216, 0x1}, {0x5, 0xfff, 0x4, 0x2, 0x7fff, 0x6950}, {0x81, 0x2, 0x7, 0xfffffff9, 0x7f, 0x7}, {0x5, 0x3, 0x6, 0xd1, 0x0, 0x1}, {0xfff, 0xfffffffc, 0x1, 0x0, 0x9, 0x9}, {0x5, 0x3ff, 0x80000000, 0xe1, 0x20, 0x3}, {0x8, 0x1f, 0x6d2, 0x401, 0x9, 0x4}, {0xfff, 0x8000, 0x20, 0xb, 0x8001, 0x40}, {0x7ff, 0x2, 0x81, 0x7, 0x2, 0x400}, {0x100000, 0x401, 0x80, 0x9, 0xfff, 0x4}, {0x0, 0x9, 0xe79350c, 0xfa4, 0x4, 0xd122}, {0xff7d, 0x3, 0x62100, 0x5585, 0x6, 0x1}, {0x1, 0xc3, 0xfffffff8, 0x8, 0xff, 0x3}, {0x0, 0x9, 0x40, 0x80000000, 0x81, 0x9}, {0xfffffffb, 0x7, 0x100, 0xffff, 0x3}, {0xffffffff, 0xfd, 0x101, 0xfffffbff, 0xff, 0x4}, {0x3, 0x1, 0x6, 0x8, 0x5, 0xa2a}, {0x9, 0xe4d7, 0x4, 0x1, 0x9}, {0x8001, 0xffff, 0x7ff, 0x0, 0xff, 0xe8}, {0xee, 0x3, 0x75, 0x400, 0x9, 0x3ff}, {0xfffffe01, 0xfff, 0x9, 0x1a4c, 0x84f, 0xffffff96}, {0x8000, 0x4, 0x4, 0xff, 0x4, 0xffff}, {0xffff, 0x5, 0x2, 0xfffffffa, 0x3ff, 0x6}, {0x0, 0xfff, 0x100, 0x101, 0xc8, 0x2}, {0x6, 0x100, 0x80000001, 0x430, 0x0, 0x7}, {0x200, 0x3f, 0x200, 0xfffffffe, 0x1, 0x2}, {0x7, 0x5, 0x6, 0x6, 0x1, 0x8}, {0x2, 0x70f, 0x1, 0xfffffffb, 0xffff, 0x68}, {0x7, 0x8, 0x78, 0x3, 0x1}, {0x7, 0x101, 0x4, 0x101, 0xffffffff, 0xfffffffa}, {0xd2d5, 0x9, 0x7f, 0x20, 0x81, 0x9}, {0x1, 0x1c, 0x80, 0x3a, 0xffffc1b4, 0x5}, {0x1d3, 0x3, 0x9, 0x8, 0x6, 0x10000}, {0x10000, 0x401, 0x7, 0x40, 0x6, 0x8}, {0x9, 0xfffffea3, 0xffffffff, 0x5, 0x1, 0xbd}, {0x3, 0x1, 0x6, 0xedb, 0x8, 0x8}, {0x0, 0x1, 0x5, 0x6, 0x3, 0x10}, {0x9, 0x7, 0xfcf7, 0x6, 0x10000, 0x5}, {0xfffffeff, 0x4, 0xfffffff7, 0xfffff800, 0x8, 0x6}, {0xdd0, 0x5, 0x177, 0xfffffff9, 0xffff, 0x7ff}, {0x80000001, 0x0, 0x9e40, 0x1, 0x101, 0x6}, {0x80000000, 0x5, 0x8000, 0x8, 0xaf7, 0x73}, {0x80000001, 0x2, 0xffff8001, 0x34b8166e, 0x100, 0x6}, {0x100, 0x6, 0x80, 0x80, 0x8, 0x9}, {0x4000, 0x0, 0x2, 0x5, 0x6946, 0x6aa}, {0x6, 0x7, 0x319, 0x9, 0x6, 0xf5}, {0x7, 0x6, 0x3086, 0x0, 0x5, 0xffffffff}, {0x6, 0xaae, 0x10001, 0x68b, 0x8001, 0x40}, {0x8, 0x4, 0x2, 0x8, 0xda14, 0x1}, {0x9, 0xd6, 0xffff, 0x3f, 0x6}, {0xffff, 0x0, 0x2, 0x0, 0x2b, 0x2}], [{0x4, 0x1}, {0x4}, {0x5, 0x1}, {0x2}, {0x7c2807728b36488b}, {0x2}, {0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x4, 0x1}, {0x4, 0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x3, 0x1}, {0x8477d3e8980e63a1}, {0x0, 0x1}, {0x1, 0x1}, {0x0, 0x1}, {0x0, 0xdec0b3ca48e5ce43}, {0x2}, {0x2}, {0x4}, {0x4}, {0x5}, {0x3}, {0x1, 0x1}, {0x1, 0x1}, {0x5}, {0x1, 0x1}, {0x1}, {0x1, 0x1}, {0x3, 0x1}, {0x2, 0x1}, {0x2}, {0x3}, {}, {0x5, 0x1}, {0x4, 0x1}, {0x3}, {0x3, 0x1}, {}, {0x1, 0x1}, {0x1, 0x1}, {0x2}, {0x8}, {}, {0x5, 0x1}, {0x0, 0x1}, {0x2, 0x1}, {0x1}, {0x2}, {0x1, 0x1}, {0x0, 0x1}, {0x4, 0x1}, {0x1}, {0x3, 0x948312a2b478d122}, {0x3, 0x1}, {0xdbb4ba5ca22dc38f}, {0x1}, {0x1}, {}, {0x3, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x5, 0x1}, {0x4}, {0x2, 0x1}, {}, {0x3, 0x1}, {0x3}, {0x4, 0x1}, {}, {}, {}, {0x6}, {0x0, 0x1}, {0x5}, {0x3, 0x1}, {0x5, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x2}, {0x3}, {0x2, 0x1}, {0x3}, {0x4}, {0x5}, {0x1, 0x1}, {0x4}, {0x4}, {0x3, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x4}, {0x5, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {}, {}, {0x1, 0x1}, {0x3}, {0x0, 0x1}, {0x1, 0x1}, {0x2, 0x1}, {0x3}, {0x1, 0x1}, {0x7}, {}, {0x5}, {0x1, 0x1}, {0x3}, {0x2}, {0x2}, {0x2, 0x1}, {0x1, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x5, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x5}, {0x5, 0x1}, {0x6520359ec8034ddf, 0x1}, {0x4, 0x1}, {0x3, 0x1}, {0x5}], 0x1}}, @TCA_PEDIT_PARMS_EX={0xee0, 0x4, {{{0x1b4d7987, 0x4fa, 0x5, 0x4, 0x6}, 0x54, 0x81, [{0x8000, 0x8, 0x2, 0x20, 0x0, 0x10000}, {0x54, 0x0, 0x10001, 0x5, 0x8cd, 0x8}, {0x5, 0x5, 0x3, 0x8001, 0x7ff, 0x8e}, {0x313, 0x6f1c, 0x19, 0x2, 0x7}, {0x7, 0x7, 0x10001, 0x3, 0xfffffffc, 0x7}, {0xff, 0x8, 0x81, 0x7fffffff, 0x3f, 0x7fffffff}, {0x87a6, 0x15, 0x2, 0x7, 0x9, 0x3}, {0x10000, 0x3, 0x200, 0x6, 0x4, 0x5}]}, [{0xe6, 0x2, 0x852, 0x4, 0x5, 0x2}, {0x50000, 0x1, 0x7fffffff, 0x1, 0x9, 0x8}, {0x6a293f5c, 0x9, 0x7fff, 0x1, 0x0, 0x8}, {0x3, 0x8, 0xdd, 0x5, 0x80000000, 0x7}, {0x7, 0x10000, 0x3, 0x5, 0x4, 0x400}, {0x1, 0x8, 0x6e6, 0x3, 0x649a018f, 0xffff}, {0x0, 0x2, 0x401, 0x3, 0x800, 0x3}, {0x6, 0x0, 0x2c, 0x1f, 0x40, 0x1}, {0x2, 0x8, 0x0, 0x6, 0x6, 0x6}, {0x10001, 0x4, 0x6, 0x7, 0xffffffff, 0x3}, {0x1ff, 0x0, 0x7, 0x1, 0x1, 0x800}, {0x0, 0x8, 0x3, 0x9, 0x1ff, 0x8ce2}, {0x10001, 0x3ff, 0x800, 0x0, 0x80000000, 0x495e}, {0x6, 0x0, 0x2, 0x1, 0xbef4, 0x7e51}, {0xfff, 0x4f78, 0x6, 0x6, 0x1}, {0x0, 0x2, 0x6, 0x2, 0x800, 0xd549}, {0x8, 0x6, 0x3cda, 0x0, 0x101, 0x2}, {0x100, 0x1, 0x5, 0x8, 0x2, 0x336}, {0x8, 0x8, 0xff, 0x3, 0x5, 0x9}, {0x4, 0xfffff8ec, 0x66, 0x2, 0x1, 0x5}, {0x2, 0x2, 0x9, 0x6, 0x8, 0x3ff}, {0xb, 0x8, 0xfc5, 0x1f, 0x6, 0x5}, {0x5, 0x4, 0x8, 0x9, 0x9, 0x6}, {0x3ff, 0x4e0b7448, 0xfffffffb, 0x9, 0x0, 0xffffff7f}, {0x10000, 0x5b6, 0x7aa, 0x3667, 0x0, 0x3ff}, {0x100, 0x8a3f, 0x3, 0x8, 0x100, 0xe752}, {0x5, 0x211f, 0x3f, 0x7, 0xffff, 0xfffffe01}, {0x7, 0x6, 0x7f, 0x5, 0xffffff0b, 0x3}, {0x1, 0x3, 0x3, 0x6, 0x7, 0x9}, {0x4, 0x0, 0x1f, 0xfffffff8, 0x0, 0x7}, {0x3f, 0x9, 0x0, 0x80000001, 0x100, 0x401}, {0xffff, 0x8, 0x71, 0x4, 0x20}, {0x40, 0x9, 0x4, 0x6, 0x2, 0x6}, {0x4, 0x64fe, 0x690, 0x7, 0x1, 0x4}, {0xd6, 0x5, 0x2, 0x0, 0x3, 0x1000}, {0x9d, 0x800, 0x1, 0x8, 0x7, 0x7}, {0xf2800000, 0x5, 0x1ff, 0x7, 0x9, 0x7}, {0x4, 0x6, 0xbce, 0x5, 0x1, 0x2}, {0x1, 0xfffff125, 0xf9, 0xb4, 0x2, 0x4}, {0x1, 0x5, 0xffff, 0x7fff, 0x8, 0x6}, {0x7, 0xfffff662, 0xfffffbff, 0x10, 0xffffffff, 0x33}, {0x96, 0x80000, 0x1, 0xd3, 0x8, 0x4}, {0x91f, 0x1, 0x7, 0xfffff000, 0x4, 0x8}, {0x9, 0x10000, 0x3, 0x7ff, 0x3ff, 0x3ff}, {0xff, 0x0, 0x7, 0x401, 0x0, 0x3f}, {0xfff, 0x5, 0x9, 0x4, 0x2ed2f465, 0x4}, {0x80000000, 0x81, 0x7, 0x0, 0x80, 0x8}, {0x5, 0x1f, 0x7fff, 0x0, 0x1, 0x4}, {0x3d7e, 0x0, 0x5, 0x7, 0x1000, 0x7}, {0x2, 0x1, 0xdb, 0x8, 0x400, 0x5}, {0xbfd9, 0x8, 0x8, 0x7, 0xc0c4779, 0x9}, {0x0, 0x0, 0x6164, 0x40, 0x3f, 0x59}, {0xffff, 0x10000, 0x9, 0x7, 0x8001, 0x2}, {0x2, 0xffff, 0x8, 0x7b7, 0x1, 0x9}, {0xffff69f1, 0x2f7e, 0x6, 0x80, 0x3, 0x9}, {0x2, 0x5, 0x3f, 0x2, 0x401, 0xae7}, {0xf4b2, 0x400, 0x37d, 0x8, 0x1ff, 0xe9}, {0x10001, 0x1ff, 0x4, 0x1ff, 0xfffffff8, 0x9}, {0x2, 0x3, 0x4aa6, 0x100, 0x9, 0x7}, {0x3, 0x4, 0x0, 0x8, 0xa8}, {0xfffffffe, 0x1, 0x1, 0x8, 0x0, 0x2}, {0x8001, 0xc7, 0x401, 0x1000, 0x1ff, 0xfffffff7}, {0x0, 0x7, 0x1, 0x401, 0x2, 0x6}, {0x7ff0, 0x0, 0x6, 0x1, 0x8000, 0x80000001}, {0x2, 0xff, 0x6b, 0x7, 0x3, 0x2}, {0x5, 0x1, 0x6, 0x7100000, 0x1ff, 0x3}, {0xb1, 0x0, 0x7d, 0x5, 0x2, 0x1ab31877}, {0xd192, 0x8, 0x3f, 0x8001, 0x10001, 0x4}, {0x8, 0x521e, 0x5132a7bf, 0x59b8000, 0x6, 0x7ff}, {0xfff, 0x7, 0xc4ef, 0x9, 0x9, 0x3}, {0x20, 0x128e6191, 0xad, 0xaf85, 0x80000000, 0xffffffff}, {0x0, 0xc25, 0x8, 0x3, 0x2, 0x80}, {0x6, 0x6, 0x4, 0xd60, 0x2, 0x7ff}, {0x6, 0xfff, 0x9, 0x379b, 0xce8d, 0xf44}, {0x5, 0x1, 0x0, 0x1, 0x32c, 0xfffffff8}, {0x3, 0x1f, 0xfffffff7, 0xffff8000, 0x8000, 0x7}, {0x0, 0x800, 0x6, 0xff, 0x101, 0x3}, {0x0, 0x7, 0x7, 0x0, 0xab4, 0x81}, {0x4, 0x7, 0x7, 0x19a, 0x9, 0x3f000000}, {0x7, 0x9, 0xfffffffb, 0x19, 0x7, 0x9}, {0x2, 0xa0, 0x3ff, 0x40, 0x56, 0x4}, {0x8, 0x4, 0x9, 0x1e5f, 0x2, 0x200}, {0x6ba, 0x100, 0x10001, 0xada1, 0x7ff, 0x6}, {0x2, 0x40, 0x3ff, 0x2, 0x3, 0x3}, {0x3, 0x4, 0x8, 0xe9, 0x4, 0x4}, {0x0, 0x4, 0x8, 0x8, 0x7fffffff, 0x6}, {0x10001, 0x5, 0x81, 0xffffffff, 0x2, 0x7fff}, {0x3bfc, 0x7, 0x8, 0x7f, 0x80000001, 0x80000001}, {0x10000, 0x2, 0x7, 0x200, 0x8, 0x4e16}, {0xfff, 0x9, 0x7, 0x6c, 0x9, 0x9}, {0x1ff, 0x1, 0x5, 0xfffffff8, 0x4, 0x1f}, {0x1, 0x9, 0x0, 0x1c, 0x6, 0x46ef}, {0x2, 0x9, 0x8, 0x2, 0x7fffffff, 0x7f}, {0x100, 0xf8ee, 0x5, 0x101, 0x1ff, 0x2}, {0x0, 0x1, 0x1, 0x6f0, 0x6}, {0x4, 0x2, 0x2, 0x200, 0xe42c, 0x8}, {0xffd6, 0xffffff20, 0x4, 0x81, 0x10001, 0xfc}, {0x6, 0x4, 0x56dc, 0x0, 0x5, 0x9}, {0x28, 0xfff, 0x4d, 0x746, 0xfff, 0x8}, {0x355, 0x3, 0x3ff, 0x8000, 0x0, 0x19ea}, {0x5, 0x9, 0x9, 0x1000, 0x0, 0x8}, {0x7, 0x0, 0x2, 0x9, 0x3, 0x20}, {0x8, 0x8, 0x4, 0x1, 0x6}, {0x1, 0xfff, 0x200, 0x1, 0xed0, 0x8}, {0x0, 0x6, 0x5d1, 0x8b, 0x144000}, {0x6, 0xfffffff9, 0x7, 0xffffffcc, 0x4, 0xef}, {0x0, 0x0, 0x7, 0x9000000, 0x6, 0x3f}, {0x3ff, 0x6, 0x2401570f, 0x5f9, 0x8fc5, 0x4}, {0x7fffffff, 0x200, 0x3, 0x7fffffff, 0x0, 0x8001}, {0x6b6, 0x9, 0x5, 0x7fff, 0xfb9, 0x100}, {0x3, 0x6, 0xff, 0x2, 0x2, 0x2}, {0xffffffb5, 0x2, 0x9c9d, 0x0, 0x3, 0x81}, {0x4, 0xffff1433, 0x3f, 0xffff8001, 0x9, 0x6}, {0x7f, 0x7, 0x7ff, 0x10000, 0x27561226, 0x10}, {0x4, 0x7f, 0x8, 0x6, 0x4, 0x5}, {0x6, 0x9, 0x81, 0x0, 0x9, 0x9}, {0x2, 0xff, 0x4, 0x100, 0x2, 0x80000001}, {0x6, 0x89, 0x2d, 0x9b, 0x2, 0x80000000}, {0x3, 0x8, 0x2, 0x1f, 0x2, 0x7}, {0x0, 0x9, 0x5ed, 0x80, 0x6, 0x7f}, {0x100, 0x10001, 0x6, 0x2, 0x8, 0x101}, {0x3, 0x8001, 0x70fb5542, 0x401, 0x6, 0x7}, {0x4e, 0x8, 0x40, 0x5, 0x1ff, 0x7f}, {0x3, 0x0, 0x1, 0x4, 0x4, 0x20}, {0x9a1, 0xffff, 0x6, 0x0, 0x9, 0x80000000}, {0x7ff, 0x2, 0x5, 0x5, 0x81, 0x8001}, {0x9d8, 0x4, 0xae6, 0x5, 0xff, 0x800}, {0x8, 0x7ff, 0x3, 0x8, 0x7, 0x6}], [{0x3}, {0x2}, {0x4, 0x1}, {0x1, 0x1}, {0x1}, {0x0, 0x1}, {0x5}, {0x4, 0x1}, {0x0, 0x1}, {}, {0x4}, {0x3}, {0x3, 0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x3}, {0x3, 0x1}, {0x4, 0x1}, {0x3}, {0x1, 0x1}, {0x2}, {0x1, 0x1}, {}, {}, {0x0, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x1}, {0x5}, {0x2}, {0x1}, {0x0, 0x1}, {0x4, 0x1}, {0x3}, {0x0, 0x1}, {0x0, 0x1}, {0x1}, {0x2}, {0x2}, {0x5, 0x1}, {0x0, 0x1}, {0x3}, {0x3}, {0x2}, {0x5}, {0x2, 0x1}, {0x5, 0x1}, {0x0, 0x1}, {0x3}, {0x1, 0x1}, {0x3, 0x1}, {0x2}, {0x1, 0x1}, {0x4, 0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x4, 0x1}, {0x2, 0x1}, {0x1, 0x1}, {0x4}, {0x3, 0x1}, {0x1, 0x1}, {0x4}, {0x5, 0x1}, {0x3}, {}, {0x1}, {0x3, 0x1}, {}, {0x3, 0x1}, {0x5}, {0x1}, {0x2}, {0x5}, {0x5, 0x3}, {0x2}, {0x4}, {0x5}, {0x5, 0x1}, {0x5}, {0x2}, {0x2}, {0x5}, {0x3}, {0x2}, {0x3, 0x1}, {0x2, 0x1}, {0x4, 0x1}, {0x4}, {0x4}, {0x2}, {0x1}, {0x3}, {0x2}, {0x5}, {0x3, 0x1}, {}, {0x5}, {0x2}, {}, {0x3, 0x1}, {0x3, 0x1}, {}, {0x1, 0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x6}, {0x6, 0x1}, {0x4}, {}, {0x1}, {0x5}, {0x2, 0x2}, {0x5}, {}, {}, {0x5, 0x1}, {0x6}, {0x1, 0x1}, {0x5}, {0x5, 0x1}, {0x4}, {0x5}, {0x2}]}}]}, {0x8f, 0x6, "1a9add4bfc7832ef7fcc33e7942f4165cb08eb87e6bf1dd69bcc080f55abd530a60986a607ee33ce9ae04dcfdbd00f8f9e40629aa992075c43017ff83ade258d870fa5286f45f5c6a9528b482a746b998a9186ce8590c2c4b30fb7d7f8fcc743dc586b8150545e8ca688968c503f1356b1f433e547ef2608ac3bd6de659fb5cdbe8155e053ebc7918ebebe"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x3, 0x2}}}}]}]}}, @TCA_CHAIN={0x8, 0xb, 0x401}, @TCA_RATE={0x6, 0x5, {0x9, 0x81}}, @TCA_CHAIN={0x8, 0xb, 0x1}]}, 0x58c4}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000010) r1 = dup(0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000340)) getrandom(&(0x7f0000000480)=""/158, 0x9e, 0x2) 00:05:12 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000180)={'filter\x00', 0x9a, "f0360ccfba2e7217c6779f5c0164797d4f4b6c89f99e73b44672768792e2116770dab279ad128142ee1041e0b7ef171f70b1ddc671899e7de9f14f9681312c414ba12b037085b8047b7909336ac57d1977c3f21bec67d78d5deb220e9061751e1ecb93bf4fcf536d2f82bc61c6346a56450a1acadbbe4698f7668d84a9360ccf17c752e81218ebb10394150afb1a7c869531d57f973c477ea8b0"}, &(0x7f0000000000)=0xbe) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='children\x00') preadv(r1, &(0x7f00000017c0), 0x3da, 0x0, 0x0) 00:05:12 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) ioctl$KVM_IRQ_LINE(0xffffffffffffffff, 0x4008ae61, &(0x7f00000000c0)={0x4, 0xfffffffb}) r1 = socket(0x11, 0x800000003, 0x8) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000300)={&(0x7f0000000200)=[0x8000], 0x1, 0x800, 0x0, 0xffffffffffffffff}) ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f0000000340)={0x3, @default, 0xee01}) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r1, 0x28, 0x6, &(0x7f00000001c0)={0x0, 0x2710}, 0x10) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 870.486829] overlayfs: missing 'lowerdir' 00:05:12 executing program 5 (fault-call:10 fault-nth:54): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) [ 870.555696] print_req_error: I/O error, dev loop0, sector 0 00:05:12 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) fcntl$setown(r0, 0x8, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) r1 = socket(0x11, 0x800000003, 0x8) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r2 = socket(0x11, 0x800000003, 0x8) bind(r2, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000240)=0xe8) r4 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000080)='./file1\x00', 0xfffffffffffffffd, 0x3, &(0x7f00000003c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17, 0x5b06}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x1, &(0x7f00000001c0)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}, {@fat=@dos1xfloppy='dos1xfloppy'}], [{@fowner_gt={'fowner>', r3}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'dos1xfloppy'}}]}) mkdirat(r4, &(0x7f0000000040)='./file1\x00', 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, &(0x7f0000000100)=0x7) [ 870.787801] FAULT_INJECTION: forcing a failure. [ 870.787801] name failslab, interval 1, probability 0, space 0, times 0 [ 870.799199] CPU: 1 PID: 16566 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 870.807087] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 870.816429] Call Trace: [ 870.819006] dump_stack+0x1b2/0x283 [ 870.822622] should_fail.cold+0x10a/0x154 [ 870.826772] should_failslab+0xd6/0x130 [ 870.830785] kmem_cache_alloc+0x28e/0x3c0 [ 870.834929] alloc_vfsmnt+0x23/0x7f0 [ 870.838637] clone_mnt+0x6c/0xff0 [ 870.842095] copy_tree+0x33e/0xa20 [ 870.845631] copy_mnt_ns+0x167/0xa30 [ 870.849330] ? create_new_namespaces+0x30/0x720 [ 870.853979] ? do_mount+0x2a00/0x2a00 [ 870.857775] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 870.862769] ? kmem_cache_alloc+0x35f/0x3c0 [ 870.867072] create_new_namespaces+0xc9/0x720 [ 870.871544] ? security_capable+0x88/0xb0 [ 870.875669] copy_namespaces+0x27b/0x310 [ 870.879726] copy_process.part.0+0x2600/0x6f00 [ 870.884557] ? trace_hardirqs_on+0x10/0x10 [ 870.888772] ? trace_hardirqs_on+0x10/0x10 [ 870.892985] ? check_preemption_disabled+0x35/0x240 [ 870.898073] ? check_preemption_disabled+0x35/0x240 [ 870.903072] ? __cleanup_sighand+0x40/0x40 [ 870.907286] ? _raw_spin_unlock_irq+0x24/0x80 [ 870.911760] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 870.916751] ? _raw_spin_unlock_irq+0x5a/0x80 [ 870.921224] _do_fork+0x184/0xc80 [ 870.924656] ? fork_idle+0x270/0x270 [ 870.928348] ? io_schedule_timeout+0x140/0x140 [ 870.932906] ? SyS_read+0x210/0x210 [ 870.936512] ? do_syscall_64+0x4c/0x640 [ 870.940475] ? sys_vfork+0x20/0x20 [ 870.943993] do_syscall_64+0x1d5/0x640 [ 870.947863] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 870.953030] RIP: 0033:0x45de59 [ 870.956195] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 870.963890] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 870.971156] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 870.978413] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 870.985670] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000036 [ 870.992930] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 [ 871.139055] FAT-fs (loop0): Unrecognized mount option "fowner>00000000000000000000" or missing value 00:05:12 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000180)={'filter\x00', 0x9a, "f0360ccfba2e7217c6779f5c0164797d4f4b6c89f99e73b44672768792e2116770dab279ad128142ee1041e0b7ef171f70b1ddc671899e7de9f14f9681312c414ba12b037085b8047b7909336ac57d1977c3f21bec67d78d5deb220e9061751e1ecb93bf4fcf536d2f82bc61c6346a56450a1acadbbe4698f7668d84a9360ccf17c752e81218ebb10394150afb1a7c869531d57f973c477ea8b0"}, &(0x7f0000000000)=0xbe) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='children\x00') preadv(r1, &(0x7f00000017c0), 0x3da, 0x0, 0x0) 00:05:12 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000180)={'filter\x00', 0x9a, "f0360ccfba2e7217c6779f5c0164797d4f4b6c89f99e73b44672768792e2116770dab279ad128142ee1041e0b7ef171f70b1ddc671899e7de9f14f9681312c414ba12b037085b8047b7909336ac57d1977c3f21bec67d78d5deb220e9061751e1ecb93bf4fcf536d2f82bc61c6346a56450a1acadbbe4698f7668d84a9360ccf17c752e81218ebb10394150afb1a7c869531d57f973c477ea8b0"}, &(0x7f0000000000)=0xbe) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='children\x00') preadv(r1, &(0x7f00000017c0), 0x3da, 0x0, 0x0) 00:05:13 executing program 5 (fault-call:10 fault-nth:55): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:05:13 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000180)={'filter\x00', 0x9a, "f0360ccfba2e7217c6779f5c0164797d4f4b6c89f99e73b44672768792e2116770dab279ad128142ee1041e0b7ef171f70b1ddc671899e7de9f14f9681312c414ba12b037085b8047b7909336ac57d1977c3f21bec67d78d5deb220e9061751e1ecb93bf4fcf536d2f82bc61c6346a56450a1acadbbe4698f7668d84a9360ccf17c752e81218ebb10394150afb1a7c869531d57f973c477ea8b0"}, &(0x7f0000000000)=0xbe) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='children\x00') preadv(r1, &(0x7f00000017c0), 0x3da, 0x0, 0x0) [ 871.605908] FAULT_INJECTION: forcing a failure. [ 871.605908] name failslab, interval 1, probability 0, space 0, times 0 [ 871.617266] CPU: 1 PID: 16594 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 871.625157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 871.634506] Call Trace: [ 871.637094] dump_stack+0x1b2/0x283 [ 871.640722] should_fail.cold+0x10a/0x154 [ 871.644869] should_failslab+0xd6/0x130 [ 871.648842] kmem_cache_alloc+0x28e/0x3c0 [ 871.652993] alloc_vfsmnt+0x23/0x7f0 [ 871.656698] clone_mnt+0x6c/0xff0 [ 871.660151] copy_tree+0x33e/0xa20 [ 871.663691] copy_mnt_ns+0x167/0xa30 [ 871.667404] ? create_new_namespaces+0x30/0x720 [ 871.672067] ? do_mount+0x2a00/0x2a00 [ 871.675863] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 871.680876] ? kmem_cache_alloc+0x35f/0x3c0 [ 871.685206] create_new_namespaces+0xc9/0x720 [ 871.689695] ? security_capable+0x88/0xb0 [ 871.693840] copy_namespaces+0x27b/0x310 [ 871.697896] copy_process.part.0+0x2600/0x6f00 [ 871.702480] ? get_pid_task+0xb8/0x130 [ 871.706366] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 871.711298] ? __cleanup_sighand+0x40/0x40 [ 871.715529] ? lock_downgrade+0x740/0x740 [ 871.719678] _do_fork+0x184/0xc80 [ 871.723131] ? fork_idle+0x270/0x270 [ 871.726840] ? fput+0xb/0x140 [ 871.729956] ? SyS_write+0x14d/0x210 [ 871.733682] ? SyS_read+0x210/0x210 [ 871.737391] ? SyS_clock_settime+0x1a0/0x1a0 [ 871.741793] ? do_syscall_64+0x4c/0x640 [ 871.745760] ? sys_vfork+0x20/0x20 [ 871.749308] do_syscall_64+0x1d5/0x640 [ 871.753215] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 871.758396] RIP: 0033:0x45de59 [ 871.761579] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 871.769280] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 871.776542] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 871.783802] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 871.791061] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000037 [ 871.798341] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:05:13 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000180)={'filter\x00', 0x9a, "f0360ccfba2e7217c6779f5c0164797d4f4b6c89f99e73b44672768792e2116770dab279ad128142ee1041e0b7ef171f70b1ddc671899e7de9f14f9681312c414ba12b037085b8047b7909336ac57d1977c3f21bec67d78d5deb220e9061751e1ecb93bf4fcf536d2f82bc61c6346a56450a1acadbbe4698f7668d84a9360ccf17c752e81218ebb10394150afb1a7c869531d57f973c477ea8b0"}, &(0x7f0000000000)=0xbe) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='children\x00') preadv(r1, &(0x7f00000017c0), 0x3da, 0x0, 0x0) 00:05:13 executing program 0: ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000580)=""/8) r0 = socket(0x21, 0x4, 0x2) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000540)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="44020000", @ANYRES16=r1, @ANYBLOB="000426bd7000fedbdf2508000000100007800c000300f000000000000000c000058007000100696200001c00028008000400660d0000080004000000000008000200ca05000008000100756470000700010069620000080001007564700054000280080002000000000008000200010000000800030005000000080004000100000008000300000200000800010012000000080001000800000008000200ff0f000008000400020000000800040001010000080001007564700024000280080003000300000008000300ff7f000008f70400faffffff080004000200000024000380080002000010000008000100ed957b74080001000000008008000200000400004400038008000200e9000000080003000100000008000200b60b0000080002003900000008000200010000000800010003000000080002000900000008000300020000002c000980080001000400000008000100001000000800010001000080080001000800000008000200faffffff18000480130001000b046f6164636173742d6c696e6b00003c000380080002000180000008000200050000000800030077000000080001000100008008000200060000000800010001000100080001000200000060000580080001007564700008000100756470001c00028008000100140000000800010018000000080001001e0000000c000280080004000800000024000280080002008d00000008000300ed0c0000080004007cc9000008000100050000000c00038008000300010000000c00068008000100e2fb0000"], 0x244}, 0x1, 0x0, 0x0, 0x4008000}, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r2, &(0x7f0000000040)='./file1\x00', 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, &(0x7f0000000680)={0x0, 0x10, &(0x7f00000005c0)="ce50ba940b4010d7c5020c90ca9cb01e44f4ecc589f393ed80d4d45444d23b92197437b802bc607cad863884146e599344f10ca4b75e469a4a49584bdeace5840379caa4550e61c1cce2b6eee4e89f43b359ac668b461441314860cd0b8d63f2197f0742fa802fa95ac94c249fd33e59233fa1159e06b5153d523db59ab35d77620b4c61c68956ccd7", {0xdff, 0x5, 0x34324142, 0x3, 0xf97b, 0x7, 0x6, 0x1}}) execve(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000880)=[&(0x7f0000000700)='vfat\x00', &(0x7f0000000740)='iocharset', &(0x7f0000000780)='TIPCv2\x00', &(0x7f00000007c0)='})&\x00', &(0x7f0000000800)='\x00', &(0x7f0000000840)='iocharset'], &(0x7f0000000900)=[&(0x7f00000008c0)='TIPCv2\x00']) 00:05:13 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) fcntl$setown(r0, 0x8, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) r1 = socket(0x11, 0x800000003, 0x8) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r2 = socket(0x11, 0x800000003, 0x8) bind(r2, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000240)=0xe8) r4 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000080)='./file1\x00', 0xfffffffffffffffd, 0x3, &(0x7f00000003c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17, 0x5b06}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x1, &(0x7f00000001c0)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}, {@fat=@dos1xfloppy='dos1xfloppy'}], [{@fowner_gt={'fowner>', r3}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'dos1xfloppy'}}]}) mkdirat(r4, &(0x7f0000000040)='./file1\x00', 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, &(0x7f0000000100)=0x7) 00:05:13 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) sendmsg$NLBL_MGMT_C_ADDDEF(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x58, 0x0, 0x300, 0x70bd2c, 0x25dfdbfc, {}, [@NLBL_MGMT_A_DOMAIN={0x9, 0x1, 'vfat\x00'}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x2}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @dev={0xfe, 0x80, [], 0x1d}}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x3}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @private0}]}, 0x58}, 0x1, 0x0, 0x0, 0x80c0}, 0x20000000) 00:05:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(0xffffffffffffffff, 0xc0385720, &(0x7f0000000000)) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000180)='lp\x00', 0x3, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000100)) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) 00:05:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000010100)='\x00NSR02', 0x6, 0x8800}, {0x0}, {&(0x7f0000011100)="02000200fd0001008f77f0010001", 0xe, 0x20000}], 0x0, &(0x7f0000000040)) 00:05:13 executing program 5 (fault-call:10 fault-nth:56): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:05:14 executing program 0: syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 872.407104] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 872.464476] FAULT_INJECTION: forcing a failure. [ 872.464476] name failslab, interval 1, probability 0, space 0, times 0 [ 872.475841] CPU: 0 PID: 16641 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 872.483731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 872.493075] Call Trace: [ 872.495661] dump_stack+0x1b2/0x283 [ 872.499287] should_fail.cold+0x10a/0x154 [ 872.503436] should_failslab+0xd6/0x130 [ 872.507407] __kmalloc_track_caller+0x2bc/0x400 [ 872.512067] ? kstrdup_const+0x35/0x60 [ 872.515948] ? lock_downgrade+0x740/0x740 [ 872.520095] kstrdup+0x36/0x70 [ 872.523283] kstrdup_const+0x35/0x60 [ 872.526989] alloc_vfsmnt+0xe0/0x7f0 [ 872.530698] clone_mnt+0x6c/0xff0 [ 872.534149] copy_tree+0x33e/0xa20 [ 872.537689] copy_mnt_ns+0x167/0xa30 [ 872.541402] ? create_new_namespaces+0x30/0x720 [ 872.546065] ? do_mount+0x2a00/0x2a00 [ 872.549862] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 872.554883] ? kmem_cache_alloc+0x35f/0x3c0 [ 872.559200] create_new_namespaces+0xc9/0x720 [ 872.563688] ? security_capable+0x88/0xb0 [ 872.567835] copy_namespaces+0x27b/0x310 [ 872.571906] copy_process.part.0+0x2600/0x6f00 [ 872.576483] ? get_pid_task+0xb8/0x130 [ 872.580370] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 872.585296] ? __schedule+0x893/0x1de0 [ 872.589190] ? __cleanup_sighand+0x40/0x40 [ 872.593419] ? lock_downgrade+0x740/0x740 [ 872.597566] _do_fork+0x184/0xc80 [ 872.601020] ? fork_idle+0x270/0x270 [ 872.604733] ? fput+0xb/0x140 [ 872.607832] ? SyS_write+0x14d/0x210 [ 872.611551] ? SyS_read+0x210/0x210 [ 872.615176] ? do_syscall_64+0x4c/0x640 [ 872.619149] ? sys_vfork+0x20/0x20 [ 872.622685] do_syscall_64+0x1d5/0x640 [ 872.626577] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 872.631759] RIP: 0033:0x45de59 [ 872.634935] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 872.642633] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 872.649899] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 872.657163] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 872.664426] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000038 [ 872.665697] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 872.671685] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:05:14 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) ioctl$SNDCTL_SEQ_SYNC(0xffffffffffffffff, 0x5101) [ 872.807729] UDF-fs: Scanning with blocksize 512 failed [ 872.839666] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 00:05:14 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x400000, 0x0) [ 872.901536] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 872.935034] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 872.959801] UDF-fs: Scanning with blocksize 1024 failed [ 872.991198] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 873.041106] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 00:05:14 executing program 1: syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 873.084579] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 873.115636] UDF-fs: Scanning with blocksize 2048 failed 00:05:14 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) chroot(&(0x7f00000000c0)='./file2\x00') mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:05:14 executing program 5 (fault-call:10 fault-nth:57): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) [ 873.133229] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found 00:05:14 executing program 1: syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 873.164692] UDF-fs: Scanning with blocksize 4096 failed 00:05:14 executing program 2: r0 = syz_mount_image$xfs(0x0, 0x0, 0x6, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040), 0x2c, 0x80000000}], 0x1080, 0x0) r1 = dup3(r0, r0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r1, 0x40405514, &(0x7f00000000c0)={0x8, 0x4, 0xa725, 0x7, 'syz1\x00', 0x2}) ioctl$SIOCGETLINKNAME(0xffffffffffffffff, 0x89e0, &(0x7f0000000040)={0x1, 0x2}) 00:05:15 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000002c0)={0x0, 0x1000, "b89078e63caeeb682672a7f73067602a476284501169b124072667eb12c56dbc9bcbb25808f0452ce127c934d4de45d11830bffeeb8190253471d34f31c9da0541364f7459d07218238a1364091098704564db6d844ca4633db0ad9b5d35891bebb30e270e877ab25e85bf9b9db1bb94bfc49143a30ce5cb031466af72a518622fc57a554ebdd735ba5c8c55698973772184a058ab287cfd3b3a60e4813c07d81baa7cf88e9ca8645d1c937ad0962da342b94f259cede49096b58214d3849e763631f0f764eb035882e8fb32b64fbcec11915fceb4668e028ca01a14d52ef9470245bff1ca548c6c2670f2287f3eebd51c7a448f0d60c8877794e3c6d70fb55bb2255c6e59ab5c02ace34ae1d55c5a97b36e7e5ccedbf29fc1d3d8323e44a99273a73090dd755bcba30f69616c426ec886e8ef522b4649686c823d673b89f4822455e559b148f8f33181d399d98896b2b3736d55926479927d5a01f5f456a9dd288e7a19f2b5a4dfc30af18956ca8ca5fb61f1e22e2e37b66a0770fd731807caa8e2a59562aff0c056e05f01bbc4e91f86e09e632ab74d693dfe83715f11edbd734f5e3c54989ab9c9e359d3177d7f583db08d56706a0887a359dd98053a13a7f10996ef866be67d3db463b77296b8fbb8272d4a3e6b55aff20ae5a404f2890bcafa0912d5f17f911a3918732f949a608ab8d7e14632939798c0f91d36e0bb283415c78872dea1fe01911c0892cb0dff27e55306e8e4dc8b69d3598ac6fc6adf66b68634cd8c72a6f44bb5733d05721afe209f498a30279505c9d247d094d7b1880087f5876ecdd1a87afb06834cf3c193b403ac32b07b1199bc48ce33a3594f422c59aa037dcca0042452315d5581f040acde8c82a3d9ac062af5034ec4872871adb9fad2735a18de333c45dbb8ea1ffb67e09016f3d42532292f91cb96ca2a55d655f8339dd071f451638d81f88232224fbde388f9fbd869767eb709a0996b0b4cd79cddea1d660c62f57a49c0ced36b824d3afc6b36ea92a463d55c8af9e7c0327c7c0816a0100b7e5f4f2d7769aa8f6b53b43a51efbacb7a1e9aaf366cb50a07b1657dee96f1b42c3bc9b36383fde2833b6375576e37b384a6f08c3142433017dcb8f1eb3c5e74650610d982e87b71c5853b9a5b8eff460e608ba1364c755fbd116a9d169c4e06f8f25185bc69f42bcd9094564ff645658b40d31538a7a6e7f0225d578eb227f4e39d1e2a8d3b0cbec0892885f61d8d73dd56917607e8f598703dbc01de6f7dbc708c6146bd8d0d1160ffe4411cdcc69a1b9b77cecf3a0e75e1c192d90fe606a606c3091961487d9ec32be75cad2f4dccf54658e42bd5aac19c69af982dd8bfe25a00d581964695ccfd2e05ca15a1876e7d606892508b76b51118afe9ec2c8dcaf1a51e9a46aa80c85f95a6335680de0e8fefbf601a35ddfaeea7a74cd40ab89e254d35182f8faa65985d21d08676394a91c44103c70a75077872c1cf5bd4aceb173b1887452cfa6a5e621b23479b2f6859090b02638eb3767ad85a2d1aeca8385f818f203b97d72d369f579c31ae350fff15283241e49e09f3550272f74ef7d78193d39f2337ce8b3af60b41341a1cfb4e6d641a956da1c345f456b4f89c11d929509497e821e61538b9c7ed297475478fb75df51d6e160d985687530eed844196221fc3c290cec3798df343542080c3efd4f6ad72b08aaaf86d2f64284d34721f26a4ad651c1557a029eb5272dadfead75d4e9a09bfb74385f80179252d7fbbabc23c207d7086de96a12fa2be115eb6f98271b46470ff561d57c94304c7742f711c71b7e24c572cb7d130a048ad742f1cdc57d6b29a9bf73d343b0ceded839c3f0b0d01d19a76f755b36e2c064567504fec98a3802ced2de6da6a31c457a6adc8a836836c0e1e1ec92e12ac1dd4b82357f931c68df1a1dedf9c1d46322262624bc8c88bb63fc6224457ca59e12f017b7d712004e16668e667f2e8f67e938e81015f47e60210de6748808fb143f7e31f3ab4f2cbe45e81a426a257dd8a777a6d3ae13d195f129ae39d2dacd749535210826a37576b6877bee5d6e582f57c1563610dfe83e87e6e4a3320f22681b6c112c9b09dab965bb486945d2bcac2f0964f7639a40b2716d018436a391d55ecc89a5722910b5b8be6679f297b3e89c4b86479039cd2fce20fc38104b4777352936a76c9009c8d8d0ef496666a5d79078fce2ff25eed1c4767982643fe50ae755b00fda89e5e8d4850870f059c5b59930f59f66e87de4d01f44dc38d0ec0b2a265359d880950b84a080cc6717be7b6d573dd718d1260553857393b016da4bc6c6df3268ccc90952b473f940526262e8d1b18b796f96531dcd0c74882162f92adfce88a0d62ab75b687593fa2aea99eeb2f42a1c9d42e62bb8bb7447e3f888bc087798262137efefe1b8d38a09fa425402bd4a355095a8f39f3b2b5f117199c117764d1c52793f18942b43f89d5eac29390ea625d4786cd7d70ec3f5c4a543e37382606d42fc27a3d24696ecabd480ada2d5fbc76e6539c294e5ff5926ccf5f0987a8386fb00e83878c0730b169ddc4a8c4b3901a7765b8a3e5ae1d81b9dd3758f1672c7e8c67acd38aec9127bd237d2d3006c339c81bcf1326e6293fa85a6db84a09db6723eb4f4d5711a58cd1138727d2d7520f3feb9d1076c0def612c3942b058fb9c863c4fbf02f956d770e5a913f09adff348d9e2a0c239cf203322d6b95de6a054f3a7a921f09b7a2b2b4da87395ac491c190ceb994d45187524ecb7e560e873cd28f6120049a6b5461c571abee22d2424beec9bec4205fe403f981d327bca846c459ebc1f8205ba59de895ad2b9379c319ac2aa4d0f18a34cf3b18e2a6b2ca9f55292ce44e21978f9739d5ccb9a4720744ee8fd41420c2961ba1069c5deab0c9f4ce52bc14e83435da14624b746de8b637f3988df2d2bf2723d7ea9486ba8d632ec60dc06d297a0b494c7ccecea868a0d089b37d7ceccd57ca45121046c88829554424a7b57bc510a47d321f261cc40c773a20cd5e11d916590344651b9148a052accd79ab040c2749548ccb23f9358117b57f0c628956d86cc7bccfed4006559d921ae77b9332a18f5e8bc07beed4d88c2d887b876ccc44b172677cec6ff84d9a114818c2a19bc2033905a1f13480144f32e599773ed66cc10581de19e1485e0fdb84f50504b4640b2a280eee40733f3f2a8bc791c068debbcd7a42a9141d8625c421e02b29312ce379d90411e8549473848be770066616cf20c595533326d51bc3ec8defa2596236bfc647c7318e05d24f5e8cb0c79d264df4b174c3d93faeddcbe522cfa61249fd0e9a7e24701debabb4938b315a69d6569d8bb306f4af3dd09203f0a2e65a98141350ed3da585fe10a9e14df61570587c73dc3ba7ce5533bc86bea75a65418a7f37c8ec29ce226317b865705e5a228ee1268ce5bd8a25b30e7e6253974f1a7e959044e900f4043f1eb9622e0d61bc714aeacc430a84ca3bfc787cd5d299125915c4fa8e4ec3c1078d86af588f827f92d5c7cd30a781ed4877132dd5c90cac4d7a1c97c1e7c6e07debae059018a1f7b8973895beed5945c379b9bcaad049631a939654b39d6ea5df16f47eb5b57cb1837baef7301399252624d5a49081db5bc7db41cbb3b7257571c3e581b1ad4e875d5cb792ed037077525fbd1057ac0b6c3b0ee2a1dc073d9d595a086fb61359dbe18415f04031ee0f7215d798e2adc8ea00102b6a445778fcf32b5f661811647c75391bb0add7ed6e79cd6265f5362b4b4b6cdfbf51a990848d275413b079198d65626acb4ea6b73250292579d29ad8666bdb5df45a8d262bf53dc1fcdf3f65a6e5c3a8a08bb1881d5984426017a9d37261ef7c09f260cf9042761c46dae6abaf6c5d5a29161f976413b35aff5b5d9caac8e66192f129dc0305fef7208f5e1fe5181436ec8401ee1c7e10069580234b43861722f911adc132d2f1013443179d8e148dfa13412295bb3ff15f0d4056503fb5bc8150e96493ad7459096f1cce57471ccd5c1fe5950083854c47da87b562b3928785c6812d77afb67dea85a21714ea280988254bf025c4c31e7ce99ae04486be5a5d190229858383f6a0bf08e813dfb920d6c1bd777e4d17b718ec55ba6bc7b235006277de65f341c92bef16bdd451983f1d53832be93e62580d77e2578b638a73fce8efbfc3a2de04bdb0aa2d03afbc096610fa4f3c63fb8841b29ec59afdbbf81395de3036862e03658f562d1a2cefd5ccb8b0c0b6034dc934c4a04028362ea3264653e541fa7bcb18cb5db5802b8bef72474f7c4f901184604bb7df799d7aa85920ec78052d3a377235a3e2e0bd8e70e366039577fd2e4b6dd607dc29f6a4d987886205e49d48c5a0b89dc3d6e2147c8ab1f76b51db248886de39297aa5c239641d07ab767e6f3352d7f329ac1a4acb1d43b3db733b2870399555ec7a2f7dbe5d3cc2b99604dab79c329f1792c8026d528d2c9b4eaba7599b3141e343dabafaec8a78e3edef11fc38c99aa441c8236ac8ed66e756b853feda829b21290f5f7be0fa5bc1c842986bc7c48a3c336de7a0643c19decf36b7b69c9f5d731704bfe874aa68734c308f5bee59c402411036d6a8c16ccc9eb05391695bc681786598ce951d614045432aa2dce53dbace8e98986e74ed0a179124a144eb66361ceb06e8e3cdd476a745ced3813f8b1c855e612349e4d274965fb27c988adf775541ac0a79d5c6d326ba734b9148bdb38c9553fe029ea8f969f750a3c5fc153a6d9fc9760e7bdbd46e57d91ca8163d580e92b9f925e81ff5c8f58e76c8d3fb3e6c33326cc42ef0750d462c29a47dacf37a8fbc78d19f5f5775d5f63ac5dd88f056478483be3cf1c048c304b0c8b7ff992b60a81719d11f7966723c58d7c07ffc57d450a8304a1bde970d353d847d9ab00c5219e7a02beb81858b60145462a4cfc3f2c845ba66659e61522c5875a4887052d02495a93122e6c163e7a74744142fcaf445363920a0d2bfdf7a7f807f189ad210a5b62218484b7ea79b3819bf3dc91d590295805e34b1acf695e251ef186ae5d8f56df8de1c11d9a3cd0f851f042519405775b8271409fbc562180cefb7faa3441778c22a957cd67383a80f3289e6e9ba3879455583eaf4e5c3696e22b19566f88e3bbd5ef72b6480db3a6760f5b6f6893b121911612422022c00ab6cb6dcfbfba315d3c8c468723c919a00ac5ad5e91e68440133a443f5bd9b96f263a05fd26bc30e35b6a7439b6d4b8b8f01e0793eed990c35207d96f7d6a68f30cae92c17a29f6eece3258e19bf7d6fd3da6915df8911762462e581856043fd46f3793697c5601bd3e702b44a09acc889b788cb4b0dcb111f22140fd6d2602071e2e955f8ed5e0e249f08f68b12de54011ba142aa328b86b07dd9108d171263fca3fc703605f966d19a3d03e764ac3281af622f6ea5c169176052684269febb694a2246365017003625f3b3ba4e56cb73d37030603c13ac96246bdbbf0015608d4cec57758253a7ee335f9b7b18860754d459cd816ce0710892d59f7033535d79f27c7b1558ac84f7ec86f884d57fc58b8be30b1da8051dea999bea22e68722e3be5fe66a3d1d6ae3a92d0d3a45616092089e0efe9ce2d28a118a169b7589f4a2cc5aee0cf8e6bef55416458b864c6f632b09565f490f639ddc5932d445e822ed7fcde4a49c02e21583ba5a577b9a08dacfe3cf7d1c481e57c5a74a774eb9747f8950b32bf324e4e23f9c7b82132a38e0f1de4129"}, &(0x7f00000000c0)=0x1008) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 873.346242] FAULT_INJECTION: forcing a failure. [ 873.346242] name failslab, interval 1, probability 0, space 0, times 0 [ 873.357602] CPU: 0 PID: 16685 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 873.365490] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 873.374841] Call Trace: [ 873.377427] dump_stack+0x1b2/0x283 [ 873.381059] should_fail.cold+0x10a/0x154 [ 873.385208] should_failslab+0xd6/0x130 [ 873.389181] kmem_cache_alloc+0x28e/0x3c0 [ 873.393327] alloc_vfsmnt+0x23/0x7f0 [ 873.397036] clone_mnt+0x6c/0xff0 [ 873.400488] copy_tree+0x33e/0xa20 [ 873.404116] copy_mnt_ns+0x167/0xa30 [ 873.407833] ? create_new_namespaces+0x30/0x720 [ 873.412496] ? do_mount+0x2a00/0x2a00 [ 873.416290] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 873.421301] ? kmem_cache_alloc+0x35f/0x3c0 [ 873.425619] create_new_namespaces+0xc9/0x720 [ 873.430108] ? security_capable+0x88/0xb0 [ 873.434258] copy_namespaces+0x27b/0x310 [ 873.438317] copy_process.part.0+0x2600/0x6f00 [ 873.442896] ? get_pid_task+0xb8/0x130 [ 873.446782] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 873.451716] ? __cleanup_sighand+0x40/0x40 [ 873.455950] ? lock_downgrade+0x740/0x740 [ 873.460099] _do_fork+0x184/0xc80 [ 873.463557] ? fork_idle+0x270/0x270 [ 873.467264] ? fput+0xb/0x140 [ 873.470366] ? SyS_write+0x14d/0x210 [ 873.474078] ? SyS_read+0x210/0x210 [ 873.477699] ? SyS_clock_settime+0x1a0/0x1a0 [ 873.482101] ? do_syscall_64+0x4c/0x640 [ 873.486069] ? sys_vfork+0x20/0x20 [ 873.489606] do_syscall_64+0x1d5/0x640 [ 873.493495] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 873.498673] RIP: 0033:0x45de59 [ 873.501852] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 873.509551] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 873.516812] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 873.524077] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 873.531427] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000039 [ 873.538691] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:05:15 executing program 1: syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:05:15 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:05:15 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) chroot(&(0x7f00000000c0)='./file2\x00') mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:05:15 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x24000844) ioctl$VIDIOC_S_FREQUENCY(0xffffffffffffffff, 0x402c5639, &(0x7f00000001c0)={0x7ff, 0x4, 0x6}) sendmsg(r0, &(0x7f0000000680)={0x0, 0x13000003, &(0x7f00000000c0)=[{&(0x7f0000000080)='f', 0xffffff1f}], 0x8, 0x0, 0x0, 0xf00}, 0x780f8) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc87,\x00\xd2\x97\x04\x03\xdc\r') openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000004c0)='lo\x00\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\xff\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00y.\xfc*_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7f\r\xb2\xcf\x8a\xc9(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0-\x96\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:05:15 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0x110) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:15 executing program 1: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x158}}, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x80000000fb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x2, 0x5e22, @local}, 0x10) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x101844, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000480)=[@in6={0xa, 0x4e24, 0x5, @private2, 0x5}, @in={0x2, 0x4e20, @broadcast}, @in={0x2, 0x4e21, @remote}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, @in={0x2, 0x4e24, @rand_addr=0x64010101}, @in6={0xa, 0x4e24, 0x2, @loopback}], 0x78) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:05:15 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(0xffffffffffffffff, 0xc0305602, &(0x7f00000000c0)={0x0, 0x25ea, 0x1002, 0x1}) [ 874.291930] FAULT_INJECTION: forcing a failure. [ 874.291930] name failslab, interval 1, probability 0, space 0, times 0 [ 874.303307] CPU: 1 PID: 16748 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 874.311197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 874.320549] Call Trace: [ 874.323138] dump_stack+0x1b2/0x283 [ 874.326766] should_fail.cold+0x10a/0x154 [ 874.330918] should_failslab+0xd6/0x130 [ 874.334945] __kmalloc_track_caller+0x2bc/0x400 [ 874.339610] ? kstrdup_const+0x35/0x60 [ 874.343494] ? lock_downgrade+0x740/0x740 [ 874.347661] kstrdup+0x36/0x70 [ 874.350847] kstrdup_const+0x35/0x60 [ 874.354556] alloc_vfsmnt+0xe0/0x7f0 [ 874.358266] clone_mnt+0x6c/0xff0 [ 874.361722] copy_tree+0x33e/0xa20 [ 874.365265] copy_mnt_ns+0x167/0xa30 [ 874.368976] ? create_new_namespaces+0x30/0x720 [ 874.373640] ? do_mount+0x2a00/0x2a00 [ 874.377438] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 874.382448] ? kmem_cache_alloc+0x35f/0x3c0 [ 874.386765] create_new_namespaces+0xc9/0x720 [ 874.391250] ? security_capable+0x88/0xb0 [ 874.395395] copy_namespaces+0x27b/0x310 [ 874.399455] copy_process.part.0+0x2600/0x6f00 [ 874.404039] ? finish_task_switch+0x178/0x610 [ 874.408531] ? lock_downgrade+0x740/0x740 [ 874.412677] ? _raw_spin_unlock_irq+0x24/0x80 [ 874.417180] ? __cleanup_sighand+0x40/0x40 [ 874.421415] ? retint_kernel+0x2d/0x2d [ 874.425300] _do_fork+0x184/0xc80 [ 874.428748] ? fork_idle+0x270/0x270 [ 874.432454] ? retint_kernel+0x2d/0x2d [ 874.436346] ? do_syscall_64+0x4c/0x640 [ 874.440312] ? sys_vfork+0x20/0x20 [ 874.443849] do_syscall_64+0x1d5/0x640 [ 874.447738] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 874.452918] RIP: 0033:0x45de59 [ 874.456101] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 874.463804] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 874.471068] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 874.478330] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 874.485595] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000003a 00:05:16 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0x110) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 874.492861] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:05:16 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, &(0x7f00000002c0)) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x2, 0x9, 0x80, 0x9, 0x7, 0x0, 0x70bd28, 0x25dfdbff, [@sadb_spirange={0x2, 0x10, 0x4d6, 0x4d3}, @sadb_x_nat_t_type={0x1, 0x14, 0xae}, @sadb_x_sa2={0x2, 0x13, 0x7f, 0x0, 0x0, 0x70bd2c, 0x3500}]}, 0x38}}, 0x4004040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000012c0)) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:05:16 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0x110) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:16 executing program 1: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x158}}, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x80000000fb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x2, 0x5e22, @local}, 0x10) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x101844, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000480)=[@in6={0xa, 0x4e24, 0x5, @private2, 0x5}, @in={0x2, 0x4e20, @broadcast}, @in={0x2, 0x4e21, @remote}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, @in={0x2, 0x4e24, @rand_addr=0x64010101}, @in6={0xa, 0x4e24, 0x2, @loopback}], 0x78) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:05:16 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0x110) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:16 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2020) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0x110) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:16 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f00000000c0)=0x80000000) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nvme-fabrics\x00', 0x101803, 0x0) openat(r0, &(0x7f0000000200)='./file1\x00', 0x20100, 0x70) bind(0xffffffffffffffff, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_SET_KEY(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYBLOB="24e6fff60000005a95fbe0b3ab4db8b73a5e558a7708a671160234b8c6f85e6f2c9ffd9285cc66d85bde4d8d0773b6ae650edaab16837cdc453c95069ea3aee7f3d8165fa136d2524eb73b318232d7d3e308a47ea5c25ea11a23", @ANYRES16=r5, @ANYBLOB="755900000000000000000200000008000300", @ANYRES32=r4, @ANYBLOB="0500080000000000"], 0x24}}, 0x0) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000680)={&(0x7f0000000440)={0x12c, r1, 0x100, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x81, 0x5c}}}}, [@NL80211_ATTR_REKEY_DATA={0x14, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x6}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x284}]}, @NL80211_ATTR_REKEY_DATA={0x54, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "19e1e55af8909edb"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="268ed03c3a2b2781e8dc00"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="d18f396bfb708df8f3fb25ea0aea4edb"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="dd1eca37500a3e326ac84bbeb5e548a0"}]}, @NL80211_ATTR_REKEY_DATA={0xc, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x8}]}, @NL80211_ATTR_REKEY_DATA={0xc, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x2}]}, @NL80211_ATTR_REKEY_DATA={0x40, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="b757c0b70109000000668aba724f3797"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x12da}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "4269b27d9a6518f6"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="b9763ac4abe92a6cb6886af39c6c280f"}]}, @NL80211_ATTR_REKEY_DATA={0x40, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xff}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="6d088f2d03245a9528798c0157f7fe79"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="cb3d1f4903937584e8bc4f9d7efeec6c"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "0d6cc9a95f9a6ff1"}]}, @NL80211_ATTR_REKEY_DATA={0x4}]}, 0x12c}, 0x1, 0x0, 0x0, 0x800}, 0xc0) creat(&(0x7f00000002c0)='./file1\x00', 0x1) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, &(0x7f00000003c0)) r6 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x7fffffff, 0x3, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x67, 0x80}, {&(0x7f0000000780)="ebe3e099ac30562abe7505fb664d476b3e4f3027ff80b726c0264e69b21767d3b4bb377292661ccb5bffdede5a86802b2bb9329d20a410c6c7e944debd5a10352fa90691eddee84eec7f3a3b14e71b4307157704955a474e72d132524cc4fc49471c3e55000d01d0abdbb978ac244bfc5a4ab00f40d8bf741a18996ae186712fa84cc95ffd43c115a65d85d32362c3b55f364270ac5a9096924a35cfc66f33f05203c7417743fd884744afe94ecced92a7c52784f46ae9e098223bf413af9816832d3dc28f609ab65f98a42ce9a96df91e3ea295a440529015315c0269787b99ab6c30ecbc7c4460a388dbd1313ab142f4baf11e44b7c539a85a0610e1d252b3cb66316a37be04149be2e19ef35d6e54373fb7fce95b1f59b67c53d3ef41", 0x11e, 0x600}, {0x0, 0x0, 0x10e00}], 0x400, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000040)) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r7, 0xc0045520, &(0x7f0000000300)=0x3f) mkdirat(r6, &(0x7f0000000040)='./file1\x00', 0x0) 00:05:16 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x12500, 0x0) connect$pppl2tp(r0, &(0x7f0000004300)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0xfffffffd, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private1}}}, 0x3a) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, &(0x7f0000000180)) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000080)={0x7fc, 0x1000, 0x10000, 0x8, 0xffffffff, 0xea}) openat$cgroup_ro(r1, &(0x7f0000000100)='memory.current\x00', 0x26e1, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r2, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000140)=0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r3, 0x4008af23, &(0x7f0000000000)={0x3, 0x1}) 00:05:16 executing program 5 (fault-call:10 fault-nth:59): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:05:16 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2020) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0x110) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 875.010463] FAT-fs (loop0): bogus number of reserved sectors 00:05:16 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2020) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0x110) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7f}, 0x0, 0x0, 0x0, 0x0, 0x200000400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000080)={0x0, r0}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='erspan0\x00', 0xff89) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r2, 0x80045700, &(0x7f00000000c0)) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x400000000000075, 0x0) open(0x0, 0x0, 0x0) [ 875.057653] FAT-fs (loop0): Can't find a valid FAT filesystem [ 875.164744] FAULT_INJECTION: forcing a failure. [ 875.164744] name failslab, interval 1, probability 0, space 0, times 0 [ 875.176097] CPU: 0 PID: 16809 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 875.183988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 875.193335] Call Trace: [ 875.195922] dump_stack+0x1b2/0x283 [ 875.199551] should_fail.cold+0x10a/0x154 [ 875.203703] should_failslab+0xd6/0x130 [ 875.207674] kmem_cache_alloc+0x28e/0x3c0 [ 875.211910] alloc_vfsmnt+0x23/0x7f0 [ 875.215623] clone_mnt+0x6c/0xff0 [ 875.219076] copy_tree+0x33e/0xa20 [ 875.222620] copy_mnt_ns+0x167/0xa30 [ 875.226336] ? create_new_namespaces+0x30/0x720 [ 875.231002] ? do_mount+0x2a00/0x2a00 [ 875.234800] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 875.239828] ? kmem_cache_alloc+0x35f/0x3c0 [ 875.244149] create_new_namespaces+0xc9/0x720 [ 875.248637] ? security_capable+0x88/0xb0 [ 875.252785] copy_namespaces+0x27b/0x310 [ 875.256852] copy_process.part.0+0x2600/0x6f00 [ 875.261428] ? trace_hardirqs_on+0x10/0x10 [ 875.265656] ? check_preemption_disabled+0x35/0x240 [ 875.270663] ? check_preemption_disabled+0x35/0x240 [ 875.275675] ? finish_task_switch+0x178/0x610 [ 875.280173] ? __cleanup_sighand+0x40/0x40 [ 875.284406] ? _raw_spin_unlock_irq+0x5a/0x80 [ 875.288898] ? finish_task_switch+0x14d/0x610 [ 875.293387] ? switch_mm_irqs_off+0x2d2/0xeb0 [ 875.297881] _do_fork+0x184/0xc80 [ 875.301332] ? fork_idle+0x270/0x270 [ 875.305039] ? io_schedule_timeout+0x140/0x140 [ 875.309617] ? fput+0xb/0x140 [ 875.312724] ? do_syscall_64+0x4c/0x640 [ 875.316692] ? sys_vfork+0x20/0x20 [ 875.320231] do_syscall_64+0x1d5/0x640 [ 875.324121] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 875.329300] RIP: 0033:0x45de59 [ 875.332478] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 875.340183] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 875.347443] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 875.354704] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 875.361964] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000003b [ 875.369227] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:05:17 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:17 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp737'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:05:17 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7f}, 0x0, 0x0, 0x0, 0x0, 0x200000400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000080)={0x0, r0}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='erspan0\x00', 0xff89) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r2, 0x80045700, &(0x7f00000000c0)) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x400000000000075, 0x0) open(0x0, 0x0, 0x0) 00:05:17 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0xa0200, 0x0) ioctl$SNDRV_PCM_IOCTL_FORWARD(r1, 0x40084149, &(0x7f00000001c0)=0x6) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:05:17 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:17 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp737'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:05:17 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:17 executing program 5 (fault-call:10 fault-nth:60): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:05:17 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp737'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:05:17 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x1, 0x7, &(0x7f00000005c0)=[{&(0x7f0000000000)="eb3c66617400028001000240000004f801", 0x11}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}, {&(0x7f0000000300)="148f3c25fc40", 0x6, 0x3}, {&(0x7f0000000340)="74e0313300bd7782bbb7fa60ddf47c64a3072c6dcde7785e70dc779c99742f2f480e3dd89f95705ff18eee3fe7b9c9d4e53086c81d1440bf2ff05156d2de419ca4e7e18e1bfd0b71fc527ce7e925de4edbefc91d5da9d4d553bb9cd40a15a0b2455ec68f4678b13c6c5d928f520c6a3f507e8d07118db785d479c5b26b270b1565adacb3a66d6d4126c92a3f049348cefc4bf83a9e7c82f0284e5d4d2052d2875a5b6fc6d1054eb44ee509645a32e56952c004d6a3b58e5c9bd1d3b92cc52d5f925729458db183f72a3f687774ae6718eaa0752028441fe2b6", 0xe3, 0x6}, {&(0x7f0000000440)="c5dfad02937fb2665b20f8f5481fdddbea182b7931af74824df4a755f277422a0047ee7be0136cab4aca5ef512fe5de4d600e3abf0aabb20841b06b045a0c87aa87d6abb4e5c449a4dbeb5cf0f84fd27e9748164f187f805c0255b19efcb71778f05b6c7d81dd6cc400be7fa56fd5f25ee6caf319b073a145244ea537afb3bc86f9eb72ab738a775f0c045cce48fd9c1596ec95b0141e5d1fd2ae1107459fe096009052f1c96ffcb7684", 0xaa, 0x1}, {&(0x7f0000000500)="9672accced6bac733744e7ccb7c38acfe297ef85d1d0ce158d9d39bb9f3889d0a8f9c0fabb3a2790f59657df378fcb9c7414f816207840b0aff639805844b44f90aa2594687808de165114a177ed363f4f9914e6871737d0f65ca79df9d1cc25783e8c03c5eb5294b64077795d6ddf4692d3b31cc7038dde7e7615f7a91f36ad24b2af2a92f3f6045a7cbd29f083ef64fd73cf02", 0x94, 0xffffffffffffffff}], 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="696f636861727365743d6370313235312c726f6469722c696f636861727365743d6d616363726f617469616e2c616c6c6f775f7574696d653d30303030303030303030303030303030303030063432322c00"]) accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000080)=0x60, 0x80000) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) r1 = socket(0x11, 0x800000003, 0x8) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) accept4$unix(r1, &(0x7f00000001c0)=@abs, &(0x7f00000000c0)=0x6e, 0x100000) 00:05:17 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp737'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:05:17 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 876.027206] FAULT_INJECTION: forcing a failure. [ 876.027206] name failslab, interval 1, probability 0, space 0, times 0 [ 876.039315] CPU: 0 PID: 16872 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 876.047214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 876.056559] Call Trace: [ 876.059146] dump_stack+0x1b2/0x283 [ 876.062877] should_fail.cold+0x10a/0x154 [ 876.067029] should_failslab+0xd6/0x130 [ 876.071004] kmem_cache_alloc+0x28e/0x3c0 [ 876.075151] alloc_vfsmnt+0x23/0x7f0 [ 876.078865] clone_mnt+0x6c/0xff0 [ 876.082319] copy_tree+0x33e/0xa20 [ 876.086001] copy_mnt_ns+0x167/0xa30 [ 876.089728] ? create_new_namespaces+0x30/0x720 [ 876.094398] ? do_mount+0x2a00/0x2a00 [ 876.098198] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 876.103214] ? kmem_cache_alloc+0x35f/0x3c0 [ 876.107543] create_new_namespaces+0xc9/0x720 [ 876.112037] ? security_capable+0x88/0xb0 [ 876.116188] copy_namespaces+0x27b/0x310 [ 876.120252] copy_process.part.0+0x2600/0x6f00 [ 876.124837] ? get_pid_task+0xb8/0x130 [ 876.128724] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 876.133662] ? __cleanup_sighand+0x40/0x40 [ 876.137896] ? lock_downgrade+0x740/0x740 [ 876.142047] _do_fork+0x184/0xc80 [ 876.145631] ? fork_idle+0x270/0x270 [ 876.149608] ? fput+0xb/0x140 [ 876.152918] ? SyS_write+0x14d/0x210 [ 876.156629] ? SyS_read+0x210/0x210 [ 876.160258] ? do_syscall_64+0x4c/0x640 [ 876.164230] ? sys_vfork+0x20/0x20 [ 876.167768] do_syscall_64+0x1d5/0x640 [ 876.171659] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 876.176109] FAT-fs (loop0): Unrecognized mount option "allow_utime=0000000000000000000422" or missing value [ 876.176838] RIP: 0033:0x45de59 [ 876.176844] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 876.176855] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 876.176861] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 876.176866] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 876.176871] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000003c 00:05:17 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 876.176876] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:05:18 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f00000000c0)=0x80000000) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nvme-fabrics\x00', 0x101803, 0x0) openat(r0, &(0x7f0000000200)='./file1\x00', 0x20100, 0x70) bind(0xffffffffffffffff, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_SET_KEY(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYBLOB="24e6fff60000005a95fbe0b3ab4db8b73a5e558a7708a671160234b8c6f85e6f2c9ffd9285cc66d85bde4d8d0773b6ae650edaab16837cdc453c95069ea3aee7f3d8165fa136d2524eb73b318232d7d3e308a47ea5c25ea11a23", @ANYRES16=r5, @ANYBLOB="755900000000000000000200000008000300", @ANYRES32=r4, @ANYBLOB="0500080000000000"], 0x24}}, 0x0) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000680)={&(0x7f0000000440)={0x12c, r1, 0x100, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x81, 0x5c}}}}, [@NL80211_ATTR_REKEY_DATA={0x14, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x6}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x284}]}, @NL80211_ATTR_REKEY_DATA={0x54, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "19e1e55af8909edb"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="268ed03c3a2b2781e8dc00"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="d18f396bfb708df8f3fb25ea0aea4edb"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="dd1eca37500a3e326ac84bbeb5e548a0"}]}, @NL80211_ATTR_REKEY_DATA={0xc, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x8}]}, @NL80211_ATTR_REKEY_DATA={0xc, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x2}]}, @NL80211_ATTR_REKEY_DATA={0x40, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="b757c0b70109000000668aba724f3797"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x12da}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "4269b27d9a6518f6"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="b9763ac4abe92a6cb6886af39c6c280f"}]}, @NL80211_ATTR_REKEY_DATA={0x40, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xff}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="6d088f2d03245a9528798c0157f7fe79"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="cb3d1f4903937584e8bc4f9d7efeec6c"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "0d6cc9a95f9a6ff1"}]}, @NL80211_ATTR_REKEY_DATA={0x4}]}, 0x12c}, 0x1, 0x0, 0x0, 0x800}, 0xc0) creat(&(0x7f00000002c0)='./file1\x00', 0x1) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, &(0x7f00000003c0)) r6 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x7fffffff, 0x3, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x67, 0x80}, {&(0x7f0000000780)="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", 0x11e, 0x600}, {0x0, 0x0, 0x10e00}], 0x400, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000040)) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r7, 0xc0045520, &(0x7f0000000300)=0x3f) mkdirat(r6, &(0x7f0000000040)='./file1\x00', 0x0) 00:05:18 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 876.333062] FAT-fs (loop0): Unrecognized mount option "allow_utime=0000000000000000000422" or missing value 00:05:18 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file2\x00', 0x2) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:05:18 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x1, 0x7, &(0x7f00000005c0)=[{&(0x7f0000000000)="eb3c66617400028001000240000004f801", 0x11}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}, {&(0x7f0000000300)="148f3c25fc40", 0x6, 0x3}, {&(0x7f0000000340)="74e0313300bd7782bbb7fa60ddf47c64a3072c6dcde7785e70dc779c99742f2f480e3dd89f95705ff18eee3fe7b9c9d4e53086c81d1440bf2ff05156d2de419ca4e7e18e1bfd0b71fc527ce7e925de4edbefc91d5da9d4d553bb9cd40a15a0b2455ec68f4678b13c6c5d928f520c6a3f507e8d07118db785d479c5b26b270b1565adacb3a66d6d4126c92a3f049348cefc4bf83a9e7c82f0284e5d4d2052d2875a5b6fc6d1054eb44ee509645a32e56952c004d6a3b58e5c9bd1d3b92cc52d5f925729458db183f72a3f687774ae6718eaa0752028441fe2b6", 0xe3, 0x6}, {&(0x7f0000000440)="c5dfad02937fb2665b20f8f5481fdddbea182b7931af74824df4a755f277422a0047ee7be0136cab4aca5ef512fe5de4d600e3abf0aabb20841b06b045a0c87aa87d6abb4e5c449a4dbeb5cf0f84fd27e9748164f187f805c0255b19efcb71778f05b6c7d81dd6cc400be7fa56fd5f25ee6caf319b073a145244ea537afb3bc86f9eb72ab738a775f0c045cce48fd9c1596ec95b0141e5d1fd2ae1107459fe096009052f1c96ffcb7684", 0xaa, 0x1}, {&(0x7f0000000500)="9672accced6bac733744e7ccb7c38acfe297ef85d1d0ce158d9d39bb9f3889d0a8f9c0fabb3a2790f59657df378fcb9c7414f816207840b0aff639805844b44f90aa2594687808de165114a177ed363f4f9914e6871737d0f65ca79df9d1cc25783e8c03c5eb5294b64077795d6ddf4692d3b31cc7038dde7e7615f7a91f36ad24b2af2a92f3f6045a7cbd29f083ef64fd73cf02", 0x94, 0xffffffffffffffff}], 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="696f636861727365743d6370313235312c726f6469722c696f636861727365743d6d616363726f617469616e2c616c6c6f775f7574696d653d30303030303030303030303030303030303030063432322c00"]) accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000080)=0x60, 0x80000) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) r1 = socket(0x11, 0x800000003, 0x8) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) accept4$unix(r1, &(0x7f00000001c0)=@abs, &(0x7f00000000c0)=0x6e, 0x100000) 00:05:18 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000004200)={0x50, 0x0, r0}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:18 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='i#C]set=cp1251,\x00']) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) [ 876.631733] FAT-fs (loop0): Unrecognized mount option "i#C]set=cp1251" or missing value 00:05:18 executing program 5 (fault-call:10 fault-nth:61): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:05:18 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f0000000800)={{0x6, 0x1, 0x0, 0x2, '\x00', 0x43}, 0x0, [0x4aa, 0xfffffffffffffeff, 0xfffffffffffffffc, 0x5, 0x3c0b, 0x200, 0x4, 0x3, 0xbc, 0x20000000000000, 0xffffffff80000000, 0x3, 0x4, 0x6, 0x800, 0x1f, 0x0, 0x81, 0x400, 0x0, 0x8000, 0x1f, 0x1, 0x9, 0x8, 0x3, 0x80000000, 0x6, 0x4, 0x4, 0x80, 0x1f, 0x1, 0x11c, 0xfffffffffffffffb, 0x800, 0x2, 0x2c60, 0xf038, 0x3, 0x2, 0x6, 0x5, 0xb2, 0x0, 0x4, 0x9, 0x2, 0x1, 0x9, 0x5, 0x0, 0x1, 0xfffffffffffffff8, 0x9, 0x8, 0x4, 0x2540000000000000, 0x100000001, 0x8b, 0x5b, 0x1200000000000, 0xfffffffff360d8b6, 0x8001, 0xfffffffffffff369, 0xb77, 0x7, 0x6, 0x1f, 0x4, 0x6e, 0x1000000000000, 0xfffffffeffffffff, 0x5, 0x400, 0x80, 0x3ff, 0x3, 0x3, 0x9, 0x5, 0x10000, 0x1, 0xffffffff, 0x4, 0x8a8, 0xc0000000000, 0x7, 0x9, 0x8000, 0x1, 0x9, 0x1, 0x100000001, 0x5, 0x8001, 0x401, 0x5, 0x0, 0x1, 0x80, 0x6, 0x7ff, 0x4, 0x200, 0x8, 0x80000000, 0xac17, 0xc79, 0x1, 0x4, 0x8, 0x326a, 0x4, 0xc65, 0x8, 0x2, 0x1000, 0x100000001, 0x7, 0x100, 0x80, 0x10001, 0x5, 0x9, 0x81, 0x38, 0x2]}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRESDEC=r1, @ANYRESOCT=r0, @ANYRES32, @ANYRESOCT=r1]) chdir(&(0x7f0000000000)='./file1\x00') r2 = creat(&(0x7f0000000240)='./file1\x00', 0x0) fallocate(r2, 0x100000001, 0x0, 0x2811ffff) socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x404400, 0x0) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f0000000100)={0x7ff, 0x1, 0x8, 0x1ff, 0x8}) 00:05:18 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000004200)={0x50, 0x0, r0}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:18 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x603}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/233, 0xe9}, {&(0x7f00000003c0)=""/118, 0x76}, {&(0x7f00000000c0)=""/41, 0x29}, {&(0x7f0000000440)=""/133, 0x85}, {&(0x7f0000000500)=""/76, 0x4c}, {&(0x7f0000000580)=""/97, 0x61}, {&(0x7f0000000600)=""/140, 0x8c}, {&(0x7f00000006c0)=""/97, 0x61}], 0x8, &(0x7f00000007c0)=""/146, 0x92}, 0x10020) [ 876.705811] print_req_error: I/O error, dev loop0, sector 0 [ 876.716393] FAT-fs (loop0): Unrecognized mount option "i#C]set=cp1251" or missing value 00:05:18 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000004200)={0x50, 0x0, r0}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 876.909418] FAULT_INJECTION: forcing a failure. [ 876.909418] name failslab, interval 1, probability 0, space 0, times 0 [ 876.921680] CPU: 1 PID: 16932 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 876.929568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 876.938936] Call Trace: [ 876.941536] dump_stack+0x1b2/0x283 [ 876.945164] should_fail.cold+0x10a/0x154 [ 876.949311] should_failslab+0xd6/0x130 [ 876.953285] kmem_cache_alloc+0x28e/0x3c0 [ 876.957547] alloc_vfsmnt+0x23/0x7f0 [ 876.961260] clone_mnt+0x6c/0xff0 [ 876.964714] copy_tree+0x33e/0xa20 [ 876.968395] copy_mnt_ns+0x167/0xa30 [ 876.972111] ? create_new_namespaces+0x30/0x720 [ 876.976782] ? do_mount+0x2a00/0x2a00 [ 876.980580] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 876.985590] ? kmem_cache_alloc+0x35f/0x3c0 [ 876.989908] create_new_namespaces+0xc9/0x720 [ 876.994399] ? security_capable+0x88/0xb0 [ 876.998545] copy_namespaces+0x27b/0x310 [ 877.002600] copy_process.part.0+0x2600/0x6f00 [ 877.007177] ? get_pid_task+0xb8/0x130 [ 877.011062] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 877.015998] ? __cleanup_sighand+0x40/0x40 [ 877.020227] ? lock_downgrade+0x740/0x740 [ 877.024376] _do_fork+0x184/0xc80 [ 877.027828] ? fork_idle+0x270/0x270 [ 877.031538] ? fput+0xb/0x140 [ 877.034640] ? SyS_write+0x14d/0x210 [ 877.038347] ? SyS_read+0x210/0x210 [ 877.041974] ? do_syscall_64+0x4c/0x640 [ 877.045949] ? sys_vfork+0x20/0x20 [ 877.049486] do_syscall_64+0x1d5/0x640 [ 877.053374] entry_SYSCALL_64_after_hwframe+0x46/0xbb 00:05:18 executing program 0: bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000080)={0x1f, 0x8, @any, 0x3, 0x1}, 0xe) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='trusted.overlay.redirect\x00', &(0x7f0000000200)='#{%*\x00', 0x5, 0x2) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000000400)=""/247) r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:05:18 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 877.058558] RIP: 0033:0x45de59 [ 877.061738] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 877.069438] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 877.076698] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 877.083964] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 877.091401] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000003d [ 877.098666] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:05:18 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:19 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:19 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="696f6368109e736574a66370313235312c00"]) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:05:19 executing program 2: mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 877.423247] FAT-fs (loop0): Unrecognized mount option "iochsetcp1251" or missing value 00:05:19 executing program 2: mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 877.476029] print_req_error: I/O error, dev loop0, sector 0 [ 877.490035] FAT-fs (loop0): Unrecognized mount option "iochsetcp1251" or missing value 00:05:19 executing program 5 (fault-call:10 fault-nth:62): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) [ 877.747493] FAULT_INJECTION: forcing a failure. [ 877.747493] name failslab, interval 1, probability 0, space 0, times 0 [ 877.758908] CPU: 1 PID: 16970 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 877.766798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 877.776151] Call Trace: [ 877.778743] dump_stack+0x1b2/0x283 [ 877.782375] should_fail.cold+0x10a/0x154 [ 877.786549] should_failslab+0xd6/0x130 [ 877.790523] __kmalloc_track_caller+0x2bc/0x400 [ 877.795188] ? kstrdup_const+0x35/0x60 [ 877.799071] kstrdup+0x36/0x70 [ 877.802261] kstrdup_const+0x35/0x60 [ 877.805975] alloc_vfsmnt+0xe0/0x7f0 [ 877.809684] clone_mnt+0x6c/0xff0 [ 877.813137] copy_tree+0x33e/0xa20 [ 877.816682] copy_mnt_ns+0x167/0xa30 [ 877.820393] ? create_new_namespaces+0x30/0x720 [ 877.825053] ? do_mount+0x2a00/0x2a00 [ 877.828848] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 877.833855] ? kmem_cache_alloc+0x35f/0x3c0 [ 877.838176] create_new_namespaces+0xc9/0x720 [ 877.842671] ? security_capable+0x88/0xb0 [ 877.846818] copy_namespaces+0x27b/0x310 [ 877.850881] copy_process.part.0+0x2600/0x6f00 [ 877.855462] ? _raw_spin_unlock_irq+0x5a/0x80 [ 877.859954] ? trace_hardirqs_on+0x10/0x10 [ 877.864184] ? switch_mm_irqs_off+0x2d2/0xeb0 [ 877.868676] ? check_preemption_disabled+0x35/0x240 [ 877.873690] ? check_preemption_disabled+0x35/0x240 [ 877.878701] ? finish_task_switch+0x178/0x610 [ 877.883199] ? __cleanup_sighand+0x40/0x40 [ 877.887428] ? _raw_spin_unlock_irq+0x5a/0x80 [ 877.891917] ? finish_task_switch+0x14d/0x610 [ 877.896404] ? switch_mm_irqs_off+0x2d2/0xeb0 [ 877.900900] _do_fork+0x184/0xc80 [ 877.904351] ? fork_idle+0x270/0x270 [ 877.908054] ? io_schedule_timeout+0x140/0x140 [ 877.912631] ? fput+0xb/0x140 [ 877.915733] ? do_syscall_64+0x4c/0x640 [ 877.919702] ? sys_vfork+0x20/0x20 [ 877.923243] do_syscall_64+0x1d5/0x640 [ 877.927127] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 877.932309] RIP: 0033:0x45de59 [ 877.935490] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 877.943192] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 877.950455] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 877.957718] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 877.964981] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000003e [ 877.972243] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:05:22 executing program 1: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = dup(r0) setsockopt$sock_int(r0, 0x1, 0xc, &(0x7f0000000100)=0x101, 0x4) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x4002, @multicast, 'batadv0\x00'}}, 0x1e) sendmsg$NFNL_MSG_ACCT_DEL(r1, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000980)={&(0x7f0000001300)=ANY=[], 0x8c}}, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:mtrr_device_t:s0\x00', 0x23, 0x3) 00:05:22 executing program 2: mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:22 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) prctl$PR_MCE_KILL_GET(0x22) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:05:22 executing program 5 (fault-call:10 fault-nth:63): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:05:22 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:22 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x2a2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r3, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "ff19574972ac36c61600003ffd0000bfffffff"}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r4, 0xc02064b9, &(0x7f00000001c0)={&(0x7f0000000040)=[0x5], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x1, 0xf95}) 00:05:22 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='iocjarset=cp1251,\x00']) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, &(0x7f0000000340)) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000580)=[&(0x7f0000000480)='vfat\x00', &(0x7f00000004c0)='vfat\x00', &(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='vfat\x00'], &(0x7f0000000600)=[&(0x7f00000005c0)='\x00']) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/82, 0x52, 0x40010141, &(0x7f00000002c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e) 00:05:22 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 880.627240] FAULT_INJECTION: forcing a failure. [ 880.627240] name failslab, interval 1, probability 0, space 0, times 0 [ 880.638619] CPU: 1 PID: 16995 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 880.646508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 880.655855] Call Trace: [ 880.658442] dump_stack+0x1b2/0x283 [ 880.662074] should_fail.cold+0x10a/0x154 [ 880.666221] should_failslab+0xd6/0x130 [ 880.670193] __kmalloc_track_caller+0x2bc/0x400 [ 880.674857] ? kstrdup_const+0x35/0x60 [ 880.678743] ? lock_downgrade+0x740/0x740 [ 880.682889] kstrdup+0x36/0x70 [ 880.686096] kstrdup_const+0x35/0x60 [ 880.689814] alloc_vfsmnt+0xe0/0x7f0 [ 880.693518] ? clone_mnt+0x67/0xff0 [ 880.697140] clone_mnt+0x6c/0xff0 [ 880.700591] copy_tree+0x33e/0xa20 [ 880.704137] copy_mnt_ns+0x167/0xa30 [ 880.707853] ? create_new_namespaces+0x30/0x720 [ 880.712529] ? do_mount+0x2a00/0x2a00 [ 880.716326] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 880.721340] ? kmem_cache_alloc+0x35f/0x3c0 [ 880.725660] create_new_namespaces+0xc9/0x720 [ 880.730146] ? security_capable+0x88/0xb0 [ 880.734291] copy_namespaces+0x27b/0x310 [ 880.738348] copy_process.part.0+0x2600/0x6f00 [ 880.742926] ? get_pid_task+0xb8/0x130 [ 880.746812] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 880.751760] ? __cleanup_sighand+0x40/0x40 [ 880.755996] ? lock_downgrade+0x740/0x740 [ 880.760145] _do_fork+0x184/0xc80 [ 880.763616] ? fork_idle+0x270/0x270 [ 880.767327] ? fput+0xb/0x140 [ 880.770432] ? SyS_write+0x14d/0x210 [ 880.774138] ? SyS_read+0x210/0x210 [ 880.777763] ? SyS_clock_settime+0x1a0/0x1a0 [ 880.782170] ? do_syscall_64+0x4c/0x640 [ 880.786138] ? sys_vfork+0x20/0x20 [ 880.789694] do_syscall_64+0x1d5/0x640 [ 880.793582] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 880.798763] RIP: 0033:0x45de59 [ 880.801943] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 880.809644] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 880.816908] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 00:05:22 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 880.824170] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 880.831435] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000003f [ 880.838698] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:05:22 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(0x0, &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 880.943577] FAT-fs (loop0): Unrecognized mount option "iocjarset=cp1251" or missing value 00:05:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="616f63686172132eaf0cbd8e73000001008a56730500f9000000000035392d31342c0157c69417c825e4117d7b"]) syz_init_net_socket$ax25(0x3, 0x3, 0xcf) 00:05:22 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(0x0, &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 881.027037] FAT-fs (loop0): Unrecognized mount option "iocjarset=cp1251" or missing value 00:05:22 executing program 1: bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) 00:05:22 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="696f636841727365963d313235312c00"]) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:05:22 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(0x0, &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 881.164159] FAT-fs (loop0): Unrecognized mount option "iochArse=1251" or missing value 00:05:23 executing program 5 (fault-call:10 fault-nth:64): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:05:23 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000001c0)={0x0, 0x0}) setpriority(0x0, r1, 0xfff) write$cgroup_int(0xffffffffffffffff, &(0x7f00000002c0)=0x3, 0x12) ioctl$SNDCTL_FM_4OP_ENABLE(r0, 0x4004510f, &(0x7f00000000c0)) r2 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r2, &(0x7f0000000040)='./file1\x00', 0x0) 00:05:23 executing program 1: ioctl$SNDCTL_SYNTH_INFO(0xffffffffffffffff, 0xc08c5102, &(0x7f0000000280)={"3778f1ed390e8dbab6d85061a45209fe3d7579d434b91ee5fcba81514705", 0x0, 0x1, 0x401, 0x1, 0x0, 0x0, 0x3, 0x0, [0x0, 0x8, 0x100, 0xffff, 0x3, 0x4, 0x6, 0xcdeb, 0x81, 0x400, 0x6, 0x4, 0x0, 0x2, 0x0, 0x76, 0x5003, 0x2, 0x800]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000140)={0x3}) r1 = syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000000)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404200a0200027400f830", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) fstatfs(r1, &(0x7f0000000180)=""/235) r2 = dup3(r1, r1, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f0000000340)=""/4096, &(0x7f0000000100)=0x1000) 00:05:23 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', 0x0, &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:23 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', 0x0, &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 881.370452] print_req_error: I/O error, dev loop0, sector 0 [ 881.387440] print_req_error: I/O error, dev loop0, sector 0 [ 881.393219] Buffer I/O error on dev loop0, logical block 0, async page read [ 881.401777] print_req_error: I/O error, dev loop0, sector 0 [ 881.407585] Buffer I/O error on dev loop0, logical block 0, async page read [ 881.416279] print_req_error: I/O error, dev loop0, sector 0 [ 881.422106] Buffer I/O error on dev loop0, logical block 0, async page read [ 881.433795] print_req_error: I/O error, dev loop0, sector 0 [ 881.439588] Buffer I/O error on dev loop0, logical block 0, async page read [ 881.455566] print_req_error: I/O error, dev loop0, sector 0 [ 881.461690] Buffer I/O error on dev loop0, logical block 0, async page read [ 881.475956] FAULT_INJECTION: forcing a failure. [ 881.475956] name failslab, interval 1, probability 0, space 0, times 0 [ 881.480033] print_req_error: I/O error, dev loop0, sector 0 [ 881.493768] CPU: 1 PID: 17053 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 881.493948] Buffer I/O error on dev loop0, logical block 0, async page read [ 881.501650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 881.511116] print_req_error: I/O error, dev loop0, sector 24 [ 881.518058] Call Trace: [ 881.518075] dump_stack+0x1b2/0x283 [ 881.518090] should_fail.cold+0x10a/0x154 [ 881.518104] should_failslab+0xd6/0x130 [ 881.518113] __kmalloc_track_caller+0x2bc/0x400 [ 881.518121] ? kstrdup_const+0x35/0x60 [ 881.518131] ? lock_downgrade+0x740/0x740 [ 881.518140] kstrdup+0x36/0x70 [ 881.518148] kstrdup_const+0x35/0x60 [ 881.518157] alloc_vfsmnt+0xe0/0x7f0 [ 881.518169] clone_mnt+0x6c/0xff0 [ 881.524383] Buffer I/O error on dev loop0, logical block 3, async page read [ 881.526544] copy_tree+0x33e/0xa20 [ 881.526560] copy_mnt_ns+0x167/0xa30 [ 881.579246] ? create_new_namespaces+0x30/0x720 [ 881.583911] ? do_mount+0x2a00/0x2a00 [ 881.587708] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 881.592717] ? kmem_cache_alloc+0x35f/0x3c0 [ 881.597035] create_new_namespaces+0xc9/0x720 [ 881.601523] ? security_capable+0x88/0xb0 [ 881.605679] copy_namespaces+0x27b/0x310 [ 881.609736] copy_process.part.0+0x2600/0x6f00 [ 881.614314] ? finish_task_switch+0x178/0x610 [ 881.618811] ? lock_downgrade+0x740/0x740 00:05:23 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYRESHEX=r0, @ANYRESOCT, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="ac2667726175705f69643d3db7d3b6657ffc86f420cb", @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f00000077c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1, {0x7, 0x1f, 0x0, 0x26000}}, 0x50) r2 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(r0, &(0x7f00000042c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00(`qH\x00', 0x2000, &(0x7f00000062c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006340)={0x20}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x200400, 0x0) ioctl$SNAPSHOT_FREE(r3, 0x3305) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x480b03, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=@newtfilter={0x48, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {}, {0xfff2}}, [@filter_kind_options=@f_flower={{0xb, 0x1, 'flower\x00'}, {0x18, 0x2, [@TCA_FLOWER_KEY_IPV6_DST={0x14, 0x10, @loopback}]}}]}, 0x48}}, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r6, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x0, 0x400, 0x70bd27, 0x25dfdbfc, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0x805) ioctl$NS_GET_USERNS(r6, 0xb701, 0x0) getdents(r2, 0x0, 0x0) read$FUSE(r0, &(0x7f0000009800)={0x2020}, 0x2020) 00:05:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) gettid() r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x101000, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r2, 0x400455c8, 0x0) [ 881.622958] ? _raw_spin_unlock_irq+0x24/0x80 [ 881.627458] ? __cleanup_sighand+0x40/0x40 [ 881.631698] _do_fork+0x184/0xc80 [ 881.635145] ? fork_idle+0x270/0x270 [ 881.638851] ? retint_kernel+0x2d/0x2d [ 881.642735] ? SyS_read+0x210/0x210 [ 881.646357] ? do_syscall_64+0x4c/0x640 [ 881.650327] ? sys_vfork+0x20/0x20 [ 881.650889] Unknown ioctl 21539 [ 881.653859] do_syscall_64+0x1d5/0x640 [ 881.653874] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 881.653882] RIP: 0033:0x45de59 [ 881.653886] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 881.653895] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 881.653899] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 881.653904] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 881.653909] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000040 [ 881.653914] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:05:23 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', 0x0, &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:23 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', 0x0, 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:23 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', 0x0, 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 881.959467] Unknown ioctl 21539 00:05:23 executing program 1: r0 = syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f0000000280)=[{&(0x7f0000000080)="083d906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f00000001c0)="4a9668ae8762ff0f0000000000001b1958b93cf6b8652e074cb095d1", 0x1c, 0x605}, {0x0, 0x0, 0x10e07}], 0x0, &(0x7f0000000100)) ioctl$KVM_SET_GSI_ROUTING(0xffffffffffffffff, 0x4008ae6a, &(0x7f0000000300)={0x9, 0x0, [{0x1ff, 0x2, 0x0, 0x0, @sint={0x10000, 0x7}}, {0x82, 0x3, 0x0, 0x0, @irqchip={0xfc000000, 0xf9ad}}, {0x49, 0x4, 0x0, 0x0, @adapter={0x1ff, 0x67, 0x9, 0x1, 0x8}}, {0x9, 0x1, 0x0, 0x0, @sint={0xfe, 0x5}}, {0x1ff, 0x4, 0x0, 0x0, @sint={0x5, 0x7}}, {0x20, 0x4, 0x0, 0x0, @msi={0xfffffff9, 0x70000, 0x3c05, 0x42}}, {0x4, 0x4, 0x0, 0x0, @msi={0x0, 0xfffffffb, 0x0, 0xfffffffc}}, {0x1f, 0x3, 0x0, 0x0, @irqchip={0xffffffff, 0x7f}}, {0x20, 0x2, 0x0, 0x0, @msi={0x7, 0x7ff, 0x7f, 0x6}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) r1 = socket(0x11, 0x800000003, 0x7) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f0000000140)=0x81, 0x4) 00:05:23 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', 0x0, 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:23 executing program 5 (fault-call:10 fault-nth:65): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:05:23 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) ioctl$sock_rose_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3f, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={'nr', 0x0}, 0x2, [@default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) 00:05:24 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:24 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) flistxattr(r1, &(0x7f0000001100)=""/75, 0x4b) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000001180), 0x10) ioctl$BTRFS_IOC_RM_DEV_V2(r1, 0x5000943a, &(0x7f0000000100)={{r0}, 0x0, 0x12, @inherit={0x70, &(0x7f0000000080)=ANY=[@ANYBLOB="01000100000000000500000000000000090000000000000004000000000000000a000000000000000200000000000000000000000000000001000000000000001c0b0000000000000000004000000000030000000000000008000000000000000100000000000000aa9cb11254994b6b"]}, @subvolid}) connect$netrom(r1, 0x0, 0x0) listen(r1, 0x0) unshare(0x40000000) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000000000000004000000000000000000000040000000000000000fcff380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f9ffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000100"/883], 0x378) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)="0c268a927f1f6588b9676b0a41ba7860ac5cf65ac618ded8974895abebf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7aec7213ae620624b0855d88fecf90b1a", 0x4d, 0x20c49e, 0x0, 0x0) open_by_handle_at(r2, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], 0x20080) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000000c0)='./file0\x00', r3, r4) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000016c0)={{{@in=@multicast2, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x0, 0x4e20, 0xdc, 0x2, 0x80, 0xa0, 0x3c, 0x0, r3}, {0x8, 0x6, 0xa6, 0x4, 0x99e, 0x2, 0xfffffffffffffff7, 0x5a}, {0x3, 0x3ff, 0x3, 0x2}, 0x6, 0x6e6bbc, 0x2}, {{@in6=@dev={0xfe, 0x80, [], 0x29}, 0x4d4, 0x33}, 0xa, @in6=@ipv4={[], [], @remote}, 0x0, 0x3, 0x3, 0x5, 0x10001, 0xfff, 0x1}}, 0xe8) [ 882.370385] FAULT_INJECTION: forcing a failure. [ 882.370385] name failslab, interval 1, probability 0, space 0, times 0 [ 882.381803] CPU: 0 PID: 17096 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 882.389780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 882.399225] Call Trace: [ 882.401809] dump_stack+0x1b2/0x283 [ 882.405437] should_fail.cold+0x10a/0x154 [ 882.409583] should_failslab+0xd6/0x130 [ 882.413553] kmem_cache_alloc+0x28e/0x3c0 [ 882.417697] alloc_vfsmnt+0x23/0x7f0 [ 882.421406] clone_mnt+0x6c/0xff0 [ 882.424859] copy_tree+0x33e/0xa20 [ 882.428401] copy_mnt_ns+0x167/0xa30 [ 882.432113] ? create_new_namespaces+0x30/0x720 [ 882.436781] ? do_mount+0x2a00/0x2a00 [ 882.440576] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 882.445588] ? kmem_cache_alloc+0x35f/0x3c0 [ 882.449905] create_new_namespaces+0xc9/0x720 [ 882.454504] ? security_capable+0x88/0xb0 [ 882.458654] copy_namespaces+0x27b/0x310 [ 882.462717] copy_process.part.0+0x2600/0x6f00 [ 882.467300] ? get_pid_task+0xb8/0x130 [ 882.471190] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 882.476126] ? __cleanup_sighand+0x40/0x40 [ 882.480362] ? lock_downgrade+0x740/0x740 [ 882.484510] _do_fork+0x184/0xc80 [ 882.487960] ? fork_idle+0x270/0x270 [ 882.491670] ? fput+0xb/0x140 [ 882.494769] ? SyS_write+0x14d/0x210 [ 882.498476] ? SyS_read+0x210/0x210 [ 882.502099] ? do_syscall_64+0x4c/0x640 [ 882.506073] ? sys_vfork+0x20/0x20 [ 882.509609] do_syscall_64+0x1d5/0x640 [ 882.513497] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 882.518678] RIP: 0033:0x45de59 [ 882.521859] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 882.529559] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 882.536821] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 882.544083] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 882.551345] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000041 [ 882.558606] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:05:24 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:24 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x120080, &(0x7f0000000000)=ANY=[@ANYRES16=0x0]) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:05:24 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 882.833679] IPVS: ftp: loaded support on port[0] = 21 00:05:24 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:24 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:24 executing program 5 (fault-call:10 fault-nth:66): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:05:24 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17, 0x1}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='yoOhapset=cp1251,\x00']) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x120) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x3c, r2, 0x1, 0x0, 0x0, {{}, {}, {0x3, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'veth1_virt_wifi\x00'}}}}}, 0x3c}}, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x34, r2, 0x200, 0x70bd2d, 0x25dfdbfe, {{}, {}, {0x18, 0x17, {0xe, 0x1, @l2={'eth', 0x3a, 'vlan1\x00'}}}}, ["", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x4000880}, 0x24000040) r3 = syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f00000001c0)='./file0\x00', 0xfebb, 0x4, &(0x7f00000005c0)=[{&(0x7f00000002c0)="f0bd76527352dcf3f612a2d5dc00fda2b1b6fadee13e99316ad804cd0f500aae526852b2c8600e7646b1695d70a4e5954e46d7591a40dccec3490b8b5f0ee8353fb37efaa76f8f2a15d61182fbefc6c92a589f45e9861da2fd468d30f4236c227e5b36fabc8ff4677aa77d359379296571e52e5186558a863fd07e648fff3514ea4b218c70c9a5e992a93fb4c7863d39f3e839bf593761cc11be130933eb9d53bdf5161f4689655080dab238", 0xac, 0xfffffffffffffff8}, {&(0x7f0000000380)="92ec9ee88d410adecab4fc90bbb5c55259accca12047c5915cf9819bce16545144e21c3f42616ca0bc4dd875dacd22a5cd80cc636997800a39f9dcb7f2ee9e09d4dc07b9b536eb464890315ec54924680b0ef3b75d964eaec741b37f15272c41e949a21ce2c265872f28b8a989b51fde51e57fa0bf0c6c65e11660649cab108ee53c98f8a0a019b6f336165ff08b43d5e9ebbef652", 0x95, 0x10000}, {&(0x7f0000000440)="2d5cfd74cdfc671da7228ba6218b111d9705f200fd37ff071fc3c72640f7bb75292e9b93e240f27be6442b8a48295f949baa50f1151dd48524a2297369f7c330acfa1e2eb266ebde6f92522f4a452fefea7d75ef207cc7caa4e6da87199b479abdd104e860b005cb36f348d85d3c4bbab7a3f5d91baf961e36b57985b07c5889ae1e303505de43a8086b89d6e76c3ef43e50a25d02e3845acfdc1f0e8a4b1fcd039dafc2f43141162fd7aab69138b373b54f0a1b4cf3ac4a4074ecfd1e7558d5873afc74dc329b0b3b", 0xc9, 0x3}, {&(0x7f0000000540)="d8c5bb99227d3be80c30f5ffaccfa00c9daa54061d4b523fcc4f8cc3a9292f2c810e9617fe31cf81d00d91d92c417a99176d14daa7f7b63ea9d173894d80fe831ba0afd968c40f09f384238949d242", 0x4f}], 0x8800, &(0x7f0000000200)={[{@map_normal='map=normal'}, {@iocharset={'iocharset', 0x3d, 'macinuit'}}], [{@smackfsroot={'smackfsroot', 0x3d, 'vfat\x00'}}]}) mknodat(r3, &(0x7f0000000640)='./file0\x00', 0x800, 0x7f) [ 883.161767] FAT-fs (loop0): Unrecognized mount option "yoOhapset=cp1251" or missing value 00:05:24 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 883.219589] print_req_error: I/O error, dev loop0, sector 0 [ 883.325387] FAULT_INJECTION: forcing a failure. [ 883.325387] name failslab, interval 1, probability 0, space 0, times 0 [ 883.336771] CPU: 1 PID: 17157 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 883.344657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 883.354005] Call Trace: [ 883.356595] dump_stack+0x1b2/0x283 [ 883.360222] should_fail.cold+0x10a/0x154 [ 883.364381] should_failslab+0xd6/0x130 [ 883.368354] kmem_cache_alloc+0x28e/0x3c0 [ 883.372499] alloc_vfsmnt+0x23/0x7f0 [ 883.376207] clone_mnt+0x6c/0xff0 [ 883.379661] copy_tree+0x33e/0xa20 [ 883.383207] copy_mnt_ns+0x167/0xa30 [ 883.386919] ? create_new_namespaces+0x30/0x720 [ 883.391583] ? do_mount+0x2a00/0x2a00 [ 883.395380] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 883.400395] ? kmem_cache_alloc+0x35f/0x3c0 [ 883.404720] create_new_namespaces+0xc9/0x720 [ 883.409223] ? security_capable+0x88/0xb0 [ 883.413374] copy_namespaces+0x27b/0x310 [ 883.417433] copy_process.part.0+0x2600/0x6f00 [ 883.422018] ? trace_hardirqs_on+0x10/0x10 [ 883.426253] ? check_preemption_disabled+0x35/0x240 [ 883.431264] ? check_preemption_disabled+0x35/0x240 [ 883.436279] ? finish_task_switch+0x178/0x610 [ 883.440780] ? __cleanup_sighand+0x40/0x40 [ 883.445010] ? _raw_spin_unlock_irq+0x5a/0x80 [ 883.449500] ? finish_task_switch+0x14d/0x610 [ 883.453988] ? switch_mm_irqs_off+0x2d2/0xeb0 [ 883.458505] _do_fork+0x184/0xc80 [ 883.461963] ? fork_idle+0x270/0x270 [ 883.465669] ? io_schedule_timeout+0x140/0x140 [ 883.470243] ? fput+0xb/0x140 [ 883.473359] ? do_syscall_64+0x4c/0x640 [ 883.477330] ? sys_vfork+0x20/0x20 [ 883.480869] do_syscall_64+0x1d5/0x640 [ 883.484758] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 883.489939] RIP: 0033:0x45de59 [ 883.493122] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 883.500820] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 883.508081] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 883.515343] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 883.522605] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000042 [ 883.529864] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:05:25 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:25 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) flistxattr(r1, &(0x7f0000001100)=""/75, 0x4b) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000001180), 0x10) ioctl$BTRFS_IOC_RM_DEV_V2(r1, 0x5000943a, &(0x7f0000000100)={{r0}, 0x0, 0x12, @inherit={0x70, &(0x7f0000000080)=ANY=[@ANYBLOB="01000100000000000500000000000000090000000000000004000000000000000a000000000000000200000000000000000000000000000001000000000000001c0b0000000000000000004000000000030000000000000008000000000000000100000000000000aa9cb11254994b6b"]}, @subvolid}) connect$netrom(r1, 0x0, 0x0) listen(r1, 0x0) unshare(0x40000000) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000000000000004000000000000000000000040000000000000000fcff380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f9ffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000100"/883], 0x378) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)="0c268a927f1f6588b9676b0a41ba7860ac5cf65ac618ded8974895abebf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7aec7213ae620624b0855d88fecf90b1a", 0x4d, 0x20c49e, 0x0, 0x0) open_by_handle_at(r2, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], 0x20080) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000000c0)='./file0\x00', r3, r4) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000016c0)={{{@in=@multicast2, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x0, 0x4e20, 0xdc, 0x2, 0x80, 0xa0, 0x3c, 0x0, r3}, {0x8, 0x6, 0xa6, 0x4, 0x99e, 0x2, 0xfffffffffffffff7, 0x5a}, {0x3, 0x3ff, 0x3, 0x2}, 0x6, 0x6e6bbc, 0x2}, {{@in6=@dev={0xfe, 0x80, [], 0x29}, 0x4d4, 0x33}, 0xa, @in6=@ipv4={[], [], @remote}, 0x0, 0x3, 0x3, 0x5, 0x10001, 0xfff, 0x1}}, 0xe8) 00:05:25 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000000c0)=""/22) 00:05:25 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="696f636860727365743d6370313235312c002834fa8291e366cf8c69919514e1717ec6d52ec4972aeeea92ae4c4a7d1d11e1101dca96550980260c7a9e03edaa5c3653037b6ec5dc"]) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:05:25 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:25 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 883.837714] print_req_error: I/O error, dev loop0, sector 0 [ 883.858071] FAT-fs (loop0): Unrecognized mount option "ioch`rset=cp1251" or missing value 00:05:25 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:25 executing program 5 (fault-call:10 fault-nth:67): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) [ 883.923019] FAT-fs (loop0): Unrecognized mount option "ioch`rset=cp1251" or missing value 00:05:25 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x40241, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) ioctl$SG_GET_TIMEOUT(r0, 0x2202, 0x0) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f00000000c0)=0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$cgroup_freezer_state(r1, &(0x7f0000000000)='FREEZING\x00', 0xfe0f) r4 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r4, &(0x7f0000000040)='./file1\x00', 0x0) [ 883.985962] print_req_error: I/O error, dev loop0, sector 0 00:05:25 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 884.217291] FAULT_INJECTION: forcing a failure. [ 884.217291] name failslab, interval 1, probability 0, space 0, times 0 [ 884.229306] CPU: 0 PID: 17222 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 884.237196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 884.246544] Call Trace: [ 884.249129] dump_stack+0x1b2/0x283 [ 884.253022] should_fail.cold+0x10a/0x154 [ 884.257174] should_failslab+0xd6/0x130 [ 884.261149] kmem_cache_alloc+0x28e/0x3c0 [ 884.265296] alloc_vfsmnt+0x23/0x7f0 [ 884.269007] clone_mnt+0x6c/0xff0 [ 884.272460] copy_tree+0x33e/0xa20 [ 884.276007] copy_mnt_ns+0x167/0xa30 [ 884.279718] ? do_mount+0x2a00/0x2a00 [ 884.283517] create_new_namespaces+0xc9/0x720 [ 884.288006] ? security_capable+0x88/0xb0 [ 884.292150] copy_namespaces+0x27b/0x310 [ 884.296207] copy_process.part.0+0x2600/0x6f00 [ 884.300796] ? get_pid_task+0xb8/0x130 [ 884.304717] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 884.309653] ? __cleanup_sighand+0x40/0x40 [ 884.313887] ? lock_downgrade+0x740/0x740 [ 884.318037] _do_fork+0x184/0xc80 [ 884.321490] ? fork_idle+0x270/0x270 [ 884.325198] ? fput+0xb/0x140 [ 884.328301] ? SyS_write+0x14d/0x210 [ 884.332012] ? SyS_read+0x210/0x210 [ 884.335637] ? SyS_clock_settime+0x1a0/0x1a0 [ 884.340048] ? do_syscall_64+0x4c/0x640 [ 884.344017] ? sys_vfork+0x20/0x20 [ 884.347551] do_syscall_64+0x1d5/0x640 [ 884.351437] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 884.356617] RIP: 0033:0x45de59 [ 884.359800] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 884.367499] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 884.374764] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 884.382025] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 884.389288] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000043 [ 884.396551] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:05:26 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) flistxattr(r1, &(0x7f0000001100)=""/75, 0x4b) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000001180), 0x10) ioctl$BTRFS_IOC_RM_DEV_V2(r1, 0x5000943a, &(0x7f0000000100)={{r0}, 0x0, 0x12, @inherit={0x70, &(0x7f0000000080)=ANY=[@ANYBLOB="01000100000000000500000000000000090000000000000004000000000000000a000000000000000200000000000000000000000000000001000000000000001c0b0000000000000000004000000000030000000000000008000000000000000100000000000000aa9cb11254994b6b"]}, @subvolid}) connect$netrom(r1, 0x0, 0x0) listen(r1, 0x0) unshare(0x40000000) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000000000000004000000000000000000000040000000000000000fcff380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f9ffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000100"/883], 0x378) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)="0c268a927f1f6588b9676b0a41ba7860ac5cf65ac618ded8974895abebf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7aec7213ae620624b0855d88fecf90b1a", 0x4d, 0x20c49e, 0x0, 0x0) open_by_handle_at(r2, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], 0x20080) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000000c0)='./file0\x00', r3, r4) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000016c0)={{{@in=@multicast2, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x0, 0x4e20, 0xdc, 0x2, 0x80, 0xa0, 0x3c, 0x0, r3}, {0x8, 0x6, 0xa6, 0x4, 0x99e, 0x2, 0xfffffffffffffff7, 0x5a}, {0x3, 0x3ff, 0x3, 0x2}, 0x6, 0x6e6bbc, 0x2}, {{@in6=@dev={0xfe, 0x80, [], 0x29}, 0x4d4, 0x33}, 0xa, @in6=@ipv4={[], [], @remote}, 0x0, 0x3, 0x3, 0x5, 0x10001, 0xfff, 0x1}}, 0xe8) 00:05:26 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:26 executing program 0: ioctl$CHAR_RAW_DISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000080)=0x4) r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="696f636861727365773d6370313235312c00ffa09938b30f419abcba12514e37b5902491fc52ae397456acd567676da224c6aeba62b9b48151051a1d30ac8bf56bb61b642e6ac7f1cfb9d0af2167"]) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:05:26 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:26 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f00000001c0)=[{&(0x7f0000000240)="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", 0x164, 0x3}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0xffffffffffffffff}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:05:26 executing program 5 (fault-call:10 fault-nth:68): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:05:26 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000340)=[{&(0x7f00000001c0)="eb3c90d10f680000006104000000010002405c00000001ee8f92bf20d3a9d8b15d10287d7c8d9f2ce9ef115ec916ce508ce47aa9a0a2339760e44c109c0214852dac846818b45dda72951d44c2ffe6c334798859d408e3a282597547a8a40be51be890a24b9e709addf6c1c6fb42756db42f7cbebf92834d7bed9d0ae7bc59983802883654b0522220ef334c8e9899293d77bc99ce0f2efcc83e42a1f0d160ad3485207364768b9e37f1f6c6f0374dee66b3582fec27c3c2f6aeeaab00affdcc43f72ff19f5520d76922a97263d00743e5fa0419250dd18925f72d0d72b126224153c9eaa3a1064a0547208a22f01de5fe3bd88536a9b55fd9340dfed66b8ad454d947939b28753ef91c334d0ef5582706fd5a3ef4ff287f1bf4c51080a2ca527f9f8a1209b96d9b9ab17d8059123d932a1cb564aa7351df696d27318a16ce293599af5db616cd686cfbd2c195817bf7612e1626e32cc50cf9b28ec8b611aa5b2d0f23e375e52a48f590bb", 0x16b, 0x8001}, {&(0x7f000000b800)="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", 0x174, 0x600}, {0x0, 0x0, 0x10e00}], 0x1080400, &(0x7f0000000080)=ANY=[]) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvme-fabrics\x00', 0x80000, 0x0) read$char_raw(r1, &(0x7f0000000400)={""/45716}, 0xb400) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x8200, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(r2, &(0x7f000000b980)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000003c0)={&(0x7f0000000100)={0x18, 0x140c, 0x20, 0x70bd2d, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}]}, 0x18}, 0x1, 0x0, 0x0, 0x20000000}, 0x24000000) r3 = socket$inet6(0xa, 0x80000, 0x9) ioctl$F2FS_IOC_GARBAGE_COLLECT(r3, 0x4004f506, &(0x7f000000b9c0)) 00:05:26 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 884.977742] print_req_error: I/O error, dev loop0, sector 0 [ 885.072842] FAULT_INJECTION: forcing a failure. [ 885.072842] name failslab, interval 1, probability 0, space 0, times 0 [ 885.084284] CPU: 0 PID: 17280 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 885.092176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 885.101541] Call Trace: [ 885.104138] dump_stack+0x1b2/0x283 [ 885.107768] should_fail.cold+0x10a/0x154 [ 885.111920] should_failslab+0xd6/0x130 [ 885.115893] __kmalloc_track_caller+0x2bc/0x400 [ 885.120555] ? kstrdup_const+0x35/0x60 [ 885.124438] ? lock_downgrade+0x740/0x740 [ 885.128583] kstrdup+0x36/0x70 [ 885.131770] kstrdup_const+0x35/0x60 [ 885.135483] alloc_vfsmnt+0xe0/0x7f0 [ 885.139200] clone_mnt+0x6c/0xff0 [ 885.142659] copy_tree+0x33e/0xa20 [ 885.146231] copy_mnt_ns+0x167/0xa30 [ 885.149953] ? create_new_namespaces+0x30/0x720 [ 885.154618] ? do_mount+0x2a00/0x2a00 [ 885.158417] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 885.163427] ? kmem_cache_alloc+0x35f/0x3c0 [ 885.167749] create_new_namespaces+0xc9/0x720 [ 885.172243] ? security_capable+0x88/0xb0 [ 885.176389] copy_namespaces+0x27b/0x310 [ 885.180445] copy_process.part.0+0x2600/0x6f00 [ 885.185025] ? get_pid_task+0xb8/0x130 [ 885.188908] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 885.193838] ? __cleanup_sighand+0x40/0x40 [ 885.198067] ? lock_downgrade+0x740/0x740 [ 885.202234] _do_fork+0x184/0xc80 [ 885.205682] ? fork_idle+0x270/0x270 [ 885.209389] ? fput+0xb/0x140 [ 885.212488] ? SyS_write+0x14d/0x210 [ 885.216195] ? SyS_read+0x210/0x210 [ 885.219819] ? SyS_clock_settime+0x1a0/0x1a0 [ 885.224230] ? do_syscall_64+0x4c/0x640 [ 885.228196] ? sys_vfork+0x20/0x20 [ 885.231739] do_syscall_64+0x1d5/0x640 [ 885.235624] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 885.240803] RIP: 0033:0x45de59 [ 885.243982] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 885.252119] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 885.259383] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 885.266647] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 885.273909] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000044 [ 885.281171] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:05:27 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:27 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:27 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000002c0)=ANY=[@ANYRESDEC=0x0]) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:05:27 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:27 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:27 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 885.574319] FAT-fs (loop0): Unrecognized mount option "00000000000000000000" or missing value 00:05:27 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0xf99, 0x7, 0x4, 0x4, 0xb4, 0x80, 0xe1, 0x3, 0x0}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000200)={r1, 0x200}, &(0x7f00000002c0)=0x8) r2 = socket(0x11, 0x800000003, 0x8) bind(r2, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) getpeername$inet(r2, &(0x7f0000000300)={0x2, 0x0, @initdev}, &(0x7f0000000340)=0x10) r3 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r3, &(0x7f0000000040)='./file1\x00', 0x0) getsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000000380)=0xfe0, &(0x7f00000003c0)=0x4) [ 885.657931] print_req_error: I/O error, dev loop0, sector 0 00:05:27 executing program 5 (fault-call:10 fault-nth:69): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:05:27 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:27 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:27 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2020) write$FUSE_INIT(r0, 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:27 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 885.971207] FAULT_INJECTION: forcing a failure. [ 885.971207] name failslab, interval 1, probability 0, space 0, times 0 [ 885.982902] CPU: 0 PID: 17340 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 885.990788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 886.000136] Call Trace: [ 886.002731] dump_stack+0x1b2/0x283 [ 886.006362] should_fail.cold+0x10a/0x154 [ 886.010514] should_failslab+0xd6/0x130 [ 886.014492] __kmalloc_track_caller+0x2bc/0x400 [ 886.019156] ? kstrdup_const+0x35/0x60 [ 886.023128] ? lock_downgrade+0x740/0x740 [ 886.027284] kstrdup+0x36/0x70 [ 886.030474] kstrdup_const+0x35/0x60 [ 886.034182] alloc_vfsmnt+0xe0/0x7f0 [ 886.037893] clone_mnt+0x6c/0xff0 [ 886.041348] copy_tree+0x33e/0xa20 [ 886.044892] copy_mnt_ns+0x167/0xa30 [ 886.048607] ? create_new_namespaces+0x30/0x720 [ 886.053266] ? do_mount+0x2a00/0x2a00 [ 886.057063] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 886.062073] ? kmem_cache_alloc+0x35f/0x3c0 [ 886.066403] create_new_namespaces+0xc9/0x720 [ 886.070892] ? security_capable+0x88/0xb0 [ 886.075038] copy_namespaces+0x27b/0x310 [ 886.079097] copy_process.part.0+0x2600/0x6f00 [ 886.083675] ? get_pid_task+0xb8/0x130 [ 886.087567] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 886.092501] ? __cleanup_sighand+0x40/0x40 [ 886.096733] ? lock_downgrade+0x740/0x740 [ 886.100880] _do_fork+0x184/0xc80 [ 886.104330] ? fork_idle+0x270/0x270 [ 886.108042] ? fput+0xb/0x140 [ 886.111270] ? SyS_write+0x14d/0x210 [ 886.114982] ? SyS_read+0x210/0x210 [ 886.118610] ? SyS_clock_settime+0x1a0/0x1a0 [ 886.123018] ? do_syscall_64+0x4c/0x640 [ 886.126991] ? sys_vfork+0x20/0x20 [ 886.130531] do_syscall_64+0x1d5/0x640 [ 886.134419] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 886.139606] RIP: 0033:0x45de59 [ 886.142789] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 886.150491] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 886.157752] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 886.165012] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 886.172274] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000045 [ 886.179540] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:05:28 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:28 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2020) write$FUSE_INIT(r0, 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:28 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:28 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2020) write$FUSE_INIT(r0, 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:28 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:28 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:28 executing program 0: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)={0xd0, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_PUBL={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x80000001}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xef72}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x60}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xff}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x20}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3fe}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x10001}]}, @TIPC_NLA_SOCK={0x20, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x741}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffffffb}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}]}, @TIPC_NLA_MEDIA={0x50, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc6}]}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x4000040}, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r1, &(0x7f0000000040)='./file1\x00', 0x0) 00:05:28 executing program 5 (fault-call:10 fault-nth:70): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:05:28 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:28 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 886.850909] FAULT_INJECTION: forcing a failure. [ 886.850909] name failslab, interval 1, probability 0, space 0, times 0 [ 886.862294] CPU: 1 PID: 17385 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 886.870184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 886.879618] Call Trace: [ 886.882203] dump_stack+0x1b2/0x283 [ 886.885854] should_fail.cold+0x10a/0x154 [ 886.889996] should_failslab+0xd6/0x130 [ 886.893999] kmem_cache_alloc+0x28e/0x3c0 [ 886.898143] alloc_vfsmnt+0x23/0x7f0 [ 886.901849] clone_mnt+0x6c/0xff0 [ 886.905300] copy_tree+0x33e/0xa20 [ 886.908841] copy_mnt_ns+0x167/0xa30 [ 886.912549] ? create_new_namespaces+0x30/0x720 [ 886.917212] ? do_mount+0x2a00/0x2a00 [ 886.921002] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 886.926018] ? kmem_cache_alloc+0x35f/0x3c0 [ 886.930356] create_new_namespaces+0xc9/0x720 [ 886.934845] ? security_capable+0x88/0xb0 [ 886.938991] copy_namespaces+0x27b/0x310 [ 886.943049] copy_process.part.0+0x2600/0x6f00 [ 886.947628] ? get_pid_task+0xb8/0x130 [ 886.951508] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 886.956445] ? __cleanup_sighand+0x40/0x40 [ 886.960681] ? lock_downgrade+0x740/0x740 [ 886.964829] _do_fork+0x184/0xc80 [ 886.968280] ? fork_idle+0x270/0x270 [ 886.971988] ? fput+0xb/0x140 [ 886.975090] ? SyS_write+0x14d/0x210 [ 886.978809] ? SyS_read+0x210/0x210 [ 886.982431] ? SyS_clock_settime+0x1a0/0x1a0 [ 886.986834] ? do_syscall_64+0x4c/0x640 [ 886.990804] ? sys_vfork+0x20/0x20 [ 886.994346] do_syscall_64+0x1d5/0x640 00:05:28 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:28 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f00000002c0)="e3e3f9595bc03bd0e099ac30562abe7505fb664d476b67d3b4bf3372927b0af5352bac886fb3654fe44b825a48da8d6cb7286f59379c76c55dbe832586570c75f13def5c4f6961318f20061b3f9797fd4556bdc4034bd93b42722d8a31578d620de9d851f01ba8015f96170a2287bb237b3ebbd4e1e1665e3ab1627179705d6fcd2d8c9605af1c33f36730fcc4dc600bc284", 0xfffffffffffffd09, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="6e6e6f6e756d746169d63d312c00"]) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="1000000017010007002e2f66696c6531664bc0cfb00fa32206f9d15f51fbbffcfa76ae77774fcc821c7dcbf242815df84b3eb258e0d03b4f68b42216ac00f66377c0226a65e79329741c"], 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x80, 0xfd, 0xe7}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000180)=0x4) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, 0xfffffffffffffffe, &(0x7f00000001c0)) 00:05:28 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 886.998243] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 887.003424] RIP: 0033:0x45de59 [ 887.006604] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 887.014306] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 887.021572] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 887.028836] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 887.036098] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000046 [ 887.043359] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:05:28 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:28 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) umount2(0x0, 0x3) 00:05:28 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:28 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) umount2(0x0, 0x3) 00:05:29 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000004200)={0x50}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:29 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) umount2(0x0, 0x3) [ 887.287086] FAT-fs (loop0): Unrecognized mount option "nnonumtai=1" or missing value 00:05:29 executing program 5 (fault-call:10 fault-nth:71): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:05:29 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000004200)={0x50}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:29 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x0) 00:05:29 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000004200)={0x50}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 887.719550] FAULT_INJECTION: forcing a failure. [ 887.719550] name failslab, interval 1, probability 0, space 0, times 0 [ 887.730955] CPU: 1 PID: 17437 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 887.738842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 887.748188] Call Trace: [ 887.750776] dump_stack+0x1b2/0x283 [ 887.754416] should_fail.cold+0x10a/0x154 [ 887.758565] should_failslab+0xd6/0x130 [ 887.762539] kmem_cache_alloc+0x28e/0x3c0 [ 887.766685] alloc_vfsmnt+0x23/0x7f0 [ 887.770389] clone_mnt+0x6c/0xff0 [ 887.773825] copy_tree+0x33e/0xa20 [ 887.777347] copy_mnt_ns+0x167/0xa30 [ 887.781142] ? create_new_namespaces+0x30/0x720 [ 887.785787] ? do_mount+0x2a00/0x2a00 [ 887.789566] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 887.794568] ? kmem_cache_alloc+0x35f/0x3c0 [ 887.798876] create_new_namespaces+0xc9/0x720 [ 887.803349] ? security_capable+0x88/0xb0 [ 887.807478] copy_namespaces+0x27b/0x310 [ 887.811518] copy_process.part.0+0x2600/0x6f00 [ 887.816091] ? get_pid_task+0xb8/0x130 [ 887.819964] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 887.824876] ? __cleanup_sighand+0x40/0x40 [ 887.829089] ? lock_downgrade+0x740/0x740 [ 887.833216] _do_fork+0x184/0xc80 [ 887.836646] ? fork_idle+0x270/0x270 [ 887.840341] ? fput+0xb/0x140 [ 887.843423] ? SyS_write+0x14d/0x210 [ 887.847113] ? SyS_read+0x210/0x210 [ 887.850730] ? do_syscall_64+0x4c/0x640 [ 887.854680] ? sys_vfork+0x20/0x20 [ 887.858209] do_syscall_64+0x1d5/0x640 [ 887.862077] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 887.867244] RIP: 0033:0x45de59 [ 887.870419] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 887.878192] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 887.885440] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 887.892710] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 887.899956] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000047 [ 887.907201] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:05:29 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@utf8='utf8=1'}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:05:29 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsa\x00', 0x1, 0x0) ioctl$TIOCL_SCROLLCONSOLE(r1, 0x541c, &(0x7f00000001c0)={0xd, 0xe86a}) 00:05:30 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f00000000c0)={'veth0_vlan\x00', {0x2, 0x0, @multicast2}}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:05:30 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvram\x00', 0x414100, 0x0) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f00000001c0)) r1 = syz_mount_image$vfat(&(0x7f0000000200)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000580)=[{&(0x7f0000000000)="eb3cb06d04f801", 0x7, 0x5}, {&(0x7f00000002c0)="e3e3e099ac30562a3e5d3027ff80b72640264e69b21767d3b4bf33729241a94d455ce20cf2636a766b97f3c7bba0e0b86309e27e73024320b0bb8d66983d219c86448c7bd7f147c0d8c0d0f16a085b3294b71764abd38c503b89ddea9d64bc636beaac2d5b11312a698405e27167b4af6d589f8cb30644d44b25d9780deebb59035fbc201f6d754969d440fc825c290e0e36bad0a9041229ec1ff7e12b8d67c81ddac4e5deb9ece0a162a93489910dcb090c7f8feddf983f8ca51104481a27acbf9822e3", 0xc4, 0x600}, {0x0, 0x0, 0x10e00}, {&(0x7f00000003c0)="715a0939cc481d4ed82772fa39e33ef92e0471aa29c4e555309760a9fff7c6faa0e85d5f19df09900675b4c46bb858f2aa25d824dbbd3ccb07e0c63f4eebf1c4d93336993acc2c8581f771c4c3adaa0f4b9fd5952a4d5689436147617afdd993fa74c4548e7249e69eb7afd202a94347abb3cb77cf1a84b5c3c7681ed4a263be7eb765ba8306cdfbebf3525ec46e3d3ba7098dca7f404515097d5fe58b81021d329dab4b33eeb478084da9a494a8047860", 0xb1, 0x52ec6623}, {&(0x7f0000000480)="75a6fa2a6b864b45e119196bab28a14aa47b4bea104b25ba37b13420c4359351068b0b9faa0b1cde6e4223c4478f00c8f0f9fdcff8c1ac41298c6470794affcdd7d8a7c649f59c62fef1d9f5354e573595b9386b0a84de39962ec2172c0398f8cb70af424ee7a01e43d174d59e8cffbe84f22dcc80f769944b1ef6a42ce4bd6234b3a39120e123b868fecca6a80ddb8c32312726dd4f953e9ec067191b6258b4b9b83837f614ca967f4f52870b9235d9a3684958d641d139b99e0858c6bddf073b032d", 0xc3, 0x400}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="be"]) mkdirat(r1, &(0x7f0000000140)='./file1\x00', 0x101) r2 = inotify_init1(0x800) ioctl$FS_IOC_SETVERSION(r2, 0x40087602, &(0x7f0000000040)) r3 = socket(0x11, 0x800000003, 0x8) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) sendmsg$NLBL_CIPSOV4_C_LIST(r3, &(0x7f0000000640)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000240)=ANY=[@ANYBLOB='h\b\x00\x00', @ANYRES16=0x0, @ANYBLOB="00032bbd7000ffdbdf2503000000080001000100000034000480050003000200000005000300020000000500030000000000050003000400480000000000000000000500030001000000080001000300000008000100030000000800020002000000"], 0x68}, 0x1, 0x0, 0x0, 0x8004}, 0x24040000) fsync(r0) 00:05:30 executing program 5 (fault-call:10 fault-nth:72): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:05:30 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:30 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x0) [ 888.471469] FAT-fs (loop0): Unrecognized mount option "" or missing value [ 888.569599] FAULT_INJECTION: forcing a failure. [ 888.569599] name failslab, interval 1, probability 0, space 0, times 0 [ 888.580950] CPU: 1 PID: 17473 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 888.588834] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 888.598279] Call Trace: [ 888.600864] dump_stack+0x1b2/0x283 [ 888.604494] should_fail.cold+0x10a/0x154 [ 888.608641] should_failslab+0xd6/0x130 [ 888.612614] __kmalloc_track_caller+0x2bc/0x400 [ 888.617276] ? kstrdup_const+0x35/0x60 [ 888.621159] ? lock_downgrade+0x740/0x740 [ 888.625301] kstrdup+0x36/0x70 [ 888.628489] kstrdup_const+0x35/0x60 [ 888.632198] alloc_vfsmnt+0xe0/0x7f0 [ 888.635907] clone_mnt+0x6c/0xff0 [ 888.639356] ? copy_tree+0x2a0/0xa20 [ 888.643260] copy_tree+0x33e/0xa20 [ 888.646803] copy_mnt_ns+0x167/0xa30 [ 888.650516] ? create_new_namespaces+0x30/0x720 [ 888.655179] ? do_mount+0x2a00/0x2a00 [ 888.658979] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 888.663995] ? kmem_cache_alloc+0x35f/0x3c0 [ 888.668314] create_new_namespaces+0xc9/0x720 [ 888.674282] ? security_capable+0x88/0xb0 [ 888.678431] copy_namespaces+0x27b/0x310 [ 888.682494] copy_process.part.0+0x2600/0x6f00 [ 888.687071] ? _raw_spin_unlock_irq+0x24/0x80 [ 888.691560] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 888.696573] ? _raw_spin_unlock_irq+0x5a/0x80 [ 888.701066] ? finish_task_switch+0x178/0x610 [ 888.705554] ? finish_task_switch+0x14d/0x610 [ 888.710041] ? switch_mm_irqs_off+0x2d2/0xeb0 [ 888.714544] ? __cleanup_sighand+0x40/0x40 [ 888.718781] _do_fork+0x184/0xc80 [ 888.722233] ? fork_idle+0x270/0x270 [ 888.725975] ? __sanitizer_cov_trace_pc+0x9/0x50 [ 888.730727] ? SyS_write+0x14d/0x210 [ 888.734432] ? SyS_read+0x210/0x210 [ 888.738056] ? do_syscall_64+0x4c/0x640 [ 888.742163] ? sys_vfork+0x20/0x20 [ 888.745687] do_syscall_64+0x1d5/0x640 [ 888.749555] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 888.754720] RIP: 0033:0x45de59 [ 888.757887] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 00:05:30 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 888.765571] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 888.772815] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 888.781189] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 888.788435] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000048 [ 888.795680] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:05:30 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) setxattr$trusted_overlay_upper(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', &(0x7f00000002c0)={0x0, 0xfb, 0x98, 0x1, 0x4, "6d45005c863ee48985b87d4f177138ac", "b2664a8d1dbbad77320535fc26876156e78070b1d20629363500ee01a0acb71635f3e6606cbd6baa17a930576c97dcfaafa2e3dc3cdd6aff1cef2392c4a42ccd6d0dc98ba81c538b637c3ebe8a7a31c0e7b34e28c6d5da5bf4cb1b02ef17d56fdd7ebf5f56fb273454823dddb113144db92bdd7c57155ad81c45261d1a07fc58f7fab5"}, 0x98, 0x2) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r0, 0x4008941a, &(0x7f0000000380)=0x2) 00:05:30 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x0) 00:05:30 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:30 executing program 1: mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:30 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='ioarse251,\x00\x00\x00']) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:05:30 executing program 1: mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:30 executing program 1: mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 889.185944] FAT-fs (loop0): Unrecognized mount option "ioarse251" or missing value 00:05:30 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x52) 00:05:30 executing program 5 (fault-call:10 fault-nth:73): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:05:31 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:31 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000940)={0xffffffffffffffff, 0x1, 0x3f, 0x1, 0x8}) sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)={0x3c, 0x1, 0x4, 0x801, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFULA_CFG_NLBUFSIZ={0x8}, @NFULA_CFG_FLAGS={0x6}, @NFULA_CFG_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x6}, @NFULA_CFG_FLAGS={0x6, 0x6, 0x1, 0x0, 0x4}, @NFULA_CFG_FLAGS={0x6, 0x6, 0x1, 0x0, 0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x20008011) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f00000001c0)='./file0\x00', 0x9f7, 0x8, &(0x7f0000000800)=[{&(0x7f00000002c0)="1ed48ebc19aa30e9ae51c1aef088f52afd9d0d27a20baf37f3b011d73bd94eb2a96bc7a29c70e847520f129337701cc3ba46216b1bec9e121b6deb7a0d7102fe26a83fae77d51a7f69e18880889f2c34de27f20ad44ff48dae208f3bfbf31d50357d4788508a4f489bafb15072baa1a754be32cc9b152601d7bc9371599b95fec8175af7288f784dd9e2e1d3f6f7a39b84e3f0125cb1bbc1dc8f1b9f56618662f68935a29639949326b1d224948ca506fcc0e4ca1187956c01c3c2124c59c27b9f2cf556fb8e1c", 0xc7, 0x7}, {&(0x7f00000003c0)="eece39308c2cce05c82a9960c8109d2afbeda440539b6a6034aa8123d48e853fc66c821f28e726ac7e04b413d46f6de5d0a465bc941bf4e5c38f73ac8dff8e2694b0dd5d74da606d6a3044c0ef1fdd6ddc13d50582021a6ad0738b4ee01821fb395a243b9682f56ec9fc6083518343c6e555c26a3b96825b05ca5848b0b2b37ab7025aace72337fd8e97ce8153c02ce722de9a28b50fc682c72792e31db5c25d4905d1a5", 0xa4, 0xc3}, {&(0x7f0000000480)="51fd29d1d69b3a1e9f8a06c03eaa0713ff09369645a0acf396d5928f943dfc74a67823c511a82c6e982eb03c1e3e1b4da51988226e1644b1fc787094895e41b3c13c6afb8284bc1f3ac538bbeaef3e1ad86d257508a2bc47fc52548617851ae1febd70d257ba5003267826cd58d135c302eb60e4bf52b7e0a85e0e8889c74bcaa8161a1c777f976de2130428e6590e5307ae192f4cd4af770f37c3ffddabe5188237ca2f58a42f6fec0b29763bfce873", 0xb0, 0xfffffffffffffff7}, {&(0x7f0000000540)="9d381bd7a3e4b7f4991c414995d7efe43030936320121e1f62c45f643b9117bc9a368161a00cb96c9333fc42d5d7e96800ce67e63de9902f434922121f7ba750571a76b9bad7a4bb588e100ff2709847cb8976c113945a1ee8c219ed8b1cbca53a8c2819dbac968221700b34bceedf5a6b6cef12f876c57cfc45a458a4399b3743e8223dea3fcd56499837d858eb", 0x8e, 0x1f}, {&(0x7f0000000200)="92267cdd115040b788bb50eb3993a682", 0x10, 0x4}, {&(0x7f0000000600)="fdb46f8ccba15ff966eed8f6610b563aaa6260d733e8a9e8edd41a6471c3da", 0x1f, 0x8}, {&(0x7f0000000640)="ae3a99705f34bc21193764617e6aa9712aa91c21a0607195ce79c906739d54930a07e2b43d2725996888305c3df2d3540f9cc4f911b41fc42608bd4bf8fd6cc558c6b8457ad8e3aecbb400d70bdcaf981833e68e8c489404c9f72533b180fa11d44d9ab9fabac7ad20324cc3c96e39982bfdd8af0db02636e825feaa6ac2ebea4409b7bcdd54c86b342d061b3c3a53732197e5de61aea76eaff65853289591f37223", 0xa2, 0x4e}, {&(0x7f0000000700)="039268fa87e17ac986a9e46783f2cdefaafdc5af49cfce5c8319a6e23caafd1a775b7b484d01bae96290504db3ad8b5f5713c2102ae49bba81b8aa0a48c4ea139489021b60de5b6e0c66fcbc72b483a9439110145226c43693eea286dfda1ffa84d2e7767b01f0ee5bacc9303ea5d5579e26b726936068c4f48fc5d679388bc0c659c7246b1825e9e071adf97d53b98c57d563bf2c26445fc7e47298de16dee966a90786f68ca490615c94f55a2e6321e3eb0f0595f12687ed3ca677e1d8796f346a747fd7bdba651df0c5e920514fa238cef2e574", 0xd5, 0x4}], 0x40, &(0x7f00000008c0)={[{@gid={'gid', 0x3d, 0xee00}}], [{@permit_directio='permit_directio'}, {@subj_user={'subj_user', 0x3d, '&)'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)='trusted.overlay.upper\x00', &(0x7f0000000b80)={0x0, 0xfb, 0x5d, 0x4, 0x70, "2615ef9518b60e9292c5a04d94802f3f", "274eae3b455ba27fe2d2bf078adf9f6ea344165e52a982acdf2aa246f411590c8217f3a95af75de2ac994f4af2548842782abccd691143fb1d13fb68b6a76cce448f38c6ddda24fa"}, 0x5d, 0x2) pivot_root(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000ac0)='./file1\x00') 00:05:31 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 889.459427] FAULT_INJECTION: forcing a failure. [ 889.459427] name failslab, interval 1, probability 0, space 0, times 0 [ 889.470882] CPU: 0 PID: 17522 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 889.478778] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 889.488126] Call Trace: [ 889.490714] dump_stack+0x1b2/0x283 [ 889.494347] should_fail.cold+0x10a/0x154 [ 889.498496] should_failslab+0xd6/0x130 [ 889.502469] __kmalloc_track_caller+0x2bc/0x400 [ 889.507131] ? kstrdup_const+0x35/0x60 [ 889.511012] ? lock_downgrade+0x740/0x740 [ 889.515155] kstrdup+0x36/0x70 [ 889.518343] kstrdup_const+0x35/0x60 [ 889.522052] alloc_vfsmnt+0xe0/0x7f0 [ 889.525764] clone_mnt+0x6c/0xff0 [ 889.529218] copy_tree+0x33e/0xa20 [ 889.532758] copy_mnt_ns+0x167/0xa30 [ 889.536467] ? create_new_namespaces+0x30/0x720 [ 889.541129] ? do_mount+0x2a00/0x2a00 [ 889.544929] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 889.549939] ? kmem_cache_alloc+0x35f/0x3c0 [ 889.554343] create_new_namespaces+0xc9/0x720 [ 889.558830] ? security_capable+0x88/0xb0 [ 889.562974] copy_namespaces+0x27b/0x310 [ 889.567033] copy_process.part.0+0x2600/0x6f00 [ 889.571616] ? get_pid_task+0xb8/0x130 [ 889.575500] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 889.580437] ? __cleanup_sighand+0x40/0x40 [ 889.584669] ? lock_downgrade+0x740/0x740 [ 889.588815] _do_fork+0x184/0xc80 [ 889.592266] ? fork_idle+0x270/0x270 [ 889.595981] ? fput+0xb/0x140 [ 889.599079] ? SyS_write+0x14d/0x210 [ 889.602806] ? SyS_read+0x210/0x210 [ 889.606428] ? SyS_clock_settime+0x1a0/0x1a0 [ 889.610830] ? do_syscall_64+0x4c/0x640 [ 889.614795] ? sys_vfork+0x20/0x20 [ 889.618330] do_syscall_64+0x1d5/0x640 [ 889.622217] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 889.627395] RIP: 0033:0x45de59 [ 889.630573] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 889.638276] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 889.645646] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 889.652908] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 889.660170] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000049 [ 889.667434] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:05:31 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:31 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(0x0, &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:31 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="696f6368617273183faa9770313235312c00"]) r1 = openat$mice(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/input/mice\x00', 0x4840) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) ioctl$KVM_SET_BOOT_CPU_ID(r2, 0xae78, &(0x7f0000000200)=0x1) write$P9_RSYMLINK(r1, &(0x7f00000001c0)={0x14, 0x11, 0x2, {0x4, 0x3, 0x8}}, 0x14) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:05:31 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(0x0, &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:31 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(0x0, &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 889.988342] FAT-fs (loop0): Unrecognized mount option "iochars?p1251" or missing value [ 890.069232] FAT-fs (loop0): Unrecognized mount option "iochars?p1251" or missing value 00:05:31 executing program 5 (fault-call:10 fault-nth:74): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:05:31 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', 0x0, &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 890.124482] print_req_error: I/O error, dev loop0, sector 0 00:05:31 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', 0x0, &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:32 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', 0x0, &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 890.321162] FAULT_INJECTION: forcing a failure. [ 890.321162] name failslab, interval 1, probability 0, space 0, times 0 [ 890.333226] CPU: 1 PID: 17564 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 890.341113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 890.350461] Call Trace: [ 890.353049] dump_stack+0x1b2/0x283 [ 890.356679] should_fail.cold+0x10a/0x154 [ 890.360828] should_failslab+0xd6/0x130 [ 890.364802] __kmalloc_track_caller+0x2bc/0x400 [ 890.369466] ? kstrdup_const+0x35/0x60 [ 890.373347] ? lock_downgrade+0x740/0x740 [ 890.377491] kstrdup+0x36/0x70 [ 890.380677] kstrdup_const+0x35/0x60 [ 890.384388] alloc_vfsmnt+0xe0/0x7f0 [ 890.388361] clone_mnt+0x6c/0xff0 [ 890.391815] copy_tree+0x33e/0xa20 [ 890.396225] copy_mnt_ns+0x167/0xa30 [ 890.399940] ? create_new_namespaces+0x30/0x720 [ 890.404603] ? do_mount+0x2a00/0x2a00 [ 890.408403] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 890.413413] ? kmem_cache_alloc+0x35f/0x3c0 [ 890.417731] create_new_namespaces+0xc9/0x720 [ 890.422219] ? security_capable+0x88/0xb0 [ 890.426371] copy_namespaces+0x27b/0x310 [ 890.430430] copy_process.part.0+0x2600/0x6f00 [ 890.435019] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 890.440032] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 890.444788] ? retint_kernel+0x2d/0x2d [ 890.448678] ? __cleanup_sighand+0x40/0x40 [ 890.452906] ? lock_downgrade+0x740/0x740 [ 890.457058] _do_fork+0x184/0xc80 [ 890.460512] ? fork_idle+0x270/0x270 [ 890.464218] ? fput+0xb/0x140 [ 890.467321] ? SyS_write+0x14d/0x210 [ 890.471030] ? SyS_read+0x210/0x210 [ 890.474658] ? do_syscall_64+0x4c/0x640 [ 890.478622] ? sys_vfork+0x20/0x20 [ 890.482161] do_syscall_64+0x1d5/0x640 [ 890.486056] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 890.491234] RIP: 0033:0x45de59 [ 890.494415] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 890.502114] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 890.509372] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 890.516658] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 890.523924] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000004a [ 890.531187] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:05:32 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', 0x0, 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:32 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000380)=0x4) r1 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17, 0x7}, {&(0x7f0000000180)="e3e3e099ac30562abe750504674d8100000000000000342640264e69b21767d3b495e17292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="696f4968743d7170313235312c00000000e3dd610a6f2c18cab0c57a8e497e9a025e3e1cc68bb1893aa3c9a06930bd34f2defd586bd98e02c2e2ac65fd0774ea7603bceef1a3f255ed508c15934db736d28c44fa52756f00c969e694ce90b22619565c36a495f69cbdc3fb5be6ff634fbfc2e8bc239251f28bb04ff70e899fe511b2241269343328c180db3c222cfe71decb3516e01044e41f1c3f"]) mkdirat(r1, &(0x7f0000000040)='./file1\x00', 0x0) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000200)="daefcd3350995c293efcf67e", 0xc, 0x0) r3 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$clear(0x7, r3) keyctl$link(0x8, r2, r3) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/consoles\x00', 0x0, 0x0) mount(&(0x7f0000000400)=@sg0='/dev/sg0\x00', &(0x7f0000000440)='./file1\x00', &(0x7f0000000480)='fusectl\x00', 0x2000, &(0x7f00000004c0)='keyring\x00') ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000780)={'\x00', &(0x7f0000000740)=@ethtool_modinfo={0x42, 0x81, 0xbf}}) 00:05:32 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', 0x0, 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 890.679207] FAT-fs (loop0): Unrecognized mount option "ioIht=qp1251" or missing value 00:05:32 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', 0x0, 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 890.749981] FAT-fs (loop0): Unrecognized mount option "ioIht=qp1251" or missing value 00:05:32 executing program 0: ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000440)={'syztnl2\x00', &(0x7f0000000500)={'syztnl1\x00', 0x0, 0x7800, 0x1, 0x0, 0x1, {{0x23, 0x4, 0x3, 0x18, 0x8c, 0x66, 0x0, 0x7f, 0x29, 0x0, @multicast2, @local, {[@timestamp_prespec={0x44, 0x14, 0x3d, 0x3, 0xe, [{@multicast1, 0x1}, {@local, 0xf7}]}, @lsrr={0x83, 0x3, 0x97}, @timestamp={0x44, 0x8, 0xd4, 0x0, 0x3, [0x9]}, @ra={0x94, 0x4}, @ssrr={0x89, 0x23, 0x1e, [@dev={0xac, 0x14, 0x14, 0x43}, @private=0xa010100, @loopback, @multicast1, @rand_addr=0x64010100, @multicast2, @remote, @multicast2]}, @rr={0x7, 0xf, 0x90, [@multicast2, @private=0xa010101, @multicast2]}, @noop, @ssrr={0x89, 0xb, 0xee, [@rand_addr=0x64010100, @broadcast]}, @timestamp_prespec={0x44, 0x14, 0x13, 0x3, 0x2, [{@local, 0xffff}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x80}]}]}}}}}) r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x2, 0x626801) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(r0, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f0000000480)={0x68, 0x0, 0x300, 0x70bd26, 0x25dfcbff, {{}, {@void, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x26}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x18}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x74}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0xa}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x2c}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0xd}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x66}]}, 0x68}, 0x1, 0x0, 0x0, 0x880}, 0x20008080) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="696f636861727365743d6370313235312c00cbb1e2d1a46008da5cb7b830294f622486b7e779219c41d421e213414998c85002c26a69af"]) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) r1 = syz_open_dev$audion(&(0x7f00000002c0)='/dev/audio#\x00', 0x7, 0x200000) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/autofs\x00', 0x0, 0x0) write$P9_RRENAME(r2, &(0x7f00000003c0)={0x7, 0x15, 0x1}, 0x7) ioctl$PPPIOCGCHAN(r1, 0x80047437, &(0x7f0000000300)) 00:05:32 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:32 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:32 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x1, 0x3, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x3}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@shortname_winnt='shortname=winnt'}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:05:32 executing program 5 (fault-call:10 fault-nth:75): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:05:32 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 891.021037] FAT-fs (loop0): invalid media value (0x30) [ 891.036332] FAT-fs (loop0): Can't find a valid FAT filesystem 00:05:32 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) getitimer(0x2, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000001c0)={0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') sendmsg$NL80211_CMD_SET_POWER_SAVE(r1, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x38, r2, 0x10, 0x70bd26, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x200, 0x51}}}}, [@NL80211_ATTR_PS_STATE={0x8, 0x5d, 0x1}, @NL80211_ATTR_PS_STATE={0x8, 0x5d, 0x1}, @NL80211_ATTR_PS_STATE={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x11}, 0x80) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:05:32 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 891.183819] FAULT_INJECTION: forcing a failure. [ 891.183819] name failslab, interval 1, probability 0, space 0, times 0 [ 891.195875] CPU: 0 PID: 17612 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 891.203766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 891.213117] Call Trace: [ 891.215711] dump_stack+0x1b2/0x283 [ 891.219345] should_fail.cold+0x10a/0x154 [ 891.223496] should_failslab+0xd6/0x130 [ 891.227473] kmem_cache_alloc+0x28e/0x3c0 [ 891.231624] alloc_vfsmnt+0x23/0x7f0 [ 891.235333] clone_mnt+0x6c/0xff0 [ 891.238788] copy_tree+0x33e/0xa20 [ 891.242334] copy_mnt_ns+0x167/0xa30 [ 891.246071] ? create_new_namespaces+0x30/0x720 [ 891.250737] ? do_mount+0x2a00/0x2a00 [ 891.254536] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 891.259568] ? kmem_cache_alloc+0x35f/0x3c0 [ 891.263888] create_new_namespaces+0xc9/0x720 [ 891.268379] ? security_capable+0x88/0xb0 [ 891.272529] copy_namespaces+0x27b/0x310 [ 891.276589] copy_process.part.0+0x2600/0x6f00 [ 891.281182] ? retint_kernel+0x2d/0x2d [ 891.285070] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 891.290087] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 891.294849] ? retint_kernel+0x2d/0x2d [ 891.298739] ? __cleanup_sighand+0x40/0x40 [ 891.302970] ? _raw_spin_unlock_irq+0x5a/0x80 [ 891.307460] ? finish_task_switch+0x14d/0x610 [ 891.311948] ? switch_mm_irqs_off+0x2d2/0xeb0 [ 891.316442] _do_fork+0x184/0xc80 [ 891.319891] ? fork_idle+0x270/0x270 [ 891.323601] ? io_schedule_timeout+0x140/0x140 [ 891.328176] ? fput+0xb/0x140 [ 891.331279] ? do_syscall_64+0x4c/0x640 [ 891.335244] ? sys_vfork+0x20/0x20 [ 891.338776] do_syscall_64+0x1d5/0x640 [ 891.342664] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 891.347846] RIP: 0033:0x45de59 [ 891.351027] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 891.358729] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 891.365988] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 891.373251] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 891.380509] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000004b [ 891.387770] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:05:33 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:33 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:33 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) r1 = socket(0x11, 0x800000003, 0x8) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) ioctl$SIOCX25GSUBSCRIP(r1, 0x89e0, &(0x7f00000002c0)={'bond_slave_0\x00', 0x9, 0x7fff}) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) r2 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x40000000004, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRESDEC=r0]) mkdirat(r2, &(0x7f0000000040)='./file1\x00', 0x0) 00:05:33 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 891.654709] FAT-fs (loop0): Unrecognized mount option "00000000000000000003" or missing value 00:05:33 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 891.736386] FAT-fs (loop0): Unrecognized mount option "00000000000000000003" or missing value 00:05:33 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) getitimer(0x2, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000001c0)={0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') sendmsg$NL80211_CMD_SET_POWER_SAVE(r1, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x38, r2, 0x10, 0x70bd26, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x200, 0x51}}}}, [@NL80211_ATTR_PS_STATE={0x8, 0x5d, 0x1}, @NL80211_ATTR_PS_STATE={0x8, 0x5d, 0x1}, @NL80211_ATTR_PS_STATE={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x11}, 0x80) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:05:33 executing program 5 (fault-call:10 fault-nth:76): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:05:33 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:33 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) getitimer(0x2, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000001c0)={0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') sendmsg$NL80211_CMD_SET_POWER_SAVE(r1, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x38, r2, 0x10, 0x70bd26, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x200, 0x51}}}}, [@NL80211_ATTR_PS_STATE={0x8, 0x5d, 0x1}, @NL80211_ATTR_PS_STATE={0x8, 0x5d, 0x1}, @NL80211_ATTR_PS_STATE={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x11}, 0x80) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:05:33 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000004200)={0x50}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 892.075453] FAULT_INJECTION: forcing a failure. [ 892.075453] name failslab, interval 1, probability 0, space 0, times 0 [ 892.086897] CPU: 1 PID: 17668 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 892.094780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 892.104131] Call Trace: [ 892.106721] dump_stack+0x1b2/0x283 [ 892.110351] should_fail.cold+0x10a/0x154 [ 892.114501] should_failslab+0xd6/0x130 [ 892.118469] __kmalloc_track_caller+0x2bc/0x400 [ 892.123127] ? kstrdup_const+0x35/0x60 [ 892.127005] ? lock_downgrade+0x740/0x740 [ 892.131160] kstrdup+0x36/0x70 [ 892.134349] kstrdup_const+0x35/0x60 [ 892.138131] alloc_vfsmnt+0xe0/0x7f0 [ 892.141843] clone_mnt+0x6c/0xff0 [ 892.145300] copy_tree+0x33e/0xa20 [ 892.148837] copy_mnt_ns+0x167/0xa30 [ 892.152548] ? create_new_namespaces+0x30/0x720 [ 892.157214] ? do_mount+0x2a00/0x2a00 [ 892.161011] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 892.166024] ? kmem_cache_alloc+0x35f/0x3c0 [ 892.170357] create_new_namespaces+0xc9/0x720 [ 892.174845] ? security_capable+0x88/0xb0 [ 892.178991] copy_namespaces+0x27b/0x310 [ 892.183055] copy_process.part.0+0x2600/0x6f00 [ 892.187638] ? get_pid_task+0xb8/0x130 [ 892.191521] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 892.196455] ? __cleanup_sighand+0x40/0x40 [ 892.200689] ? lock_downgrade+0x740/0x740 [ 892.204838] _do_fork+0x184/0xc80 [ 892.208290] ? fork_idle+0x270/0x270 [ 892.211999] ? fput+0xb/0x140 [ 892.215100] ? SyS_write+0x14d/0x210 [ 892.218805] ? SyS_read+0x210/0x210 [ 892.222425] ? SyS_clock_settime+0x1a0/0x1a0 [ 892.226829] ? do_syscall_64+0x4c/0x640 [ 892.230795] ? sys_vfork+0x20/0x20 [ 892.234330] do_syscall_64+0x1d5/0x640 [ 892.238217] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 892.243396] RIP: 0033:0x45de59 [ 892.246608] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 892.254317] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 892.261580] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 892.268842] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 00:05:33 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:33 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) getitimer(0x2, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000001c0)={0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') sendmsg$NL80211_CMD_SET_POWER_SAVE(r1, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x38, r2, 0x10, 0x70bd26, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x200, 0x51}}}}, [@NL80211_ATTR_PS_STATE={0x8, 0x5d, 0x1}, @NL80211_ATTR_PS_STATE={0x8, 0x5d, 0x1}, @NL80211_ATTR_PS_STATE={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x11}, 0x80) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 892.276108] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000004c [ 892.283369] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:05:34 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) umount2(0x0, 0x3) 00:05:34 executing program 0: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:34 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) umount2(0x0, 0x3) 00:05:34 executing program 0: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:34 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) umount2(0x0, 0x3) 00:05:34 executing program 5 (fault-call:10 fault-nth:77): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:05:34 executing program 0: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:34 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x0) 00:05:34 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x0) 00:05:34 executing program 0: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 892.947120] FAULT_INJECTION: forcing a failure. [ 892.947120] name failslab, interval 1, probability 0, space 0, times 0 [ 892.958509] CPU: 0 PID: 17719 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 892.966403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 892.975870] Call Trace: [ 892.978461] dump_stack+0x1b2/0x283 [ 892.982110] should_fail.cold+0x10a/0x154 [ 892.986260] should_failslab+0xd6/0x130 [ 892.990296] kmem_cache_alloc+0x28e/0x3c0 [ 892.994468] alloc_vfsmnt+0x23/0x7f0 [ 892.998181] clone_mnt+0x6c/0xff0 [ 893.001633] copy_tree+0x33e/0xa20 [ 893.005178] copy_mnt_ns+0x167/0xa30 [ 893.008888] ? create_new_namespaces+0x30/0x720 [ 893.013550] ? do_mount+0x2a00/0x2a00 [ 893.017348] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 893.022356] ? kmem_cache_alloc+0x35f/0x3c0 [ 893.026674] create_new_namespaces+0xc9/0x720 [ 893.031172] ? security_capable+0x88/0xb0 [ 893.035320] copy_namespaces+0x27b/0x310 [ 893.039381] copy_process.part.0+0x2600/0x6f00 [ 893.043961] ? get_pid_task+0xb8/0x130 [ 893.047844] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 893.052814] ? __cleanup_sighand+0x40/0x40 [ 893.057047] ? lock_downgrade+0x740/0x740 [ 893.061195] _do_fork+0x184/0xc80 [ 893.064646] ? fork_idle+0x270/0x270 [ 893.068353] ? fput+0xb/0x140 [ 893.071580] ? SyS_write+0x14d/0x210 [ 893.075289] ? SyS_read+0x210/0x210 [ 893.078911] ? SyS_clock_settime+0x1a0/0x1a0 [ 893.084054] ? do_syscall_64+0x4c/0x640 [ 893.088023] ? sys_vfork+0x20/0x20 [ 893.091581] do_syscall_64+0x1d5/0x640 [ 893.095468] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 893.100651] RIP: 0033:0x45de59 [ 893.103833] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 893.111534] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 893.118797] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 893.126063] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 893.133328] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000004d [ 893.140598] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:05:34 executing program 0: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:35 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x0) 00:05:35 executing program 0: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:35 executing program 0: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:35 executing program 0: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:35 executing program 5 (fault-call:10 fault-nth:78): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:05:35 executing program 0: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:35 executing program 0: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 893.772490] FAULT_INJECTION: forcing a failure. [ 893.772490] name failslab, interval 1, probability 0, space 0, times 0 [ 893.783869] CPU: 1 PID: 17759 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 893.792537] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 893.801891] Call Trace: [ 893.804477] dump_stack+0x1b2/0x283 [ 893.808116] should_fail.cold+0x10a/0x154 [ 893.812267] should_failslab+0xd6/0x130 [ 893.816239] kmem_cache_alloc+0x28e/0x3c0 00:05:35 executing program 0: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 893.820385] alloc_vfsmnt+0x23/0x7f0 [ 893.824099] clone_mnt+0x6c/0xff0 [ 893.827553] copy_tree+0x33e/0xa20 [ 893.831098] copy_mnt_ns+0x167/0xa30 [ 893.834811] ? create_new_namespaces+0x30/0x720 [ 893.839473] ? do_mount+0x2a00/0x2a00 [ 893.843269] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 893.848282] ? kmem_cache_alloc+0x35f/0x3c0 [ 893.852599] create_new_namespaces+0xc9/0x720 [ 893.857096] ? security_capable+0x88/0xb0 [ 893.861245] copy_namespaces+0x27b/0x310 [ 893.865304] copy_process.part.0+0x2600/0x6f00 [ 893.869885] ? get_pid_task+0xb8/0x130 [ 893.873773] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 893.878708] ? __cleanup_sighand+0x40/0x40 [ 893.882940] ? lock_downgrade+0x740/0x740 [ 893.887095] _do_fork+0x184/0xc80 [ 893.890545] ? fork_idle+0x270/0x270 [ 893.894258] ? fput+0xb/0x140 [ 893.897360] ? SyS_write+0x14d/0x210 [ 893.901071] ? SyS_read+0x210/0x210 [ 893.904694] ? SyS_clock_settime+0x1a0/0x1a0 [ 893.909097] ? do_syscall_64+0x4c/0x640 [ 893.913066] ? sys_vfork+0x20/0x20 [ 893.916605] do_syscall_64+0x1d5/0x640 00:05:35 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 893.920496] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 893.925682] RIP: 0033:0x45de59 [ 893.928962] RSP: 002b:00007f98c988cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 893.936682] RAX: ffffffffffffffda RBX: 0000000000001fc0 RCX: 000000000045de59 [ 893.943947] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020100 [ 893.951214] RBP: 00007f98c988cca0 R08: 0000000000000000 R09: 0000000000000000 [ 893.958480] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000004e [ 893.965742] R13: 00007ffe34e0cc1f R14: 00007f98c988d9c0 R15: 000000000118c124 00:05:35 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:35 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:35 executing program 0: mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:35 executing program 0: mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:36 executing program 0: mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:36 executing program 0: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:36 executing program 5 (fault-call:10 fault-nth:79): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:05:36 executing program 0: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:36 executing program 0: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:36 executing program 0: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(0x0, &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 894.646811] FAULT_INJECTION: forcing a failure. [ 894.646811] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 894.659260] CPU: 1 PID: 17802 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 894.667142] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 894.676490] Call Trace: [ 894.679080] dump_stack+0x1b2/0x283 [ 894.682710] should_fail.cold+0x10a/0x154 [ 894.686862] __alloc_pages_nodemask+0x22c/0x2720 [ 894.691638] ? __lock_acquire+0x5fc/0x3f20 [ 894.695872] ? trace_hardirqs_on+0x10/0x10 [ 894.700103] ? lock_downgrade+0x740/0x740 [ 894.704249] ? _raw_spin_unlock_irq+0x24/0x80 [ 894.708745] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 894.713757] ? trace_hardirqs_on+0x10/0x10 [ 894.717988] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 894.722827] ? __lock_acquire+0x5fc/0x3f20 [ 894.727056] ? get_mem_cgroup_from_mm+0xf5/0x360 [ 894.731809] ? __lock_acquire+0x5fc/0x3f20 [ 894.736048] alloc_pages_vma+0xd2/0x6d0 [ 894.740060] __handle_mm_fault+0x25fa/0x4620 00:05:36 executing program 0: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(0x0, &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 894.744473] ? vm_insert_page+0x7c0/0x7c0 [ 894.748619] ? lock_downgrade+0x740/0x740 [ 894.752775] handle_mm_fault+0x306/0x7a0 [ 894.756833] __do_page_fault+0x578/0xb50 [ 894.760892] ? spurious_fault+0x640/0x640 [ 894.765036] ? do_page_fault+0x60/0x4f2 [ 894.769005] ? page_fault+0x2f/0x50 [ 894.772624] page_fault+0x45/0x50 [ 894.776074] RIP: c988cba0:0x7f98c988d9c0 [ 894.780126] RSP: c988a4f0:00007f98c988a4c0 EFLAGS: 004d3158 [ 894.787484] syz-executor.5 invoked oom-killer: gfp_mask=0x0(), nodemask=(null), order=0, oom_score_adj=1000 [ 894.803990] syz-executor.5 cpuset=/ mems_allowed=0-1 [ 894.809563] CPU: 0 PID: 17802 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 894.817446] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 894.826790] Call Trace: [ 894.829374] dump_stack+0x1b2/0x283 [ 894.833001] dump_header+0x178/0x82f [ 894.836721] ? _raw_spin_unlock_irqrestore+0xaf/0xe0 [ 894.841819] ? ___ratelimit+0x2cd/0x522 [ 894.845794] oom_kill_process.cold+0x10/0xa69 [ 894.850287] ? lock_downgrade+0x740/0x740 [ 894.854431] out_of_memory+0x2dc/0x1190 [ 894.858403] ? oom_killer_disable+0x1c0/0x1c0 [ 894.862891] ? mutex_trylock+0x152/0x1a0 [ 894.866948] ? pagefault_out_of_memory+0xaa/0xc9 [ 894.871700] pagefault_out_of_memory+0xbb/0xc9 [ 894.876366] ? out_of_memory+0x1190/0x1190 [ 894.880600] ? lock_downgrade+0x740/0x740 [ 894.884763] mm_fault_error+0xad/0x2c0 [ 894.888832] __do_page_fault+0x9d1/0xb50 [ 894.892891] ? spurious_fault+0x640/0x640 00:05:36 executing program 0: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(0x0, &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 894.897034] ? do_page_fault+0x60/0x4f2 [ 894.901006] ? page_fault+0x2f/0x50 [ 894.904628] page_fault+0x45/0x50 [ 894.908073] RIP: c988cba0:0x7f98c988d9c0 [ 894.912120] RSP: c988a4f0:00007f98c988a4c0 EFLAGS: 004d3158 [ 894.912779] Mem-Info: [ 894.912888] active_anon:198520 inactive_anon:6116 isolated_anon:0 [ 894.912888] active_file:12559 inactive_file:98375 isolated_file:0 [ 894.912888] unevictable:0 dirty:225 writeback:0 unstable:0 [ 894.912888] slab_reclaimable:19028 slab_unreclaimable:125894 [ 894.912888] mapped:62943 shmem:6306 pagetables:2337 bounce:0 [ 894.912888] free:1067641 free_pcp:333 free_cma:0 [ 894.912986] Node 0 active_anon:794080kB inactive_anon:24464kB active_file:50104kB inactive_file:393500kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:251772kB dirty:900kB writeback:0kB shmem:25224kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 448512kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 894.913103] Node 1 active_anon:0kB inactive_anon:0kB active_file:132kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 894.913168] Node 0 DMA free:15908kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 894.913322] lowmem_reserve[]: 0 2557 2557 2557 2557 00:05:36 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r2, &(0x7f00000002c0)="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", 0x173) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) [ 894.913859] Node 0 DMA32 free:470232kB min:36272kB low:45340kB high:54408kB active_anon:794080kB inactive_anon:24464kB active_file:50104kB inactive_file:393500kB unevictable:0kB writepending:900kB present:3129332kB managed:2621180kB mlocked:0kB kernel_stack:8608kB pagetables:9348kB bounce:0kB free_pcp:1332kB local_pcp:644kB free_cma:0kB [ 894.913879] lowmem_reserve[]: 0 0 0 0 0 [ 894.913898] Node 0 Normal free:0kB min:4kB low:4kB high:4kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:328kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 894.913980] lowmem_reserve[]: 0 0 0 0 0 [ 894.914000] Node 1 Normal free:3784424kB min:53612kB low:67012kB high:80412kB active_anon:0kB inactive_anon:0kB active_file:132kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3870192kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 894.919894] lowmem_reserve[]: 0 0 0 0 0 [ 894.920048] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 894.920677] Node 0 DMA32: 213*4kB (UME) 303*8kB (UME) 121*16kB (UME) 52*32kB (UM) 15*64kB (UM) 21*128kB (UM) 10*256kB (UM) 9*512kB (ME) 8*1024kB (UME) 7*2048kB (UME) 105*4096kB (UM) = 470300kB [ 894.921250] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 894.921539] Node 1 Normal: 50*4kB (UE) 360*8kB (UE) 266*16kB (UME) 76*32kB (UME) 21*64kB (UME) 11*128kB (UME) 8*256kB (UME) 3*512kB (UE) 2*1024kB (ME) 3*2048kB (M) 918*4096kB (M) = 3784424kB [ 894.922128] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 894.922158] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB 00:05:37 executing program 0: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', 0x0, &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 894.922195] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 894.922225] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 894.922256] 30631 total pagecache pages [ 894.922308] 0 pages in swap cache [ 894.922342] Swap cache stats: add 0, delete 0, find 0/0 [ 894.922371] Free swap = 0kB [ 894.922405] Total swap = 0kB [ 894.922838] 1965979 pages RAM [ 894.922870] 0 pages HighMem/MovableOnly [ 894.922874] 339077 pages reserved [ 894.922903] 0 pages cma reserved 00:05:37 executing program 0: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', 0x0, &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 894.922937] Out of memory: Kill process 2631 (syz-executor.4) score 1007 or sacrifice child [ 894.923818] Killed process 2631 (syz-executor.4) total-vm:93680kB, anon-rss:18168kB, file-rss:35960kB, shmem-rss:0kB [ 894.975524] oom_reaper: reaped process 2631 (syz-executor.4), now anon-rss:0kB, file-rss:56kB, shmem-rss:0kB 00:05:37 executing program 0: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', 0x0, &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:37 executing program 0: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', 0x0, 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:37 executing program 0: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', 0x0, 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:37 executing program 0: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', 0x0, 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:37 executing program 0: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:37 executing program 0: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:37 executing program 0: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:37 executing program 0: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:37 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000004200)={0x50}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:37 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{}], 0x1, 0x0) ioctl$SNDCTL_SYNTH_ID(r2, 0xc08c5114, &(0x7f00000000c0)={"47ba7775395dba691e0d361cb16eff298621e896bde937b5646b0e45a20a", 0x0, 0x2, 0x1, 0x10000, 0x8001, 0x7, 0x8, 0x5, [0xfffffff7, 0x3, 0x2, 0x3f, 0x100, 0x5, 0x5, 0xffffadf2, 0x1, 0x1, 0x4, 0x6, 0x7, 0x2, 0x7fff, 0x7f, 0x51d, 0x35b2, 0x291]}) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:05:37 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f00000002c0)="e3e3f9595bc03bd0e099ac30562abe7505fb664d476b67d3b4bf3372927b0af5352bac886fb3654fe44b825a48da8d6cb7286f59379c76c55dbe832586570c75f13def5c4f6961318f20061b3f9797fd4556bdc4034bd93b42722d8a31578d620de9d851f01ba8015f96170a2287bb237b3ebbd4e1e1665e3ab1627179705d6fcd2d8c9605af1c33f36730fcc4dc600bc284", 0xfffffffffffffd09, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="6e6e6f6e756d746169d63d312c00"]) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="1000000017010007002e2f66696c6531664bc0cfb00fa32206f9d15f51fbbffcfa76ae77774fcc821c7dcbf242815df84b3eb258e0d03b4f68b42216ac00f66377c0226a65e79329741c"], 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x80, 0xfd, 0xe7}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000180)=0x4) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, 0xfffffffffffffffe, &(0x7f00000001c0)) 00:05:37 executing program 0: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:37 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f00000002c0)="e3e3f9595bc03bd0e099ac30562abe7505fb664d476b67d3b4bf3372927b0af5352bac886fb3654fe44b825a48da8d6cb7286f59379c76c55dbe832586570c75f13def5c4f6961318f20061b3f9797fd4556bdc4034bd93b42722d8a31578d620de9d851f01ba8015f96170a2287bb237b3ebbd4e1e1665e3ab1627179705d6fcd2d8c9605af1c33f36730fcc4dc600bc284", 0xfffffffffffffd09, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="6e6e6f6e756d746169d63d312c00"]) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="1000000017010007002e2f66696c6531664bc0cfb00fa32206f9d15f51fbbffcfa76ae77774fcc821c7dcbf242815df84b3eb258e0d03b4f68b42216ac00f66377c0226a65e79329741c"], 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x80, 0xfd, 0xe7}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000180)=0x4) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, 0xfffffffffffffffe, &(0x7f00000001c0)) 00:05:37 executing program 0: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:37 executing program 0: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:37 executing program 0: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 896.218445] FAT-fs (loop2): Unrecognized mount option "nnonumtai=1" or missing value 00:05:38 executing program 0: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:38 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f00000002c0)="e3e3f9595bc03bd0e099ac30562abe7505fb664d476b67d3b4bf3372927b0af5352bac886fb3654fe44b825a48da8d6cb7286f59379c76c55dbe832586570c75f13def5c4f6961318f20061b3f9797fd4556bdc4034bd93b42722d8a31578d620de9d851f01ba8015f96170a2287bb237b3ebbd4e1e1665e3ab1627179705d6fcd2d8c9605af1c33f36730fcc4dc600bc284", 0xfffffffffffffd09, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="6e6e6f6e756d746169d63d312c00"]) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="1000000017010007002e2f66696c6531664bc0cfb00fa32206f9d15f51fbbffcfa76ae77774fcc821c7dcbf242815df84b3eb258e0d03b4f68b42216ac00f66377c0226a65e79329741c"], 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x80, 0xfd, 0xe7}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000180)=0x4) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, 0xfffffffffffffffe, &(0x7f00000001c0)) 00:05:38 executing program 0: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(0x0, 0x3) 00:05:38 executing program 0: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(0x0, 0x3) 00:05:38 executing program 0: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(0x0, 0x3) 00:05:38 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r4, 0x4020565b, &(0x7f00000000c0)={0x0, 0x7, 0x1}) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:05:38 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 00:05:38 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x40241, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) ioctl$SG_GET_TIMEOUT(r0, 0x2202, 0x0) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f00000000c0)=0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$cgroup_freezer_state(r1, &(0x7f0000000000)='FREEZING\x00', 0xfe0f) r4 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r4, &(0x7f0000000040)='./file1\x00', 0x0) 00:05:38 executing program 0: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000080)='./file0\x00', 0x0) 00:05:38 executing program 2 (fault-call:5 fault-nth:0): mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 897.062395] FAULT_INJECTION: forcing a failure. [ 897.062395] name failslab, interval 1, probability 0, space 0, times 0 00:05:38 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x4, 0x0, 0x8, 0x3, 0x0, 0x10000000000}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in6, @in6=@ipv4={[], [], @private}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) setresuid(r1, 0xee01, 0xee01) r2 = socket$key(0xf, 0x3, 0x2) recvmmsg(r2, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) [ 897.185568] CPU: 1 PID: 17933 Comm: syz-executor.2 Not tainted 4.14.198-syzkaller #0 [ 897.193479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 897.202840] Call Trace: [ 897.205432] dump_stack+0x1b2/0x283 [ 897.209067] should_fail.cold+0x10a/0x154 [ 897.213219] should_failslab+0xd6/0x130 [ 897.217191] kmem_cache_alloc+0x28e/0x3c0 [ 897.221339] getname_flags+0xc8/0x550 [ 897.225254] user_path_mountpoint_at+0x23/0x40 [ 897.229837] SyS_umount+0x125/0xeb0 [ 897.233464] ? wait_for_completion_io+0x10/0x10 [ 897.238130] ? vfs_write+0x319/0x4d0 [ 897.241841] ? __detach_mounts+0x400/0x400 [ 897.246073] ? fput+0xb/0x140 [ 897.249172] ? SyS_write+0x14d/0x210 [ 897.252879] ? SyS_read+0x210/0x210 [ 897.256503] ? SyS_clock_settime+0x1a0/0x1a0 [ 897.260907] ? do_syscall_64+0x4c/0x640 [ 897.264877] ? __detach_mounts+0x400/0x400 [ 897.269110] do_syscall_64+0x1d5/0x640 [ 897.272999] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 897.278177] RIP: 0033:0x45de59 [ 897.281355] RSP: 002b:00007fd0f18fcc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 897.289058] RAX: ffffffffffffffda RBX: 0000000000038080 RCX: 000000000045de59 [ 897.296322] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000020000080 [ 897.303586] RBP: 00007fd0f18fcca0 R08: 0000000000000000 R09: 0000000000000000 [ 897.310961] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 897.318227] R13: 00007ffcf77646cf R14: 00007fd0f18fd9c0 R15: 000000000118bf2c 00:05:39 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x40241, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) ioctl$SG_GET_TIMEOUT(r0, 0x2202, 0x0) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f00000000c0)=0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$cgroup_freezer_state(r1, &(0x7f0000000000)='FREEZING\x00', 0xfe0f) r4 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r4, &(0x7f0000000040)='./file1\x00', 0x0) 00:05:39 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r4, 0x4020565b, &(0x7f00000000c0)={0x0, 0x7, 0x1}) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x80020100, 0x0, 0x0, 0x0, 0x0) 00:05:39 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x40241, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) ioctl$SG_GET_TIMEOUT(r0, 0x2202, 0x0) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f00000000c0)=0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$cgroup_freezer_state(r1, &(0x7f0000000000)='FREEZING\x00', 0xfe0f) r4 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e3e3e099ac30562abe7505fb664d476b3e5d3027ff80b72640264e69b21767d3b4bf337292", 0x25, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}]}) mkdirat(r4, &(0x7f0000000040)='./file1\x00', 0x0) 00:05:39 executing program 2 (fault-call:5 fault-nth:1): mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 897.776877] FAULT_INJECTION: forcing a failure. [ 897.776877] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 897.788711] CPU: 0 PID: 17975 Comm: syz-executor.2 Not tainted 4.14.198-syzkaller #0 [ 897.796592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 897.805942] Call Trace: [ 897.808535] dump_stack+0x1b2/0x283 [ 897.812167] should_fail.cold+0x10a/0x154 [ 897.816319] __alloc_pages_nodemask+0x22c/0x2720 [ 897.821077] ? __might_fault+0x104/0x1b0 [ 897.825137] ? __lock_acquire+0x5fc/0x3f20 [ 897.829368] ? avc_has_perm_noaudit+0x157/0x2a0 [ 897.834123] ? lock_acquire+0x170/0x3f0 [ 897.838098] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 897.842936] ? trace_hardirqs_on+0x10/0x10 [ 897.847173] ? avc_has_extended_perms+0xbf0/0xbf0 [ 897.852017] ? lock_downgrade+0x740/0x740 [ 897.856170] cache_grow_begin+0x8f/0x420 [ 897.860231] cache_alloc_refill+0x273/0x350 [ 897.864549] kmem_cache_alloc+0x333/0x3c0 [ 897.868697] getname_flags+0xc8/0x550 [ 897.872507] user_path_mountpoint_at+0x23/0x40 [ 897.877086] SyS_umount+0x125/0xeb0 [ 897.880713] ? wait_for_completion_io+0x10/0x10 [ 897.885376] ? vfs_write+0x319/0x4d0 [ 897.889122] ? __detach_mounts+0x400/0x400 [ 897.893350] ? fput+0xb/0x140 [ 897.896450] ? SyS_write+0x14d/0x210 [ 897.900154] ? SyS_read+0x210/0x210 [ 897.903778] ? SyS_clock_settime+0x1a0/0x1a0 [ 897.908182] ? do_syscall_64+0x4c/0x640 [ 897.912153] ? __detach_mounts+0x400/0x400 [ 897.916390] do_syscall_64+0x1d5/0x640 [ 897.920275] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 897.925457] RIP: 0033:0x45de59 [ 897.928639] RSP: 002b:00007fd0f18fcc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 897.936342] RAX: ffffffffffffffda RBX: 0000000000038080 RCX: 000000000045de59 [ 897.943606] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000020000080 [ 897.950868] RBP: 00007fd0f18fcca0 R08: 0000000000000000 R09: 0000000000000000 [ 897.958132] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 897.965397] R13: 00007ffcf77646cf R14: 00007fd0f18fd9c0 R15: 000000000118bf2c 00:05:39 executing program 1 (fault-call:3 fault-nth:0): mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000080)='./file0\x00', 0x0) [ 898.094120] FAULT_INJECTION: forcing a failure. [ 898.094120] name failslab, interval 1, probability 0, space 0, times 0 [ 898.121629] CPU: 1 PID: 17979 Comm: syz-executor.1 Not tainted 4.14.198-syzkaller #0 [ 898.129542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 898.138896] Call Trace: [ 898.141490] dump_stack+0x1b2/0x283 [ 898.145123] should_fail.cold+0x10a/0x154 [ 898.149279] should_failslab+0xd6/0x130 [ 898.153252] kmem_cache_alloc+0x28e/0x3c0 [ 898.157399] getname_flags+0xc8/0x550 [ 898.161200] user_path_mountpoint_at+0x23/0x40 [ 898.165784] SyS_umount+0x125/0xeb0 [ 898.169411] ? wait_for_completion_io+0x10/0x10 [ 898.174078] ? vfs_write+0x319/0x4d0 [ 898.177786] ? __detach_mounts+0x400/0x400 [ 898.182016] ? fput+0xb/0x140 [ 898.185115] ? SyS_write+0x14d/0x210 [ 898.188829] ? SyS_read+0x210/0x210 [ 898.192449] ? SyS_clock_settime+0x1a0/0x1a0 [ 898.196853] ? do_syscall_64+0x4c/0x640 [ 898.200870] ? __detach_mounts+0x400/0x400 [ 898.205100] do_syscall_64+0x1d5/0x640 [ 898.208989] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 898.214174] RIP: 0033:0x45de59 [ 898.217354] RSP: 002b:00007faf7eb29c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 898.225061] RAX: ffffffffffffffda RBX: 0000000000038080 RCX: 000000000045de59 [ 898.232321] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000080 00:05:40 executing program 0 (fault-call:4 fault-nth:0): mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x0) [ 898.239582] RBP: 00007faf7eb29ca0 R08: 0000000000000000 R09: 0000000000000000 [ 898.246845] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 898.254107] R13: 00007fff80c5c2bf R14: 00007faf7eb2a9c0 R15: 000000000118bf2c 00:05:40 executing program 2 (fault-call:5 fault-nth:2): mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 898.356323] FAULT_INJECTION: forcing a failure. [ 898.356323] name failslab, interval 1, probability 0, space 0, times 0 [ 898.373922] CPU: 1 PID: 17982 Comm: syz-executor.0 Not tainted 4.14.198-syzkaller #0 [ 898.381820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 898.391167] Call Trace: [ 898.393758] dump_stack+0x1b2/0x283 [ 898.397408] should_fail.cold+0x10a/0x154 [ 898.401696] should_failslab+0xd6/0x130 00:05:40 executing program 1 (fault-call:3 fault-nth:1): mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000080)='./file0\x00', 0x0) [ 898.405673] kmem_cache_alloc+0x28e/0x3c0 [ 898.409817] getname_flags+0xc8/0x550 [ 898.413616] user_path_mountpoint_at+0x23/0x40 [ 898.418209] SyS_umount+0x125/0xeb0 [ 898.421829] ? wait_for_completion_io+0x10/0x10 [ 898.426490] ? vfs_write+0x319/0x4d0 [ 898.430200] ? __detach_mounts+0x400/0x400 [ 898.434428] ? fput+0xb/0x140 [ 898.437530] ? SyS_write+0x14d/0x210 [ 898.441238] ? SyS_read+0x210/0x210 [ 898.444859] ? SyS_clock_settime+0x1a0/0x1a0 [ 898.449285] ? do_syscall_64+0x4c/0x640 [ 898.453252] ? __detach_mounts+0x400/0x400 [ 898.457482] do_syscall_64+0x1d5/0x640 [ 898.461365] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 898.466543] RIP: 0033:0x45de59 [ 898.469724] RSP: 002b:00007f83d73a4c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 898.477565] RAX: ffffffffffffffda RBX: 0000000000038080 RCX: 000000000045de59 [ 898.484828] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000080 [ 898.492091] RBP: 00007f83d73a4ca0 R08: 0000000000000000 R09: 0000000000000000 [ 898.499353] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 898.506619] R13: 00007ffe5e353c9f R14: 00007f83d73a59c0 R15: 000000000118bf2c 00:05:40 executing program 0 (fault-call:4 fault-nth:1): mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x0) [ 898.564812] FAULT_INJECTION: forcing a failure. [ 898.564812] name failslab, interval 1, probability 0, space 0, times 0 [ 898.589867] CPU: 1 PID: 17992 Comm: syz-executor.1 Not tainted 4.14.198-syzkaller #0 [ 898.597771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 898.607149] Call Trace: [ 898.609738] dump_stack+0x1b2/0x283 00:05:40 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) r1 = socket(0x11, 0x800000003, 0x8) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) mount$fuseblk(&(0x7f0000002000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000004440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d3030303030303030ba3030303030303030303034303030302c757365725f6964", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB="ffc0"]) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r2}, 0x50) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, r2, {0x7, 0x1f, 0xfffffff9, 0x8000, 0x3, 0xf5, 0x2, 0xc674}}, 0x50) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) ioctl$TCXONC(r3, 0x540a, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x3) r4 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio1\x00', 0x8200, 0x0) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r4, 0x80489439, &(0x7f00000000c0)) [ 898.613369] should_fail.cold+0x10a/0x154 [ 898.617520] should_failslab+0xd6/0x130 [ 898.621501] kmem_cache_alloc_trace+0x29a/0x3d0 [ 898.626167] ? dev_uevent_filter+0xd0/0xd0 [ 898.630400] kobject_uevent_env+0x1fa/0xcb0 [ 898.634722] ? wait_for_completion_io+0x10/0x10 [ 898.639389] ? is_acpi_device_node+0x5b/0x70 [ 898.643799] device_del+0x642/0xa80 [ 898.647423] ? __device_links_no_driver+0x1b0/0x1b0 [ 898.652438] ? synchronize_srcu+0x146/0x3ce [ 898.656758] device_unregister+0x11/0x30 [ 898.660817] bdi_unregister+0x3f9/0x5c0 [ 898.664786] ? wb_blkcg_offline+0x180/0x180 [ 898.669102] ? generic_shutdown_super+0x276/0x370 [ 898.673944] ? lock_acquire+0x170/0x3f0 [ 898.676854] sysfs: cannot create duplicate filename '/devices/virtual/bdi/7:0-fuseblk' [ 898.677916] ? lock_downgrade+0x740/0x740 [ 898.677931] bdi_put+0x127/0x160 [ 898.677943] generic_shutdown_super+0x2aa/0x370 [ 898.677952] kill_block_super+0x95/0xe0 [ 898.677966] deactivate_locked_super+0x6c/0xd0 [ 898.677976] deactivate_super+0x7f/0xa0 [ 898.700901] ------------[ cut here ]------------ [ 898.702357] cleanup_mnt+0x186/0x2c0 [ 898.706924] WARNING: CPU: 0 PID: 18003 at fs/sysfs/dir.c:30 sysfs_warn_dup.cold+0x17/0x2d [ 898.710873] task_work_run+0x11f/0x190 [ 898.715603] Kernel panic - not syncing: panic_on_warn set ... [ 898.715603] [ 898.719294] exit_to_usermode_loop+0x1ad/0x200 [ 898.743320] do_syscall_64+0x4a3/0x640 [ 898.747192] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 898.752374] RIP: 0033:0x45de59 [ 898.755544] RSP: 002b:00007faf7eb29c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 898.763242] RAX: 0000000000000000 RBX: 0000000000038080 RCX: 000000000045de59 [ 898.770502] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000080 [ 898.777751] RBP: 00007faf7eb29ca0 R08: 0000000000000000 R09: 0000000000000000 [ 898.784998] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 898.792244] R13: 00007fff80c5c2bf R14: 00007faf7eb2a9c0 R15: 000000000118bf2c [ 898.799509] CPU: 0 PID: 18003 Comm: syz-executor.0 Not tainted 4.14.198-syzkaller #0 [ 898.807383] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 898.816730] Call Trace: [ 898.819314] dump_stack+0x1b2/0x283 [ 898.822943] panic+0x1f9/0x42d [ 898.826131] ? add_taint.cold+0x16/0x16 [ 898.830109] ? sysfs_warn_dup.cold+0x17/0x2d [ 898.834511] ? __warn.cold+0x5/0x4b [ 898.838136] ? sysfs_warn_dup.cold+0x17/0x2d [ 898.842540] __warn.cold+0x20/0x4b [ 898.846077] ? ist_end_non_atomic+0x10/0x10 [ 898.850391] ? sysfs_warn_dup.cold+0x17/0x2d [ 898.854791] report_bug+0x208/0x249 [ 898.858416] do_error_trap+0x195/0x2d0 [ 898.862295] ? math_error+0x2d0/0x2d0 [ 898.866089] ? ___preempt_schedule+0x16/0x18 [ 898.870511] ? vprintk_emit+0x247/0x620 [ 898.874482] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 898.879320] invalid_op+0x1b/0x40 [ 898.882765] RIP: 0010:sysfs_warn_dup.cold+0x17/0x2d [ 898.887781] RSP: 0018:ffff888034c877a0 EFLAGS: 00010282 [ 898.893133] RAX: 000000000000004a RBX: ffff8880a601a090 RCX: 0000000000000000 [ 898.900394] RDX: 000000000001b7bf RSI: ffffffff814a4600 RDI: ffffed1006990eea [ 898.907656] RBP: ffff888087f36340 R08: 000000000000004a R09: 0000000000000000 [ 898.914920] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880a41389a0 [ 898.922185] R13: ffff88809415c6c0 R14: ffff8880a601a0b0 R15: ffff8880a13da658 [ 898.929465] ? vprintk_func+0x60/0x152 [ 898.933359] sysfs_create_dir_ns+0x16f/0x1d0 [ 898.937767] kobject_add_internal+0x279/0x810 [ 898.942351] kobject_add+0x11f/0x180 [ 898.946065] ? kset_create_and_add+0x190/0x190 [ 898.950656] device_add+0x32c/0x1510 [ 898.954370] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 898.959821] ? kfree_const+0x33/0x40 [ 898.963537] ? device_is_dependent+0x270/0x270 [ 898.968111] ? kfree+0x1f0/0x250 [ 898.971474] device_create_groups_vargs+0x1dc/0x250 [ 898.976489] device_create_vargs+0x3a/0x50 [ 898.980725] bdi_register_va.part.0+0x35/0x650 [ 898.985307] bdi_register_va+0x63/0x80 [ 898.989279] super_setup_bdi_name+0x123/0x220 [ 898.993769] ? kill_block_super+0xe0/0xe0 [ 898.997914] ? do_raw_spin_unlock+0x164/0x220 [ 899.002409] fuse_fill_super+0x937/0x15c0 [ 899.006555] ? fuse_get_root_inode+0xc0/0xc0 [ 899.010959] ? lock_downgrade+0x740/0x740 [ 899.015109] ? set_blocksize+0x125/0x380 [ 899.019171] mount_bdev+0x2b3/0x360 [ 899.022791] ? fuse_get_root_inode+0xc0/0xc0 [ 899.027199] mount_fs+0x92/0x2a0 [ 899.030563] vfs_kern_mount.part.0+0x5b/0x470 [ 899.035054] do_mount+0xe53/0x2a00 [ 899.038598] ? copy_mount_string+0x40/0x40 [ 899.042831] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 899.047840] ? copy_mnt_ns+0xa30/0xa30 [ 899.051726] ? copy_mount_options+0x1fa/0x2f0 [ 899.056215] ? copy_mnt_ns+0xa30/0xa30 [ 899.060101] SyS_mount+0xa8/0x120 [ 899.063548] ? copy_mnt_ns+0xa30/0xa30 [ 899.067432] do_syscall_64+0x1d5/0x640 [ 899.071323] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 899.076509] RIP: 0033:0x45de59 [ 899.079689] RSP: 002b:00007f83d73a4c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 899.087393] RAX: ffffffffffffffda RBX: 00000000000219c0 RCX: 000000000045de59 [ 899.094656] RDX: 0000000020004300 RSI: 0000000020002040 RDI: 0000000020002000 [ 899.101927] RBP: 000000000118bf70 R08: 0000000020004440 R09: 0000000000000000 [ 899.109194] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 899.116457] R13: 00007ffe5e353c9f R14: 00007f83d73a59c0 R15: 000000000118bf2c [ 899.125515] Kernel Offset: disabled [ 899.129286] Rebooting in 86400 seconds..