706.339325] ? finish_task_switch+0x1ca/0x810 [ 706.341413] IPVS: Unknown mcast interface: rose0 [ 706.343845] ? syscall_return_slowpath+0x5c0/0x5c0 [ 706.343863] ? syscall_return_slowpath+0x30f/0x5c0 [ 706.343884] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 706.343905] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 706.343925] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 706.343937] RIP: 0033:0x455979 [ 706.343951] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/05/13 06:34:10 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\x00\x00\x00\x00\b\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:10 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r2 = dup(r0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x402000, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f00000000c0)=0x80000001) fcntl$notify(r2, 0x0, 0x1000000000282) [ 706.384780] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 706.392062] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 706.399343] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 706.406628] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 706.413908] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 706.525619] IPVS: Unknown mcast interface: rose0 [ 706.537466] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 706.540238] IPVS: Unknown mcast interface: rose0 2018/05/13 06:34:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0x2000000}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:11 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 2018/05/13 06:34:11 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000000000000000000500"}}) 2018/05/13 06:34:11 executing program 1 (fault-call:3 fault-nth:12): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:34:11 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r2 = dup(r0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x402000, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f00000000c0)=0x80000001) fcntl$notify(r2, 0x0, 0x1000000000282) 2018/05/13 06:34:11 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\x00\a\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:11 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x400000, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000140)=""/65) sync() lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x7c, r1, 0x220, 0x70bd29, 0x25dfdbfc, {0x10}, [@IPVS_CMD_ATTR_SERVICE={0x60, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast2={0xff, 0x2, [], 0x1}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1={0xff, 0x1, [], 0x1}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x10001}]}, 0x7c}, 0x1}, 0x4000000) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'bridge_slave_0\x00', 0x1800}) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000001140)=""/121, 0x56) 2018/05/13 06:34:11 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0x401d}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) [ 706.992220] IPVS: Unknown mcast interface: rose0 [ 707.009277] FAULT_INJECTION: forcing a failure. [ 707.009277] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 707.021910] CPU: 0 PID: 16298 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 707.026601] IPVS: Unknown mcast interface: rose0 [ 707.029186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 707.029194] Call Trace: [ 707.029222] dump_stack+0x1b9/0x294 [ 707.029244] ? dump_stack_print_info.cold.2+0x52/0x52 [ 707.029259] ? graph_lock+0x170/0x170 [ 707.029278] ? debug_check_no_locks_freed+0x310/0x310 [ 707.063842] should_fail.cold.4+0xa/0x1a [ 707.067917] ? print_usage_bug+0xc0/0xc0 [ 707.072000] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 707.077130] ? debug_check_no_locks_freed+0x310/0x310 [ 707.082350] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 707.087391] ? pcpu_next_fit_region.constprop.23+0x334/0x410 [ 707.093215] ? kasan_check_write+0x14/0x20 [ 707.097470] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 707.102419] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 707.107968] ? should_fail+0x21b/0xbcd [ 707.111876] __alloc_pages_nodemask+0x34e/0xd70 [ 707.116568] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 707.121601] ? find_held_lock+0x36/0x1c0 [ 707.125691] ? check_same_owner+0x320/0x320 [ 707.130027] cache_grow_begin+0x72/0x6c0 [ 707.134115] kmem_cache_alloc_trace+0x6a5/0x780 2018/05/13 06:34:11 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000000000000300"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:11 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r2 = dup(r0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x402000, 0x0) fcntl$notify(r2, 0x0, 0x1000000000282) 2018/05/13 06:34:11 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) [ 707.137618] IPVS: Unknown mcast interface: rose0 [ 707.138793] ? kasan_check_write+0x14/0x20 [ 707.138812] ? do_raw_spin_lock+0xc1/0x200 [ 707.138834] sget_userns+0x1c7/0xf00 [ 707.138849] ? get_anon_bdev+0x2f0/0x2f0 [ 707.138873] ? destroy_unused_super.part.11+0x110/0x110 [ 707.138889] ? __alloc_pages_nodemask+0xacf/0xd70 [ 707.138907] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 707.138925] ? kasan_check_read+0x11/0x20 [ 707.165904] IPVS: Unknown mcast interface: rose0 [ 707.170056] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 2018/05/13 06:34:11 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000000000000f0ffffff7f00"}}) [ 707.170072] ? cap_capable+0x1f9/0x260 [ 707.170094] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 707.170109] ? security_capable+0x99/0xc0 [ 707.170130] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 707.170145] ? ns_capable_common+0x13f/0x170 [ 707.170163] ? get_anon_bdev+0x2f0/0x2f0 [ 707.170180] sget+0x10b/0x150 [ 707.203993] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 707.208663] ? fuse_get_root_inode+0x190/0x190 [ 707.208683] mount_nodev+0x33/0x110 [ 707.208699] fuse_mount+0x2c/0x40 [ 707.208717] mount_fs+0xae/0x328 2018/05/13 06:34:11 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000000000005f200"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 707.208737] vfs_kern_mount.part.34+0xd4/0x4d0 [ 707.208750] ? may_umount+0xb0/0xb0 [ 707.208767] ? _raw_read_unlock+0x22/0x30 [ 707.255196] ? __get_fs_type+0x97/0xc0 [ 707.259110] do_mount+0x564/0x3070 [ 707.262666] ? copy_mount_string+0x40/0x40 [ 707.266910] ? rcu_pm_notify+0xc0/0xc0 [ 707.270812] ? copy_mount_options+0x5f/0x380 [ 707.275228] ? rcu_read_lock_sched_held+0x108/0x120 [ 707.280259] ? kmem_cache_alloc_trace+0x616/0x780 [ 707.285121] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 2018/05/13 06:34:11 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}}) [ 707.290667] ? _copy_from_user+0xdf/0x150 [ 707.294828] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 707.300372] ? copy_mount_options+0x285/0x380 [ 707.304876] ksys_mount+0x12d/0x140 [ 707.306775] IPVS: Unknown mcast interface: rose0 [ 707.308508] __x64_sys_mount+0xbe/0x150 [ 707.308527] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 707.308556] do_syscall_64+0x1b1/0x800 [ 707.308576] ? finish_task_switch+0x1ca/0x810 [ 707.308594] ? syscall_return_slowpath+0x5c0/0x5c0 [ 707.308610] ? syscall_return_slowpath+0x30f/0x5c0 [ 707.308633] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 707.331996] IPVS: Unknown mcast interface: rose0 [ 707.335608] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 707.335632] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 707.335644] RIP: 0033:0x455979 [ 707.335652] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 707.335668] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 707.335678] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 707.335687] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 2018/05/13 06:34:11 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000d24000"}}) 2018/05/13 06:34:11 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000000000000007ffffffff000"}}) [ 707.335696] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 707.335705] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 707.494457] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 2018/05/13 06:34:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0x40020020}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:12 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r2 = dup(r0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x402000, 0x0) fcntl$notify(r2, 0x0, 0x1000000000282) 2018/05/13 06:34:12 executing program 1 (fault-call:3 fault-nth:13): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:34:12 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}}) 2018/05/13 06:34:12 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000000000034165d4000"}}) 2018/05/13 06:34:12 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, 0x0) sync() r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @dev}, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000000440)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000480)={{{@in=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000580)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000005c0)={{{@in=@multicast2=0xe0000002, @in6=@mcast2={0xff, 0x2, [], 0x1}, 0x4e20, 0xed, 0x4e20, 0x1, 0x0, 0xa0, 0x20, 0x2b, r1, r2}, {0x800, 0x1, 0x1c5, 0x1000, 0x8, 0x3, 0x6, 0x3f}, {0x5, 0x8c8, 0x4, 0xffff}, 0x8, 0x6e6bbc, 0x3, 0x0, 0x3, 0x1}, {{@in6, 0x4d3, 0x3c}, 0xa, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x3503, 0x1, 0x2, 0x5, 0x3ff, 0x27bb, 0x6}}, 0xe8) fsetxattr(r0, &(0x7f00000001c0)=@random={'osx.', "0000000201000000000000010400"}, &(0x7f0000000200)='.eth1)\x00', 0x7, 0x1) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) r3 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x9, 0x90100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000240)={0x3, 0x2, {0x3, 0x1, 0x7ff, 0x2}}) name_to_handle_at(r3, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)={0x36, 0x0, "7c16e7189b6f82e8934f28f40abb14aec0810f9aafef3a2bb0f382d24dd45d6662319481d50eb3c9b94cbf3d4fef"}, &(0x7f0000000180), 0x1400) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000001140)=""/121, 0x56) 2018/05/13 06:34:12 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000000000f00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:12 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0xb8040000}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) [ 707.947201] IPVS: Unknown mcast interface: rose0 [ 707.955443] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 707.976423] IPVS: Unknown mcast interface: rose0 [ 707.996444] FAULT_INJECTION: forcing a failure. [ 707.996444] name failslab, interval 1, probability 0, space 0, times 0 [ 708.008372] CPU: 1 PID: 16370 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 708.015663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 708.025027] Call Trace: [ 708.027638] dump_stack+0x1b9/0x294 [ 708.031283] ? dump_stack_print_info.cold.2+0x52/0x52 [ 708.036493] ? kernel_text_address+0x79/0xf0 [ 708.040910] ? __unwind_start+0x166/0x330 [ 708.045073] should_fail.cold.4+0xa/0x1a [ 708.049169] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 708.054294] ? graph_lock+0x170/0x170 [ 708.058106] ? save_stack+0x43/0xd0 [ 708.061743] ? kasan_kmalloc+0xc4/0xe0 [ 708.065636] ? __kmalloc+0x14e/0x760 [ 708.069355] ? __list_lru_init+0xdd/0x790 [ 708.073513] ? find_held_lock+0x36/0x1c0 [ 708.077588] ? __lock_is_held+0xb5/0x140 [ 708.081673] ? check_same_owner+0x320/0x320 [ 708.086008] ? rcu_note_context_switch+0x710/0x710 [ 708.090949] __should_failslab+0x124/0x180 2018/05/13 06:34:12 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 2018/05/13 06:34:12 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\x00\x00\x00\x00\n\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:12 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r2 = dup(r0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}) fcntl$notify(r2, 0x0, 0x1000000000282) 2018/05/13 06:34:12 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000000000000f00"}}) 2018/05/13 06:34:12 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000034165d4000"}}) [ 708.095198] should_failslab+0x9/0x14 [ 708.099016] kmem_cache_alloc_node_trace+0x26f/0x770 [ 708.104135] ? mark_held_locks+0xc9/0x160 [ 708.108305] ? __raw_spin_lock_init+0x1c/0x100 [ 708.112905] __kmalloc_node+0x33/0x70 [ 708.116717] kvmalloc_node+0x6b/0x100 [ 708.120528] __list_lru_init+0x559/0x790 [ 708.124605] ? list_lru_destroy+0x4c0/0x4c0 [ 708.128936] ? mark_held_locks+0xc9/0x160 [ 708.133097] ? __raw_spin_lock_init+0x1c/0x100 [ 708.137695] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 708.142722] ? __lockdep_init_map+0x105/0x590 2018/05/13 06:34:12 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000000000000000000000000008000"}}) [ 708.147230] ? lockdep_init_map+0x9/0x10 [ 708.151300] sget_userns+0x73a/0xf00 [ 708.155022] ? get_anon_bdev+0x2f0/0x2f0 [ 708.159100] ? destroy_unused_super.part.11+0x110/0x110 [ 708.164477] ? __alloc_pages_nodemask+0xacf/0xd70 [ 708.168829] IPVS: Unknown mcast interface: rose0 [ 708.169331] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 708.179164] ? kasan_check_read+0x11/0x20 [ 708.183318] ? cap_capable+0x1f9/0x260 [ 708.187224] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 708.192768] ? security_capable+0x99/0xc0 2018/05/13 06:34:12 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000300"}}) [ 708.196930] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 708.202478] ? ns_capable_common+0x13f/0x170 [ 708.206900] ? get_anon_bdev+0x2f0/0x2f0 [ 708.210967] sget+0x10b/0x150 [ 708.214084] ? fuse_get_root_inode+0x190/0x190 [ 708.214836] IPVS: Unknown mcast interface: rose0 [ 708.218666] mount_nodev+0x33/0x110 [ 708.218685] fuse_mount+0x2c/0x40 [ 708.218702] mount_fs+0xae/0x328 [ 708.218722] vfs_kern_mount.part.34+0xd4/0x4d0 [ 708.218739] ? may_umount+0xb0/0xb0 [ 708.218753] ? _raw_read_unlock+0x22/0x30 2018/05/13 06:34:12 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000000000000000000000ffffff8d00"}}) [ 708.218766] ? __get_fs_type+0x97/0xc0 [ 708.218783] do_mount+0x564/0x3070 [ 708.218801] ? copy_mount_string+0x40/0x40 [ 708.257889] ? rcu_pm_notify+0xc0/0xc0 [ 708.261793] ? copy_mount_options+0x5f/0x380 [ 708.266210] ? rcu_read_lock_sched_held+0x108/0x120 [ 708.271239] ? kmem_cache_alloc_trace+0x616/0x780 [ 708.276096] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 708.281646] ? _copy_from_user+0xdf/0x150 [ 708.285816] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 708.291382] ? copy_mount_options+0x285/0x380 [ 708.295894] ksys_mount+0x12d/0x140 [ 708.299538] __x64_sys_mount+0xbe/0x150 [ 708.303520] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 708.308550] do_syscall_64+0x1b1/0x800 [ 708.312448] ? finish_task_switch+0x1ca/0x810 [ 708.316957] ? syscall_return_slowpath+0x5c0/0x5c0 [ 708.321896] ? syscall_return_slowpath+0x30f/0x5c0 [ 708.326834] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 708.332199] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 708.337050] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 708.342245] RIP: 0033:0x455979 [ 708.345438] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 708.353150] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 708.360431] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 708.367704] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 708.374982] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 708.382262] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 708.479445] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 2018/05/13 06:34:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0x18020000}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:13 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000500"}}) 2018/05/13 06:34:13 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00'}}) 2018/05/13 06:34:13 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000000f0ffffff00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:13 executing program 1 (fault-call:3 fault-nth:14): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:34:13 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r2 = dup(r0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}) fcntl$notify(r2, 0x0, 0x1000000000282) 2018/05/13 06:34:13 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000380)=[{&(0x7f0000000000)="e39f150ecb864e8aa0ae59519dde97c7e5434113c2625f6354f5436616f97b866f669edcc7b994f7de796172ba07319a5fde2076560e916e730735", 0x3b, 0xff}, {&(0x7f0000000140)="0409f4b594972e9bc3dc221b50a06352e00e76528fb10fef3f6b3ff5fd427eb61acd26de2c1f5690c3c058414fa8eb12b1a374aa1911358bc530477815e4f7c367d03a3d63f6dbe535fcd40a799f77fa98a95d6245eceee5390b303f60d29a1278d6ab083f7b6b420fa095502239f3514840348e5d", 0x75, 0xfffffffffffffff9}, {&(0x7f00000001c0)="c2aef6bdf79c640303000000000000c9bc147f31435d54bba854fc30e0731007eed9654e607315c8533df21533cefe97689c3d9a6c740000230f351603638e5059ddf1b34ad6d9ec3ccdd74b8c80feccbc654c605e3e947ed9c981f21922ae0eda46b663b0d1a8bf24", 0xffffffffffffff6e, 0xda}, {&(0x7f0000000240)="e6d15e22c577e08f19e3ceb004a2b927ff50e410f8739deda0d5dd526ff9d83df10aed006e997025220a90d908aa985068e4cb8449aa3c8a2b832a0b0f0b9e25b1121c9cca42f9244b5c82ebbb9d68482cde28b0657c119ce8881c43b6f94755f106d71db26eaaf46b547665", 0x6c, 0xb}, {&(0x7f0000000400)="fe638a160becfcffa7d361e0c7cae7a76ffcdc069789790bfad8aa6f44a5ae043fb93da1a05b9e3d80dc89712574f6ce4dc7dc1a1c6e7d6a31a8d2cc5b0af7e4a614d45e059ebcb6bbef80dcad97695b9278b015101b76b0af022bb5b9c24af51dd5ec6aae1b47eb2cca6b720a9a00e5b354f666af3193431015eb85335cbe6ad2238b70444c8d930ee985a2048a9557010718b987bd2410d37b5b2db7a0717e93a9f78de7a80e91806fea40058b920d8b50eee4565e39", 0x91, 0xa9}], 0x0, 0x0) sync() r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x1, 0x0) name_to_handle_at(r0, &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="9e000000ff0f0000eea5c69461dcc57ab834f75ac936a6cc4bd22f614b8bc1f778dfea72b45c37ed53ba6b5dd3deac1437190b5d4df15ce58b59817105459b6862111466797a828d254cb2e021fd2075daff7ca8bbb81767d24126f74e1fb07b8f1b663a8c7e1bdf7e1462f68a599934ebcab9721b5f3e84a33aac6cbaaa6b57781142d8e98bad0ee868c0c8a950f72b158c805607667d249ff1357451a7"], &(0x7f0000000840), 0x1400) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000500)=[&(0x7f00000002c0)="0000000201000000000000010400", &(0x7f0000000300)="c22176626f786e6574312a7d2f70707031766d6e65743025766d6e6574307573657227257070703100", &(0x7f0000000340)='bfs\x00', &(0x7f00000004c0)="0000000201000000000000010400"], &(0x7f0000000640)=[&(0x7f0000000540)='bfs\x00', &(0x7f0000000580)="5b247d76626f786e6574314026fa50656d302f73656c696e757876626f786e65743100", &(0x7f00000005c0)='\x00', &(0x7f0000000600)="70707030657468315c656d30dd76626f786e65743076626f786e65743170707030637075736574706f7369785f61636c5f616363657373242800"]) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000001140)=""/121, 0x56) r1 = syz_open_dev$dmmidi(&(0x7f0000000680)='/dev/dmmidi#\x00', 0x3, 0x20400) mknodat(r1, &(0x7f00000006c0)='/\x00', 0xe091, 0x3f) 2018/05/13 06:34:13 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0xbc}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) [ 708.838980] IPVS: Unknown mcast interface: rose0 [ 708.862965] IPVS: Unknown mcast interface: rose0 [ 708.896148] FAULT_INJECTION: forcing a failure. [ 708.896148] name failslab, interval 1, probability 0, space 0, times 0 [ 708.907545] CPU: 0 PID: 16434 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 708.914831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 708.924196] Call Trace: [ 708.926809] dump_stack+0x1b9/0x294 [ 708.930459] ? dump_stack_print_info.cold.2+0x52/0x52 [ 708.935667] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 708.940888] should_fail.cold.4+0xa/0x1a [ 708.944965] ? is_bpf_text_address+0xd7/0x170 [ 708.949480] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 708.954603] ? unwind_get_return_address+0x61/0xa0 [ 708.959552] ? __save_stack_trace+0x7e/0xd0 [ 708.963889] ? graph_lock+0x170/0x170 [ 708.965125] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=bdf6aec2) [ 708.967706] ? find_held_lock+0x36/0x1c0 [ 708.967728] ? __lock_is_held+0xb5/0x140 [ 708.967757] ? check_same_owner+0x320/0x320 [ 708.967776] ? rcu_note_context_switch+0x710/0x710 [ 708.992740] __should_failslab+0x124/0x180 [ 708.996996] should_failslab+0x9/0x14 [ 709.000815] kmem_cache_alloc_trace+0x2cb/0x780 [ 709.005496] ? __kmalloc_node+0x33/0x70 [ 709.009483] ? __kmalloc_node+0x33/0x70 [ 709.013469] ? rcu_read_lock_sched_held+0x108/0x120 [ 709.019338] __memcg_init_list_lru_node+0x17d/0x2c0 [ 709.024371] ? kvfree_rcu+0x20/0x20 [ 709.028012] ? __kmalloc_node+0x47/0x70 [ 709.032005] __list_lru_init+0x456/0x790 [ 709.036092] ? list_lru_destroy+0x4c0/0x4c0 [ 709.040436] ? mark_held_locks+0xc9/0x160 [ 709.044604] ? __raw_spin_lock_init+0x1c/0x100 [ 709.049210] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 709.054253] ? __lockdep_init_map+0x105/0x590 [ 709.058762] ? lockdep_init_map+0x9/0x10 [ 709.062841] sget_userns+0x73a/0xf00 [ 709.066569] ? get_anon_bdev+0x2f0/0x2f0 [ 709.070661] ? destroy_unused_super.part.11+0x110/0x110 [ 709.076033] ? __alloc_pages_nodemask+0xacf/0xd70 [ 709.080898] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 709.085930] ? kasan_check_read+0x11/0x20 [ 709.090095] ? cap_capable+0x1f9/0x260 [ 709.094000] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 709.099544] ? security_capable+0x99/0xc0 [ 709.103708] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 709.109263] ? ns_capable_common+0x13f/0x170 [ 709.113687] ? get_anon_bdev+0x2f0/0x2f0 [ 709.117764] sget+0x10b/0x150 [ 709.120890] ? fuse_get_root_inode+0x190/0x190 [ 709.125483] mount_nodev+0x33/0x110 [ 709.129134] fuse_mount+0x2c/0x40 [ 709.132598] mount_fs+0xae/0x328 [ 709.135980] vfs_kern_mount.part.34+0xd4/0x4d0 [ 709.140567] ? may_umount+0xb0/0xb0 2018/05/13 06:34:13 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x0, 0x1000000000282) 2018/05/13 06:34:13 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 2018/05/13 06:34:13 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}}) 2018/05/13 06:34:13 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000000000000000f0ffffff7f00"}}) 2018/05/13 06:34:13 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000f00"}}) 2018/05/13 06:34:13 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000000000000000feffff00"}}) 2018/05/13 06:34:13 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000000000000300"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 709.144204] ? _raw_read_unlock+0x22/0x30 [ 709.148355] ? __get_fs_type+0x97/0xc0 [ 709.152257] do_mount+0x564/0x3070 [ 709.155810] ? copy_mount_string+0x40/0x40 [ 709.160052] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 709.164817] ? retint_kernel+0x10/0x10 [ 709.168719] ? copy_mount_options+0x1e3/0x380 [ 709.173228] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 709.178780] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 709.184330] ? copy_mount_options+0x285/0x380 [ 709.188840] ksys_mount+0x12d/0x140 [ 709.192487] __x64_sys_mount+0xbe/0x150 2018/05/13 06:34:13 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000200"}}) [ 709.196470] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 709.201502] do_syscall_64+0x1b1/0x800 [ 709.205407] ? finish_task_switch+0x1ca/0x810 [ 709.209916] ? syscall_return_slowpath+0x5c0/0x5c0 [ 709.214861] ? syscall_return_slowpath+0x30f/0x5c0 [ 709.219809] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 709.222039] IPVS: Unknown mcast interface: rose0 [ 709.225189] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 709.225213] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 709.225225] RIP: 0033:0x455979 [ 709.225234] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 709.225250] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 709.225259] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 709.225267] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 709.225275] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 709.225289] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 709.260657] IPVS: Unknown mcast interface: rose0 [ 709.496325] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=bdf6aec2) 2018/05/13 06:34:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0x4}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:14 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000000000001000"}}) 2018/05/13 06:34:14 executing program 2: socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x0, 0x1000000000282) 2018/05/13 06:34:14 executing program 1 (fault-call:3 fault-nth:15): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:34:14 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000d24000"}}) 2018/05/13 06:34:14 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\x00\x00`\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:14 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, 0x0) sync() lsetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f0000000140)="0000000201000000000000010400000000000000", 0x2c5, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000001140)=""/121, 0x56) 2018/05/13 06:34:14 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0x4b8}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:14 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x0, 0x1000000000282) [ 709.732286] IPVS: Unknown mcast interface: rose0 2018/05/13 06:34:14 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000500"}}) [ 709.772740] IPVS: Unknown mcast interface: rose0 2018/05/13 06:34:14 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000000000000000000034165d4000"}}) [ 709.820100] FAULT_INJECTION: forcing a failure. [ 709.820100] name failslab, interval 1, probability 0, space 0, times 0 [ 709.831534] CPU: 0 PID: 16502 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 709.838828] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 709.848190] Call Trace: [ 709.850803] dump_stack+0x1b9/0x294 [ 709.854449] ? dump_stack_print_info.cold.2+0x52/0x52 [ 709.859655] ? __save_stack_trace+0x7e/0xd0 [ 709.863999] should_fail.cold.4+0xa/0x1a [ 709.868076] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 709.873195] ? save_stack+0x43/0xd0 [ 709.876829] ? kasan_kmalloc+0xc4/0xe0 [ 709.880723] ? kmem_cache_alloc_trace+0x152/0x780 [ 709.885575] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 709.890774] ? __list_lru_init+0x456/0x790 [ 709.895026] ? sget_userns+0x73a/0xf00 [ 709.898923] ? graph_lock+0x170/0x170 [ 709.902734] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 709.907499] ? do_mount+0x564/0x3070 [ 709.911224] ? ksys_mount+0x12d/0x140 [ 709.921374] ? __x64_sys_mount+0xbe/0x150 [ 709.925534] ? do_syscall_64+0x1b1/0x800 [ 709.929606] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 709.934981] ? find_held_lock+0x36/0x1c0 [ 709.939060] ? __lock_is_held+0xb5/0x140 [ 709.943142] ? check_same_owner+0x320/0x320 [ 709.947489] ? rcu_note_context_switch+0x710/0x710 [ 709.952431] __should_failslab+0x124/0x180 [ 709.956676] should_failslab+0x9/0x14 [ 709.957311] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 2018/05/13 06:34:14 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000000000000500"}}) 2018/05/13 06:34:14 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000040d200"}}) 2018/05/13 06:34:14 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x0, 0x1000000000282) 2018/05/13 06:34:14 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000000600"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 709.960480] kmem_cache_alloc_trace+0x2cb/0x780 [ 709.960497] ? __kmalloc_node+0x33/0x70 [ 709.960511] ? __kmalloc_node+0x33/0x70 [ 709.960528] ? rcu_read_lock_sched_held+0x108/0x120 [ 709.960545] __memcg_init_list_lru_node+0x17d/0x2c0 [ 709.960561] ? kvfree_rcu+0x20/0x20 [ 709.995022] ? __kmalloc_node+0x47/0x70 [ 709.999016] __list_lru_init+0x456/0x790 [ 710.003091] ? list_lru_destroy+0x4c0/0x4c0 [ 710.007428] ? mark_held_locks+0xc9/0x160 [ 710.011591] ? __raw_spin_lock_init+0x1c/0x100 2018/05/13 06:34:14 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000000000000000000000000001000"}}) [ 710.016187] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 710.021218] ? __lockdep_init_map+0x105/0x590 [ 710.025729] ? lockdep_init_map+0x9/0x10 [ 710.029828] sget_userns+0x73a/0xf00 [ 710.033555] ? get_anon_bdev+0x2f0/0x2f0 [ 710.037630] ? destroy_unused_super.part.11+0x110/0x110 [ 710.043006] ? __alloc_pages_nodemask+0xacf/0xd70 [ 710.047924] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 710.052958] ? kasan_check_read+0x11/0x20 [ 710.057117] ? cap_capable+0x1f9/0x260 [ 710.061025] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 710.066574] ? security_capable+0x99/0xc0 [ 710.070742] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 710.076302] ? ns_capable_common+0x13f/0x170 [ 710.080724] ? get_anon_bdev+0x2f0/0x2f0 [ 710.084801] sget+0x10b/0x150 [ 710.087920] ? fuse_get_root_inode+0x190/0x190 [ 710.092516] mount_nodev+0x33/0x110 [ 710.096149] fuse_mount+0x2c/0x40 [ 710.099608] mount_fs+0xae/0x328 [ 710.102985] vfs_kern_mount.part.34+0xd4/0x4d0 [ 710.107600] ? may_umount+0xb0/0xb0 [ 710.111233] ? _raw_read_unlock+0x22/0x30 [ 710.115373] ? __get_fs_type+0x97/0xc0 [ 710.119250] do_mount+0x564/0x3070 [ 710.122805] ? copy_mount_string+0x40/0x40 [ 710.127048] ? rcu_pm_notify+0xc0/0xc0 [ 710.130933] ? copy_mount_options+0x5f/0x380 [ 710.135325] ? rcu_read_lock_sched_held+0x108/0x120 [ 710.140332] ? kmem_cache_alloc_trace+0x616/0x780 [ 710.145179] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 710.150713] ? _copy_from_user+0xdf/0x150 [ 710.154857] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 710.160395] ? copy_mount_options+0x285/0x380 [ 710.164884] ksys_mount+0x12d/0x140 [ 710.168585] __x64_sys_mount+0xbe/0x150 [ 710.172544] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 710.177547] do_syscall_64+0x1b1/0x800 [ 710.181430] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 710.186261] ? syscall_return_slowpath+0x5c0/0x5c0 [ 710.191191] ? syscall_return_slowpath+0x30f/0x5c0 [ 710.196120] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 710.201474] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 710.206317] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 710.211500] RIP: 0033:0x455979 [ 710.214672] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 710.222361] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 710.229613] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 710.236881] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 710.244140] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 710.251486] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 710.280807] IPVS: Unknown mcast interface: rose0 [ 710.306654] IPVS: Unknown mcast interface: rose0 [ 710.353167] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 2018/05/13 06:34:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0xffffffff00000000}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:15 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000000000000000500"}}) 2018/05/13 06:34:15 executing program 1 (fault-call:3 fault-nth:16): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:34:15 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x0, 0x1000000000282) 2018/05/13 06:34:15 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000040d200"}}) 2018/05/13 06:34:15 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, 0x0) sync() r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x88401, 0x0) connect$vsock_stream(r0, &(0x7f0000000180)={0x28, 0x0, 0x2710, @host=0x2}, 0x10) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000580)=0x1, 0x4) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f0000000700)=""/191) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000001c0)='./file0\x00', 0x8) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x7fffffff, 0x4, &(0x7f0000000440)=[{&(0x7f0000000300)="dadec5ed8a7a5745692acdee379f9261", 0x10, 0x1f}, {&(0x7f0000000340)="83f7098f63c6a8e741", 0x9, 0xffffffffffffffff}, {&(0x7f0000000380)="df0a4b91ebb8f3", 0x7, 0x97}, {&(0x7f00000003c0)="5b381f37311349c228c2d0f82fe41b727fdf1c24ea518eef30ef811450cfc213dc3bfe8e31e30c3b208b2f4886a885f1d4c1e9de9b6ba37223da663ec1577ec8b348add88263ba5c66901e7be6893d9bb6e6bffb88d2e8e94e8430f3d5e5754741", 0x61, 0x6}], 0x2010, &(0x7f00000004c0)={[{@nls={'nls', 0x3d, 'iso8859-13'}, 0x2c}, {@disable_sparse_yes={'disable_sparse=yes', 0x3d, [0x3f, 0x36, 0x36, 0x37, 0x37, 0x30]}, 0x2c}, {@umask={'umask', 0x3d, [0x37]}, 0x2c}, {@disable_sparse_yes={'disable_sparse=yes', 0x3d, [0x37, 0x2d, 0x0]}, 0x2c}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, [0x3f]}, 0x2c}, {@show_sys_files_yes={'show_sys_files=yes', 0x3d, [0x7b, 0x37, 0x35, 0x39]}, 0x2c}, {@errors_continue='errors=continue', 0x2c}]}) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000200)) socket$inet_udp(0x2, 0x2, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000240)={0xab, 0x1, 0x7}) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000001140)=""/121, 0x56) 2018/05/13 06:34:15 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000000500"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:15 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0xeffe000000000000}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:15 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r0 = dup(0xffffffffffffffff) fcntl$notify(r0, 0x0, 0x1000000000282) 2018/05/13 06:34:15 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 710.616774] IPVS: Unknown mcast interface: rose0 [ 710.635170] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 710.646851] IPVS: Unknown mcast interface: rose0 2018/05/13 06:34:15 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000000000000000000f00"}}) 2018/05/13 06:34:15 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000009016a66800"}}) 2018/05/13 06:34:15 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x0, 0x1000000000282) [ 710.737773] IPVS: Unknown mcast interface: rose0 [ 710.772007] IPVS: Unknown mcast interface: rose0 [ 710.801321] FAULT_INJECTION: forcing a failure. [ 710.801321] name failslab, interval 1, probability 0, space 0, times 0 [ 710.812647] CPU: 1 PID: 16559 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 710.819926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 710.829283] Call Trace: [ 710.831887] dump_stack+0x1b9/0x294 [ 710.835527] ? dump_stack_print_info.cold.2+0x52/0x52 [ 710.840727] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 710.845934] should_fail.cold.4+0xa/0x1a [ 710.850438] ? is_bpf_text_address+0xd7/0x170 [ 710.854947] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 710.860067] ? unwind_get_return_address+0x61/0xa0 [ 710.865005] ? __save_stack_trace+0x7e/0xd0 [ 710.869332] ? graph_lock+0x170/0x170 [ 710.873141] ? find_held_lock+0x36/0x1c0 [ 710.877218] ? __lock_is_held+0xb5/0x140 [ 710.877794] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 710.881279] ? fib_rules_lookup+0xa60/0xcb0 [ 710.881311] ? check_same_owner+0x320/0x320 [ 710.881332] ? rcu_note_context_switch+0x710/0x710 [ 710.881350] __should_failslab+0x124/0x180 [ 710.906731] should_failslab+0x9/0x14 [ 710.910555] kmem_cache_alloc_trace+0x2cb/0x780 [ 710.912860] IPVS: Unknown mcast interface: rose0 [ 710.915231] ? __kmalloc_node+0x33/0x70 [ 710.915247] ? __kmalloc_node+0x33/0x70 [ 710.915264] ? rcu_read_lock_sched_held+0x108/0x120 [ 710.915285] __memcg_init_list_lru_node+0x17d/0x2c0 [ 710.915302] ? kvfree_rcu+0x20/0x20 [ 710.915316] ? __kmalloc_node+0x47/0x70 [ 710.915333] __list_lru_init+0x456/0x790 [ 710.936360] IPVS: Unknown mcast interface: rose0 [ 710.937997] ? list_lru_destroy+0x4c0/0x4c0 [ 710.938014] ? mark_held_locks+0xc9/0x160 [ 710.938033] ? __raw_spin_lock_init+0x1c/0x100 [ 710.938050] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 710.938066] ? __lockdep_init_map+0x105/0x590 [ 710.938083] ? lockdep_init_map+0x9/0x10 [ 710.938103] sget_userns+0x73a/0xf00 [ 710.938117] ? get_anon_bdev+0x2f0/0x2f0 [ 710.938140] ? destroy_unused_super.part.11+0x110/0x110 [ 710.994147] ? __alloc_pages_nodemask+0xacf/0xd70 [ 710.999005] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 711.004030] ? kasan_check_read+0x11/0x20 [ 711.008181] ? cap_capable+0x1f9/0x260 [ 711.012085] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 711.017628] ? security_capable+0x99/0xc0 [ 711.021791] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 711.027335] ? ns_capable_common+0x13f/0x170 [ 711.031755] ? get_anon_bdev+0x2f0/0x2f0 [ 711.035821] sget+0x10b/0x150 [ 711.038938] ? fuse_get_root_inode+0x190/0x190 [ 711.043532] mount_nodev+0x33/0x110 [ 711.047170] fuse_mount+0x2c/0x40 2018/05/13 06:34:15 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000000000000000000010"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:15 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000000000000000001000"}}) 2018/05/13 06:34:15 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000200"}}) [ 711.050636] mount_fs+0xae/0x328 [ 711.054013] vfs_kern_mount.part.34+0xd4/0x4d0 [ 711.058602] ? may_umount+0xb0/0xb0 [ 711.062232] ? _raw_read_unlock+0x22/0x30 [ 711.066386] ? __get_fs_type+0x97/0xc0 [ 711.070288] do_mount+0x564/0x3070 [ 711.073841] ? copy_mount_string+0x40/0x40 [ 711.078085] ? rcu_pm_notify+0xc0/0xc0 [ 711.081993] ? copy_mount_options+0x5f/0x380 [ 711.086409] ? rcu_read_lock_sched_held+0x108/0x120 [ 711.091436] ? kmem_cache_alloc_trace+0x616/0x780 [ 711.096414] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 711.101963] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 711.107506] ? copy_mount_options+0x285/0x380 [ 711.112014] ksys_mount+0x12d/0x140 [ 711.115647] __x64_sys_mount+0xbe/0x150 [ 711.119616] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 711.124623] do_syscall_64+0x1b1/0x800 [ 711.128493] ? finish_task_switch+0x1ca/0x810 [ 711.132972] ? syscall_return_slowpath+0x5c0/0x5c0 [ 711.137883] ? syscall_return_slowpath+0x30f/0x5c0 [ 711.142808] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 711.148154] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 711.152986] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 711.158159] RIP: 0033:0x455979 [ 711.161345] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 711.169054] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 711.176322] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 711.183582] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 711.190844] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 711.198110] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 2018/05/13 06:34:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0xffffff7f00000000}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:15 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000000000000000fffffff0"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:15 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000f00"}}) 2018/05/13 06:34:15 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 2018/05/13 06:34:15 executing program 1 (fault-call:3 fault-nth:17): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:34:15 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) fcntl$notify(r1, 0x0, 0x1000000000282) 2018/05/13 06:34:15 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, 0x0) sync() lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000001140)=""/121, 0x56) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_buf(r0, 0x0, 0x28, &(0x7f0000000080)="117b16a277f2bed02a9df151bfa7c8d90baee889b67e958cc87a67966d288df8d51ca933d53eca4d7d849346969e6dde", 0x30) 2018/05/13 06:34:15 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0xf0ff7f}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) [ 711.507587] IPVS: Unknown mcast interface: rose0 [ 711.523961] FAULT_INJECTION: forcing a failure. [ 711.523961] name failslab, interval 1, probability 0, space 0, times 0 [ 711.526285] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 711.535283] CPU: 0 PID: 16628 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 711.535293] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 711.535303] Call Trace: [ 711.562126] dump_stack+0x1b9/0x294 [ 711.565771] ? dump_stack_print_info.cold.2+0x52/0x52 [ 711.570973] ? __save_stack_trace+0x7e/0xd0 [ 711.575311] should_fail.cold.4+0xa/0x1a [ 711.579388] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 711.584504] ? save_stack+0x43/0xd0 [ 711.588135] ? kasan_kmalloc+0xc4/0xe0 [ 711.592040] ? kmem_cache_alloc_trace+0x152/0x780 [ 711.596887] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 711.602078] ? __list_lru_init+0x456/0x790 [ 711.606315] ? sget_userns+0x73a/0xf00 [ 711.610211] ? graph_lock+0x170/0x170 [ 711.614020] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 711.618779] ? do_mount+0x564/0x3070 [ 711.622496] ? ksys_mount+0x12d/0x140 [ 711.626308] ? __x64_sys_mount+0xbe/0x150 [ 711.630471] ? do_syscall_64+0x1b1/0x800 [ 711.634542] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 711.636987] IPVS: Unknown mcast interface: rose0 [ 711.639909] ? find_held_lock+0x36/0x1c0 [ 711.639928] ? __lock_is_held+0xb5/0x140 [ 711.639957] ? check_same_owner+0x320/0x320 [ 711.639976] ? rcu_note_context_switch+0x710/0x710 [ 711.639996] __should_failslab+0x124/0x180 [ 711.640014] should_failslab+0x9/0x14 [ 711.640030] kmem_cache_alloc_trace+0x2cb/0x780 [ 711.640044] ? __kmalloc_node+0x33/0x70 [ 711.640054] ? __kmalloc_node+0x33/0x70 [ 711.640072] ? rcu_read_lock_sched_held+0x108/0x120 [ 711.687717] __memcg_init_list_lru_node+0x17d/0x2c0 [ 711.692750] ? kvfree_rcu+0x20/0x20 [ 711.696393] ? __kmalloc_node+0x47/0x70 [ 711.700387] __list_lru_init+0x456/0x790 2018/05/13 06:34:16 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000000000000034165d408e2400"}}) 2018/05/13 06:34:16 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(0xffffffffffffffff, 0x0, 0x1000000000282) 2018/05/13 06:34:16 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000001400"}}) 2018/05/13 06:34:16 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 2018/05/13 06:34:16 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}}) [ 711.704460] ? list_lru_destroy+0x4c0/0x4c0 [ 711.708794] ? mark_held_locks+0xc9/0x160 [ 711.712949] ? __raw_spin_lock_init+0x1c/0x100 [ 711.717537] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 711.722556] ? __lockdep_init_map+0x105/0x590 [ 711.727055] ? lockdep_init_map+0x9/0x10 [ 711.731123] sget_userns+0x73a/0xf00 [ 711.734843] ? get_anon_bdev+0x2f0/0x2f0 [ 711.738914] ? destroy_unused_super.part.11+0x110/0x110 [ 711.744280] ? __alloc_pages_nodemask+0xacf/0xd70 [ 711.749132] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 711.754160] ? kasan_check_read+0x11/0x20 2018/05/13 06:34:16 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000001000"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:16 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000000000000000000500"}}) [ 711.758321] ? cap_capable+0x1f9/0x260 [ 711.762228] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 711.767773] ? security_capable+0x99/0xc0 [ 711.771936] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 711.777916] ? ns_capable_common+0x13f/0x170 [ 711.782337] ? get_anon_bdev+0x2f0/0x2f0 [ 711.786409] sget+0x10b/0x150 [ 711.789526] ? fuse_get_root_inode+0x190/0x190 [ 711.794114] mount_nodev+0x33/0x110 [ 711.797746] fuse_mount+0x2c/0x40 [ 711.801209] mount_fs+0xae/0x328 [ 711.804595] vfs_kern_mount.part.34+0xd4/0x4d0 [ 711.809191] ? may_umount+0xb0/0xb0 [ 711.812821] ? _raw_read_unlock+0x22/0x30 [ 711.816976] ? __get_fs_type+0x97/0xc0 [ 711.818726] IPVS: Unknown mcast interface: rose0 [ 711.820871] do_mount+0x564/0x3070 [ 711.820894] ? copy_mount_string+0x40/0x40 [ 711.820911] ? rcu_pm_notify+0xc0/0xc0 [ 711.820933] ? copy_mount_options+0x5f/0x380 [ 711.820949] ? rcu_read_lock_sched_held+0x108/0x120 [ 711.820967] ? kmem_cache_alloc_trace+0x616/0x780 [ 711.820987] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 2018/05/13 06:34:16 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000000000000fffffe00"}}) [ 711.821008] ? _copy_from_user+0xdf/0x150 [ 711.850216] IPVS: Unknown mcast interface: rose0 [ 711.851598] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 711.851623] ? copy_mount_options+0x285/0x380 [ 711.851642] ksys_mount+0x12d/0x140 [ 711.851660] __x64_sys_mount+0xbe/0x150 [ 711.851675] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 711.851694] do_syscall_64+0x1b1/0x800 [ 711.851710] ? finish_task_switch+0x1ca/0x810 [ 711.851727] ? syscall_return_slowpath+0x5c0/0x5c0 [ 711.851744] ? syscall_return_slowpath+0x30f/0x5c0 [ 711.906913] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 711.912298] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 711.917160] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 711.922358] RIP: 0033:0x455979 [ 711.925549] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 711.933269] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 711.940547] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 711.947821] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 711.955096] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 711.962372] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 712.042368] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 2018/05/13 06:34:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0x20000240}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:16 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000000f00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:16 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00'}}) 2018/05/13 06:34:16 executing program 1 (fault-call:3 fault-nth:18): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:34:16 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x0, 0x0) 2018/05/13 06:34:16 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x81008, 0x0) sync() lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000001140)=""/121, 0x56) 2018/05/13 06:34:16 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000009016a66800"}}) 2018/05/13 06:34:16 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0xb4}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) [ 712.375520] IPVS: Unknown mcast interface: rose0 2018/05/13 06:34:16 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000000000000000000000000000500"}}) [ 712.415447] IPVS: Unknown mcast interface: rose0 [ 712.421998] FAULT_INJECTION: forcing a failure. [ 712.421998] name failslab, interval 1, probability 0, space 0, times 0 [ 712.433359] CPU: 0 PID: 16692 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 712.440642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 712.450005] Call Trace: [ 712.452618] dump_stack+0x1b9/0x294 [ 712.456272] ? dump_stack_print_info.cold.2+0x52/0x52 [ 712.461483] ? __save_stack_trace+0x7e/0xd0 2018/05/13 06:34:16 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x0, 0x0) 2018/05/13 06:34:16 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000000000000000000000ffffffff00"}}) [ 712.465828] should_fail.cold.4+0xa/0x1a [ 712.469904] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 712.475022] ? save_stack+0x43/0xd0 [ 712.478666] ? kasan_kmalloc+0xc4/0xe0 [ 712.482571] ? kmem_cache_alloc_trace+0x152/0x780 [ 712.487423] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 712.492625] ? __list_lru_init+0x456/0x790 [ 712.496872] ? sget_userns+0x73a/0xf00 [ 712.500771] ? graph_lock+0x170/0x170 [ 712.504585] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 712.509342] ? do_mount+0x564/0x3070 2018/05/13 06:34:17 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x0, 0x0) 2018/05/13 06:34:17 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000000000000000034000"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 712.513064] ? ksys_mount+0x12d/0x140 [ 712.516870] ? __x64_sys_mount+0xbe/0x150 [ 712.521024] ? do_syscall_64+0x1b1/0x800 [ 712.525093] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 712.530467] ? find_held_lock+0x36/0x1c0 [ 712.534541] ? __lock_is_held+0xb5/0x140 [ 712.538640] ? check_same_owner+0x320/0x320 [ 712.542976] ? rcu_note_context_switch+0x710/0x710 [ 712.547919] __should_failslab+0x124/0x180 [ 712.552167] should_failslab+0x9/0x14 [ 712.555983] kmem_cache_alloc_trace+0x2cb/0x780 [ 712.560666] ? __kmalloc_node+0x33/0x70 [ 712.564651] ? __kmalloc_node+0x33/0x70 [ 712.568633] ? rcu_read_lock_sched_held+0x108/0x120 [ 712.573665] __memcg_init_list_lru_node+0x17d/0x2c0 [ 712.578689] ? kvfree_rcu+0x20/0x20 [ 712.582325] ? __kmalloc_node+0x47/0x70 [ 712.586312] __list_lru_init+0x456/0x790 [ 712.590384] ? list_lru_destroy+0x4c0/0x4c0 [ 712.594713] ? mark_held_locks+0xc9/0x160 [ 712.598874] ? __raw_spin_lock_init+0x1c/0x100 [ 712.603460] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 712.608488] ? __lockdep_init_map+0x105/0x590 2018/05/13 06:34:17 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000000000000000000200"}}) [ 712.612994] ? lockdep_init_map+0x9/0x10 [ 712.617063] sget_userns+0x73a/0xf00 [ 712.620044] IPVS: Unknown mcast interface: rose0 [ 712.620776] ? get_anon_bdev+0x2f0/0x2f0 [ 712.620800] ? destroy_unused_super.part.11+0x110/0x110 [ 712.620817] ? __alloc_pages_nodemask+0xacf/0xd70 [ 712.620838] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 712.620858] ? kasan_check_read+0x11/0x20 [ 712.620879] ? cap_capable+0x1f9/0x260 [ 712.652874] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 712.658150] IPVS: Unknown mcast interface: rose0 2018/05/13 06:34:17 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000000000001000"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 712.658416] ? security_capable+0x99/0xc0 [ 712.658437] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 712.658456] ? ns_capable_common+0x13f/0x170 [ 712.677256] ? get_anon_bdev+0x2f0/0x2f0 [ 712.681328] sget+0x10b/0x150 [ 712.684445] ? fuse_get_root_inode+0x190/0x190 [ 712.689043] mount_nodev+0x33/0x110 [ 712.692681] fuse_mount+0x2c/0x40 [ 712.696147] mount_fs+0xae/0x328 [ 712.699537] vfs_kern_mount.part.34+0xd4/0x4d0 [ 712.704126] ? may_umount+0xb0/0xb0 [ 712.707753] ? _raw_read_unlock+0x22/0x30 [ 712.711906] ? __get_fs_type+0x97/0xc0 2018/05/13 06:34:17 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000000000008dffffff00"}}) [ 712.715805] do_mount+0x564/0x3070 [ 712.719361] ? copy_mount_string+0x40/0x40 [ 712.723602] ? rcu_pm_notify+0xc0/0xc0 [ 712.727504] ? copy_mount_options+0x5f/0x380 [ 712.731922] ? rcu_read_lock_sched_held+0x108/0x120 [ 712.736945] ? kmem_cache_alloc_trace+0x616/0x780 [ 712.741797] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 712.747341] ? _copy_from_user+0xdf/0x150 [ 712.748095] IPVS: Unknown mcast interface: rose0 [ 712.751496] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 712.751513] ? copy_mount_options+0x285/0x380 [ 712.751535] ksys_mount+0x12d/0x140 [ 712.751553] __x64_sys_mount+0xbe/0x150 [ 712.751569] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 712.751588] do_syscall_64+0x1b1/0x800 [ 712.751604] ? finish_task_switch+0x1ca/0x810 [ 712.751621] ? syscall_return_slowpath+0x5c0/0x5c0 [ 712.751641] ? syscall_return_slowpath+0x30f/0x5c0 [ 712.782479] IPVS: Unknown mcast interface: rose0 [ 712.782843] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 712.782866] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 712.812128] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 712.817323] RIP: 0033:0x455979 [ 712.820512] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 712.828236] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 712.835505] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 712.842781] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 712.850053] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 712.857325] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 2018/05/13 06:34:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0x1d40000000000000}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:17 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000100"}}) 2018/05/13 06:34:17 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000000000000f00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:17 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}}) 2018/05/13 06:34:17 executing program 1 (fault-call:3 fault-nth:19): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:34:17 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, 0x0) sync() lsetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f0000000140)="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", 0xfffffffffffffdd8, 0x40000000000000) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000001140)=""/121, 0x56) 2018/05/13 06:34:17 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0x240}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) [ 713.286968] IPVS: Unknown mcast interface: rose0 [ 713.295076] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 713.313797] FAULT_INJECTION: forcing a failure. [ 713.313797] name failslab, interval 1, probability 0, space 0, times 0 [ 713.325101] CPU: 1 PID: 16752 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 713.332393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 713.341749] Call Trace: [ 713.344360] dump_stack+0x1b9/0x294 [ 713.346222] IPVS: Unknown mcast interface: rose0 [ 713.348019] ? dump_stack_print_info.cold.2+0x52/0x52 [ 713.348038] ? __save_stack_trace+0x7e/0xd0 [ 713.348058] should_fail.cold.4+0xa/0x1a [ 713.366354] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 713.371474] ? save_stack+0x43/0xd0 [ 713.375109] ? kasan_kmalloc+0xc4/0xe0 [ 713.379009] ? kmem_cache_alloc_trace+0x152/0x780 [ 713.383865] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 713.389065] ? __list_lru_init+0x456/0x790 [ 713.393306] ? sget_userns+0x73a/0xf00 [ 713.397200] ? graph_lock+0x170/0x170 [ 713.401007] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 713.405774] ? do_mount+0x564/0x3070 [ 713.409496] ? ksys_mount+0x12d/0x140 [ 713.413305] ? __x64_sys_mount+0xbe/0x150 [ 713.414830] IPVS: Unknown mcast interface: rose0 [ 713.417458] ? do_syscall_64+0x1b1/0x800 [ 713.417476] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 713.417496] ? find_held_lock+0x36/0x1c0 2018/05/13 06:34:17 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000000000000e6f2f400"}}) 2018/05/13 06:34:17 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000000000f000"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:17 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000000000000034165d4000"}}) 2018/05/13 06:34:17 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000001400"}}) [ 713.417516] ? __lock_is_held+0xb5/0x140 [ 713.417546] ? check_same_owner+0x320/0x320 [ 713.417561] ? rcu_note_context_switch+0x710/0x710 [ 713.417578] __should_failslab+0x124/0x180 [ 713.446120] IPVS: Unknown mcast interface: rose0 [ 713.449059] should_failslab+0x9/0x14 [ 713.449077] kmem_cache_alloc_trace+0x2cb/0x780 [ 713.449091] ? __kmalloc_node+0x33/0x70 [ 713.449106] ? __kmalloc_node+0x33/0x70 [ 713.449122] ? rcu_read_lock_sched_held+0x108/0x120 [ 713.449142] __memcg_init_list_lru_node+0x17d/0x2c0 [ 713.484515] ? kvfree_rcu+0x20/0x20 2018/05/13 06:34:17 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000000000f0ffffffffffff"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 713.488152] ? __kmalloc_node+0x47/0x70 [ 713.492144] __list_lru_init+0x456/0x790 [ 713.496219] ? list_lru_destroy+0x4c0/0x4c0 [ 713.500566] ? mark_held_locks+0xc9/0x160 [ 713.504725] ? __raw_spin_lock_init+0x1c/0x100 [ 713.509321] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 713.514353] ? __lockdep_init_map+0x105/0x590 [ 713.518860] ? lockdep_init_map+0x9/0x10 [ 713.522937] sget_userns+0x73a/0xf00 [ 713.527803] ? get_anon_bdev+0x2f0/0x2f0 [ 713.531884] ? destroy_unused_super.part.11+0x110/0x110 2018/05/13 06:34:18 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000000000000000000000000000f00"}}) [ 713.537259] ? __alloc_pages_nodemask+0xacf/0xd70 [ 713.542118] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 713.547149] ? kasan_check_read+0x11/0x20 [ 713.547609] IPVS: Unknown mcast interface: rose0 [ 713.551304] ? cap_capable+0x1f9/0x260 [ 713.551328] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 713.551343] ? security_capable+0x99/0xc0 [ 713.551363] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 713.551379] ? ns_capable_common+0x13f/0x170 [ 713.551397] ? get_anon_bdev+0x2f0/0x2f0 [ 713.551415] sget+0x10b/0x150 2018/05/13 06:34:18 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}}) [ 713.585199] IPVS: Unknown mcast interface: rose0 [ 713.586745] ? fuse_get_root_inode+0x190/0x190 [ 713.586763] mount_nodev+0x33/0x110 [ 713.586779] fuse_mount+0x2c/0x40 [ 713.586796] mount_fs+0xae/0x328 [ 713.586815] vfs_kern_mount.part.34+0xd4/0x4d0 [ 713.586831] ? may_umount+0xb0/0xb0 [ 713.614741] ? _raw_read_unlock+0x22/0x30 [ 713.618900] ? __get_fs_type+0x97/0xc0 [ 713.622801] do_mount+0x564/0x3070 [ 713.626351] ? do_raw_spin_unlock+0x9e/0x2e0 [ 713.630773] ? copy_mount_string+0x40/0x40 [ 713.635017] ? rcu_pm_notify+0xc0/0xc0 2018/05/13 06:34:18 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000000000000000000300"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 713.638919] ? copy_mount_options+0x5f/0x380 [ 713.643343] ? rcu_read_lock_sched_held+0x108/0x120 [ 713.648375] ? kmem_cache_alloc_trace+0x616/0x780 [ 713.653236] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 713.658787] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 713.664335] ? copy_mount_options+0x285/0x380 [ 713.668844] ksys_mount+0x12d/0x140 [ 713.673451] __x64_sys_mount+0xbe/0x150 [ 713.677472] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 713.682501] do_syscall_64+0x1b1/0x800 2018/05/13 06:34:18 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000034165d4000"}}) [ 713.683286] IPVS: Unknown mcast interface: rose0 [ 713.686392] ? finish_task_switch+0x1ca/0x810 [ 713.686411] ? syscall_return_slowpath+0x5c0/0x5c0 [ 713.686428] ? syscall_return_slowpath+0x30f/0x5c0 [ 713.686448] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 713.686468] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 713.686491] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 713.715910] IPVS: Unknown mcast interface: rose0 [ 713.720891] RIP: 0033:0x455979 [ 713.720900] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 713.720915] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 713.720924] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 713.720934] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 713.720947] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 713.720955] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 713.824079] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 2018/05/13 06:34:18 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0xa00000000000000}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0x4002000000000000}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:18 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}}) 2018/05/13 06:34:18 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000248e405d163400"}}) 2018/05/13 06:34:18 executing program 1 (fault-call:3 fault-nth:20): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:34:18 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000000fffff000"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:18 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r2 = dup(r0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}) fcntl$notify(r2, 0x0, 0x1000000000282) 2018/05/13 06:34:18 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x8, &(0x7f0000000600)=[{&(0x7f0000000140)="3d8c7a87dcc91a3b49d98ee678f9e6083641bcc452c2db52bc148bac22d4ed543791fa3f3b59bacc46bcf728d7e1d504e780f8f85cef41ffb593a7e2608249acf3ac8802ace95ea61ac8898aec7d957a9adf18a48082cc77b9", 0x59, 0x8f7}, {&(0x7f00000001c0)="552acd8214b5317d289bcb25678a0980c6a0a9e350fecaa2aa4d1e6b48c21ea03d2844941d46d62c56392058afd821a44ef6f1374e3820cc79d457a0ba543c49f70abf49f4da5fbc16d9ca60f49177350deea2f245ac8b97fce023ac46df0e58a95e0db34d7cad34407420340f5b253298ce9d600de82c", 0x77, 0x10003}, {&(0x7f0000000240)="905f16ff6a2a8d1e08abd6faf4333bcc5bbd936fe43fb7460d60cd9c26371749dc15ddd7c51c11c30a0cb6c7c48b8844f291686c92a99833ce5596b6dbe80db3436236ad0847c976fdcc6116e3f908f2a55a3647255bae02e0", 0x59}, {&(0x7f00000002c0)="ef66d0c4a554b2922eec54fb0339c9ae5a1ccb68f56cac650296fa5e0bd25c4605a20433196669ff301dcdbd3e85f3a4e651f42ff4e8bef876792a6f8ddaeb3edb501e75ede1edcda4beea8bc36bbaa19fbbcb8b4647d41dd45f5a05446b72deebface71b8ed32", 0x67, 0x9}, {&(0x7f0000000340)="079b2a759b02199ca6f9560e2dfa16191f44b8fadbb61d3dc2fda720a8a4ed124354f45f65729f8a02cbd3090d49ea3b6e9f35148f5a55b53f12b1d409724654bdd78c8a17d2247694334836181fd0e7bbc856d775609d8037b6916cdc5391ccf9b6278983d5bcf157fcf39aec09ba3f52f926c687265e099af561988e0d2f04175c531be78d20667c7ec83f6d266e8605d512f975876cb37bba301af0acd8a4090aeac68d7f47e8c759616380034a2a1092073bd5a4a73110a7f53e907d7358f2da9287c16757f6f5b82614bcc9f0922cd92b35e0913088aeb504b46e", 0xdd, 0x1}, {&(0x7f0000000440)="bfd3497a642fe0a3614ca04a0d0d18ad4d28bd7874a5eeeee65dea4682dae50dbe039f4ef38465ec1e2436fd536e6e7ca1cbc6d09cb15c2ad337c8c63b81aa4e39c07c60008dc0c84acaf6c3585b0673959c8db734a849a2005f476a43ea47c0d963854b8c0378337e4edec9e60f1214d68121916d6b6e93054df1ea31dc4c3f8ce5640390c6e4422868bc773d12d9c48032e2e3703fd3a927db612aee4ead1e585f55c4be178222515ad1aaa08674b6e37bfd8c8b91099dd1ea442062b940a16db609f750f333003e7bbe49fedb2054c7dc", 0xd2, 0xda8}, {&(0x7f0000000000)="cb0fb699d7f9cc3d1039daa8dbc39427334e41ff8ed6eaf814603dbe2e23e01ee0d38c35cbd09016d855e45db7e5c6838054d1cace39", 0x36, 0x3f}, {&(0x7f0000000540)="b548a484d7bb72ca1890b3e4210bf185e0bcf519df20ebb0c237b9b45d839609ece17583471254ce96fabab85aa9d2a3fea756a027c0859f58356941ed5b65863455b92e13fca62e6128d4ff08c61e025a658cd5b5c832bba8d43d39bf455254b4a7bcd1823987b0d99bbe3766c17dc000630b097594471a4202a1c58d6e04ebcc55cfbb9107382af2d26ce53b12dd", 0x8f, 0x8}], 0x0, 0x0) sync() lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000080)=@random={'os2.', 'security.capability\x00'}, &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) socketpair(0x2, 0x2, 0x1, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route_sched(r0, &(0x7f0000000800)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x400810}, 0xc, &(0x7f00000007c0)={&(0x7f0000000740)=@gettaction={0x60, 0x32, 0x400, 0x70bd26, 0x25dfdbfe, {0x0, 0x2, 0x1}, [@action_gd=@TCA_ACT_TAB={0x24, 0x1, [{0x10, 0x1e, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0x10, 0x8, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}]}, @action_gd=@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x1, @TCA_ACT_INDEX={0x8, 0x3, 0xfffffffffffffc00}}]}, @action_gd=@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x1b, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x40}, 0x4000000) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000001140)=""/121, 0x56) [ 714.171608] IPVS: Unknown mcast interface: rose0 2018/05/13 06:34:18 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r2 = dup(r0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x402000, 0x0) fcntl$notify(r2, 0x0, 0x1000000000282) [ 714.215180] IPVS: Unknown mcast interface: rose0 [ 714.235258] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=2a9b0790) [ 714.257390] FAULT_INJECTION: forcing a failure. 2018/05/13 06:34:18 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000068a6169000"}}) 2018/05/13 06:34:18 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000000000000000f00"}}) [ 714.257390] name failslab, interval 1, probability 0, space 0, times 0 [ 714.268743] CPU: 1 PID: 16823 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 714.276028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 714.285392] Call Trace: [ 714.287999] dump_stack+0x1b9/0x294 [ 714.291648] ? dump_stack_print_info.cold.2+0x52/0x52 [ 714.296854] ? __save_stack_trace+0x7e/0xd0 [ 714.301200] should_fail.cold.4+0xa/0x1a [ 714.305276] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 714.310396] ? save_stack+0x43/0xd0 2018/05/13 06:34:18 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\x00\x00\x00\x00\v\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 714.314032] ? kasan_kmalloc+0xc4/0xe0 [ 714.317926] ? kmem_cache_alloc_trace+0x152/0x780 [ 714.322778] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 714.327972] ? __list_lru_init+0x456/0x790 [ 714.332215] ? sget_userns+0x73a/0xf00 [ 714.336200] ? graph_lock+0x170/0x170 [ 714.340011] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 714.344772] ? do_mount+0x564/0x3070 [ 714.348488] ? ksys_mount+0x12d/0x140 [ 714.352292] ? __x64_sys_mount+0xbe/0x150 [ 714.356449] ? do_syscall_64+0x1b1/0x800 [ 714.360523] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 714.363060] IPVS: Unknown mcast interface: rose0 [ 714.365899] ? find_held_lock+0x36/0x1c0 [ 714.365921] ? __lock_is_held+0xb5/0x140 [ 714.365952] ? check_same_owner+0x320/0x320 [ 714.365974] ? rcu_note_context_switch+0x710/0x710 [ 714.365993] __should_failslab+0x124/0x180 [ 714.366013] should_failslab+0x9/0x14 [ 714.366030] kmem_cache_alloc_trace+0x2cb/0x780 [ 714.366045] ? __kmalloc_node+0x33/0x70 [ 714.366059] ? __kmalloc_node+0x33/0x70 [ 714.366076] ? rcu_read_lock_sched_held+0x108/0x120 2018/05/13 06:34:18 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000000000000000000000f4f2e600"}}) 2018/05/13 06:34:18 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\x00\x00\x00\x00\t\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 714.382412] IPVS: Unknown mcast interface: rose0 [ 714.383244] __memcg_init_list_lru_node+0x17d/0x2c0 [ 714.383264] ? kvfree_rcu+0x20/0x20 [ 714.383283] ? __kmalloc_node+0x47/0x70 [ 714.383304] __list_lru_init+0x456/0x790 [ 714.383323] ? list_lru_destroy+0x4c0/0x4c0 [ 714.383340] ? mark_held_locks+0xc9/0x160 [ 714.383359] ? __raw_spin_lock_init+0x1c/0x100 [ 714.383375] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 714.383388] ? __lockdep_init_map+0x105/0x590 [ 714.383408] ? lockdep_init_map+0x9/0x10 [ 714.461845] sget_userns+0x73a/0xf00 [ 714.465675] ? get_anon_bdev+0x2f0/0x2f0 [ 714.469750] ? destroy_unused_super.part.11+0x110/0x110 [ 714.475252] ? __alloc_pages_nodemask+0xacf/0xd70 [ 714.479656] IPVS: Unknown mcast interface: rose0 [ 714.480106] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 714.480128] ? kasan_check_read+0x11/0x20 [ 714.480146] ? cap_capable+0x1f9/0x260 [ 714.480170] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 714.480185] ? security_capable+0x99/0xc0 [ 714.480204] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 2018/05/13 06:34:18 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000000000000400"}}) [ 714.480222] ? ns_capable_common+0x13f/0x170 [ 714.504387] IPVS: Unknown mcast interface: rose0 [ 714.507638] ? get_anon_bdev+0x2f0/0x2f0 [ 714.507654] sget+0x10b/0x150 [ 714.507672] ? fuse_get_root_inode+0x190/0x190 [ 714.507688] mount_nodev+0x33/0x110 [ 714.507704] fuse_mount+0x2c/0x40 [ 714.507722] mount_fs+0xae/0x328 [ 714.507743] vfs_kern_mount.part.34+0xd4/0x4d0 [ 714.507758] ? may_umount+0xb0/0xb0 [ 714.507771] ? _raw_read_unlock+0x22/0x30 [ 714.507787] ? __get_fs_type+0x97/0xc0 [ 714.560766] do_mount+0x564/0x3070 2018/05/13 06:34:19 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\x00\x00\t\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 714.564320] ? do_raw_spin_unlock+0x9e/0x2e0 [ 714.568739] ? copy_mount_string+0x40/0x40 [ 714.572980] ? rcu_pm_notify+0xc0/0xc0 [ 714.576892] ? copy_mount_options+0x5f/0x380 [ 714.581314] ? rcu_read_lock_sched_held+0x108/0x120 [ 714.586349] ? kmem_cache_alloc_trace+0x616/0x780 [ 714.591208] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 714.596770] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 714.602323] ? copy_mount_options+0x285/0x380 [ 714.606834] ksys_mount+0x12d/0x140 [ 714.610476] __x64_sys_mount+0xbe/0x150 [ 714.614465] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 714.619486] do_syscall_64+0x1b1/0x800 [ 714.623383] ? finish_task_switch+0x1ca/0x810 [ 714.627894] ? syscall_return_slowpath+0x5c0/0x5c0 [ 714.632843] ? syscall_return_slowpath+0x30f/0x5c0 [ 714.637786] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 714.643163] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 714.648023] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 714.653217] RIP: 0033:0x455979 [ 714.656406] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 714.657426] IPVS: Unknown mcast interface: rose0 [ 714.664114] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 714.664124] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 714.664132] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 714.664140] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 714.664148] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 714.750729] IPVS: Unknown mcast interface: rose0 [ 714.759886] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=2a9b0790) 2018/05/13 06:34:19 executing program 1 (fault-call:3 fault-nth:21): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:34:19 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000300"}}) 2018/05/13 06:34:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0xa000000}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:19 executing program 2 (fault-call:3 fault-nth:0): r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x0, 0x1000000000282) 2018/05/13 06:34:19 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000000000000000007ffffffff000"}}) 2018/05/13 06:34:19 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000000000000000000002"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:19 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0x1d40000000000000}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:19 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, 0x0) sync() lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x80000, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000080)=0x6, 0x4) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000001140)=""/121, 0x56) 2018/05/13 06:34:19 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00'}}) [ 715.085479] IPVS: Unknown mcast interface: rose0 [ 715.098740] FAULT_INJECTION: forcing a failure. [ 715.098740] name failslab, interval 1, probability 0, space 0, times 0 [ 715.110194] CPU: 1 PID: 16883 Comm: syz-executor2 Not tainted 4.17.0-rc4+ #44 [ 715.117482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 715.126850] Call Trace: [ 715.129458] dump_stack+0x1b9/0x294 [ 715.133108] ? dump_stack_print_info.cold.2+0x52/0x52 [ 715.138324] should_fail.cold.4+0xa/0x1a [ 715.142403] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 715.147532] ? __lock_acquire+0x7f5/0x5140 [ 715.151795] ? print_usage_bug+0xc0/0xc0 [ 715.155886] ? find_held_lock+0x36/0x1c0 [ 715.158663] IPVS: Unknown mcast interface: rose0 [ 715.159960] ? ilk_init_clock_gating+0xf0/0x3a0 [ 715.159991] ? check_same_owner+0x320/0x320 [ 715.160013] ? rcu_note_context_switch+0x710/0x710 [ 715.160034] __should_failslab+0x124/0x180 [ 715.160053] should_failslab+0x9/0x14 [ 715.166952] FAULT_INJECTION: forcing a failure. [ 715.166952] name failslab, interval 1, probability 0, space 0, times 0 [ 715.169577] kmem_cache_alloc_trace+0x2cb/0x780 [ 715.169597] ? do_raw_spin_unlock+0x9e/0x2e0 [ 715.169615] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 715.169630] ? __lock_is_held+0xb5/0x140 [ 715.169647] alloc_fdtable+0x89/0x280 [ 715.169666] expand_files.part.8+0x20e/0x9a0 [ 715.223852] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 715.229391] ? _parse_integer+0x13b/0x190 [ 715.233537] ? iterate_fd+0x4a0/0x4a0 [ 715.237336] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 715.242866] ? _kstrtoull+0x180/0x230 [ 715.246663] ? graph_lock+0x170/0x170 [ 715.250462] ? __alloc_fd+0xb4/0x700 [ 715.254175] ? lock_release+0xa10/0xa10 [ 715.258141] ? graph_lock+0x170/0x170 [ 715.261940] ? __lock_is_held+0xb5/0x140 [ 715.265995] ? var_to_display+0x4c0/0x810 [ 715.270146] __alloc_fd+0x11d/0x700 [ 715.273769] ? lock_downgrade+0x8e0/0x8e0 [ 715.277922] ? exit_files+0xb0/0xb0 [ 715.281544] ? rcu_is_watching+0x85/0x140 [ 715.285689] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 715.290882] ? __fget+0x40c/0x650 [ 715.294335] f_dupfd+0x21f/0x3d0 [ 715.297698] ? __ia32_sys_dup+0x40/0x40 [ 715.301669] ? wait_for_completion+0x870/0x870 [ 715.306248] ? __lock_is_held+0xb5/0x140 [ 715.310396] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 715.315585] do_fcntl+0x867/0x14b0 [ 715.319123] ? f_getown+0xc0/0xc0 [ 715.322575] ? fget_raw+0x20/0x20 [ 715.326025] ? __sb_end_write+0xac/0xe0 [ 715.330002] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 715.335540] ? fput+0x130/0x1a0 [ 715.338817] ? ksys_write+0x1a6/0x250 [ 715.342618] ? __ia32_sys_read+0xb0/0xb0 [ 715.346675] ? security_file_fcntl+0x94/0xc0 [ 715.351086] __x64_sys_fcntl+0x177/0x1f0 [ 715.355163] do_syscall_64+0x1b1/0x800 [ 715.359051] ? finish_task_switch+0x1ca/0x810 [ 715.363545] ? syscall_return_slowpath+0x5c0/0x5c0 [ 715.368474] ? syscall_return_slowpath+0x30f/0x5c0 [ 715.373405] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 715.378767] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 715.383611] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 715.388797] RIP: 0033:0x455979 [ 715.391979] RSP: 002b:00007f458c76bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000048 [ 715.399682] RAX: ffffffffffffffda RBX: 00007f458c76c6d4 RCX: 0000000000455979 [ 715.406946] RDX: 0001000000000282 RSI: 0000000000000000 RDI: 0000000000000015 [ 715.414214] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 715.421477] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 715.428741] R13: 0000000000000090 R14: 00000000006f4e20 R15: 0000000000000000 2018/05/13 06:34:19 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000000000000000000400"}}) [ 715.436034] CPU: 0 PID: 16881 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 715.443329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 715.452688] Call Trace: [ 715.455302] dump_stack+0x1b9/0x294 [ 715.458949] ? dump_stack_print_info.cold.2+0x52/0x52 [ 715.464148] ? __save_stack_trace+0x7e/0xd0 [ 715.468480] should_fail.cold.4+0xa/0x1a [ 715.468913] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 715.472546] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/05/13 06:34:19 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000000ffffff9e00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 715.472564] ? save_stack+0x43/0xd0 [ 715.472578] ? kasan_kmalloc+0xc4/0xe0 [ 715.472593] ? kmem_cache_alloc_trace+0x152/0x780 [ 715.472608] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 715.472620] ? __list_lru_init+0x456/0x790 [ 715.472636] ? sget_userns+0x73a/0xf00 [ 715.472652] ? graph_lock+0x170/0x170 [ 715.472664] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 715.472677] ? do_mount+0x564/0x3070 [ 715.472686] ? ksys_mount+0x12d/0x140 [ 715.472702] ? __x64_sys_mount+0xbe/0x150 [ 715.531168] ? do_syscall_64+0x1b1/0x800 [ 715.535244] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 715.540108] IPVS: Unknown mcast interface: rose0 [ 715.540710] ? find_held_lock+0x36/0x1c0 [ 715.540729] ? __lock_is_held+0xb5/0x140 [ 715.540753] ? check_same_owner+0x320/0x320 [ 715.549740] IPVS: Unknown mcast interface: rose0 [ 715.553603] ? rcu_note_context_switch+0x710/0x710 [ 715.553623] __should_failslab+0x124/0x180 [ 715.553643] should_failslab+0x9/0x14 [ 715.553661] kmem_cache_alloc_trace+0x2cb/0x780 [ 715.553675] ? __kmalloc_node+0x33/0x70 2018/05/13 06:34:20 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\x00\x00\v\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:20 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00'}}) [ 715.553689] ? __kmalloc_node+0x33/0x70 [ 715.553705] ? rcu_read_lock_sched_held+0x108/0x120 [ 715.553725] __memcg_init_list_lru_node+0x17d/0x2c0 [ 715.553741] ? kvfree_rcu+0x20/0x20 [ 715.553756] ? __kmalloc_node+0x47/0x70 [ 715.553774] __list_lru_init+0x456/0x790 [ 715.553789] ? list_lru_destroy+0x4c0/0x4c0 [ 715.553808] ? mark_held_locks+0xc9/0x160 [ 715.618429] ? __raw_spin_lock_init+0x1c/0x100 [ 715.623027] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 715.628064] ? __lockdep_init_map+0x105/0x590 [ 715.632581] ? lockdep_init_map+0x9/0x10 [ 715.636658] sget_userns+0x73a/0xf00 [ 715.639248] IPVS: Unknown mcast interface: rose0 [ 715.640377] ? get_anon_bdev+0x2f0/0x2f0 [ 715.640402] ? destroy_unused_super.part.11+0x110/0x110 [ 715.640419] ? __alloc_pages_nodemask+0xacf/0xd70 [ 715.640440] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 715.640460] ? kasan_check_read+0x11/0x20 [ 715.640478] ? cap_capable+0x1f9/0x260 [ 715.640503] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 715.640516] ? security_capable+0x99/0xc0 2018/05/13 06:34:20 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}}) 2018/05/13 06:34:20 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000000000034000"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 715.640536] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 715.670934] IPVS: Unknown mcast interface: rose0 [ 715.673327] ? ns_capable_common+0x13f/0x170 [ 715.673347] ? get_anon_bdev+0x2f0/0x2f0 [ 715.673362] sget+0x10b/0x150 [ 715.673381] ? fuse_get_root_inode+0x190/0x190 [ 715.673396] mount_nodev+0x33/0x110 [ 715.673413] fuse_mount+0x2c/0x40 [ 715.673430] mount_fs+0xae/0x328 [ 715.673451] vfs_kern_mount.part.34+0xd4/0x4d0 [ 715.673466] ? may_umount+0xb0/0xb0 [ 715.673478] ? _raw_read_unlock+0x22/0x30 [ 715.673494] ? __get_fs_type+0x97/0xc0 [ 715.736277] do_mount+0x564/0x3070 [ 715.739842] ? copy_mount_string+0x40/0x40 [ 715.744091] ? rcu_pm_notify+0xc0/0xc0 [ 715.748003] ? copy_mount_options+0x5f/0x380 [ 715.752431] ? rcu_read_lock_sched_held+0x108/0x120 [ 715.757466] ? kmem_cache_alloc_trace+0x616/0x780 [ 715.762330] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 715.767879] ? _copy_from_user+0xdf/0x150 [ 715.772043] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 715.777589] ? copy_mount_options+0x285/0x380 [ 715.782102] ksys_mount+0x12d/0x140 [ 715.784759] IPVS: Unknown mcast interface: rose0 [ 715.785741] __x64_sys_mount+0xbe/0x150 [ 715.785759] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 715.785778] do_syscall_64+0x1b1/0x800 [ 715.785796] ? syscall_return_slowpath+0x5c0/0x5c0 [ 715.785814] ? syscall_return_slowpath+0x30f/0x5c0 [ 715.785834] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 715.785854] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 715.785873] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 715.785889] RIP: 0033:0x455979 [ 715.820848] IPVS: Unknown mcast interface: rose0 2018/05/13 06:34:20 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000000000000000248e405d163400"}}) [ 715.823485] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 715.823502] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 715.823511] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 715.823520] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 715.823528] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 715.823537] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 2018/05/13 06:34:20 executing program 1 (fault-call:3 fault-nth:22): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) [ 716.009296] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 2018/05/13 06:34:20 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0xe0ffffff}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:20 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x0, 0x1000000000282) 2018/05/13 06:34:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0x1d40}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:20 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000000000000f00"}}) 2018/05/13 06:34:20 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000034165d408e2400"}}) 2018/05/13 06:34:20 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, 0x0) r0 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000000)) r1 = add_key(&(0x7f0000000140)='logon\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000240)="95f09a7cd7e8e06bb25e264a0ce54a4f4dbd871054f466db9e02abb2836ec710e4858f46e493c55e10284eeed8c38580fa9c6b67dbdea936a256e7824891a42c7a6b6d9ba67870b3b000d62842d94c371b67c7244524c3c755c9854d320ef0d7a2b05a302072faca033a82b98c625f9fbdbe85de7c8c38e2bac886a5744a6d14aa254635b55058ff35423d94cd704d3161921a6635935cdf66c64c3963263d01e4f08bebdbec249abec1266733fdfd8da90fdb4de06ca28bb0be4f130905fa70380053cf58fc4cc65e0a6e023cc21cad8074a00d13dff1b2e4629d7085dfff1d9772be18357a5e68c4dca355a475af27", 0xf0, 0xffffffffffffffff) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r1, r2, r3) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000280), 0x0) sync() lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f0000000500)=@known='security.capability\x00', &(0x7f00000004c0)="0000000201000000000000010400", 0xe, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000001140)=""/121, 0x56) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x404000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r4, 0x4010ae67, &(0x7f0000000200)={0x0, 0x8000}) 2018/05/13 06:34:20 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 '}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:20 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x2, 0x1000000000282) [ 716.106006] IPVS: Unknown mcast interface: rose0 [ 716.118506] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 716.140393] IPVS: Unknown mcast interface: rose0 [ 716.157838] FAULT_INJECTION: forcing a failure. [ 716.157838] name failslab, interval 1, probability 0, space 0, times 0 [ 716.169962] CPU: 0 PID: 16957 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 716.177261] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 716.186623] Call Trace: [ 716.189230] dump_stack+0x1b9/0x294 [ 716.192869] ? dump_stack_print_info.cold.2+0x52/0x52 [ 716.198073] ? __save_stack_trace+0x7e/0xd0 [ 716.202408] should_fail.cold.4+0xa/0x1a [ 716.206482] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 716.211594] ? save_stack+0x43/0xd0 [ 716.215233] ? kasan_kmalloc+0xc4/0xe0 [ 716.219131] ? kmem_cache_alloc_trace+0x152/0x780 [ 716.223981] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 716.229180] ? __list_lru_init+0x456/0x790 [ 716.233422] ? sget_userns+0x73a/0xf00 [ 716.237320] ? graph_lock+0x170/0x170 [ 716.241138] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 716.245899] ? do_mount+0x564/0x3070 [ 716.249623] ? ksys_mount+0x12d/0x140 [ 716.253433] ? __x64_sys_mount+0xbe/0x150 [ 716.257602] ? do_syscall_64+0x1b1/0x800 [ 716.261672] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 716.267052] ? find_held_lock+0x36/0x1c0 [ 716.271128] ? __lock_is_held+0xb5/0x140 [ 716.275224] ? check_same_owner+0x320/0x320 [ 716.279559] ? rcu_note_context_switch+0x710/0x710 [ 716.284505] __should_failslab+0x124/0x180 [ 716.288757] should_failslab+0x9/0x14 [ 716.292570] kmem_cache_alloc_trace+0x2cb/0x780 [ 716.297253] ? __kmalloc_node+0x33/0x70 [ 716.301241] ? __kmalloc_node+0x33/0x70 2018/05/13 06:34:20 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000000000000000000000000000400"}}) 2018/05/13 06:34:20 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\x00\x00\x00\x00`\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:20 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000fffffe00"}}) 2018/05/13 06:34:20 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000f00"}}) [ 716.305236] ? rcu_read_lock_sched_held+0x108/0x120 [ 716.310270] __memcg_init_list_lru_node+0x17d/0x2c0 [ 716.315300] ? kvfree_rcu+0x20/0x20 [ 716.318944] ? __kmalloc_node+0x47/0x70 [ 716.322937] __list_lru_init+0x456/0x790 [ 716.327009] ? list_lru_destroy+0x4c0/0x4c0 [ 716.331340] ? mark_held_locks+0xc9/0x160 [ 716.335496] ? __raw_spin_lock_init+0x1c/0x100 [ 716.340086] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 716.345107] ? __lockdep_init_map+0x105/0x590 [ 716.349610] ? lockdep_init_map+0x9/0x10 [ 716.353678] sget_userns+0x73a/0xf00 [ 716.357389] ? get_anon_bdev+0x2f0/0x2f0 [ 716.361452] ? destroy_unused_super.part.11+0x110/0x110 [ 716.366804] ? __alloc_pages_nodemask+0xacf/0xd70 [ 716.371642] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 716.376660] ? kasan_check_read+0x11/0x20 [ 716.380811] ? cap_capable+0x1f9/0x260 [ 716.384707] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 716.390238] ? security_capable+0x99/0xc0 [ 716.394374] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 716.399905] ? ns_capable_common+0x13f/0x170 [ 716.404311] ? get_anon_bdev+0x2f0/0x2f0 [ 716.408370] sget+0x10b/0x150 [ 716.411467] ? fuse_get_root_inode+0x190/0x190 [ 716.416044] mount_nodev+0x33/0x110 [ 716.419661] fuse_mount+0x2c/0x40 [ 716.423110] mount_fs+0xae/0x328 [ 716.426484] vfs_kern_mount.part.34+0xd4/0x4d0 [ 716.431073] ? may_umount+0xb0/0xb0 [ 716.434782] ? _raw_read_unlock+0x22/0x30 [ 716.438912] ? __get_fs_type+0x97/0xc0 [ 716.442800] do_mount+0x564/0x3070 [ 716.446348] ? copy_mount_string+0x40/0x40 [ 716.450577] ? rcu_pm_notify+0xc0/0xc0 [ 716.454455] ? copy_mount_options+0x5f/0x380 [ 716.458858] ? rcu_read_lock_sched_held+0x108/0x120 [ 716.463868] ? kmem_cache_alloc_trace+0x616/0x780 [ 716.468872] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 716.474399] ? _copy_from_user+0xdf/0x150 [ 716.478539] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 716.484066] ? copy_mount_options+0x285/0x380 [ 716.488555] ksys_mount+0x12d/0x140 [ 716.492176] __x64_sys_mount+0xbe/0x150 [ 716.496149] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 716.501171] do_syscall_64+0x1b1/0x800 [ 716.505060] ? finish_task_switch+0x1ca/0x810 [ 716.509549] ? syscall_return_slowpath+0x5c0/0x5c0 [ 716.514483] ? syscall_return_slowpath+0x30f/0x5c0 [ 716.519422] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 716.524798] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 716.529642] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 716.534820] RIP: 0033:0x455979 [ 716.538008] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 716.545723] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 716.552988] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 716.560255] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 716.567529] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 716.574798] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 716.586193] IPVS: Unknown mcast interface: rose0 2018/05/13 06:34:21 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0xf, 0x1000000000282) 2018/05/13 06:34:21 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000000000000000000100"}}) [ 716.609943] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 716.617755] IPVS: Unknown mcast interface: rose0 2018/05/13 06:34:21 executing program 1 (fault-call:3 fault-nth:23): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:34:21 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000000005f200"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:21 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, 0x0) sync() lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) timer_create(0x7, &(0x7f0000000080)={0x0, 0x1d, 0x5, @thr={&(0x7f0000000000), &(0x7f0000000140)="bd3b7c1905ae4df9efcd2b29d8acd0aca2d6814cea03f8ab9c03bc59716b37f1c81498599f05699ad5168b2b7c3fccd7c4ea51b38516a9ebe6718ecb287fbfb3736c7f1a187901fb22216249d5cf617ee04dcaae3a2e528c649b"}}, &(0x7f00000001c0)=0x0) timer_settime(r0, 0x0, &(0x7f0000000200)={{0x77359400}}, &(0x7f0000000240)) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000001140)=""/121, 0x56) 2018/05/13 06:34:21 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000400"}}) 2018/05/13 06:34:21 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000000000000000000000000000100"}}) 2018/05/13 06:34:21 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0xa000000}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:21 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x2600000000000000, 0x1000000000282) 2018/05/13 06:34:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0xb400}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) [ 716.954479] IPVS: Unknown mcast interface: rose0 2018/05/13 06:34:21 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x40000, 0x1000000000282) 2018/05/13 06:34:21 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) [ 716.991351] IPVS: Unknown mcast interface: rose0 [ 717.009253] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 717.057816] FAULT_INJECTION: forcing a failure. [ 717.057816] name failslab, interval 1, probability 0, space 0, times 0 [ 717.069146] CPU: 0 PID: 17026 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 717.076435] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 717.085798] Call Trace: [ 717.088419] dump_stack+0x1b9/0x294 [ 717.092061] ? dump_stack_print_info.cold.2+0x52/0x52 [ 717.097269] ? mutex_trylock+0x2a0/0x2a0 [ 717.101957] should_fail.cold.4+0xa/0x1a [ 717.106048] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 717.111183] ? print_usage_bug+0xc0/0xc0 [ 717.115259] ? graph_lock+0x170/0x170 [ 717.119065] ? lock_downgrade+0x8e0/0x8e0 [ 717.123224] ? find_held_lock+0x36/0x1c0 [ 717.127296] ? __lock_is_held+0xb5/0x140 [ 717.131353] ? check_same_owner+0x320/0x320 [ 717.135665] ? __might_sleep+0x95/0x190 [ 717.139635] ? rcu_note_context_switch+0x710/0x710 [ 717.144577] __should_failslab+0x124/0x180 [ 717.148813] should_failslab+0x9/0x14 [ 717.152603] __kmalloc+0x2c8/0x760 [ 717.156143] ? __kmalloc_node+0x47/0x70 [ 717.160102] ? __list_lru_init+0xdd/0x790 [ 717.164248] __list_lru_init+0xdd/0x790 [ 717.168210] ? list_lru_destroy+0x4c0/0x4c0 [ 717.172515] ? mark_held_locks+0xc9/0x160 [ 717.176646] ? __raw_spin_lock_init+0x1c/0x100 [ 717.181218] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 717.186233] ? lockdep_init_map+0x9/0x10 [ 717.190296] sget_userns+0x767/0xf00 [ 717.193992] ? get_anon_bdev+0x2f0/0x2f0 [ 717.198045] ? destroy_unused_super.part.11+0x110/0x110 [ 717.203395] ? __alloc_pages_nodemask+0xacf/0xd70 [ 717.208241] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 717.213248] ? kasan_check_read+0x11/0x20 [ 717.217379] ? cap_capable+0x1f9/0x260 [ 717.221257] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 717.226776] ? security_capable+0x99/0xc0 [ 717.230914] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 717.236438] ? ns_capable_common+0x13f/0x170 [ 717.240832] ? get_anon_bdev+0x2f0/0x2f0 [ 717.244875] sget+0x10b/0x150 [ 717.247968] ? fuse_get_root_inode+0x190/0x190 [ 717.252531] mount_nodev+0x33/0x110 [ 717.256151] fuse_mount+0x2c/0x40 [ 717.259590] mount_fs+0xae/0x328 [ 717.262944] vfs_kern_mount.part.34+0xd4/0x4d0 [ 717.267509] ? may_umount+0xb0/0xb0 [ 717.271123] ? _raw_read_unlock+0x22/0x30 [ 717.275254] ? __get_fs_type+0x97/0xc0 [ 717.279134] do_mount+0x564/0x3070 [ 717.282662] ? copy_mount_string+0x40/0x40 [ 717.286884] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 717.291888] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 717.296632] ? retint_kernel+0x10/0x10 [ 717.300525] ? copy_mount_options+0x1f0/0x380 [ 717.305011] ? copy_mount_options+0x1fa/0x380 [ 717.309506] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 717.315033] ? copy_mount_options+0x285/0x380 [ 717.319519] ksys_mount+0x12d/0x140 [ 717.323138] __x64_sys_mount+0xbe/0x150 [ 717.327095] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 717.332103] do_syscall_64+0x1b1/0x800 [ 717.335977] ? finish_task_switch+0x1ca/0x810 [ 717.340460] ? syscall_return_slowpath+0x5c0/0x5c0 [ 717.345376] ? syscall_return_slowpath+0x30f/0x5c0 [ 717.350292] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 717.355643] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 717.360473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 717.365659] RIP: 0033:0x455979 [ 717.368834] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 717.376525] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 717.383781] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 717.391036] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 717.398290] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 717.405541] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 717.478045] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 2018/05/13 06:34:22 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:22 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00'}}) 2018/05/13 06:34:22 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000000000000ffffff8d00"}}) 2018/05/13 06:34:22 executing program 1 (fault-call:3 fault-nth:24): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:34:22 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x6, 0x1000000000282) 2018/05/13 06:34:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0x40020000}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:22 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x40, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000080)={0x1, 0x92, &(0x7f0000000140)="4cf9d79a0581499d026b8761058370361fd79907970687c9cc0d8bf16b82d74964fcc333d7acb746e3ae46f19e094956b26c541d140535c29ca6903f98266b781c82014d1dc776e7160a0d9385e0402a5c1fb63c9423c19b696d1d8e1bf5a5b309e8b4ce66bf6f2988dfc4965f68af3f1d7742c7a0a7a968d9a4901470470b3cdcac1d24929fee3087ef4b8c3cce8732459f"}) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000200)={0x0, 0x10001, 0x0, 0xcd8}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000280)={r1, 0x53, "185c7a73bea3abeab4ea23d4133cd13332b363edfc66088571fccaf61e120d1385128395ce08f13d877c1cbdceb1b0ad0ab582a3b13082c0f7b8de0630b34f56f73cddcd77baf75f1764523861f3379d6a42e9"}, &(0x7f0000000300)=0x5b) sync() lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000001140)=""/121, 0x56) 2018/05/13 06:34:22 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0xeffe0000}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) [ 717.851346] IPVS: Unknown mcast interface: rose0 [ 717.872234] IPVS: Unknown mcast interface: rose0 2018/05/13 06:34:22 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}}) 2018/05/13 06:34:22 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000000000000200"}}) [ 717.905067] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 717.906666] FAULT_INJECTION: forcing a failure. [ 717.906666] name failslab, interval 1, probability 0, space 0, times 0 [ 717.924136] CPU: 0 PID: 17059 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 717.931416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 717.940776] Call Trace: [ 717.943379] dump_stack+0x1b9/0x294 [ 717.947021] ? dump_stack_print_info.cold.2+0x52/0x52 [ 717.952236] ? mutex_trylock+0x2a0/0x2a0 [ 717.956314] should_fail.cold.4+0xa/0x1a [ 717.960387] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 717.965509] ? print_usage_bug+0xc0/0xc0 [ 717.969583] ? graph_lock+0x170/0x170 [ 717.973398] ? lock_downgrade+0x8e0/0x8e0 [ 717.977555] ? find_held_lock+0x36/0x1c0 [ 717.981634] ? __lock_is_held+0xb5/0x140 [ 717.985722] ? check_same_owner+0x320/0x320 [ 717.990062] ? __might_sleep+0x95/0x190 [ 717.994048] ? rcu_note_context_switch+0x710/0x710 [ 717.998993] __should_failslab+0x124/0x180 2018/05/13 06:34:22 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00'}}) [ 718.003241] should_failslab+0x9/0x14 [ 718.007061] __kmalloc+0x2c8/0x760 [ 718.010626] ? __kmalloc_node+0x47/0x70 [ 718.014606] ? __list_lru_init+0xdd/0x790 [ 718.018763] __list_lru_init+0xdd/0x790 [ 718.022745] ? list_lru_destroy+0x4c0/0x4c0 [ 718.027075] ? mark_held_locks+0xc9/0x160 [ 718.031228] ? __raw_spin_lock_init+0x1c/0x100 [ 718.035817] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 718.040846] ? lockdep_init_map+0x9/0x10 [ 718.044916] sget_userns+0x767/0xf00 [ 718.048639] ? get_anon_bdev+0x2f0/0x2f0 2018/05/13 06:34:22 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000000000000405d163400"}}) 2018/05/13 06:34:22 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000000f20500"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 718.052714] ? destroy_unused_super.part.11+0x110/0x110 [ 718.058088] ? __alloc_pages_nodemask+0xacf/0xd70 [ 718.062944] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 718.067972] ? kasan_check_read+0x11/0x20 [ 718.072130] ? cap_capable+0x1f9/0x260 [ 718.076030] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 718.081585] ? security_capable+0x99/0xc0 [ 718.085744] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 718.091291] ? ns_capable_common+0x13f/0x170 [ 718.095714] ? get_anon_bdev+0x2f0/0x2f0 [ 718.099782] sget+0x10b/0x150 2018/05/13 06:34:22 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000600"}}) [ 718.102898] ? fuse_get_root_inode+0x190/0x190 [ 718.107489] mount_nodev+0x33/0x110 [ 718.111135] fuse_mount+0x2c/0x40 [ 718.114606] mount_fs+0xae/0x328 [ 718.117989] vfs_kern_mount.part.34+0xd4/0x4d0 [ 718.120636] IPVS: Unknown mcast interface: rose0 [ 718.122576] ? may_umount+0xb0/0xb0 [ 718.122591] ? _raw_read_unlock+0x22/0x30 [ 718.122604] ? __get_fs_type+0x97/0xc0 [ 718.122624] do_mount+0x564/0x3070 [ 718.122645] ? copy_mount_string+0x40/0x40 [ 718.122661] ? rcu_pm_notify+0xc0/0xc0 [ 718.122682] ? copy_mount_options+0x5f/0x380 [ 718.122699] ? rcu_read_lock_sched_held+0x108/0x120 [ 718.155716] IPVS: Unknown mcast interface: rose0 [ 718.160105] ? kmem_cache_alloc_trace+0x616/0x780 [ 718.160128] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 718.160146] ? _copy_from_user+0xdf/0x150 [ 718.160166] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 718.160183] ? copy_mount_options+0x285/0x380 [ 718.160202] ksys_mount+0x12d/0x140 [ 718.160221] __x64_sys_mount+0xbe/0x150 [ 718.197054] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 718.202090] do_syscall_64+0x1b1/0x800 2018/05/13 06:34:22 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000000fffffff000"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 718.205988] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 718.210840] ? syscall_return_slowpath+0x5c0/0x5c0 [ 718.215776] ? syscall_return_slowpath+0x30f/0x5c0 [ 718.220711] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 718.226087] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 718.230944] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 718.236141] RIP: 0033:0x455979 [ 718.239336] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 718.247058] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 2018/05/13 06:34:22 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000000000000000000000000000200"}}) 2018/05/13 06:34:22 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x409, 0x1000000000282) [ 718.254338] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 718.255999] IPVS: Unknown mcast interface: rose0 [ 718.261606] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 718.261615] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 718.261624] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 2018/05/13 06:34:22 executing program 1 (fault-call:3 fault-nth:25): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) [ 718.331778] IPVS: Unknown mcast interface: rose0 2018/05/13 06:34:22 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000600"}}) 2018/05/13 06:34:22 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\x00\x00\x00\x00\a\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 718.374421] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 2018/05/13 06:34:22 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x11000000, 0x1000000000282) [ 718.470348] IPVS: Unknown mcast interface: rose0 [ 718.484473] FAULT_INJECTION: forcing a failure. [ 718.484473] name failslab, interval 1, probability 0, space 0, times 0 [ 718.495834] CPU: 0 PID: 17110 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 718.501040] IPVS: Unknown mcast interface: rose0 [ 718.503108] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 718.503116] Call Trace: [ 718.503142] dump_stack+0x1b9/0x294 [ 718.503165] ? dump_stack_print_info.cold.2+0x52/0x52 [ 718.503184] ? mutex_trylock+0x2a0/0x2a0 [ 718.532729] should_fail.cold.4+0xa/0x1a [ 718.536805] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 718.541928] ? print_usage_bug+0xc0/0xc0 [ 718.546005] ? graph_lock+0x170/0x170 [ 718.549818] ? lock_downgrade+0x8e0/0x8e0 [ 718.553978] ? find_held_lock+0x36/0x1c0 [ 718.558056] ? __lock_is_held+0xb5/0x140 [ 718.562139] ? check_same_owner+0x320/0x320 [ 718.566472] ? __might_sleep+0x95/0x190 [ 718.570460] ? rcu_note_context_switch+0x710/0x710 [ 718.575405] __should_failslab+0x124/0x180 [ 718.579656] should_failslab+0x9/0x14 [ 718.583464] __kmalloc+0x2c8/0x760 [ 718.587027] ? __kmalloc_node+0x47/0x70 [ 718.591014] ? __list_lru_init+0xdd/0x790 [ 718.595173] __list_lru_init+0xdd/0x790 [ 718.599159] ? list_lru_destroy+0x4c0/0x4c0 [ 718.603490] ? mark_held_locks+0xc9/0x160 [ 718.607644] ? __raw_spin_lock_init+0x1c/0x100 [ 718.612229] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 718.617261] ? lockdep_init_map+0x9/0x10 [ 718.621331] sget_userns+0x767/0xf00 [ 718.625046] ? get_anon_bdev+0x2f0/0x2f0 [ 718.629125] ? destroy_unused_super.part.11+0x110/0x110 [ 718.634496] ? __alloc_pages_nodemask+0xacf/0xd70 [ 718.639347] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 718.644375] ? kasan_check_read+0x11/0x20 [ 718.648534] ? cap_capable+0x1f9/0x260 [ 718.652425] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 718.657964] ? security_capable+0x99/0xc0 [ 718.662114] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 718.667637] ? ns_capable_common+0x13f/0x170 [ 718.672038] ? get_anon_bdev+0x2f0/0x2f0 [ 718.676184] sget+0x10b/0x150 [ 718.679286] ? fuse_get_root_inode+0x190/0x190 [ 718.683874] mount_nodev+0x33/0x110 [ 718.687512] fuse_mount+0x2c/0x40 [ 718.690974] mount_fs+0xae/0x328 [ 718.694356] vfs_kern_mount.part.34+0xd4/0x4d0 [ 718.698949] ? may_umount+0xb0/0xb0 [ 718.702584] ? _raw_read_unlock+0x22/0x30 [ 718.706745] ? __get_fs_type+0x97/0xc0 [ 718.710645] do_mount+0x564/0x3070 [ 718.714197] ? copy_mount_string+0x40/0x40 [ 718.718432] ? rcu_pm_notify+0xc0/0xc0 [ 718.722327] ? copy_mount_options+0x5f/0x380 [ 718.726752] ? rcu_read_lock_sched_held+0x108/0x120 [ 718.731776] ? kmem_cache_alloc_trace+0x616/0x780 [ 718.736631] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 718.742178] ? _copy_from_user+0xdf/0x150 [ 718.746343] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 718.751878] ? copy_mount_options+0x285/0x380 [ 718.756363] ksys_mount+0x12d/0x140 [ 718.759992] __x64_sys_mount+0xbe/0x150 [ 718.763956] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 718.768972] do_syscall_64+0x1b1/0x800 [ 718.772872] ? finish_task_switch+0x1ca/0x810 [ 718.777355] ? syscall_return_slowpath+0x5c0/0x5c0 [ 718.782268] ? syscall_return_slowpath+0x30f/0x5c0 [ 718.787184] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 718.792537] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 718.797369] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 718.802555] RIP: 0033:0x455979 [ 718.805732] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 718.813423] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 2018/05/13 06:34:23 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0x8dffffff}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:23 executing program 1 (fault-call:3 fault-nth:26): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:34:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0x4002}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:23 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000000000000000000000fffffe00"}}) 2018/05/13 06:34:23 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000001400"}}) 2018/05/13 06:34:23 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xaaaaaaaaaaaad5f, &(0x7f0000000080), 0x0, 0x0) sync() lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)=@known='security.capability\x00', &(0x7f0000001140)=""/121, 0x79) 2018/05/13 06:34:23 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\x00\n\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:23 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x9040000, 0x1000000000282) [ 718.820682] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 718.828054] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 718.835402] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 718.842656] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 718.891107] FAULT_INJECTION: forcing a failure. [ 718.891107] name failslab, interval 1, probability 0, space 0, times 0 [ 718.902445] CPU: 0 PID: 17134 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 718.909731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 718.919112] Call Trace: [ 718.921287] IPVS: Unknown mcast interface: rose0 [ 718.921719] dump_stack+0x1b9/0x294 [ 718.921743] ? dump_stack_print_info.cold.2+0x52/0x52 [ 718.935301] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 718.938921] IPVS: Unknown mcast interface: rose0 [ 718.940503] should_fail.cold.4+0xa/0x1a [ 718.940521] ? is_bpf_text_address+0xd7/0x170 [ 718.940540] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 718.940563] ? unwind_get_return_address+0x61/0xa0 [ 718.940581] ? __save_stack_trace+0x7e/0xd0 [ 718.968188] ? graph_lock+0x170/0x170 [ 718.972013] ? find_held_lock+0x36/0x1c0 [ 718.976093] ? __lock_is_held+0xb5/0x140 [ 718.980178] ? check_same_owner+0x320/0x320 [ 718.984512] ? rcu_note_context_switch+0x710/0x710 2018/05/13 06:34:23 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000300"}}) 2018/05/13 06:34:23 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 718.989452] __should_failslab+0x124/0x180 [ 718.993697] should_failslab+0x9/0x14 [ 718.997505] kmem_cache_alloc_trace+0x2cb/0x780 [ 719.002181] ? __kmalloc_node+0x33/0x70 [ 719.006163] ? __kmalloc_node+0x33/0x70 [ 719.010145] ? rcu_read_lock_sched_held+0x108/0x120 [ 719.015176] __memcg_init_list_lru_node+0x17d/0x2c0 [ 719.020948] ? kvfree_rcu+0x20/0x20 [ 719.024590] ? __kmalloc_node+0x47/0x70 [ 719.028576] __list_lru_init+0x456/0x790 [ 719.032646] ? list_lru_destroy+0x4c0/0x4c0 [ 719.036981] ? mark_held_locks+0xc9/0x160 [ 719.041138] ? __raw_spin_lock_init+0x1c/0x100 [ 719.045730] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 719.050760] ? lockdep_init_map+0x9/0x10 [ 719.054831] sget_userns+0x767/0xf00 [ 719.058550] ? get_anon_bdev+0x2f0/0x2f0 [ 719.062629] ? destroy_unused_super.part.11+0x110/0x110 [ 719.063204] IPVS: Unknown mcast interface: rose0 [ 719.067998] ? __alloc_pages_nodemask+0xacf/0xd70 [ 719.068019] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 719.068039] ? kasan_check_read+0x11/0x20 [ 719.068057] ? cap_capable+0x1f9/0x260 2018/05/13 06:34:23 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000001400"}}) 2018/05/13 06:34:23 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x204, 0x1000000000282) [ 719.068081] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 719.068095] ? security_capable+0x99/0xc0 [ 719.068112] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 719.068130] ? ns_capable_common+0x13f/0x170 [ 719.101556] IPVS: Unknown mcast interface: rose0 [ 719.105903] ? get_anon_bdev+0x2f0/0x2f0 [ 719.105917] sget+0x10b/0x150 [ 719.105937] ? fuse_get_root_inode+0x190/0x190 [ 719.105958] mount_nodev+0x33/0x110 [ 719.105974] fuse_mount+0x2c/0x40 [ 719.105991] mount_fs+0xae/0x328 [ 719.106010] vfs_kern_mount.part.34+0xd4/0x4d0 [ 719.106027] ? may_umount+0xb0/0xb0 [ 719.106046] ? _raw_read_unlock+0x22/0x30 [ 719.149596] ? __get_fs_type+0x97/0xc0 [ 719.153500] do_mount+0x564/0x3070 [ 719.157052] ? copy_mount_string+0x40/0x40 [ 719.161297] ? rcu_pm_notify+0xc0/0xc0 [ 719.165197] ? copy_mount_options+0x5f/0x380 [ 719.169615] ? rcu_read_lock_sched_held+0x108/0x120 [ 719.174637] ? kmem_cache_alloc_trace+0x616/0x780 [ 719.179493] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 719.185038] ? _copy_from_user+0xdf/0x150 2018/05/13 06:34:23 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 719.189199] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 719.194746] ? copy_mount_options+0x285/0x380 [ 719.199256] ksys_mount+0x12d/0x140 [ 719.202897] __x64_sys_mount+0xbe/0x150 [ 719.206876] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 719.211905] do_syscall_64+0x1b1/0x800 [ 719.215812] ? finish_task_switch+0x1ca/0x810 [ 719.220321] ? syscall_return_slowpath+0x5c0/0x5c0 [ 719.225260] ? syscall_return_slowpath+0x30f/0x5c0 [ 719.230207] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 719.235587] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 719.240450] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 719.245648] RIP: 0033:0x455979 [ 719.248838] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 719.252378] IPVS: Unknown mcast interface: rose0 [ 719.256552] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 719.256562] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 719.256571] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 719.256580] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 2018/05/13 06:34:23 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x40b, 0x1000000000282) [ 719.256589] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 2018/05/13 06:34:23 executing program 1 (fault-call:3 fault-nth:27): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:34:23 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000400"}}) [ 719.446738] IPVS: Unknown mcast interface: rose0 [ 719.473521] FAULT_INJECTION: forcing a failure. [ 719.473521] name failslab, interval 1, probability 0, space 0, times 0 [ 719.484899] CPU: 0 PID: 17186 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 719.492189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 719.501552] Call Trace: [ 719.504159] dump_stack+0x1b9/0x294 [ 719.507808] ? dump_stack_print_info.cold.2+0x52/0x52 [ 719.513001] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 719.518205] should_fail.cold.4+0xa/0x1a [ 719.522276] ? is_bpf_text_address+0xd7/0x170 [ 719.526784] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 719.531941] ? unwind_get_return_address+0x61/0xa0 [ 719.536885] ? __save_stack_trace+0x7e/0xd0 [ 719.541227] ? graph_lock+0x170/0x170 [ 719.545041] ? find_held_lock+0x36/0x1c0 [ 719.549117] ? __lock_is_held+0xb5/0x140 [ 719.553204] ? check_same_owner+0x320/0x320 [ 719.557531] ? rcu_note_context_switch+0x710/0x710 [ 719.562467] __should_failslab+0x124/0x180 [ 719.566707] should_failslab+0x9/0x14 [ 719.570501] kmem_cache_alloc_trace+0x2cb/0x780 [ 719.575179] ? __kmalloc_node+0x33/0x70 [ 719.579150] ? __kmalloc_node+0x33/0x70 [ 719.583121] ? rcu_read_lock_sched_held+0x108/0x120 [ 719.588151] __memcg_init_list_lru_node+0x17d/0x2c0 [ 719.593157] ? kvfree_rcu+0x20/0x20 [ 719.596770] ? __kmalloc_node+0x47/0x70 [ 719.600740] __list_lru_init+0x456/0x790 [ 719.604793] ? list_lru_destroy+0x4c0/0x4c0 [ 719.609102] ? mark_held_locks+0xc9/0x160 [ 719.613242] ? __raw_spin_lock_init+0x1c/0x100 [ 719.617813] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 719.622820] ? lockdep_init_map+0x9/0x10 [ 719.626871] sget_userns+0x767/0xf00 [ 719.630584] ? get_anon_bdev+0x2f0/0x2f0 [ 719.634636] ? destroy_unused_super.part.11+0x110/0x110 [ 719.639987] ? __alloc_pages_nodemask+0xacf/0xd70 [ 719.644839] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 719.649846] ? kasan_check_read+0x11/0x20 [ 719.653993] ? cap_capable+0x1f9/0x260 [ 719.657891] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 719.663427] ? security_capable+0x99/0xc0 [ 719.667566] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 719.673120] ? ns_capable_common+0x13f/0x170 [ 719.677533] ? get_anon_bdev+0x2f0/0x2f0 [ 719.681584] sget+0x10b/0x150 [ 719.684688] ? fuse_get_root_inode+0x190/0x190 [ 719.689279] mount_nodev+0x33/0x110 [ 719.694195] fuse_mount+0x2c/0x40 [ 719.697635] mount_fs+0xae/0x328 [ 719.700997] vfs_kern_mount.part.34+0xd4/0x4d0 [ 719.705571] ? may_umount+0xb0/0xb0 [ 719.709182] ? _raw_read_unlock+0x22/0x30 [ 719.713324] ? __get_fs_type+0x97/0xc0 [ 719.717206] do_mount+0x564/0x3070 [ 719.720736] ? copy_mount_string+0x40/0x40 2018/05/13 06:34:24 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0x61afff7f}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:24 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000000000000000000000ffffffff00"}}) [ 719.724957] ? rcu_pm_notify+0xc0/0xc0 [ 719.728831] ? copy_mount_options+0x5f/0x380 [ 719.733233] ? rcu_read_lock_sched_held+0x108/0x120 [ 719.738237] ? kmem_cache_alloc_trace+0x616/0x780 [ 719.743086] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 719.748628] ? copy_mount_options+0x285/0x380 [ 719.753140] ksys_mount+0x12d/0x140 [ 719.756778] __x64_sys_mount+0xbe/0x150 [ 719.760759] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 719.766136] do_syscall_64+0x1b1/0x800 [ 719.770030] ? finish_task_switch+0x1ca/0x810 [ 719.774539] ? syscall_return_slowpath+0x5c0/0x5c0 [ 719.779491] ? syscall_return_slowpath+0x30f/0x5c0 [ 719.784439] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 719.789816] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 719.794675] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 719.799871] RIP: 0033:0x455979 [ 719.803065] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 719.810779] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 719.818229] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 719.825503] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 719.832783] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 719.840053] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 2018/05/13 06:34:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0xb4}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:25 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000000000000000ffffff8d00"}}) 2018/05/13 06:34:25 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0xa}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:25 executing program 1 (fault-call:3 fault-nth:28): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:34:25 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x600000000000000, 0x1000000000282) 2018/05/13 06:34:25 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, 0x0) sync() lsetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000000)=@random={'system.', '\x00'}, &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x3) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000001140)=""/121, 0x56) 2018/05/13 06:34:25 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000000300"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:25 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000600"}}) [ 720.667546] IPVS: Unknown mcast interface: rose0 [ 720.682155] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 720.698897] FAULT_INJECTION: forcing a failure. [ 720.698897] name failslab, interval 1, probability 0, space 0, times 0 [ 720.710295] CPU: 1 PID: 17218 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 720.717591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 720.726956] Call Trace: [ 720.729561] dump_stack+0x1b9/0x294 [ 720.733208] ? dump_stack_print_info.cold.2+0x52/0x52 [ 720.738418] ? __save_stack_trace+0x7e/0xd0 [ 720.740587] IPVS: Unknown mcast interface: rose0 [ 720.742756] should_fail.cold.4+0xa/0x1a [ 720.742778] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 720.742799] ? save_stack+0x43/0xd0 [ 720.742815] ? kasan_kmalloc+0xc4/0xe0 [ 720.742834] ? kmem_cache_alloc_trace+0x152/0x780 [ 720.742846] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 720.742862] ? __list_lru_init+0x456/0x790 [ 720.778481] ? sget_userns+0x767/0xf00 [ 720.782383] ? graph_lock+0x170/0x170 [ 720.786194] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 720.790962] ? do_mount+0x564/0x3070 [ 720.794690] ? ksys_mount+0x12d/0x140 [ 720.798505] ? __x64_sys_mount+0xbe/0x150 [ 720.802668] ? do_syscall_64+0x1b1/0x800 [ 720.806768] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 720.812147] ? find_held_lock+0x36/0x1c0 [ 720.816225] ? __lock_is_held+0xb5/0x140 [ 720.818164] IPVS: Unknown mcast interface: rose0 [ 720.820310] ? check_same_owner+0x320/0x320 [ 720.820333] ? rcu_note_context_switch+0x710/0x710 [ 720.820354] __should_failslab+0x124/0x180 [ 720.820372] should_failslab+0x9/0x14 [ 720.820390] kmem_cache_alloc_trace+0x2cb/0x780 [ 720.820403] ? __kmalloc_node+0x33/0x70 [ 720.820419] ? __kmalloc_node+0x33/0x70 [ 720.843480] IPVS: Unknown mcast interface: rose0 [ 720.847054] ? rcu_read_lock_sched_held+0x108/0x120 [ 720.847076] __memcg_init_list_lru_node+0x17d/0x2c0 [ 720.847093] ? kvfree_rcu+0x20/0x20 [ 720.847110] ? __kmalloc_node+0x47/0x70 [ 720.847131] __list_lru_init+0x456/0x790 [ 720.847149] ? list_lru_destroy+0x4c0/0x4c0 [ 720.847165] ? mark_held_locks+0xc9/0x160 [ 720.847185] ? __raw_spin_lock_init+0x1c/0x100 [ 720.894496] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 720.899533] ? lockdep_init_map+0x9/0x10 [ 720.903608] sget_userns+0x767/0xf00 [ 720.907334] ? get_anon_bdev+0x2f0/0x2f0 [ 720.910514] IPVS: Unknown mcast interface: rose0 2018/05/13 06:34:25 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00'}}) 2018/05/13 06:34:25 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x4000000000000, 0x1000000000282) 2018/05/13 06:34:25 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:25 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000000000000000000000400"}}) 2018/05/13 06:34:25 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000000000000500"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 720.911409] ? destroy_unused_super.part.11+0x110/0x110 [ 720.911426] ? __alloc_pages_nodemask+0xacf/0xd70 [ 720.911447] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 720.911468] ? kasan_check_read+0x11/0x20 [ 720.911488] ? cap_capable+0x1f9/0x260 [ 720.911512] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 720.911525] ? security_capable+0x99/0xc0 [ 720.911544] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 720.933034] IPVS: Unknown mcast interface: rose0 [ 720.935621] ? ns_capable_common+0x13f/0x170 [ 720.935641] ? get_anon_bdev+0x2f0/0x2f0 2018/05/13 06:34:25 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\x00\x00\n\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 720.935655] sget+0x10b/0x150 [ 720.935675] ? fuse_get_root_inode+0x190/0x190 [ 720.935691] mount_nodev+0x33/0x110 [ 720.935707] fuse_mount+0x2c/0x40 [ 720.935723] mount_fs+0xae/0x328 [ 720.935743] vfs_kern_mount.part.34+0xd4/0x4d0 [ 720.990636] ? may_umount+0xb0/0xb0 [ 720.994273] ? _raw_read_unlock+0x22/0x30 [ 720.998441] ? __get_fs_type+0x97/0xc0 [ 721.002348] do_mount+0x564/0x3070 [ 721.005184] IPVS: Unknown mcast interface: rose0 [ 721.005897] ? copy_mount_string+0x40/0x40 2018/05/13 06:34:25 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000000000000034165d4000"}}) [ 721.005914] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 721.005933] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 721.005953] ? retint_kernel+0x10/0x10 [ 721.005976] ? copy_mount_options+0x1f0/0x380 [ 721.005992] ? copy_mount_options+0x1f6/0x380 [ 721.006010] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 721.006025] ? copy_mount_options+0x285/0x380 [ 721.006045] ksys_mount+0x12d/0x140 [ 721.032564] IPVS: Unknown mcast interface: rose0 [ 721.033110] __x64_sys_mount+0xbe/0x150 [ 721.033128] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 721.064950] do_syscall_64+0x1b1/0x800 2018/05/13 06:34:25 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000000000500"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 721.068860] ? finish_task_switch+0x1ca/0x810 [ 721.073366] ? syscall_return_slowpath+0x5c0/0x5c0 [ 721.078314] ? syscall_return_slowpath+0x30f/0x5c0 [ 721.083261] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 721.088649] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 721.093510] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 721.098316] IPVS: Unknown mcast interface: rose0 [ 721.098698] RIP: 0033:0x455979 [ 721.098708] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 721.098724] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 721.098734] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 721.098743] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 721.098752] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 721.098761] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 721.182791] IPVS: Unknown mcast interface: rose0 [ 721.228679] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 2018/05/13 06:34:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0x1100000000000000}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:25 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000300"}}) 2018/05/13 06:34:25 executing program 1 (fault-call:3 fault-nth:29): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:34:25 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x104000000000000, 0x1000000000282) 2018/05/13 06:34:25 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000000000000000000f00"}}) 2018/05/13 06:34:25 executing program 5: sync() lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000001140)=""/121, 0x56) r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x2000) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) socket(0x7, 0xa, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000180)=0x7fffffff, 0xfffffffffffffe30) 2018/05/13 06:34:25 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000000000600"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:25 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0x218}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) [ 721.552573] IPVS: Unknown mcast interface: rose0 [ 721.590973] FAULT_INJECTION: forcing a failure. [ 721.590973] name failslab, interval 1, probability 0, space 0, times 0 [ 721.602375] CPU: 1 PID: 17295 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 721.609659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 721.618251] IPVS: Unknown mcast interface: rose0 [ 721.619009] Call Trace: [ 721.619037] dump_stack+0x1b9/0x294 [ 721.619056] ? dump_stack_print_info.cold.2+0x52/0x52 [ 721.619077] ? __save_stack_trace+0x7e/0xd0 [ 721.639506] should_fail.cold.4+0xa/0x1a [ 721.643581] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 721.648695] ? save_stack+0x43/0xd0 [ 721.652337] ? kasan_kmalloc+0xc4/0xe0 [ 721.656236] ? kmem_cache_alloc_trace+0x152/0x780 [ 721.661082] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 721.666282] ? __list_lru_init+0x456/0x790 [ 721.670527] ? sget_userns+0x767/0xf00 [ 721.674428] ? graph_lock+0x170/0x170 [ 721.678245] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 721.683009] ? do_mount+0x564/0x3070 [ 721.686729] ? ksys_mount+0x12d/0x140 [ 721.690535] ? __x64_sys_mount+0xbe/0x150 [ 721.694691] ? do_syscall_64+0x1b1/0x800 [ 721.698756] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 721.704125] ? find_held_lock+0x36/0x1c0 [ 721.708203] ? __lock_is_held+0xb5/0x140 [ 721.712287] ? check_same_owner+0x320/0x320 [ 721.716621] ? rcu_note_context_switch+0x710/0x710 [ 721.721571] __should_failslab+0x124/0x180 [ 721.725815] should_failslab+0x9/0x14 [ 721.729622] kmem_cache_alloc_trace+0x2cb/0x780 [ 721.734303] ? __kmalloc_node+0x33/0x70 [ 721.738282] ? __kmalloc_node+0x33/0x70 [ 721.742269] ? rcu_read_lock_sched_held+0x108/0x120 [ 721.746139] IPVS: Unknown mcast interface: rose0 [ 721.747292] __memcg_init_list_lru_node+0x17d/0x2c0 [ 721.747309] ? kvfree_rcu+0x20/0x20 [ 721.747327] ? __kmalloc_node+0x47/0x70 [ 721.747347] __list_lru_init+0x456/0x790 [ 721.747365] ? list_lru_destroy+0x4c0/0x4c0 [ 721.747383] ? mark_held_locks+0xc9/0x160 [ 721.747401] ? __raw_spin_lock_init+0x1c/0x100 [ 721.747415] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 721.747431] ? lockdep_init_map+0x9/0x10 2018/05/13 06:34:26 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}}) 2018/05/13 06:34:26 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x704000000000000, 0x1000000000282) 2018/05/13 06:34:26 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000000000000001000"}}) 2018/05/13 06:34:26 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000009effffff00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:26 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000000000000000200"}}) 2018/05/13 06:34:26 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000000000000000ffffff9e"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 721.774325] IPVS: Unknown mcast interface: rose0 [ 721.777245] sget_userns+0x767/0xf00 [ 721.777260] ? get_anon_bdev+0x2f0/0x2f0 [ 721.777283] ? destroy_unused_super.part.11+0x110/0x110 [ 721.777300] ? __alloc_pages_nodemask+0xacf/0xd70 [ 721.777321] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 721.777341] ? kasan_check_read+0x11/0x20 [ 721.777358] ? cap_capable+0x1f9/0x260 [ 721.826669] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 721.832224] ? security_capable+0x99/0xc0 [ 721.836384] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 2018/05/13 06:34:26 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) [ 721.841928] ? ns_capable_common+0x13f/0x170 [ 721.846347] ? get_anon_bdev+0x2f0/0x2f0 [ 721.850415] sget+0x10b/0x150 [ 721.853530] ? fuse_get_root_inode+0x190/0x190 [ 721.858117] mount_nodev+0x33/0x110 [ 721.861749] fuse_mount+0x2c/0x40 [ 721.865212] mount_fs+0xae/0x328 [ 721.868590] vfs_kern_mount.part.34+0xd4/0x4d0 [ 721.873183] ? may_umount+0xb0/0xb0 [ 721.876819] ? _raw_read_unlock+0x22/0x30 [ 721.880972] ? __get_fs_type+0x97/0xc0 [ 721.884874] do_mount+0x564/0x3070 2018/05/13 06:34:26 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000000000000000000000000000000500"}}) [ 721.888428] ? copy_mount_string+0x40/0x40 [ 721.892673] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 721.897700] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 721.902476] ? retint_kernel+0x10/0x10 [ 721.903829] IPVS: Unknown mcast interface: rose0 [ 721.906379] ? copy_mount_options+0x1f0/0x380 [ 721.906395] ? copy_mount_options+0x202/0x380 [ 721.906415] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 721.906430] ? copy_mount_options+0x285/0x380 [ 721.906449] ksys_mount+0x12d/0x140 [ 721.906467] __x64_sys_mount+0xbe/0x150 [ 721.906486] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 721.942816] do_syscall_64+0x1b1/0x800 [ 721.946717] ? finish_task_switch+0x1ca/0x810 [ 721.951235] ? syscall_return_slowpath+0x5c0/0x5c0 [ 721.956178] ? syscall_return_slowpath+0x30f/0x5c0 [ 721.961117] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 721.966483] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 721.971315] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 721.976488] RIP: 0033:0x455979 [ 721.979659] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 721.987356] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 721.994609] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 722.001864] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 722.009118] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 722.016372] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 722.028782] IPVS: Unknown mcast interface: rose0 2018/05/13 06:34:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0x100000000000000}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:26 executing program 1 (fault-call:3 fault-nth:30): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:34:26 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000100"}}) 2018/05/13 06:34:26 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x904000000000000, 0x1000000000282) 2018/05/13 06:34:26 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000000000000000fffffe00"}}) 2018/05/13 06:34:26 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000000000000000000006"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:26 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, 0x0) sync() lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)=@random={'trusted.', 'security.capability\x00'}, &(0x7f0000001140)=""/121, 0x79) 2018/05/13 06:34:26 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0xf0ffffff00000000}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) [ 722.430629] IPVS: Unknown mcast interface: rose0 2018/05/13 06:34:26 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x1040000, 0x1000000000282) [ 722.469590] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 722.475048] IPVS: Unknown mcast interface: rose0 [ 722.500467] FAULT_INJECTION: forcing a failure. [ 722.500467] name failslab, interval 1, probability 0, space 0, times 0 [ 722.511833] CPU: 0 PID: 17361 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 722.519115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 722.528589] Call Trace: [ 722.531198] dump_stack+0x1b9/0x294 [ 722.534850] ? dump_stack_print_info.cold.2+0x52/0x52 [ 722.540055] ? __save_stack_trace+0x7e/0xd0 [ 722.544397] should_fail.cold.4+0xa/0x1a [ 722.548476] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 722.553625] ? save_stack+0x43/0xd0 [ 722.557369] ? kasan_kmalloc+0xc4/0xe0 [ 722.561268] ? kmem_cache_alloc_trace+0x152/0x780 [ 722.566123] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 722.571325] ? __list_lru_init+0x456/0x790 [ 722.575566] ? sget_userns+0x767/0xf00 [ 722.579463] ? graph_lock+0x170/0x170 [ 722.583267] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 722.588013] ? do_mount+0x564/0x3070 [ 722.591737] ? ksys_mount+0x12d/0x140 [ 722.595523] ? __x64_sys_mount+0xbe/0x150 [ 722.599659] ? do_syscall_64+0x1b1/0x800 [ 722.603707] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 722.609058] ? find_held_lock+0x36/0x1c0 [ 722.613107] ? __lock_is_held+0xb5/0x140 [ 722.617163] ? check_same_owner+0x320/0x320 [ 722.621472] ? rcu_note_context_switch+0x710/0x710 [ 722.626402] __should_failslab+0x124/0x180 [ 722.630643] should_failslab+0x9/0x14 [ 722.634447] kmem_cache_alloc_trace+0x2cb/0x780 [ 722.639110] ? __kmalloc_node+0x33/0x70 [ 722.643068] ? __kmalloc_node+0x33/0x70 [ 722.647035] ? rcu_read_lock_sched_held+0x108/0x120 [ 722.652043] __memcg_init_list_lru_node+0x17d/0x2c0 [ 722.657044] ? kvfree_rcu+0x20/0x20 [ 722.660663] ? __kmalloc_node+0x47/0x70 [ 722.664636] __list_lru_init+0x456/0x790 [ 722.668685] ? list_lru_destroy+0x4c0/0x4c0 [ 722.672992] ? mark_held_locks+0xc9/0x160 [ 722.677133] ? __raw_spin_lock_init+0x1c/0x100 [ 722.681703] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 722.686705] ? lockdep_init_map+0x9/0x10 [ 722.690757] sget_userns+0x767/0xf00 [ 722.694455] ? get_anon_bdev+0x2f0/0x2f0 [ 722.698507] ? destroy_unused_super.part.11+0x110/0x110 [ 722.703865] ? __alloc_pages_nodemask+0xacf/0xd70 [ 722.708696] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 722.713702] ? kasan_check_read+0x11/0x20 [ 722.717837] ? cap_capable+0x1f9/0x260 [ 722.721717] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 722.727247] ? security_capable+0x99/0xc0 [ 722.731383] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 722.736907] ? ns_capable_common+0x13f/0x170 [ 722.741303] ? get_anon_bdev+0x2f0/0x2f0 [ 722.745345] sget+0x10b/0x150 [ 722.748438] ? fuse_get_root_inode+0x190/0x190 [ 722.753178] mount_nodev+0x33/0x110 [ 722.756790] fuse_mount+0x2c/0x40 [ 722.760229] mount_fs+0xae/0x328 [ 722.763590] vfs_kern_mount.part.34+0xd4/0x4d0 [ 722.768165] ? may_umount+0xb0/0xb0 [ 722.771780] ? _raw_read_unlock+0x22/0x30 [ 722.775911] ? __get_fs_type+0x97/0xc0 [ 722.779785] do_mount+0x564/0x3070 [ 722.783312] ? copy_mount_string+0x40/0x40 [ 722.787534] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 722.792275] ? retint_kernel+0x10/0x10 [ 722.796160] ? copy_mount_options+0x1a1/0x380 [ 722.800641] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 722.805470] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 722.810988] ? copy_mount_options+0x285/0x380 [ 722.815473] ksys_mount+0x12d/0x140 [ 722.819093] __x64_sys_mount+0xbe/0x150 [ 722.823054] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 722.828058] do_syscall_64+0x1b1/0x800 [ 722.831928] ? finish_task_switch+0x1ca/0x810 [ 722.836408] ? syscall_return_slowpath+0x5c0/0x5c0 [ 722.841327] ? syscall_return_slowpath+0x30f/0x5c0 [ 722.846253] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 722.851622] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 722.856457] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 722.861634] RIP: 0033:0x455979 2018/05/13 06:34:27 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000000000000000000000500"}}) 2018/05/13 06:34:27 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000f00"}}) 2018/05/13 06:34:27 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000000000000600"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 722.864818] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 722.873036] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 722.880292] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 722.887546] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 722.894799] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 722.902052] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 722.935544] IPVS: Unknown mcast interface: rose0 2018/05/13 06:34:27 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0xa00, 0x1000000000282) 2018/05/13 06:34:27 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) [ 722.968372] IPVS: Unknown mcast interface: rose0 2018/05/13 06:34:27 executing program 1 (fault-call:3 fault-nth:31): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:34:27 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000405d163400"}}) [ 723.017747] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 723.163735] FAULT_INJECTION: forcing a failure. [ 723.163735] name failslab, interval 1, probability 0, space 0, times 0 [ 723.175222] CPU: 1 PID: 17399 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 723.182513] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 723.191873] Call Trace: [ 723.194481] dump_stack+0x1b9/0x294 [ 723.198134] ? dump_stack_print_info.cold.2+0x52/0x52 [ 723.203342] ? __save_stack_trace+0x7e/0xd0 [ 723.207678] should_fail.cold.4+0xa/0x1a [ 723.211746] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 723.216857] ? save_stack+0x43/0xd0 [ 723.220482] ? kasan_kmalloc+0xc4/0xe0 [ 723.224447] ? kmem_cache_alloc_trace+0x152/0x780 [ 723.229369] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 723.234549] ? __list_lru_init+0x456/0x790 [ 723.238777] ? sget_userns+0x767/0xf00 [ 723.242678] ? graph_lock+0x170/0x170 [ 723.246485] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 723.251247] ? do_mount+0x564/0x3070 [ 723.254970] ? ksys_mount+0x12d/0x140 [ 723.258779] ? __x64_sys_mount+0xbe/0x150 [ 723.262951] ? do_syscall_64+0x1b1/0x800 [ 723.267027] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 723.272421] ? find_held_lock+0x36/0x1c0 [ 723.276501] ? __lock_is_held+0xb5/0x140 [ 723.280589] ? check_same_owner+0x320/0x320 [ 723.284922] ? rcu_note_context_switch+0x710/0x710 [ 723.289847] __should_failslab+0x124/0x180 [ 723.294086] should_failslab+0x9/0x14 [ 723.297906] kmem_cache_alloc_trace+0x2cb/0x780 [ 723.302578] ? __kmalloc_node+0x33/0x70 [ 723.306551] ? __kmalloc_node+0x33/0x70 [ 723.310531] ? rcu_read_lock_sched_held+0x108/0x120 [ 723.315652] __memcg_init_list_lru_node+0x17d/0x2c0 [ 723.320685] ? kvfree_rcu+0x20/0x20 [ 723.324327] ? __kmalloc_node+0x47/0x70 [ 723.328318] __list_lru_init+0x456/0x790 [ 723.332396] ? list_lru_destroy+0x4c0/0x4c0 [ 723.336731] ? mark_held_locks+0xc9/0x160 [ 723.340896] ? __raw_spin_lock_init+0x1c/0x100 [ 723.345495] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 723.350503] ? lockdep_init_map+0x9/0x10 [ 723.354571] sget_userns+0x767/0xf00 [ 723.358273] ? get_anon_bdev+0x2f0/0x2f0 [ 723.362332] ? destroy_unused_super.part.11+0x110/0x110 [ 723.367680] ? __alloc_pages_nodemask+0xacf/0xd70 [ 723.372520] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 723.377524] ? kasan_check_read+0x11/0x20 [ 723.381670] ? cap_capable+0x1f9/0x260 [ 723.385550] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 723.391080] ? security_capable+0x99/0xc0 [ 723.395227] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 723.400751] ? ns_capable_common+0x13f/0x170 [ 723.405145] ? get_anon_bdev+0x2f0/0x2f0 [ 723.409196] sget+0x10b/0x150 [ 723.412291] ? fuse_get_root_inode+0x190/0x190 [ 723.416861] mount_nodev+0x33/0x110 [ 723.420478] fuse_mount+0x2c/0x40 [ 723.423916] mount_fs+0xae/0x328 [ 723.427274] vfs_kern_mount.part.34+0xd4/0x4d0 [ 723.431842] ? may_umount+0xb0/0xb0 [ 723.435464] ? _raw_read_unlock+0x22/0x30 [ 723.439598] ? __get_fs_type+0x97/0xc0 [ 723.443476] do_mount+0x564/0x3070 [ 723.447008] ? copy_mount_string+0x40/0x40 [ 723.451234] ? rcu_pm_notify+0xc0/0xc0 [ 723.455121] ? copy_mount_options+0x5f/0x380 [ 723.459530] ? rcu_read_lock_sched_held+0x108/0x120 [ 723.464543] ? kmem_cache_alloc_trace+0x616/0x780 [ 723.469394] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 723.474937] ? _copy_from_user+0xdf/0x150 [ 723.479075] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 723.484603] ? copy_mount_options+0x285/0x380 [ 723.489100] ksys_mount+0x12d/0x140 [ 723.492734] __x64_sys_mount+0xbe/0x150 [ 723.496707] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 723.501721] do_syscall_64+0x1b1/0x800 [ 723.505599] ? finish_task_switch+0x1ca/0x810 [ 723.510087] ? syscall_return_slowpath+0x5c0/0x5c0 [ 723.515000] ? syscall_return_slowpath+0x30f/0x5c0 [ 723.519930] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 723.525294] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 723.530140] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 723.535321] RIP: 0033:0x455979 [ 723.538492] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 723.546195] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 723.553447] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 2018/05/13 06:34:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0xf0ffffff}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:28 executing program 1 (fault-call:3 fault-nth:32): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:34:28 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0xffffff7f00000000}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:28 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000000000000000000004"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:28 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0xe04, 0x1000000000282) 2018/05/13 06:34:28 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000000000000000007ffffffff000"}}) 2018/05/13 06:34:28 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, 0x0) sync() lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000000)=@random={'osx.', "0000000201000000000000010400"}, &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) io_setup(0x8, &(0x7f00000001c0)=0x0) io_submit(r1, 0x2, &(0x7f0000000400)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0xb, 0x6, r0, &(0x7f0000000200)="ed88200d95902e54c506819849036b4cfc40f908121c4d2f6799e0b78738159eed39e13341aefb18056bb2a680ae0e857a8537c79d57fb5712741d64a5bfd7ded5eb59c9058100c1fcc28d855769787df04e95ca8feecb0cc1ee039d997f93da1867d97c580202bb86d4f1c2c4419103", 0x70, 0x0, 0x0, 0x1, r0}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x9, r0, &(0x7f00000002c0)="b777f12aa611665b3b63586c72e1ae8b271239fb313514156743acdf90104d8bf8469333260a32e7fa2615aca115dd3f723e54f58e62fcb9f2a9197ed64fb4ac7f031d5e9a55d62edd4f5a2705c2e11adeff456e10af085c3aac962086f66790d23c4056f3a2ae0e07d32f206afbbc9e9c3b6b3d261cade3b9e65fc17b7e5f7a67bb6230806f99369b2e4ab2636d317ccfd61808cef06e9cc3ffc985fbe9f0f26c407aeaf66bd775db77d191a5ed6dfaa25aa7dfa0f87767a3cbf4c79b6142dbe09a2107acf5facc1c919ad7ddbab547fa913bb67959811de97616acfd13d3e62741", 0xe2, 0x7, 0x0, 0x1, r0}]) symlinkat(&(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000180)='./file0/file1\x00') getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000001140)=""/121, 0x56) 2018/05/13 06:34:28 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000600"}}) [ 723.560708] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 723.567963] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 723.575214] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 723.626413] IPVS: Unknown mcast interface: rose0 [ 723.641219] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 723.661529] IPVS: Unknown mcast interface: rose0 2018/05/13 06:34:28 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0xf00, 0x1000000000282) 2018/05/13 06:34:28 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000000000000000000000000000000100"}}) [ 723.701296] FAULT_INJECTION: forcing a failure. [ 723.701296] name failslab, interval 1, probability 0, space 0, times 0 [ 723.713019] CPU: 0 PID: 17430 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 723.720315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 723.729682] Call Trace: [ 723.732293] dump_stack+0x1b9/0x294 [ 723.735939] ? dump_stack_print_info.cold.2+0x52/0x52 [ 723.741149] ? __save_stack_trace+0x7e/0xd0 [ 723.745489] should_fail.cold.4+0xa/0x1a 2018/05/13 06:34:28 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x2500, 0x1000000000282) 2018/05/13 06:34:28 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000fffffe00"}}) [ 723.749578] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 723.754697] ? save_stack+0x43/0xd0 [ 723.758335] ? kasan_kmalloc+0xc4/0xe0 [ 723.762237] ? kmem_cache_alloc_trace+0x152/0x780 [ 723.767089] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 723.772291] ? __list_lru_init+0x456/0x790 [ 723.776545] ? sget_userns+0x767/0xf00 [ 723.780445] ? graph_lock+0x170/0x170 [ 723.784255] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 723.789022] ? do_mount+0x564/0x3070 [ 723.792752] ? ksys_mount+0x12d/0x140 [ 723.796672] ? __x64_sys_mount+0xbe/0x150 2018/05/13 06:34:28 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) [ 723.800836] ? do_syscall_64+0x1b1/0x800 [ 723.804906] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 723.810281] ? find_held_lock+0x36/0x1c0 [ 723.814342] ? __lock_is_held+0xb5/0x140 [ 723.818404] ? nfs_readdir_page_filler+0x190/0xc20 [ 723.823347] ? check_same_owner+0x320/0x320 [ 723.827663] ? rcu_note_context_switch+0x710/0x710 [ 723.832581] __should_failslab+0x124/0x180 [ 723.836843] should_failslab+0x9/0x14 [ 723.840633] kmem_cache_alloc_trace+0x2cb/0x780 [ 723.845288] ? __kmalloc_node+0x33/0x70 [ 723.849247] ? __kmalloc_node+0x33/0x70 [ 723.853218] ? rcu_read_lock_sched_held+0x108/0x120 [ 723.858242] __memcg_init_list_lru_node+0x17d/0x2c0 [ 723.863261] ? kvfree_rcu+0x20/0x20 [ 723.866878] ? __kmalloc_node+0x47/0x70 [ 723.870855] __list_lru_init+0x456/0x790 [ 723.874909] ? list_lru_destroy+0x4c0/0x4c0 [ 723.879219] ? mark_held_locks+0xc9/0x160 [ 723.883358] ? __raw_spin_lock_init+0x1c/0x100 [ 723.887929] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 723.892949] ? lockdep_init_map+0x9/0x10 [ 723.896998] sget_userns+0x767/0xf00 [ 723.900713] ? get_anon_bdev+0x2f0/0x2f0 [ 723.904777] ? destroy_unused_super.part.11+0x110/0x110 [ 723.910132] ? __alloc_pages_nodemask+0xacf/0xd70 [ 723.914980] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 723.920011] ? kasan_check_read+0x11/0x20 [ 723.924245] ? cap_capable+0x1f9/0x260 [ 723.928138] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 723.933676] ? security_capable+0x99/0xc0 [ 723.937827] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 723.943353] ? ns_capable_common+0x13f/0x170 [ 723.947752] ? get_anon_bdev+0x2f0/0x2f0 [ 723.951810] sget+0x10b/0x150 [ 723.954924] ? fuse_get_root_inode+0x190/0x190 [ 723.959500] mount_nodev+0x33/0x110 [ 723.963153] fuse_mount+0x2c/0x40 [ 723.966606] mount_fs+0xae/0x328 [ 723.969977] vfs_kern_mount.part.34+0xd4/0x4d0 [ 723.974564] ? may_umount+0xb0/0xb0 [ 723.978189] ? _raw_read_unlock+0x22/0x30 [ 723.982331] ? __get_fs_type+0x97/0xc0 [ 723.986220] do_mount+0x564/0x3070 [ 723.989756] ? do_raw_spin_unlock+0x9e/0x2e0 [ 723.994158] ? copy_mount_string+0x40/0x40 [ 723.998383] ? rcu_pm_notify+0xc0/0xc0 [ 724.002265] ? copy_mount_options+0x5f/0x380 [ 724.006666] ? rcu_read_lock_sched_held+0x108/0x120 [ 724.011684] ? kmem_cache_alloc_trace+0x616/0x780 [ 724.016530] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 724.022070] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 724.027598] ? copy_mount_options+0x285/0x380 [ 724.032097] ksys_mount+0x12d/0x140 [ 724.035731] __x64_sys_mount+0xbe/0x150 [ 724.039703] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 724.044725] do_syscall_64+0x1b1/0x800 [ 724.048617] ? finish_task_switch+0x1ca/0x810 [ 724.053122] ? syscall_return_slowpath+0x5c0/0x5c0 [ 724.058131] ? syscall_return_slowpath+0x30f/0x5c0 [ 724.063061] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 724.068424] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 724.073261] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 724.078445] RIP: 0033:0x455979 [ 724.081621] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 724.089320] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 2018/05/13 06:34:28 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000000000000000000005f2"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 724.096583] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 724.103846] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 724.111123] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 724.118394] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 2018/05/13 06:34:28 executing program 1 (fault-call:3 fault-nth:33): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:34:28 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x26, 0x1000000000282) [ 724.206181] IPVS: Unknown mcast interface: rose0 [ 724.243222] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 724.256188] IPVS: Unknown mcast interface: rose0 [ 724.291884] FAULT_INJECTION: forcing a failure. [ 724.291884] name failslab, interval 1, probability 0, space 0, times 0 [ 724.303336] CPU: 1 PID: 17456 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 724.310623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 724.319996] Call Trace: [ 724.322609] dump_stack+0x1b9/0x294 [ 724.326256] ? dump_stack_print_info.cold.2+0x52/0x52 [ 724.331465] ? __save_stack_trace+0x7e/0xd0 [ 724.335811] should_fail.cold.4+0xa/0x1a [ 724.339903] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 724.345029] ? save_stack+0x43/0xd0 [ 724.348676] ? kasan_kmalloc+0xc4/0xe0 [ 724.352582] ? kmem_cache_alloc_trace+0x152/0x780 [ 724.357617] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 724.362821] ? __list_lru_init+0x456/0x790 [ 724.367072] ? sget_userns+0x767/0xf00 [ 724.370985] ? graph_lock+0x170/0x170 [ 724.374807] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 724.379577] ? do_mount+0x564/0x3070 [ 724.383306] ? ksys_mount+0x12d/0x140 [ 724.387122] ? __x64_sys_mount+0xbe/0x150 [ 724.391288] ? do_syscall_64+0x1b1/0x800 [ 724.395356] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 724.400741] ? find_held_lock+0x36/0x1c0 [ 724.404812] ? __lock_is_held+0xb5/0x140 [ 724.408899] ? check_same_owner+0x320/0x320 [ 724.413250] ? rcu_note_context_switch+0x710/0x710 [ 724.418201] __should_failslab+0x124/0x180 [ 724.422442] should_failslab+0x9/0x14 [ 724.426244] kmem_cache_alloc_trace+0x2cb/0x780 [ 724.430904] ? __kmalloc_node+0x33/0x70 [ 724.434881] ? __kmalloc_node+0x33/0x70 [ 724.438861] ? rcu_read_lock_sched_held+0x108/0x120 [ 724.443874] __memcg_init_list_lru_node+0x17d/0x2c0 [ 724.448912] ? kvfree_rcu+0x20/0x20 [ 724.452558] ? __kmalloc_node+0x47/0x70 [ 724.456540] __list_lru_init+0x456/0x790 [ 724.460604] ? list_lru_destroy+0x4c0/0x4c0 [ 724.464939] ? mark_held_locks+0xc9/0x160 [ 724.469110] ? __raw_spin_lock_init+0x1c/0x100 [ 724.473705] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 724.478750] ? lockdep_init_map+0x9/0x10 [ 724.482821] sget_userns+0x767/0xf00 [ 724.486542] ? get_anon_bdev+0x2f0/0x2f0 [ 724.490622] ? destroy_unused_super.part.11+0x110/0x110 [ 724.496008] ? __alloc_pages_nodemask+0xacf/0xd70 [ 724.500873] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 724.505999] ? kasan_check_read+0x11/0x20 [ 724.510168] ? cap_capable+0x1f9/0x260 [ 724.514081] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 724.519630] ? security_capable+0x99/0xc0 [ 724.523796] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 724.529347] ? ns_capable_common+0x13f/0x170 [ 724.533769] ? get_anon_bdev+0x2f0/0x2f0 [ 724.537821] sget+0x10b/0x150 [ 724.540926] ? fuse_get_root_inode+0x190/0x190 [ 724.545497] mount_nodev+0x33/0x110 [ 724.549114] fuse_mount+0x2c/0x40 [ 724.552558] mount_fs+0xae/0x328 [ 724.555923] vfs_kern_mount.part.34+0xd4/0x4d0 [ 724.560496] ? may_umount+0xb0/0xb0 [ 724.564291] ? _raw_read_unlock+0x22/0x30 [ 724.568440] ? __get_fs_type+0x97/0xc0 [ 724.572322] do_mount+0x564/0x3070 [ 724.575853] ? copy_mount_string+0x40/0x40 [ 724.580073] ? rcu_pm_notify+0xc0/0xc0 [ 724.583959] ? copy_mount_options+0x5f/0x380 [ 724.588356] ? rcu_read_lock_sched_held+0x108/0x120 [ 724.593365] ? kmem_cache_alloc_trace+0x616/0x780 [ 724.598211] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 724.603753] ? copy_mount_options+0x285/0x380 [ 724.608253] ksys_mount+0x12d/0x140 [ 724.611879] __x64_sys_mount+0xbe/0x150 [ 724.615847] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 724.620850] do_syscall_64+0x1b1/0x800 [ 724.624723] ? finish_task_switch+0x1ca/0x810 [ 724.629226] ? syscall_return_slowpath+0x5c0/0x5c0 [ 724.634157] ? syscall_return_slowpath+0x30f/0x5c0 [ 724.639082] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 724.644446] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 724.649289] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 724.654474] RIP: 0033:0x455979 [ 724.657661] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 724.665365] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 724.672635] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 724.679903] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 2018/05/13 06:34:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0xfffffff0}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:29 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00'}}) 2018/05/13 06:34:29 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x100000000000000, 0x1000000000282) 2018/05/13 06:34:29 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, 0x0) sync() recvmsg(0xffffffffffffff9c, &(0x7f0000000840)={&(0x7f0000000140)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000000680)=[{&(0x7f00000001c0)=""/220, 0xdc}, {&(0x7f00000002c0)=""/87, 0x57}, {&(0x7f0000000340)=""/247, 0xf7}, {&(0x7f0000000000)=""/52, 0x34}, {&(0x7f0000000440)=""/233, 0xe9}, {&(0x7f0000000540)=""/198, 0xc6}, {&(0x7f0000000080)=""/46, 0x2e}, {&(0x7f00000011c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/17, 0x11}], 0x9, &(0x7f0000000740)=""/195, 0xc3, 0x401}, 0x100) connect$bt_sco(r0, &(0x7f0000000880)={0x1f, {0x7, 0x40, 0x7, 0x1, 0xde852d6, 0x7ff}}, 0x8) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$binfmt_script(r0, &(0x7f0000000940)={'#! ', './file0', [{0x20, "0000000201000000000000010400"}, {0x20, 'security.capability\x00'}, {0x20, "1627"}, {0x20, 'bfs\x00'}, {0x20, 'bfs\x00'}], 0xa, "d0a7acc405e72f57ae5878399bbf3fa24211a18b31ae0abe684a50c2a5aa462c61264f9a444e45c1e5f8d341a74926aa8cdf684c380fb3f15786484d4cab0b85236d4020dc376293064f5544b222d829ea37d8e0972693b04f5cc794004d646ef8d7d4e06032ec92f435160762acbf"}, 0xab) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f00000008c0)=""/121, 0x79) 2018/05/13 06:34:29 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0xb804000000000000}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:29 executing program 1 (fault-call:3 fault-nth:34): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) [ 724.687174] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 724.694428] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 2018/05/13 06:34:29 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000000000f0ffff00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:29 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000000000000000000248e405d163400"}}) [ 724.791348] IPVS: Unknown mcast interface: rose0 [ 724.825808] FAULT_INJECTION: forcing a failure. [ 724.825808] name failslab, interval 1, probability 0, space 0, times 0 [ 724.837625] CPU: 1 PID: 17489 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 724.844914] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 724.855078] Call Trace: [ 724.857693] dump_stack+0x1b9/0x294 [ 724.861213] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 724.861950] ? dump_stack_print_info.cold.2+0x52/0x52 [ 724.861969] ? __save_stack_trace+0x7e/0xd0 [ 724.861990] should_fail.cold.4+0xa/0x1a [ 724.862009] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 724.888298] ? save_stack+0x43/0xd0 [ 724.891953] ? kasan_kmalloc+0xc4/0xe0 [ 724.895954] ? kmem_cache_alloc_trace+0x152/0x780 [ 724.900812] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 724.906017] ? __list_lru_init+0x456/0x790 [ 724.910268] ? sget_userns+0x767/0xf00 [ 724.914172] ? graph_lock+0x170/0x170 [ 724.917988] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 724.922757] ? do_mount+0x564/0x3070 [ 724.926487] ? ksys_mount+0x12d/0x140 [ 724.930301] ? __x64_sys_mount+0xbe/0x150 [ 724.934463] ? do_syscall_64+0x1b1/0x800 [ 724.938538] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 724.943922] ? find_held_lock+0x36/0x1c0 [ 724.948002] ? __lock_is_held+0xb5/0x140 [ 724.952097] ? check_same_owner+0x320/0x320 [ 724.956446] ? rcu_note_context_switch+0x710/0x710 [ 724.961397] __should_failslab+0x124/0x180 [ 724.965669] should_failslab+0x9/0x14 [ 724.969486] kmem_cache_alloc_trace+0x2cb/0x780 [ 724.974178] ? __kmalloc_node+0x33/0x70 [ 724.978192] ? __kmalloc_node+0x33/0x70 [ 724.982192] ? rcu_read_lock_sched_held+0x108/0x120 [ 724.987232] __memcg_init_list_lru_node+0x17d/0x2c0 [ 724.992271] ? kvfree_rcu+0x20/0x20 [ 724.995920] ? __kmalloc_node+0x47/0x70 [ 724.999908] __list_lru_init+0x456/0x790 [ 725.003992] ? list_lru_destroy+0x4c0/0x4c0 [ 725.008329] ? mark_held_locks+0xc9/0x160 [ 725.012497] ? __raw_spin_lock_init+0x1c/0x100 [ 725.017091] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 725.022126] ? lockdep_init_map+0x9/0x10 [ 725.026211] sget_userns+0x767/0xf00 [ 725.029947] ? get_anon_bdev+0x2f0/0x2f0 [ 725.034039] ? destroy_unused_super.part.11+0x110/0x110 [ 725.039428] ? __alloc_pages_nodemask+0xacf/0xd70 [ 725.044297] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 725.049340] ? kasan_check_read+0x11/0x20 [ 725.053534] ? cap_capable+0x1f9/0x260 [ 725.057451] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 725.063012] ? security_capable+0x99/0xc0 [ 725.067189] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 725.072754] ? ns_capable_common+0x13f/0x170 [ 725.077189] ? get_anon_bdev+0x2f0/0x2f0 [ 725.081267] sget+0x10b/0x150 [ 725.084394] ? fuse_get_root_inode+0x190/0x190 [ 725.088994] mount_nodev+0x33/0x110 [ 725.092649] fuse_mount+0x2c/0x40 [ 725.096122] mount_fs+0xae/0x328 [ 725.099506] vfs_kern_mount.part.34+0xd4/0x4d0 [ 725.104102] ? may_umount+0xb0/0xb0 [ 725.107738] ? _raw_read_unlock+0x22/0x30 [ 725.111894] ? __get_fs_type+0x97/0xc0 [ 725.115809] do_mount+0x564/0x3070 [ 725.119396] ? copy_mount_string+0x40/0x40 [ 725.123641] ? rcu_pm_notify+0xc0/0xc0 [ 725.127548] ? copy_mount_options+0x5f/0x380 [ 725.131973] ? rcu_read_lock_sched_held+0x108/0x120 [ 725.137009] ? kmem_cache_alloc_trace+0x616/0x780 [ 725.141877] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 725.147444] ? _copy_from_user+0xdf/0x150 [ 725.151620] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 725.157208] ? copy_mount_options+0x285/0x380 [ 725.161719] ksys_mount+0x12d/0x140 [ 725.165363] __x64_sys_mount+0xbe/0x150 [ 725.169344] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 725.174376] do_syscall_64+0x1b1/0x800 [ 725.178277] ? finish_task_switch+0x1ca/0x810 [ 725.182787] ? syscall_return_slowpath+0x5c0/0x5c0 [ 725.187735] ? syscall_return_slowpath+0x30f/0x5c0 [ 725.192684] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 725.198072] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 725.202947] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 725.208148] RIP: 0033:0x455979 [ 725.211346] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 725.219071] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 2018/05/13 06:34:29 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x7040000, 0x1000000000282) [ 725.226455] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 725.233756] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 725.241041] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 725.248327] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 725.259723] IPVS: Unknown mcast interface: rose0 2018/05/13 06:34:29 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 2018/05/13 06:34:29 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000000000000000e6f2f400"}}) 2018/05/13 06:34:29 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\x00\v\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:29 executing program 1 (fault-call:3 fault-nth:35): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:34:29 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0xf000000, 0x1000000000282) [ 725.371575] IPVS: Unknown mcast interface: rose0 [ 725.387529] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 725.405745] IPVS: Unknown mcast interface: rose0 2018/05/13 06:34:29 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}}) 2018/05/13 06:34:29 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000000200"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 725.539726] IPVS: Unknown mcast interface: rose0 [ 725.558852] FAULT_INJECTION: forcing a failure. [ 725.558852] name failslab, interval 1, probability 0, space 0, times 0 [ 725.570453] CPU: 1 PID: 17526 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 725.577740] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 725.587103] Call Trace: [ 725.589711] dump_stack+0x1b9/0x294 [ 725.593357] ? dump_stack_print_info.cold.2+0x52/0x52 [ 725.596166] IPVS: Unknown mcast interface: rose0 [ 725.598555] ? __save_stack_trace+0x7e/0xd0 [ 725.598579] should_fail.cold.4+0xa/0x1a [ 725.598599] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 725.598616] ? save_stack+0x43/0xd0 [ 725.598634] ? kasan_kmalloc+0xc4/0xe0 [ 725.624458] ? kmem_cache_alloc_trace+0x152/0x780 [ 725.629323] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 725.634525] ? __list_lru_init+0x456/0x790 [ 725.638766] ? sget_userns+0x767/0xf00 [ 725.642664] ? graph_lock+0x170/0x170 [ 725.646479] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 725.651243] ? do_mount+0x564/0x3070 [ 725.654967] ? ksys_mount+0x12d/0x140 [ 725.658781] ? __x64_sys_mount+0xbe/0x150 [ 725.662943] ? do_syscall_64+0x1b1/0x800 [ 725.667027] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 725.672415] ? find_held_lock+0x36/0x1c0 [ 725.676506] ? __lock_is_held+0xb5/0x140 [ 725.680596] ? check_same_owner+0x320/0x320 [ 725.684939] ? rcu_note_context_switch+0x710/0x710 [ 725.689897] __should_failslab+0x124/0x180 [ 725.694146] should_failslab+0x9/0x14 [ 725.697965] kmem_cache_alloc_trace+0x2cb/0x780 [ 725.702655] ? __kmalloc_node+0x33/0x70 [ 725.706641] ? __kmalloc_node+0x33/0x70 [ 725.710629] ? rcu_read_lock_sched_held+0x108/0x120 [ 725.715665] __memcg_init_list_lru_node+0x17d/0x2c0 [ 725.720693] ? kvfree_rcu+0x20/0x20 [ 725.724326] ? __kmalloc_node+0x47/0x70 [ 725.728319] __list_lru_init+0x456/0x790 [ 725.732398] ? list_lru_destroy+0x4c0/0x4c0 [ 725.736720] ? mark_held_locks+0xc9/0x160 [ 725.740871] ? __raw_spin_lock_init+0x1c/0x100 [ 725.745445] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 725.750454] ? lockdep_init_map+0x9/0x10 [ 725.754520] sget_userns+0x767/0xf00 [ 725.758231] ? get_anon_bdev+0x2f0/0x2f0 [ 725.762289] ? destroy_unused_super.part.11+0x110/0x110 [ 725.767638] ? __alloc_pages_nodemask+0xacf/0xd70 [ 725.772466] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 725.777468] ? kasan_check_read+0x11/0x20 [ 725.781601] ? cap_capable+0x1f9/0x260 [ 725.785485] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 725.791010] ? security_capable+0x99/0xc0 [ 725.795156] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 725.800676] ? ns_capable_common+0x13f/0x170 [ 725.805081] ? get_anon_bdev+0x2f0/0x2f0 [ 725.809130] sget+0x10b/0x150 [ 725.812228] ? fuse_get_root_inode+0x190/0x190 [ 725.816798] mount_nodev+0x33/0x110 [ 725.820416] fuse_mount+0x2c/0x40 [ 725.823862] mount_fs+0xae/0x328 [ 725.827216] vfs_kern_mount.part.34+0xd4/0x4d0 [ 725.831786] ? may_umount+0xb0/0xb0 [ 725.835399] ? _raw_read_unlock+0x22/0x30 [ 725.839532] ? __get_fs_type+0x97/0xc0 [ 725.843406] do_mount+0x564/0x3070 [ 725.846937] ? copy_mount_string+0x40/0x40 [ 725.851172] ? rcu_pm_notify+0xc0/0xc0 [ 725.855054] ? copy_mount_options+0x5f/0x380 [ 725.859540] ? rcu_read_lock_sched_held+0x108/0x120 [ 725.864552] ? kmem_cache_alloc_trace+0x616/0x780 [ 725.869397] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 725.874947] ? _copy_from_user+0xdf/0x150 [ 725.879087] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 725.884617] ? copy_mount_options+0x285/0x380 [ 725.889110] ksys_mount+0x12d/0x140 [ 725.892724] __x64_sys_mount+0xbe/0x150 [ 725.896687] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 725.901690] do_syscall_64+0x1b1/0x800 [ 725.905570] ? syscall_return_slowpath+0x5c0/0x5c0 [ 725.910500] ? syscall_return_slowpath+0x30f/0x5c0 [ 725.915434] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 725.920792] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 725.925636] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 725.930816] RIP: 0033:0x455979 [ 725.933991] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/05/13 06:34:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0x218}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:30 executing program 1 (fault-call:3 fault-nth:36): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:34:30 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}}) 2018/05/13 06:34:30 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000400"}}) 2018/05/13 06:34:30 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0xb00, 0x1000000000282) 2018/05/13 06:34:30 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000000000300"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:30 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000580)=[{&(0x7f0000000140)="ba53892f06c4451397f38a6e60578f4ecbc0d1cd10e0ea1da997e489c3a401ae682c9de43b929a7166f98bfdfacf2d0a81427ecb1e2e19072d9fc1b22c66c56f2d640a52457ca891f660bf66179024bee02f44a245597de75541e173221ee7e42350c47fc67e0885a811d3bfddd85af9eb97f403e4031726e48f0921ec231fbd6b5913c0d98580cd2d25d529bf5da7b737241a3d7c98da7f1d33a50a981a5661e040735fb16ce1b8205014c985a39920640342", 0xb3, 0x5e4042b9}, {&(0x7f0000000200)="ace017bc26b09002702c6d6dfa474b7e7ec4a15fe282f9e3cb917b8afe125d1d8d5635b55e5d17e1424325a6d5751c0264baccfc40817b600fdfed58513b9cc2626c028e6cb235ac5f225bcd5f0b23a906cb7822571689f98cc02f048960cae84a4d", 0x62, 0x5}, {&(0x7f0000000280)="a286d78ba33a3e31a245f925d0d068d8032dfbb442da261f027b23044e5e0f66f50bd3bc749a53eee3e01ef04b4e8169f179bb64dc8801567921035c6c9229745d9762255f5677ef5602dcba6a345ac22571e4ac004ccb0e116f43afb135235bee6d29623f52f7686c03effd2eafc35ba98cddeffabdd17265d6fd7f81677000de192a9ecc1332edd083584ad41c21ee778d78232c94d391b3f5e88e5673", 0x9e, 0x200}, {&(0x7f00000011c0)="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", 0x1000, 0x40}, {&(0x7f0000000780)="13167883d7bfee0211fa1332f9ba8f070aa8ce89cae0265b4755bb97ace2dcf6d7e41575cddc3ce0f1480c04af4cafdaa0d75e4a5f799a7b201575b03dd4a20a34100130335f282084b4ec233f99a2f89c0d98cf274532860eb84fa336b70149dbf97d82e320952c85fe0f5e", 0x6c, 0x9}, {&(0x7f00000003c0)="6747d887044204058d0ae83a2138d9ddf97fb7edc3f577abf5c7cecdfedea35316f6ff9c01e9c81e5b4b93f7dc91f68f35863e9cb7a4ae639caa84e6a514ef50945bbed55636b6322f501a792bf50311c219150bcf1f7cdbd76c82b7a603e8e5a23a5dce68e5e0", 0x67, 0x6}, {&(0x7f0000000640)="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", 0x140, 0xffffffffffffffff}, {&(0x7f0000000500)="92b7df938acf1f92e9b6391ace40aae7b0042a04cf54880d040dd80fcd6178b047ce5a5e3bdb0b6809446c60f1c3261fe97ff64b08bcb576dcc8e2ead1d3229058f4c314c86fd30f8b2d81ec7f8e587b8dd8a52f4f182cf2c520dcc9a7a2516a5a", 0x61, 0x62}], 0x0, 0x0) sync() lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) getuid() getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000001140)=""/121, 0x56) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}) 2018/05/13 06:34:30 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0x2000000}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) [ 725.941700] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 725.948978] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 725.956247] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 725.963508] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 725.970766] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 726.034943] IPVS: Unknown mcast interface: rose0 [ 726.060518] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 726.062503] IPVS: Unknown mcast interface: rose0 [ 726.092953] FAULT_INJECTION: forcing a failure. [ 726.092953] name failslab, interval 1, probability 0, space 0, times 0 [ 726.104797] CPU: 0 PID: 17562 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 726.112084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 726.121444] Call Trace: [ 726.124049] dump_stack+0x1b9/0x294 [ 726.127697] ? dump_stack_print_info.cold.2+0x52/0x52 [ 726.132903] ? lock_downgrade+0x8e0/0x8e0 [ 726.137065] ? graph_lock+0x170/0x170 [ 726.140888] should_fail.cold.4+0xa/0x1a [ 726.144970] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 726.150083] ? print_usage_bug+0xc0/0xc0 [ 726.154160] ? print_usage_bug+0xc0/0xc0 [ 726.158245] ? graph_lock+0x170/0x170 [ 726.162063] ? find_held_lock+0x36/0x1c0 [ 726.166142] ? __lock_is_held+0xb5/0x140 [ 726.170223] ? check_same_owner+0x320/0x320 [ 726.174534] ? lockdep_init_map+0x9/0x10 [ 726.178584] ? rcu_note_context_switch+0x710/0x710 [ 726.183501] ? kasan_check_write+0x14/0x20 [ 726.187738] ? __init_rwsem+0x1c4/0x290 [ 726.191706] __should_failslab+0x124/0x180 [ 726.195934] should_failslab+0x9/0x14 [ 726.199761] __kmalloc+0x2c8/0x760 [ 726.203293] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 726.208300] ? prealloc_shrinker+0xcf/0x130 [ 726.212627] prealloc_shrinker+0xcf/0x130 [ 726.216766] sget_userns+0x9b2/0xf00 [ 726.220463] ? get_anon_bdev+0x2f0/0x2f0 [ 726.224516] ? destroy_unused_super.part.11+0x110/0x110 [ 726.229868] ? __alloc_pages_nodemask+0xacf/0xd70 [ 726.234700] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 726.239708] ? kasan_check_read+0x11/0x20 [ 726.243847] ? cap_capable+0x1f9/0x260 [ 726.247930] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 726.253460] ? security_capable+0x99/0xc0 [ 726.257615] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 726.263140] ? ns_capable_common+0x13f/0x170 [ 726.267536] ? get_anon_bdev+0x2f0/0x2f0 [ 726.271583] sget+0x10b/0x150 [ 726.274681] ? fuse_get_root_inode+0x190/0x190 [ 726.279249] mount_nodev+0x33/0x110 [ 726.282861] fuse_mount+0x2c/0x40 [ 726.286316] mount_fs+0xae/0x328 [ 726.289675] vfs_kern_mount.part.34+0xd4/0x4d0 [ 726.294243] ? may_umount+0xb0/0xb0 [ 726.297857] ? _raw_read_unlock+0x22/0x30 [ 726.301988] ? __get_fs_type+0x97/0xc0 [ 726.305867] do_mount+0x564/0x3070 [ 726.309400] ? copy_mount_string+0x40/0x40 [ 726.313626] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 726.318394] ? retint_kernel+0x10/0x10 [ 726.322276] ? copy_mount_options+0x1f0/0x380 [ 726.326764] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 726.331594] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 726.337119] ? copy_mount_options+0x285/0x380 [ 726.341604] ksys_mount+0x12d/0x140 [ 726.345216] __x64_sys_mount+0xbe/0x150 [ 726.349175] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 726.354180] do_syscall_64+0x1b1/0x800 [ 726.358053] ? finish_task_switch+0x1ca/0x810 [ 726.362535] ? syscall_return_slowpath+0x5c0/0x5c0 [ 726.367452] ? syscall_return_slowpath+0x30f/0x5c0 [ 726.372372] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 726.377725] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 726.382559] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 726.387742] RIP: 0033:0x455979 [ 726.390915] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 726.398609] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 2018/05/13 06:34:30 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000000000000000000001"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:30 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000200"}}) 2018/05/13 06:34:30 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x25, 0x1000000000282) 2018/05/13 06:34:30 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000000000000000f00"}}) [ 726.405872] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 726.413124] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 726.420381] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 726.427635] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 2018/05/13 06:34:30 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x1000000000000, 0x1000000000282) 2018/05/13 06:34:30 executing program 1 (fault-call:3 fault-nth:37): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) [ 726.485626] IPVS: Unknown mcast interface: rose0 [ 726.497342] IPVS: Unknown mcast interface: rose0 2018/05/13 06:34:30 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000000000000000000000000f4f2e600"}}) 2018/05/13 06:34:31 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}}) [ 726.611484] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 726.659811] FAULT_INJECTION: forcing a failure. [ 726.659811] name failslab, interval 1, probability 0, space 0, times 0 [ 726.671302] CPU: 0 PID: 17591 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 726.678593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 726.687954] Call Trace: [ 726.690564] dump_stack+0x1b9/0x294 [ 726.694207] ? dump_stack_print_info.cold.2+0x52/0x52 [ 726.699413] ? __save_stack_trace+0x7e/0xd0 [ 726.703755] should_fail.cold.4+0xa/0x1a [ 726.707828] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 726.712934] ? save_stack+0x43/0xd0 [ 726.716573] ? kasan_kmalloc+0xc4/0xe0 [ 726.720472] ? kmem_cache_alloc_trace+0x152/0x780 [ 726.725325] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 726.730504] ? __list_lru_init+0x456/0x790 [ 726.734725] ? sget_userns+0x767/0xf00 [ 726.738615] ? graph_lock+0x170/0x170 [ 726.742428] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 726.747173] ? do_mount+0x564/0x3070 [ 726.750874] ? ksys_mount+0x12d/0x140 [ 726.754664] ? __x64_sys_mount+0xbe/0x150 [ 726.758805] ? do_syscall_64+0x1b1/0x800 [ 726.762867] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 726.768242] ? find_held_lock+0x36/0x1c0 [ 726.772300] ? __lock_is_held+0xb5/0x140 [ 726.776360] ? check_same_owner+0x320/0x320 [ 726.780679] ? rcu_note_context_switch+0x710/0x710 [ 726.785600] __should_failslab+0x124/0x180 [ 726.789829] should_failslab+0x9/0x14 [ 726.793630] kmem_cache_alloc_trace+0x2cb/0x780 [ 726.798298] ? __kmalloc_node+0x33/0x70 [ 726.802264] ? __kmalloc_node+0x33/0x70 [ 726.806232] ? rcu_read_lock_sched_held+0x108/0x120 [ 726.811259] __memcg_init_list_lru_node+0x17d/0x2c0 [ 726.816279] ? kvfree_rcu+0x20/0x20 [ 726.819913] ? __kmalloc_node+0x47/0x70 [ 726.823890] __list_lru_init+0x456/0x790 [ 726.827946] ? list_lru_destroy+0x4c0/0x4c0 [ 726.832271] ? mark_held_locks+0xc9/0x160 [ 726.836423] ? __raw_spin_lock_init+0x1c/0x100 [ 726.841005] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 726.846031] ? lockdep_init_map+0x9/0x10 [ 726.850097] sget_userns+0x767/0xf00 [ 726.853800] ? get_anon_bdev+0x2f0/0x2f0 [ 726.857863] ? destroy_unused_super.part.11+0x110/0x110 [ 726.863235] ? __alloc_pages_nodemask+0xacf/0xd70 [ 726.868099] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 726.873127] ? kasan_check_read+0x11/0x20 [ 726.877287] ? cap_capable+0x1f9/0x260 [ 726.881186] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 726.886731] ? security_capable+0x99/0xc0 [ 726.890895] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 726.896444] ? ns_capable_common+0x13f/0x170 [ 726.900861] ? get_anon_bdev+0x2f0/0x2f0 [ 726.904919] sget+0x10b/0x150 [ 726.908028] ? fuse_get_root_inode+0x190/0x190 [ 726.912613] mount_nodev+0x33/0x110 [ 726.916269] fuse_mount+0x2c/0x40 [ 726.919722] mount_fs+0xae/0x328 [ 726.923094] vfs_kern_mount.part.34+0xd4/0x4d0 [ 726.927665] ? may_umount+0xb0/0xb0 [ 726.931279] ? _raw_read_unlock+0x22/0x30 [ 726.935415] ? __get_fs_type+0x97/0xc0 [ 726.939300] do_mount+0x564/0x3070 [ 726.942830] ? copy_mount_string+0x40/0x40 [ 726.947059] ? rcu_pm_notify+0xc0/0xc0 [ 726.950941] ? copy_mount_options+0x5f/0x380 [ 726.955343] ? rcu_read_lock_sched_held+0x108/0x120 [ 726.960348] ? kmem_cache_alloc_trace+0x616/0x780 [ 726.965191] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 726.970722] ? _copy_from_user+0xdf/0x150 [ 726.974873] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 726.980405] ? copy_mount_options+0x285/0x380 [ 726.984894] ksys_mount+0x12d/0x140 [ 726.988505] __x64_sys_mount+0xbe/0x150 [ 726.992476] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 726.997483] do_syscall_64+0x1b1/0x800 [ 727.001356] ? finish_task_switch+0x1ca/0x810 [ 727.005833] ? syscall_return_slowpath+0x5c0/0x5c0 [ 727.010747] ? syscall_return_slowpath+0x30f/0x5c0 [ 727.016144] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 727.021499] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 727.026339] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 727.031517] RIP: 0033:0x455979 [ 727.034687] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 727.042399] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 727.049680] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 727.056935] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 727.064189] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 727.071443] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 2018/05/13 06:34:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0xa00}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:31 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0x7fffaf61}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:31 executing program 1 (fault-call:3 fault-nth:38): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:34:31 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x220000) fchmodat(r0, &(0x7f0000000080)='./file1\x00', 0x2) socket$pptp(0x18, 0x1, 0x2) sync() syz_mount_image$cifs(&(0x7f0000000180)='cifs\x00', &(0x7f00000001c0)='./file0\x00', 0x5, 0x5, &(0x7f0000000380)=[{&(0x7f00000011c0)="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", 0x1000, 0x4}, {&(0x7f0000000200)="240c846da3d366755b1bbfb6bc37b74d1e56a9fd59de6279e13736fb56356c516e2456a1d7c646c66b6220d10067c860fe0a76195d8a7f874e96f377d95bc5e241133c1947657316a4ad983484d7", 0x4e, 0x8}, {&(0x7f0000000280)="c3b5656b1d85e428d29c877cf946618b2376d33f893cc47b93b3d4623f2bef283f95f5b6fcd317a7246d8240af3d8e2f9524ac3bfa", 0x35, 0x101}, {&(0x7f00000002c0)="a8718619840a705ee94194c75c010c160c55c092b3c0dee3b1f02fe8a2532a00bddcb5565bf62ad78111389c777fe89827f5b8fb2e92aa19bb92f044e021aca3b6c74a4e79d52b80dd1b3b0537c2fda375811535176d52406b799e4847452af14623b5dbd7a03a3e5b735f55", 0x6c, 0x5}, {&(0x7f0000000340)="481559b50ac9ed814822548997e91bcc560259fb350f071aa571efb40206a32c589840fb766c48", 0x27, 0x1}], 0x2000000, &(0x7f0000000400)="9e6d643573756d2673656375726974792770726f6300") lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000001140)=""/121, 0x56) 2018/05/13 06:34:31 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000000000000400"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:31 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000000000000000000000000000000400"}}) 2018/05/13 06:34:31 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x604000000000000, 0x1000000000282) 2018/05/13 06:34:31 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000feffff00"}}) [ 727.152047] IPVS: Unknown mcast interface: rose0 [ 727.185453] IPVS: Unknown mcast interface: rose0 2018/05/13 06:34:31 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x9000000, 0x1000000000282) 2018/05/13 06:34:31 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\x00\x00 \x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 727.227480] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 727.278150] FAULT_INJECTION: forcing a failure. [ 727.278150] name failslab, interval 1, probability 0, space 0, times 0 [ 727.289500] CPU: 1 PID: 17630 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 727.296787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 727.306149] Call Trace: [ 727.308750] dump_stack+0x1b9/0x294 [ 727.312388] ? dump_stack_print_info.cold.2+0x52/0x52 [ 727.317590] ? debug_check_no_locks_freed+0x310/0x310 [ 727.322794] should_fail.cold.4+0xa/0x1a [ 727.326867] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 727.331977] ? graph_lock+0x170/0x170 [ 727.335791] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 727.341336] ? graph_lock+0x170/0x170 [ 727.345143] ? graph_lock+0x170/0x170 [ 727.348954] ? ida_get_new_above+0x490/0xa10 [ 727.353366] ? save_stack+0x43/0xd0 [ 727.356998] ? find_held_lock+0x36/0x1c0 [ 727.361066] ? __lock_is_held+0xb5/0x140 [ 727.365144] ? check_same_owner+0x320/0x320 [ 727.369479] ? rcu_note_context_switch+0x710/0x710 [ 727.374416] __should_failslab+0x124/0x180 [ 727.378662] should_failslab+0x9/0x14 [ 727.382478] __kmalloc+0x2c8/0x760 [ 727.386025] ? up_read+0x110/0x110 [ 727.389581] ? down_read+0x1b0/0x1b0 [ 727.392201] IPVS: Unknown mcast interface: rose0 [ 727.393311] ? match_number.isra.0+0xb6/0x260 [ 727.393349] match_number.isra.0+0xb6/0x260 [ 727.393365] ? match_strdup+0xa0/0xa0 [ 727.393384] ? match_wildcard+0x3c0/0x3c0 [ 727.414867] match_int+0x23/0x30 [ 727.418244] fuse_fill_super+0x812/0x1e20 [ 727.422409] ? fuse_get_root_inode+0x190/0x190 [ 727.427007] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 727.428418] IPVS: Unknown mcast interface: rose0 [ 727.432031] ? kasan_check_read+0x11/0x20 [ 727.432050] ? cap_capable+0x1f9/0x260 [ 727.432074] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 727.432088] ? security_capable+0x99/0xc0 [ 727.432104] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 727.432123] ? ns_capable_common+0x13f/0x170 [ 727.464478] ? get_anon_bdev+0x2f0/0x2f0 [ 727.468552] ? sget+0x113/0x150 [ 727.471848] ? fuse_get_root_inode+0x190/0x190 [ 727.476436] mount_nodev+0x6b/0x110 [ 727.480065] fuse_mount+0x2c/0x40 [ 727.483537] mount_fs+0xae/0x328 [ 727.486918] vfs_kern_mount.part.34+0xd4/0x4d0 [ 727.491510] ? may_umount+0xb0/0xb0 [ 727.495145] ? _raw_read_unlock+0x22/0x30 [ 727.499302] ? __get_fs_type+0x97/0xc0 [ 727.503200] do_mount+0x564/0x3070 [ 727.506759] ? copy_mount_string+0x40/0x40 [ 727.511003] ? rcu_pm_notify+0xc0/0xc0 [ 727.514904] ? copy_mount_options+0x5f/0x380 [ 727.519321] ? rcu_read_lock_sched_held+0x108/0x120 [ 727.524350] ? kmem_cache_alloc_trace+0x616/0x780 2018/05/13 06:34:31 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000500"}}) 2018/05/13 06:34:31 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000000000000000000000f00"}}) 2018/05/13 06:34:31 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000000f000"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:31 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000000000000000000001000"}}) [ 727.527216] IPVS: Unknown mcast interface: rose0 [ 727.529207] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 727.529225] ? _copy_from_user+0xdf/0x150 [ 727.529246] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 727.529262] ? copy_mount_options+0x285/0x380 [ 727.529278] ksys_mount+0x12d/0x140 [ 727.529295] __x64_sys_mount+0xbe/0x150 [ 727.561357] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 727.561825] IPVS: Unknown mcast interface: rose0 [ 727.566402] do_syscall_64+0x1b1/0x800 [ 727.566420] ? finish_task_switch+0x1ca/0x810 2018/05/13 06:34:32 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0xa000000, 0x1000000000282) 2018/05/13 06:34:32 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000000000000008dffffff00"}}) [ 727.566437] ? syscall_return_slowpath+0x5c0/0x5c0 [ 727.566453] ? syscall_return_slowpath+0x30f/0x5c0 [ 727.566474] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 727.566494] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 727.566510] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 727.566524] RIP: 0033:0x455979 [ 727.608072] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 727.615792] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 727.623069] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 727.630350] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 727.637632] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 727.644909] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 727.837308] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 2018/05/13 06:34:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0x400000000000000}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:32 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000000400"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:32 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x10, 0x1000000000282) 2018/05/13 06:34:32 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000e800"}}) 2018/05/13 06:34:32 executing program 1 (fault-call:3 fault-nth:39): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:34:32 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00'}}) 2018/05/13 06:34:32 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x20000, 0x0) recvfrom$unix(r0, &(0x7f00000021c0)=""/4096, 0x1000, 0x0, &(0x7f0000000500)=@file={0x0, './file0\x00'}, 0x6e) recvfrom$unix(r0, &(0x7f00000001c0)=""/153, 0x99, 0x10020, &(0x7f0000000280)=@file={0x0, '/\x00'}, 0x6e) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, 0x0) connect$pppoe(r0, &(0x7f0000000180)={0x18, 0x0, {0x3, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'yam0\x00'}}, 0x1e) ioctl$TIOCNXCL(r0, 0x540d) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000080)=0x1, 0x4) sync() lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f0000000140)="0000000201000000000000010400000000000000", 0x14, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000001140)=""/121, 0x56) 2018/05/13 06:34:32 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0xf0ffffff7f0000}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) [ 728.053483] IPVS: Unknown mcast interface: rose0 [ 728.083628] IPVS: Unknown mcast interface: rose0 [ 728.101975] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 728.118267] FAULT_INJECTION: forcing a failure. [ 728.118267] name failslab, interval 1, probability 0, space 0, times 0 [ 728.129611] CPU: 0 PID: 17703 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 728.136902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 728.146273] Call Trace: [ 728.148881] dump_stack+0x1b9/0x294 [ 728.152545] ? dump_stack_print_info.cold.2+0x52/0x52 [ 728.157758] ? is_bpf_text_address+0xd7/0x170 [ 728.162272] should_fail.cold.4+0xa/0x1a [ 728.166352] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 728.171476] ? graph_lock+0x170/0x170 [ 728.175292] ? save_stack+0xa9/0xd0 [ 728.178934] ? find_held_lock+0x36/0x1c0 [ 728.183017] ? __lock_is_held+0xb5/0x140 [ 728.187105] ? check_same_owner+0x320/0x320 [ 728.191449] ? trace_hardirqs_off+0xd/0x10 [ 728.195697] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 728.200817] ? rcu_note_context_switch+0x710/0x710 [ 728.205766] ? debug_check_no_obj_freed+0x2ff/0x584 [ 728.210813] __should_failslab+0x124/0x180 [ 728.215065] should_failslab+0x9/0x14 [ 728.218875] __kmalloc+0x2c8/0x760 [ 728.222435] ? match_strdup+0x5e/0xa0 [ 728.226253] match_strdup+0x5e/0xa0 [ 728.229901] fuse_match_uint+0x1a/0x60 [ 728.233801] fuse_fill_super+0x455/0x1e20 [ 728.237967] ? fuse_get_root_inode+0x190/0x190 [ 728.242566] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 728.247602] ? kasan_check_read+0x11/0x20 [ 728.251769] ? cap_capable+0x1f9/0x260 [ 728.255681] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 728.261241] ? security_capable+0x99/0xc0 [ 728.265412] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 728.270967] ? ns_capable_common+0x13f/0x170 [ 728.275392] ? get_anon_bdev+0x2f0/0x2f0 [ 728.279469] ? sget+0x113/0x150 2018/05/13 06:34:32 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x24, 0x1000000000282) 2018/05/13 06:34:32 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000000000000034165d408e2400"}}) 2018/05/13 06:34:32 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x40e, 0x1000000000282) 2018/05/13 06:34:32 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000000000000000000000000000008000"}}) 2018/05/13 06:34:32 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000000000000000300"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:32 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x2500000000000000, 0x1000000000282) [ 728.282768] ? fuse_get_root_inode+0x190/0x190 [ 728.287364] mount_nodev+0x6b/0x110 [ 728.291006] fuse_mount+0x2c/0x40 [ 728.294471] mount_fs+0xae/0x328 [ 728.297849] vfs_kern_mount.part.34+0xd4/0x4d0 [ 728.302448] ? may_umount+0xb0/0xb0 [ 728.306081] ? _raw_read_unlock+0x22/0x30 [ 728.310251] ? __get_fs_type+0x97/0xc0 [ 728.314180] do_mount+0x564/0x3070 [ 728.317742] ? copy_mount_string+0x40/0x40 [ 728.321981] ? rcu_pm_notify+0xc0/0xc0 [ 728.325883] ? copy_mount_options+0x5f/0x380 2018/05/13 06:34:32 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000068a6169000"}}) [ 728.330295] ? rcu_read_lock_sched_held+0x108/0x120 [ 728.335322] ? kmem_cache_alloc_trace+0x616/0x780 [ 728.340182] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 728.345734] ? _copy_from_user+0xdf/0x150 [ 728.349902] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 728.355458] ? copy_mount_options+0x285/0x380 [ 728.358660] IPVS: Unknown mcast interface: rose0 [ 728.359967] ksys_mount+0x12d/0x140 [ 728.359986] __x64_sys_mount+0xbe/0x150 [ 728.360002] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 728.360021] do_syscall_64+0x1b1/0x800 [ 728.360038] ? finish_task_switch+0x1ca/0x810 [ 728.360056] ? syscall_return_slowpath+0x5c0/0x5c0 [ 728.360073] ? syscall_return_slowpath+0x30f/0x5c0 [ 728.360097] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 728.393564] IPVS: Unknown mcast interface: rose0 [ 728.395649] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 728.395673] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 728.395686] RIP: 0033:0x455979 [ 728.395694] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 728.395711] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 2018/05/13 06:34:32 executing program 1 (fault-call:3 fault-nth:40): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) [ 728.395720] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 728.395729] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 728.395736] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 728.395745] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 728.501862] FAULT_INJECTION: forcing a failure. [ 728.501862] name failslab, interval 1, probability 0, space 0, times 0 [ 728.513401] CPU: 0 PID: 17729 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 728.520689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 728.530051] Call Trace: [ 728.532658] dump_stack+0x1b9/0x294 [ 728.536396] ? dump_stack_print_info.cold.2+0x52/0x52 [ 728.541605] ? rcu_is_watching+0x85/0x140 [ 728.545781] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 728.550994] should_fail.cold.4+0xa/0x1a [ 728.555077] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 728.560289] ? kernel_text_address+0x79/0xf0 [ 728.564720] ? __unwind_start+0x166/0x330 [ 728.568884] ? __kernel_text_address+0xd/0x40 [ 728.573400] ? graph_lock+0x170/0x170 [ 728.577220] ? __save_stack_trace+0x7e/0xd0 [ 728.581565] ? find_held_lock+0x36/0x1c0 [ 728.585649] ? __lock_is_held+0xb5/0x140 [ 728.589747] ? check_same_owner+0x320/0x320 [ 728.594111] ? rcu_note_context_switch+0x710/0x710 [ 728.599060] __should_failslab+0x124/0x180 [ 728.603316] should_failslab+0x9/0x14 [ 728.607100] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 728.607129] __kmalloc+0x2c8/0x760 [ 728.618288] ? match_number.isra.0+0xb6/0x260 [ 728.622799] match_number.isra.0+0xb6/0x260 [ 728.627122] ? match_strdup+0xa0/0xa0 [ 728.630914] ? match_wildcard+0x3c0/0x3c0 [ 728.635054] ? trace_hardirqs_on+0xd/0x10 [ 728.639194] match_octal+0x26/0x30 [ 728.642746] fuse_fill_super+0x615/0x1e20 [ 728.646889] ? fuse_get_root_inode+0x190/0x190 [ 728.651476] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 728.656481] ? kasan_check_read+0x11/0x20 [ 728.660618] ? cap_capable+0x1f9/0x260 [ 728.664510] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 728.670046] ? security_capable+0x99/0xc0 [ 728.674188] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 728.679802] ? ns_capable_common+0x13f/0x170 [ 728.684199] ? get_anon_bdev+0x2f0/0x2f0 [ 728.688249] ? sget+0x113/0x150 [ 728.691543] ? fuse_get_root_inode+0x190/0x190 [ 728.696114] mount_nodev+0x6b/0x110 [ 728.699730] fuse_mount+0x2c/0x40 [ 728.703174] mount_fs+0xae/0x328 [ 728.706545] vfs_kern_mount.part.34+0xd4/0x4d0 [ 728.711114] ? may_umount+0xb0/0xb0 [ 728.714733] ? _raw_read_unlock+0x22/0x30 [ 728.718867] ? __get_fs_type+0x97/0xc0 [ 728.722745] do_mount+0x564/0x3070 [ 728.726287] ? copy_mount_string+0x40/0x40 [ 728.730510] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 728.735530] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 728.740276] ? retint_kernel+0x10/0x10 [ 728.744166] ? copy_mount_options+0x1f0/0x380 [ 728.748662] ? copy_mount_options+0x1fa/0x380 [ 728.753164] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 728.758700] ? copy_mount_options+0x285/0x380 [ 728.763183] ksys_mount+0x12d/0x140 [ 728.766801] __x64_sys_mount+0xbe/0x150 [ 728.770765] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 728.775775] do_syscall_64+0x1b1/0x800 [ 728.779649] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 728.784568] ? syscall_return_slowpath+0x5c0/0x5c0 [ 728.789490] ? syscall_return_slowpath+0x30f/0x5c0 [ 728.794408] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 728.799760] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 728.804595] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 728.809768] RIP: 0033:0x455979 [ 728.812941] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 728.820646] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 728.827902] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 728.835159] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 728.842417] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 728.849681] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 2018/05/13 06:34:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0xb804000000000000}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:33 executing program 1 (fault-call:3 fault-nth:41): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:34:33 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0xb40000}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:33 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000000000000000000000fffffe00"}}) 2018/05/13 06:34:33 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0xa040000, 0x1000000000282) 2018/05/13 06:34:33 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000e800"}}) 2018/05/13 06:34:33 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000000000000300"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:33 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, 0x0) sync() lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000001140)=""/121, 0x1a) r0 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x1, 0x1) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') accept$packet(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000240)=0x14) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000280)={0x0, @multicast1, @loopback}, &(0x7f00000002c0)=0xc) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x1, 0x4) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f00000001c0), &(0x7f0000000600)=0x4) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000340)={0x0, @multicast2}, &(0x7f0000000380)=0xc) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000005c0)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f00000003c0)={0x1b8, r1, 0x0, 0x70bd2a, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x50, 0x2, [{0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8, 0x3, 0xb}, {0x1c, 0x4, [{0x5, 0x100000000, 0x5, 0x800}, {0x3, 0x6, 0x81}, {0x2, 0x9, 0x5, 0x2}]}}}]}}, {{0x8, 0x1, r3}, {0x4, 0x2}}, {{0x8, 0x1, r4}, {0x138, 0x2, [{0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8, 0x3, 0xb}, {0x14, 0x4, [{0x5, 0xffffffffffffff69, 0x5, 0xffffffffffffff35}, {0x4, 0xfffffffffffffffc, 0x0, 0x5}]}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8, 0x3, 0xe}, {0x8, 0x4, 0x10001}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8, 0x3, 0x5}, {0x10, 0x4, 'broadcast\x00'}}}]}}]}, 0x1b8}, 0x1, 0x0, 0x0, 0x4000800}, 0x800) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000640)) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f0000000080)={0x9, 0x2, 0x6, 0x1, "77d4066ca45a0d54ae1ced2b46864bceca00eabe82650b4981e158342377282f3ec05a81a24052306d3916c1", 0x401}) [ 728.972196] IPVS: Unknown mcast interface: rose0 [ 729.002749] IPVS: Unknown mcast interface: rose0 2018/05/13 06:34:33 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0xb, 0x1000000000282) [ 729.044332] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 729.068407] FAULT_INJECTION: forcing a failure. [ 729.068407] name failslab, interval 1, probability 0, space 0, times 0 [ 729.079851] CPU: 1 PID: 17770 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 729.087144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 729.096505] Call Trace: [ 729.099115] dump_stack+0x1b9/0x294 [ 729.102762] ? dump_stack_print_info.cold.2+0x52/0x52 [ 729.107975] ? is_bpf_text_address+0xd7/0x170 [ 729.112499] should_fail.cold.4+0xa/0x1a [ 729.116583] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 729.121707] ? graph_lock+0x170/0x170 [ 729.125521] ? save_stack+0xa9/0xd0 [ 729.129171] ? find_held_lock+0x36/0x1c0 [ 729.133249] ? __lock_is_held+0xb5/0x140 [ 729.137320] ? btrfs_reloc_pre_snapshot+0xc0/0x240 [ 729.142275] ? check_same_owner+0x320/0x320 [ 729.146607] ? trace_hardirqs_off+0xd/0x10 [ 729.150854] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 729.155970] ? rcu_note_context_switch+0x710/0x710 [ 729.160912] ? debug_check_no_obj_freed+0x2ff/0x584 [ 729.165945] __should_failslab+0x124/0x180 [ 729.170197] should_failslab+0x9/0x14 [ 729.174012] __kmalloc+0x2c8/0x760 [ 729.177577] ? match_strdup+0x5e/0xa0 [ 729.181395] match_strdup+0x5e/0xa0 [ 729.185039] fuse_match_uint+0x1a/0x60 [ 729.188938] fuse_fill_super+0x455/0x1e20 [ 729.193106] ? fuse_get_root_inode+0x190/0x190 [ 729.197708] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 729.202746] ? kasan_check_read+0x11/0x20 [ 729.206915] ? cap_capable+0x1f9/0x260 [ 729.210826] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 729.216375] ? security_capable+0x99/0xc0 [ 729.220550] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 729.226277] ? ns_capable_common+0x13f/0x170 [ 729.230710] ? get_anon_bdev+0x2f0/0x2f0 [ 729.234786] ? sget+0x113/0x150 [ 729.238086] ? fuse_get_root_inode+0x190/0x190 [ 729.242771] mount_nodev+0x6b/0x110 [ 729.246414] fuse_mount+0x2c/0x40 [ 729.249880] mount_fs+0xae/0x328 [ 729.253262] vfs_kern_mount.part.34+0xd4/0x4d0 [ 729.257858] ? may_umount+0xb0/0xb0 [ 729.261497] ? _raw_read_unlock+0x22/0x30 [ 729.265671] ? __get_fs_type+0x97/0xc0 [ 729.269578] do_mount+0x564/0x3070 [ 729.273133] ? do_raw_spin_unlock+0x9e/0x2e0 [ 729.277565] ? copy_mount_string+0x40/0x40 [ 729.281812] ? rcu_pm_notify+0xc0/0xc0 [ 729.285715] ? copy_mount_options+0x5f/0x380 [ 729.290136] ? rcu_read_lock_sched_held+0x108/0x120 [ 729.295165] ? kmem_cache_alloc_trace+0x616/0x780 [ 729.300024] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 729.305583] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 729.311135] ? copy_mount_options+0x285/0x380 [ 729.315649] ksys_mount+0x12d/0x140 [ 729.319287] __x64_sys_mount+0xbe/0x150 [ 729.323274] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 729.328307] do_syscall_64+0x1b1/0x800 [ 729.332205] ? finish_task_switch+0x1ca/0x810 [ 729.336704] ? syscall_return_slowpath+0x5c0/0x5c0 [ 729.341623] ? syscall_return_slowpath+0x30f/0x5c0 [ 729.346559] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 729.351922] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 729.356765] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 729.361944] RIP: 0033:0x455979 [ 729.365122] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 729.372837] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 729.380099] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 729.387369] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 2018/05/13 06:34:33 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000000000000000000500"}}) 2018/05/13 06:34:33 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000500"}}) 2018/05/13 06:34:33 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000000000300"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:33 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000000000000000feffff00"}}) 2018/05/13 06:34:33 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}}) 2018/05/13 06:34:33 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000000000000000400"}}) 2018/05/13 06:34:33 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000fffffe00"}}) [ 729.394634] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 729.401895] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 729.418986] IPVS: Unknown mcast interface: rose0 [ 729.446281] IPVS: Unknown mcast interface: rose0 [ 729.516888] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 2018/05/13 06:34:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0x4000000}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:34 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}}) 2018/05/13 06:34:34 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000600"}}) 2018/05/13 06:34:34 executing program 1 (fault-call:3 fault-nth:42): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:34:34 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x204000000000000, 0x1000000000282) 2018/05/13 06:34:34 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:34 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, 0x0) sync() lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) creat(&(0x7f00000011c0)='./file0\x00', 0x60) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@random={'osx.', 'security.capability\x00'}, &(0x7f0000000140)=""/4096, 0x1000) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000001140)=""/121, 0x56) 2018/05/13 06:34:34 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0x7ffffffff000}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) [ 729.875691] IPVS: Unknown mcast interface: rose0 [ 729.891398] FAULT_INJECTION: forcing a failure. [ 729.891398] name failslab, interval 1, probability 0, space 0, times 0 [ 729.902751] CPU: 1 PID: 17817 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 729.910073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 729.919439] Call Trace: [ 729.922050] dump_stack+0x1b9/0x294 [ 729.925698] ? dump_stack_print_info.cold.2+0x52/0x52 [ 729.930911] should_fail.cold.4+0xa/0x1a [ 729.934995] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 729.940118] ? graph_lock+0x170/0x170 [ 729.943953] ? lock_downgrade+0x8e0/0x8e0 [ 729.948110] ? kasan_check_write+0x14/0x20 [ 729.952359] ? find_held_lock+0x36/0x1c0 [ 729.956439] ? __lock_is_held+0xb5/0x140 [ 729.960619] ? check_same_owner+0x320/0x320 [ 729.964957] ? rcu_note_context_switch+0x710/0x710 [ 729.969902] __should_failslab+0x124/0x180 [ 729.974155] should_failslab+0x9/0x14 [ 729.977971] kmem_cache_alloc_trace+0x2cb/0x780 [ 729.982655] ? match_wildcard+0x3c0/0x3c0 [ 729.986818] ? trace_hardirqs_on+0xd/0x10 [ 729.990988] fuse_fill_super+0xc92/0x1e20 [ 729.995154] ? fuse_get_root_inode+0x190/0x190 [ 729.999759] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 730.004800] ? kasan_check_read+0x11/0x20 [ 730.008970] ? cap_capable+0x1f9/0x260 [ 730.012878] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 730.018438] ? security_capable+0x99/0xc0 [ 730.022620] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 730.028180] ? ns_capable_common+0x13f/0x170 [ 730.032612] ? get_anon_bdev+0x2f0/0x2f0 [ 730.036687] ? sget+0x113/0x150 [ 730.039985] ? fuse_get_root_inode+0x190/0x190 [ 730.044584] mount_nodev+0x6b/0x110 [ 730.048230] fuse_mount+0x2c/0x40 [ 730.051696] mount_fs+0xae/0x328 [ 730.055082] vfs_kern_mount.part.34+0xd4/0x4d0 [ 730.059676] ? may_umount+0xb0/0xb0 [ 730.063318] ? _raw_read_unlock+0x22/0x30 [ 730.067478] ? __get_fs_type+0x97/0xc0 [ 730.071383] do_mount+0x564/0x3070 2018/05/13 06:34:34 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000001400"}}) 2018/05/13 06:34:34 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000000000000000405d163400"}}) 2018/05/13 06:34:34 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x5000000, 0x1000000000282) 2018/05/13 06:34:34 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x25000000, 0x1000000000282) 2018/05/13 06:34:34 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000300"}}) [ 730.074937] ? copy_mount_string+0x40/0x40 [ 730.079179] ? rcu_pm_notify+0xc0/0xc0 [ 730.083089] ? copy_mount_options+0x5f/0x380 [ 730.087510] ? rcu_read_lock_sched_held+0x108/0x120 [ 730.092539] ? kmem_cache_alloc_trace+0x616/0x780 [ 730.097404] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 730.102949] ? copy_mount_options+0x285/0x380 [ 730.107463] ksys_mount+0x12d/0x140 [ 730.111103] __x64_sys_mount+0xbe/0x150 [ 730.115084] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 730.120115] do_syscall_64+0x1b1/0x800 [ 730.124011] ? finish_task_switch+0x1ca/0x810 [ 730.128513] ? syscall_return_slowpath+0x5c0/0x5c0 [ 730.133455] ? syscall_return_slowpath+0x30f/0x5c0 [ 730.138396] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 730.143772] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 730.148633] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 730.153830] RIP: 0033:0x455979 [ 730.158067] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 730.165793] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 2018/05/13 06:34:34 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000000000000000ffffff"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:34 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x604, 0x1000000000282) [ 730.173075] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 730.180355] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 730.187642] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 730.194918] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 2018/05/13 06:34:34 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}}) [ 730.220166] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 730.265412] IPVS: Unknown mcast interface: rose0 [ 730.323262] IPVS: Unknown mcast interface: rose0 [ 730.376400] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 2018/05/13 06:34:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0xeffe0000}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:35 executing program 1 (fault-call:3 fault-nth:43): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:34:35 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00'}}) 2018/05/13 06:34:35 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x904, 0x1000000000282) 2018/05/13 06:34:35 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:35 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000068a6169000"}}) 2018/05/13 06:34:35 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x376, &(0x7f0000000a80), 0x0, 0x0) sync() lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000001140)=""/121, 0x56) 2018/05/13 06:34:35 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0xfeef}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) [ 730.929139] IPVS: Unknown mcast interface: rose0 [ 730.964386] IPVS: Unknown mcast interface: rose0 2018/05/13 06:34:35 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000000000034000"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:35 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000d24000"}}) [ 731.008365] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 731.008977] FAULT_INJECTION: forcing a failure. [ 731.008977] name failslab, interval 1, probability 0, space 0, times 0 [ 731.027956] CPU: 1 PID: 17901 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 731.035237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 731.044599] Call Trace: [ 731.047209] dump_stack+0x1b9/0x294 [ 731.048552] IPVS: Unknown mcast interface: rose0 [ 731.050851] ? dump_stack_print_info.cold.2+0x52/0x52 [ 731.050879] should_fail.cold.4+0xa/0x1a [ 731.050900] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 731.050914] ? fuse_mount+0x2c/0x40 [ 731.050932] ? mount_fs+0xae/0x328 [ 731.069552] IPVS: Unknown mcast interface: rose0 [ 731.070695] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 731.070710] ? do_mount+0x564/0x3070 [ 731.070725] ? ksys_mount+0x12d/0x140 [ 731.070740] ? __x64_sys_mount+0xbe/0x150 [ 731.070754] ? do_syscall_64+0x1b1/0x800 [ 731.070771] ? graph_lock+0x170/0x170 2018/05/13 06:34:35 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000000000f000"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 731.106859] ? find_held_lock+0x36/0x1c0 [ 731.110926] ? find_held_lock+0x36/0x1c0 [ 731.114994] ? __lock_is_held+0xb5/0x140 [ 731.119078] ? check_same_owner+0x320/0x320 [ 731.123410] ? rcu_note_context_switch+0x710/0x710 [ 731.128353] ? kasan_check_read+0x11/0x20 [ 731.129651] IPVS: Unknown mcast interface: rose0 [ 731.132514] __should_failslab+0x124/0x180 [ 731.132534] should_failslab+0x9/0x14 [ 731.132551] kmem_cache_alloc_node_trace+0x26f/0x770 [ 731.132572] ? _raw_spin_unlock+0x22/0x30 [ 731.132590] bdi_alloc_node+0x67/0xe0 2018/05/13 06:34:35 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000000000000000000000000000000f00"}}) 2018/05/13 06:34:35 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000001400"}}) [ 731.132607] super_setup_bdi_name+0x8b/0x220 [ 731.132624] ? kill_block_super+0x100/0x100 [ 731.145892] IPVS: Unknown mcast interface: rose0 [ 731.150480] ? rcu_read_lock_sched_held+0x108/0x120 [ 731.150498] ? kmem_cache_alloc_trace+0x616/0x780 [ 731.150515] ? match_wildcard+0x3c0/0x3c0 [ 731.150539] fuse_fill_super+0xe6e/0x1e20 [ 731.150560] ? fuse_get_root_inode+0x190/0x190 [ 731.150576] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 731.150595] ? kasan_check_read+0x11/0x20 [ 731.203897] ? cap_capable+0x1f9/0x260 2018/05/13 06:34:35 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000000000f0ffffffffff"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:35 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x1100000000000000, 0x1000000000282) [ 731.207807] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 731.213359] ? security_capable+0x99/0xc0 [ 731.217522] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 731.223064] ? ns_capable_common+0x13f/0x170 [ 731.227530] ? get_anon_bdev+0x2f0/0x2f0 [ 731.231596] ? sget+0x113/0x150 [ 731.234884] ? fuse_get_root_inode+0x190/0x190 [ 731.239473] mount_nodev+0x6b/0x110 [ 731.243375] fuse_mount+0x2c/0x40 [ 731.246838] mount_fs+0xae/0x328 [ 731.250218] vfs_kern_mount.part.34+0xd4/0x4d0 [ 731.254812] ? may_umount+0xb0/0xb0 2018/05/13 06:34:35 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000000000000000000000000000001000"}}) [ 731.258446] ? _raw_read_unlock+0x22/0x30 [ 731.262599] ? __get_fs_type+0x97/0xc0 [ 731.266508] do_mount+0x564/0x3070 [ 731.270058] ? copy_mount_string+0x40/0x40 [ 731.270554] IPVS: Unknown mcast interface: rose0 [ 731.274294] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 731.274313] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 731.274333] ? retint_kernel+0x10/0x10 [ 731.274360] ? copy_mount_options+0x1f0/0x380 [ 731.274375] ? copy_mount_options+0x202/0x380 [ 731.274394] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 731.274408] ? copy_mount_options+0x285/0x380 [ 731.274426] ksys_mount+0x12d/0x140 [ 731.274443] __x64_sys_mount+0xbe/0x150 [ 731.319385] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 731.324419] do_syscall_64+0x1b1/0x800 [ 731.328317] ? finish_task_switch+0x1ca/0x810 [ 731.329974] IPVS: Unknown mcast interface: rose0 [ 731.332831] ? syscall_return_slowpath+0x5c0/0x5c0 [ 731.332847] ? syscall_return_slowpath+0x30f/0x5c0 [ 731.332867] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 731.332887] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 731.332909] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 731.332920] RIP: 0033:0x455979 [ 731.332928] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 731.332945] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 731.332955] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 731.332963] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 731.332971] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 731.332979] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 731.512316] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 2018/05/13 06:34:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0x8dffffff}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:36 executing program 1 (fault-call:3 fault-nth:44): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:34:36 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000000000000000000000000000000200"}}) 2018/05/13 06:34:36 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x800000000000000, 0x1000000000282) 2018/05/13 06:34:36 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000040d200"}}) 2018/05/13 06:34:36 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, 0x0) sync() r0 = dup(0xffffffffffffff9c) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000000)={0x0, 0x9b1}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={r1, 0x7}, &(0x7f0000000200)=0xfffffd6e) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000001140)=""/121, 0x56) 2018/05/13 06:34:36 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000000000f0ffffff00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:36 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0xffffffe0}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) [ 731.840904] IPVS: Unknown mcast interface: rose0 [ 731.870731] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 731.872483] IPVS: Unknown mcast interface: rose0 [ 731.880464] FAULT_INJECTION: forcing a failure. [ 731.880464] name failslab, interval 1, probability 0, space 0, times 0 [ 731.894562] CPU: 1 PID: 17969 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 731.901843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 731.911201] Call Trace: [ 731.913804] dump_stack+0x1b9/0x294 [ 731.917448] ? dump_stack_print_info.cold.2+0x52/0x52 [ 731.922654] should_fail.cold.4+0xa/0x1a [ 731.926723] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 731.931840] ? graph_lock+0x170/0x170 [ 731.935648] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 731.940765] ? find_held_lock+0x36/0x1c0 [ 731.944843] ? __lock_is_held+0xb5/0x140 [ 731.948926] ? check_same_owner+0x320/0x320 [ 731.953260] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 731.958817] ? rcu_note_context_switch+0x710/0x710 [ 731.963760] __should_failslab+0x124/0x180 2018/05/13 06:34:36 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\x00\x00\x00\x00\x00\t\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:36 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000034165d4000"}}) 2018/05/13 06:34:36 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000000000000000000000034165d4000"}}) 2018/05/13 06:34:36 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x704, 0x1000000000282) [ 731.968005] should_failslab+0x9/0x14 [ 731.971821] kmem_cache_alloc_trace+0x2cb/0x780 [ 731.976504] ? __raw_spin_lock_init+0x1c/0x100 [ 731.981108] device_create_groups_vargs+0xa7/0x270 [ 731.986058] device_create_vargs+0x46/0x60 [ 731.990319] bdi_register_va.part.10+0xbb/0x9b0 [ 731.995009] ? cgwb_kill+0x630/0x630 [ 731.998740] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 732.004294] ? bdi_init+0x416/0x510 [ 732.007936] ? wb_init+0x9e0/0x9e0 [ 732.011486] ? bdi_alloc_node+0x67/0xe0 [ 732.015471] ? bdi_alloc_node+0x67/0xe0 [ 732.019473] ? rcu_read_lock_sched_held+0x108/0x120 [ 732.024499] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 732.029794] ? _raw_spin_unlock+0x22/0x30 [ 732.033953] bdi_register_va+0x68/0x80 [ 732.037851] super_setup_bdi_name+0x123/0x220 [ 732.042357] ? kill_block_super+0x100/0x100 [ 732.046686] ? kmem_cache_alloc_trace+0x616/0x780 [ 732.051540] ? match_wildcard+0x3c0/0x3c0 [ 732.055693] ? trace_hardirqs_on+0xd/0x10 [ 732.059857] fuse_fill_super+0xe6e/0x1e20 [ 732.064019] ? fuse_get_root_inode+0x190/0x190 2018/05/13 06:34:36 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000000000000000000000ffffff8d00"}}) 2018/05/13 06:34:36 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}}) [ 732.068610] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 732.073638] ? kasan_check_read+0x11/0x20 [ 732.077798] ? cap_capable+0x1f9/0x260 [ 732.081700] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 732.087245] ? security_capable+0x99/0xc0 [ 732.091415] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 732.096966] ? ns_capable_common+0x13f/0x170 [ 732.101386] ? get_anon_bdev+0x2f0/0x2f0 [ 732.105456] ? sget+0x113/0x150 [ 732.108752] ? fuse_get_root_inode+0x190/0x190 [ 732.113347] mount_nodev+0x6b/0x110 [ 732.116984] fuse_mount+0x2c/0x40 2018/05/13 06:34:36 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000000000000000000000100"}}) [ 732.120445] mount_fs+0xae/0x328 [ 732.123825] vfs_kern_mount.part.34+0xd4/0x4d0 [ 732.128416] ? may_umount+0xb0/0xb0 [ 732.132047] ? _raw_read_unlock+0x22/0x30 [ 732.136197] ? __get_fs_type+0x97/0xc0 [ 732.140092] do_mount+0x564/0x3070 [ 732.143643] ? copy_mount_string+0x40/0x40 [ 732.147888] ? rcu_pm_notify+0xc0/0xc0 [ 732.151787] ? copy_mount_options+0x5f/0x380 [ 732.156204] ? rcu_read_lock_sched_held+0x108/0x120 [ 732.162353] ? kmem_cache_alloc_trace+0x616/0x780 2018/05/13 06:34:36 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000248e405d163400"}}) [ 732.167207] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 732.172759] ? _copy_from_user+0xdf/0x150 [ 732.176923] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 732.182475] ? copy_mount_options+0x285/0x380 [ 732.186992] ksys_mount+0x12d/0x140 [ 732.188477] IPVS: Unknown mcast interface: rose0 [ 732.190631] __x64_sys_mount+0xbe/0x150 [ 732.190647] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 732.190666] do_syscall_64+0x1b1/0x800 [ 732.190684] ? finish_task_switch+0x1ca/0x810 [ 732.190702] ? syscall_return_slowpath+0x5c0/0x5c0 [ 732.190719] ? syscall_return_slowpath+0x30f/0x5c0 [ 732.190739] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 732.190762] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 732.232887] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 732.234204] IPVS: Unknown mcast interface: rose0 [ 732.238095] RIP: 0033:0x455979 [ 732.238104] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 732.238120] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 732.238129] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 732.238138] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 732.238147] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 732.238155] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 732.380359] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 2018/05/13 06:34:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0xf0ff7f00000000}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:37 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000000000000000f0ffffff7f00"}}) 2018/05/13 06:34:37 executing program 1 (fault-call:3 fault-nth:45): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:34:37 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000600"}}) 2018/05/13 06:34:37 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x2000000, 0x1000000000282) 2018/05/13 06:34:37 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000000000000000000340"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:37 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, 0x0) sync() lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)=@known='security.capability\x00', &(0x7f0000001140)=""/121, 0x79) 2018/05/13 06:34:37 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0x4000000}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) [ 732.716581] IPVS: Unknown mcast interface: rose0 [ 732.747316] IPVS: Unknown mcast interface: rose0 [ 732.777904] FAULT_INJECTION: forcing a failure. [ 732.777904] name failslab, interval 1, probability 0, space 0, times 0 [ 732.779243] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 732.789286] CPU: 0 PID: 18037 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 732.789301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 732.813547] Call Trace: [ 732.816154] dump_stack+0x1b9/0x294 [ 732.819807] ? dump_stack_print_info.cold.2+0x52/0x52 [ 732.825012] ? is_bpf_text_address+0xd7/0x170 [ 732.829523] ? kernel_text_address+0x79/0xf0 [ 732.833948] should_fail.cold.4+0xa/0x1a [ 732.838025] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 732.843149] ? graph_lock+0x170/0x170 [ 732.846966] ? save_stack+0xa9/0xd0 [ 732.850616] ? save_stack+0x43/0xd0 [ 732.854259] ? kasan_kmalloc+0xc4/0xe0 [ 732.858166] ? find_held_lock+0x36/0x1c0 [ 732.862247] ? __lock_is_held+0xb5/0x140 [ 732.866337] ? check_same_owner+0x320/0x320 [ 732.870672] ? rcu_note_context_switch+0x710/0x710 [ 732.875636] __should_failslab+0x124/0x180 [ 732.879887] should_failslab+0x9/0x14 [ 732.883712] kmem_cache_alloc_trace+0x2cb/0x780 [ 732.888404] ? refcount_add_not_zero+0x320/0x320 [ 732.893186] device_private_init+0x98/0x230 [ 732.897522] ? virtual_device_parent+0x60/0x60 [ 732.902121] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 732.907679] ? refcount_inc+0x29/0x70 [ 732.911509] device_add+0xe98/0x16d0 [ 732.915259] ? device_private_init+0x230/0x230 [ 732.919850] ? kfree+0x1e9/0x260 [ 732.923226] ? kfree_const+0x5e/0x70 [ 732.926951] device_create_groups_vargs+0x1ff/0x270 [ 732.931983] device_create_vargs+0x46/0x60 [ 732.936229] bdi_register_va.part.10+0xbb/0x9b0 [ 732.940911] ? cgwb_kill+0x630/0x630 [ 732.944640] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 732.950184] ? bdi_init+0x416/0x510 [ 732.953818] ? wb_init+0x9e0/0x9e0 [ 732.957363] ? bdi_alloc_node+0x67/0xe0 [ 732.961345] ? bdi_alloc_node+0x67/0xe0 [ 732.965713] ? rcu_read_lock_sched_held+0x108/0x120 [ 732.970751] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 732.976048] ? _raw_spin_unlock+0x22/0x30 [ 732.980217] bdi_register_va+0x68/0x80 [ 732.984118] super_setup_bdi_name+0x123/0x220 [ 732.988629] ? kill_block_super+0x100/0x100 [ 732.992967] ? kmem_cache_alloc_trace+0x616/0x780 [ 732.997825] ? match_wildcard+0x3c0/0x3c0 [ 733.001982] ? trace_hardirqs_on+0xd/0x10 [ 733.006145] fuse_fill_super+0xe6e/0x1e20 [ 733.010305] ? fuse_get_root_inode+0x190/0x190 [ 733.015808] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 733.020837] ? kasan_check_read+0x11/0x20 [ 733.024998] ? cap_capable+0x1f9/0x260 [ 733.028905] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 733.034453] ? security_capable+0x99/0xc0 [ 733.038614] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 733.044168] ? ns_capable_common+0x13f/0x170 [ 733.048592] ? get_anon_bdev+0x2f0/0x2f0 [ 733.052660] ? sget+0x113/0x150 [ 733.055951] ? fuse_get_root_inode+0x190/0x190 [ 733.060546] mount_nodev+0x6b/0x110 [ 733.064183] fuse_mount+0x2c/0x40 [ 733.067647] mount_fs+0xae/0x328 [ 733.071031] vfs_kern_mount.part.34+0xd4/0x4d0 [ 733.075619] ? may_umount+0xb0/0xb0 [ 733.079247] ? _raw_read_unlock+0x22/0x30 [ 733.083404] ? __get_fs_type+0x97/0xc0 [ 733.087301] do_mount+0x564/0x3070 [ 733.090851] ? copy_mount_string+0x40/0x40 [ 733.095094] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 733.099863] ? retint_kernel+0x10/0x10 [ 733.103769] ? copy_mount_options+0x1a1/0x380 [ 733.108276] ? __sanitizer_cov_trace_pc+0x38/0x50 [ 733.113132] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 733.118694] ? copy_mount_options+0x285/0x380 [ 733.123202] ksys_mount+0x12d/0x140 [ 733.126838] __x64_sys_mount+0xbe/0x150 [ 733.130822] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 733.135851] do_syscall_64+0x1b1/0x800 [ 733.139750] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 733.144600] ? syscall_return_slowpath+0x5c0/0x5c0 [ 733.149543] ? syscall_return_slowpath+0x30f/0x5c0 [ 733.154486] ? retint_user+0x18/0x18 [ 733.158216] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 733.163073] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 733.168270] RIP: 0033:0x455979 [ 733.171463] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/05/13 06:34:37 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x9, 0x1000000000282) 2018/05/13 06:34:37 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000d24000"}}) 2018/05/13 06:34:37 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0xa, 0x1000000000282) 2018/05/13 06:34:37 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000034165d4000"}}) 2018/05/13 06:34:37 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x5, 0x1000000000282) 2018/05/13 06:34:37 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000000000000000500"}}) 2018/05/13 06:34:37 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000000400"}}) 2018/05/13 06:34:37 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x11, 0x1000000000282) [ 733.179179] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 733.186458] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 733.193736] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 733.201016] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 733.208294] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 733.283293] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 2018/05/13 06:34:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0x61afff7f}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:38 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000000000000000000000200"}}) 2018/05/13 06:34:38 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x400000000000000, 0x1000000000282) 2018/05/13 06:34:38 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000fffffe00"}}) 2018/05/13 06:34:38 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:38 executing program 1 (fault-call:3 fault-nth:46): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:34:38 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, 0x0) sync() lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c, 0x0) setsockopt$inet6_int(r0, 0x29, 0xff, &(0x7f0000000140)=0x7, 0x4) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000001140)=""/121, 0x56) 2018/05/13 06:34:38 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0x1d400000}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) [ 733.594709] IPVS: Unknown mcast interface: rose0 [ 733.622360] IPVS: Unknown mcast interface: rose0 [ 733.636008] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 2018/05/13 06:34:38 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00'}}) 2018/05/13 06:34:38 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 733.669275] FAULT_INJECTION: forcing a failure. [ 733.669275] name failslab, interval 1, probability 0, space 0, times 0 [ 733.680814] CPU: 1 PID: 18099 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 733.688104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 733.697474] Call Trace: [ 733.700078] dump_stack+0x1b9/0x294 [ 733.703721] ? dump_stack_print_info.cold.2+0x52/0x52 [ 733.708937] should_fail.cold.4+0xa/0x1a [ 733.713018] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/05/13 06:34:38 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000000000000000000000248e405d163400"}}) [ 733.718151] ? trace_hardirqs_on+0xd/0x10 [ 733.722315] ? graph_lock+0x170/0x170 [ 733.726145] ? graph_lock+0x170/0x170 [ 733.729962] ? find_held_lock+0x36/0x1c0 [ 733.734041] ? __lock_is_held+0xb5/0x140 [ 733.738136] ? check_same_owner+0x320/0x320 [ 733.742432] IPVS: Unknown mcast interface: rose0 [ 733.742474] ? rcu_note_context_switch+0x710/0x710 [ 733.752155] __should_failslab+0x124/0x180 [ 733.756405] should_failslab+0x9/0x14 [ 733.760217] kmem_cache_alloc_trace+0x2cb/0x780 [ 733.763199] IPVS: Unknown mcast interface: rose0 2018/05/13 06:34:38 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000200"}}) [ 733.764901] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 733.764923] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 733.764946] wb_congested_get_create+0x1ca/0x450 [ 733.764963] ? wb_wakeup_delayed+0xf0/0xf0 [ 733.764983] ? __lockdep_init_map+0x105/0x590 [ 733.793303] wb_init+0x62e/0x9e0 [ 733.796684] ? bdi_put+0x180/0x180 [ 733.800238] ? mark_held_locks+0xc9/0x160 [ 733.804392] ? do_mount+0x564/0x3070 [ 733.808125] ? __raw_spin_lock_init+0x1c/0x100 [ 733.812723] ? mark_held_locks+0xc9/0x160 2018/05/13 06:34:38 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000000000000000000000000ffffffff00"}}) 2018/05/13 06:34:38 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\x00\x00\x00\x00\x00 \x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 733.816878] ? __raw_spin_lock_init+0x1c/0x100 [ 733.821460] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 733.826484] ? lockdep_init_map+0x9/0x10 [ 733.830560] bdi_init+0x353/0x510 [ 733.834023] ? wb_init+0x9e0/0x9e0 [ 733.837573] ? bdi_alloc_node+0x67/0xe0 [ 733.841553] ? bdi_alloc_node+0x67/0xe0 [ 733.845533] ? rcu_read_lock_sched_held+0x108/0x120 [ 733.850557] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 733.855846] ? _raw_spin_unlock+0x22/0x30 [ 733.860005] bdi_alloc_node+0x81/0xe0 [ 733.863371] IPVS: Unknown mcast interface: rose0 2018/05/13 06:34:38 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000009016a66800"}}) 2018/05/13 06:34:38 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000000000000000ffffff8d00"}}) [ 733.863812] super_setup_bdi_name+0x8b/0x220 [ 733.872961] ? kill_block_super+0x100/0x100 [ 733.877288] ? rcu_read_lock_sched_held+0x108/0x120 [ 733.882313] ? kmem_cache_alloc_trace+0x616/0x780 [ 733.887166] ? match_wildcard+0x3c0/0x3c0 [ 733.887601] IPVS: Unknown mcast interface: rose0 [ 733.891315] ? trace_hardirqs_on+0xd/0x10 [ 733.891339] fuse_fill_super+0xe6e/0x1e20 [ 733.891361] ? fuse_get_root_inode+0x190/0x190 [ 733.891380] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 733.891400] ? kasan_check_read+0x11/0x20 [ 733.918165] ? cap_capable+0x1f9/0x260 [ 733.922076] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 733.927635] ? security_capable+0x99/0xc0 [ 733.931797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 733.937348] ? ns_capable_common+0x13f/0x170 [ 733.941773] ? get_anon_bdev+0x2f0/0x2f0 [ 733.945844] ? sget+0x113/0x150 [ 733.949155] ? fuse_get_root_inode+0x190/0x190 [ 733.953749] mount_nodev+0x6b/0x110 [ 733.957396] fuse_mount+0x2c/0x40 [ 733.961124] mount_fs+0xae/0x328 [ 733.964507] vfs_kern_mount.part.34+0xd4/0x4d0 [ 733.969105] ? may_umount+0xb0/0xb0 [ 733.972746] ? _raw_read_unlock+0x22/0x30 [ 733.976896] ? __get_fs_type+0x97/0xc0 [ 733.980797] do_mount+0x564/0x3070 [ 733.984348] ? do_raw_spin_unlock+0x9e/0x2e0 [ 733.988768] ? copy_mount_string+0x40/0x40 [ 733.993007] ? rcu_pm_notify+0xc0/0xc0 [ 733.996906] ? copy_mount_options+0x5f/0x380 [ 734.001320] ? rcu_read_lock_sched_held+0x108/0x120 [ 734.006345] ? kmem_cache_alloc_trace+0x616/0x780 [ 734.011202] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 734.016755] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 734.022305] ? copy_mount_options+0x285/0x380 [ 734.026814] ksys_mount+0x12d/0x140 [ 734.030544] __x64_sys_mount+0xbe/0x150 [ 734.034527] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 734.039561] do_syscall_64+0x1b1/0x800 [ 734.043463] ? finish_task_switch+0x1ca/0x810 [ 734.047970] ? syscall_return_slowpath+0x5c0/0x5c0 [ 734.052911] ? syscall_return_slowpath+0x30f/0x5c0 [ 734.057861] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 734.063250] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 734.068116] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 734.073312] RIP: 0033:0x455979 [ 734.076504] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 734.084221] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 734.091496] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 734.098770] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 734.106046] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 734.113324] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 734.188149] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 2018/05/13 06:34:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121"}, 0x20003e80, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:38 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\x00\x00\x00`\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:38 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000000300"}}) 2018/05/13 06:34:38 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000000000000000000200"}}) 2018/05/13 06:34:38 executing program 1 (fault-call:3 fault-nth:47): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:34:38 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0xf00000000000000, 0x1000000000282) 2018/05/13 06:34:38 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000640)=[{&(0x7f00000004c0)="91c94dcc51", 0x5, 0x5}, {&(0x7f0000000500)="ff20c8e687d1d2d675b7de72e220565387cd8f7d3d26738accff302787982442157d4b0ee47cbbae7b1d2a558a1b53c6d9fe77477293fc14caf7ce33912f0c0fa63337a9e30f4a94f17dbb44121a62dfd229744b3848bd90ecf7648d56028d5b9de83dbcd07ab6849c4167f7c534a92e529b8d56e810c8bf76b93f6ae71d26f199d73844eed09f1c961a9a7ce04f76fe3bfbf5942fa71f7058d050bc3d3b47a845e0abc7365923791d1b3bdde201bd00c547e4e09ea18da370d4f566d8858b4f2961ada08493a50a8861025df12d431ca220f6b3dba58397", 0xd8, 0x20}, {&(0x7f00000011c0)="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", 0x1000, 0xfffffffffffffffc}, {&(0x7f0000000600)="dd4b1de1981a7da368e4f1d977d4c596e2104003411dc511927d9c8f1d6065b4fc67d5a6fb909faba8d110642e79", 0x2e, 0x100000001}], 0x0, 0x0) sync() r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x8000, 0x0) lsetxattr(&(0x7f0000000400)='./file0\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB="000000000000000005950ac4de0bf7e118c87fbb83969ea92986c6d33002779b166a5809c378603304793f330fdab177d0110ccb9da3ba753820733b0ca9b27b9e8f693a"], &(0x7f0000000480)='\x00', 0x1, 0x3) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f0000000140)) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000001140)=""/121, 0x56) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000300)=""/244) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000080)='./file0\x00', r0}, 0x10) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000440)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f0000000740)={r1}) 2018/05/13 06:34:38 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0x40020020}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) [ 734.472268] IPVS: Unknown mcast interface: rose0 [ 734.497816] IPVS: Unknown mcast interface: rose0 2018/05/13 06:34:39 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x6000000, 0x1000000000282) [ 734.529306] FAULT_INJECTION: forcing a failure. [ 734.529306] name failslab, interval 1, probability 0, space 0, times 0 [ 734.540712] CPU: 1 PID: 18176 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 734.547993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 734.557354] Call Trace: [ 734.559962] dump_stack+0x1b9/0x294 [ 734.563608] ? dump_stack_print_info.cold.2+0x52/0x52 [ 734.568807] ? is_bpf_text_address+0xd7/0x170 [ 734.573315] ? kernel_text_address+0x79/0xf0 2018/05/13 06:34:39 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000000000000000000400"}}) 2018/05/13 06:34:39 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\x00\x00\t\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:39 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) [ 734.577746] should_fail.cold.4+0xa/0x1a [ 734.581822] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 734.586943] ? graph_lock+0x170/0x170 [ 734.590755] ? save_stack+0xa9/0xd0 [ 734.594393] ? save_stack+0x43/0xd0 [ 734.598033] ? kasan_kmalloc+0xc4/0xe0 [ 734.601936] ? find_held_lock+0x36/0x1c0 [ 734.606017] ? __lock_is_held+0xb5/0x140 [ 734.610091] ? fib_rules_lookup+0xa60/0xcb0 [ 734.614431] ? check_same_owner+0x320/0x320 [ 734.618770] ? rcu_note_context_switch+0x710/0x710 [ 734.623713] __should_failslab+0x124/0x180 [ 734.627961] should_failslab+0x9/0x14 [ 734.631771] kmem_cache_alloc_trace+0x2cb/0x780 [ 734.636455] ? refcount_add_not_zero+0x320/0x320 [ 734.641232] device_private_init+0x98/0x230 [ 734.645572] ? virtual_device_parent+0x60/0x60 [ 734.650170] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 734.655715] ? refcount_inc+0x29/0x70 [ 734.659529] device_add+0xe98/0x16d0 [ 734.663258] ? device_private_init+0x230/0x230 [ 734.667854] ? kfree+0x1e9/0x260 [ 734.671247] ? kfree_const+0x5e/0x70 [ 734.674978] device_create_groups_vargs+0x1ff/0x270 [ 734.677266] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 734.680004] device_create_vargs+0x46/0x60 [ 734.680028] bdi_register_va.part.10+0xbb/0x9b0 [ 734.680049] ? cgwb_kill+0x630/0x630 [ 734.680070] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 734.680083] ? bdi_init+0x416/0x510 [ 734.680100] ? wb_init+0x9e0/0x9e0 [ 734.712976] ? bdi_alloc_node+0x67/0xe0 [ 734.716964] ? bdi_alloc_node+0x67/0xe0 [ 734.720946] ? rcu_read_lock_sched_held+0x108/0x120 2018/05/13 06:34:39 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x8000000, 0x1000000000282) [ 734.725972] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 734.731267] ? _raw_spin_unlock+0x22/0x30 [ 734.732603] IPVS: Unknown mcast interface: rose0 [ 734.735423] bdi_register_va+0x68/0x80 [ 734.735443] super_setup_bdi_name+0x123/0x220 [ 734.735459] ? kill_block_super+0x100/0x100 [ 734.735479] ? kmem_cache_alloc_trace+0x616/0x780 [ 734.735495] ? match_wildcard+0x3c0/0x3c0 [ 734.735512] ? trace_hardirqs_on+0xd/0x10 [ 734.735533] fuse_fill_super+0xe6e/0x1e20 [ 734.735551] ? fuse_get_root_inode+0x190/0x190 [ 734.774775] ? __alloc_pages_slowpath+0x2db0/0x2db0 2018/05/13 06:34:39 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000000000000000000000000000000100"}}) [ 734.779815] ? kasan_check_read+0x11/0x20 [ 734.783980] ? cap_capable+0x1f9/0x260 [ 734.787891] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 734.792896] IPVS: Unknown mcast interface: rose0 [ 734.793435] ? security_capable+0x99/0xc0 [ 734.793458] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 734.793474] ? ns_capable_common+0x13f/0x170 [ 734.793492] ? get_anon_bdev+0x2f0/0x2f0 [ 734.793503] ? sget+0x113/0x150 [ 734.793521] ? fuse_get_root_inode+0x190/0x190 [ 734.824353] mount_nodev+0x6b/0x110 2018/05/13 06:34:39 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 2018/05/13 06:34:39 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000000001000"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 734.827997] fuse_mount+0x2c/0x40 [ 734.831470] mount_fs+0xae/0x328 [ 734.834845] vfs_kern_mount.part.34+0xd4/0x4d0 [ 734.839432] ? may_umount+0xb0/0xb0 [ 734.843066] ? _raw_read_unlock+0x22/0x30 [ 734.848128] ? __get_fs_type+0x97/0xc0 [ 734.852038] do_mount+0x564/0x3070 [ 734.855595] ? copy_mount_string+0x40/0x40 [ 734.859842] ? rcu_pm_notify+0xc0/0xc0 [ 734.863750] ? copy_mount_options+0x5f/0x380 [ 734.868166] ? rcu_read_lock_sched_held+0x108/0x120 [ 734.873192] ? kmem_cache_alloc_trace+0x616/0x780 [ 734.878057] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 734.883605] ? _copy_from_user+0xdf/0x150 [ 734.887768] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 734.893314] ? copy_mount_options+0x285/0x380 [ 734.897829] ksys_mount+0x12d/0x140 [ 734.901470] __x64_sys_mount+0xbe/0x150 [ 734.905453] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 734.905876] IPVS: Unknown mcast interface: rose0 [ 734.910475] do_syscall_64+0x1b1/0x800 [ 734.910494] ? syscall_return_slowpath+0x5c0/0x5c0 [ 734.910511] ? syscall_return_slowpath+0x30f/0x5c0 [ 734.910530] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 734.910551] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 734.910571] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 734.910582] RIP: 0033:0x455979 [ 734.910589] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 734.910611] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 734.950554] IPVS: Unknown mcast interface: rose0 [ 734.955306] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 734.955316] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 734.955324] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 734.955332] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 735.067392] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 2018/05/13 06:34:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121"}, 0x7ffff000, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:39 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x2040000, 0x1000000000282) 2018/05/13 06:34:39 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00'}}) 2018/05/13 06:34:39 executing program 1 (fault-call:3 fault-nth:48): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:34:39 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:39 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000000000000000000000000f00"}}) 2018/05/13 06:34:39 executing program 5: syz_mount_image$bfs(&(0x7f00000011c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x0, &(0x7f0000000080), 0x8000, 0x0) sync() socket$inet_dccp(0x2, 0x6, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000001140)=""/121, 0x56) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x20, 0x420000) ioctl$DRM_IOCTL_AGP_INFO(r0, 0x80386433, &(0x7f0000000140)=""/4096) 2018/05/13 06:34:39 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0x1100}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) [ 735.357898] IPVS: Unknown mcast interface: rose0 [ 735.372245] FAULT_INJECTION: forcing a failure. [ 735.372245] name failslab, interval 1, probability 0, space 0, times 0 [ 735.383642] CPU: 0 PID: 18234 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 735.390931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 735.393703] IPVS: Unknown mcast interface: rose0 [ 735.400287] Call Trace: [ 735.400315] dump_stack+0x1b9/0x294 [ 735.400338] ? dump_stack_print_info.cold.2+0x52/0x52 [ 735.400362] should_fail.cold.4+0xa/0x1a [ 735.400381] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 735.425672] ? graph_lock+0x170/0x170 [ 735.429497] ? find_held_lock+0x36/0x1c0 [ 735.433578] ? __lock_is_held+0xb5/0x140 [ 735.437669] ? check_same_owner+0x320/0x320 [ 735.442006] ? rcu_note_context_switch+0x710/0x710 [ 735.446950] ? check_same_owner+0x320/0x320 [ 735.451293] __should_failslab+0x124/0x180 [ 735.455550] should_failslab+0x9/0x14 [ 735.459367] __kmalloc_track_caller+0x2c4/0x760 [ 735.464044] ? debug_check_no_locks_freed+0x310/0x310 [ 735.469230] ? kasan_check_write+0x14/0x20 [ 735.473467] ? __mutex_lock+0x7d9/0x17f0 [ 735.477526] ? kstrdup_const+0x66/0x80 [ 735.481404] kstrdup+0x39/0x70 [ 735.484589] kstrdup_const+0x66/0x80 [ 735.488292] __kernfs_new_node+0xa8/0x580 [ 735.492430] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 735.497186] ? lock_downgrade+0x8e0/0x8e0 [ 735.501325] kernfs_new_node+0x80/0xf0 [ 735.505208] kernfs_create_dir_ns+0x3d/0x140 [ 735.509604] sysfs_create_dir_ns+0xbe/0x1d0 [ 735.513926] kobject_add_internal+0x354/0xac0 [ 735.518410] ? kobj_ns_type_registered+0x60/0x60 [ 735.523156] ? lock_downgrade+0x8e0/0x8e0 [ 735.527293] ? refcount_add_not_zero+0x320/0x320 [ 735.532039] ? kasan_check_read+0x11/0x20 [ 735.536177] kobject_add+0x13a/0x190 [ 735.539890] ? kset_create_and_add+0x190/0x190 [ 735.544465] ? mutex_unlock+0xd/0x10 [ 735.548168] device_add+0x3a5/0x16d0 [ 735.551872] ? device_private_init+0x230/0x230 [ 735.556458] ? kfree+0x1e9/0x260 [ 735.559816] ? kfree_const+0x5e/0x70 [ 735.563539] device_create_groups_vargs+0x1ff/0x270 [ 735.568556] device_create_vargs+0x46/0x60 [ 735.572780] bdi_register_va.part.10+0xbb/0x9b0 [ 735.577435] ? cgwb_kill+0x630/0x630 [ 735.581146] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 735.586670] ? bdi_init+0x416/0x510 [ 735.590284] ? wb_init+0x9e0/0x9e0 [ 735.593814] ? bdi_alloc_node+0x67/0xe0 [ 735.597771] ? bdi_alloc_node+0x67/0xe0 [ 735.601732] ? rcu_read_lock_sched_held+0x108/0x120 [ 735.606737] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 735.612011] ? _raw_spin_unlock+0x22/0x30 [ 735.616150] bdi_register_va+0x68/0x80 [ 735.620030] super_setup_bdi_name+0x123/0x220 [ 735.624516] ? kill_block_super+0x100/0x100 [ 735.628825] ? kmem_cache_alloc_trace+0x616/0x780 [ 735.633660] ? match_wildcard+0x3c0/0x3c0 [ 735.637796] ? trace_hardirqs_on+0xd/0x10 [ 735.641952] fuse_fill_super+0xe6e/0x1e20 [ 735.646095] ? fuse_get_root_inode+0x190/0x190 [ 735.650675] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 735.655681] ? kasan_check_read+0x11/0x20 [ 735.659817] ? cap_capable+0x1f9/0x260 [ 735.663696] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 735.669218] ? security_capable+0x99/0xc0 [ 735.673357] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 735.678881] ? ns_capable_common+0x13f/0x170 [ 735.683296] ? get_anon_bdev+0x2f0/0x2f0 [ 735.687357] ? sget+0x113/0x150 [ 735.690629] ? fuse_get_root_inode+0x190/0x190 [ 735.695198] mount_nodev+0x6b/0x110 [ 735.698811] fuse_mount+0x2c/0x40 [ 735.702252] mount_fs+0xae/0x328 [ 735.705609] vfs_kern_mount.part.34+0xd4/0x4d0 [ 735.710178] ? may_umount+0xb0/0xb0 [ 735.713793] ? _raw_read_unlock+0x22/0x30 [ 735.717929] ? __get_fs_type+0x97/0xc0 [ 735.721810] do_mount+0x564/0x3070 [ 735.725361] ? copy_mount_string+0x40/0x40 [ 735.729588] ? rcu_pm_notify+0xc0/0xc0 [ 735.733482] ? copy_mount_options+0x5f/0x380 [ 735.737883] ? rcu_read_lock_sched_held+0x108/0x120 [ 735.742888] ? kmem_cache_alloc_trace+0x616/0x780 [ 735.747721] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 735.753247] ? _copy_from_user+0xdf/0x150 [ 735.757398] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 735.762925] ? copy_mount_options+0x285/0x380 [ 735.767417] ksys_mount+0x12d/0x140 [ 735.771041] __x64_sys_mount+0xbe/0x150 [ 735.775007] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 735.780022] do_syscall_64+0x1b1/0x800 [ 735.783898] ? finish_task_switch+0x1ca/0x810 [ 735.788383] ? syscall_return_slowpath+0x5c0/0x5c0 [ 735.793301] ? syscall_return_slowpath+0x30f/0x5c0 [ 735.798225] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 735.803578] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 735.808420] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 735.813601] RIP: 0033:0x455979 [ 735.816785] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 735.824484] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 735.831741] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 735.838998] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 735.846256] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 2018/05/13 06:34:40 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000000000000000ffffff"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:40 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x600, 0x1000000000282) 2018/05/13 06:34:40 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) [ 735.853524] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 735.861193] kobject_add_internal failed for 0:45 (error: -12 parent: bdi) [ 735.882342] IPVS: Unknown mcast interface: rose0 [ 735.889783] IPVS: Unknown mcast interface: rose0 2018/05/13 06:34:40 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000000600"}}) 2018/05/13 06:34:40 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\x00\x00\x00\a\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:40 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x300, 0x1000000000282) 2018/05/13 06:34:40 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000000000000000008dffffff00"}}) [ 735.982839] IPVS: Unknown mcast interface: rose0 [ 736.000575] IPVS: Unknown mcast interface: rose0 2018/05/13 06:34:40 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000034165d408e2400"}}) 2018/05/13 06:34:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121"}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:40 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\x00\x00\x00\n\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:40 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x804, 0x1000000000282) 2018/05/13 06:34:40 executing program 1 (fault-call:3 fault-nth:49): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:34:40 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000000000000000000000000000000500"}}) 2018/05/13 06:34:40 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000300"}}) 2018/05/13 06:34:40 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121", 0xbc00}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:40 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, 0x0) sync() lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x2, 0x8202) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000180)={0x0, 0x7f}, &(0x7f00000001c0)=0x8) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000001140)=""/121, 0x56) [ 736.276373] IPVS: Unknown mcast interface: rose0 [ 736.279466] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 736.302596] IPVS: Unknown mcast interface: rose0 [ 736.333644] FAULT_INJECTION: forcing a failure. [ 736.333644] name failslab, interval 1, probability 0, space 0, times 0 [ 736.345209] CPU: 0 PID: 18300 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 736.352503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 736.361866] Call Trace: [ 736.364470] dump_stack+0x1b9/0x294 [ 736.368110] ? dump_stack_print_info.cold.2+0x52/0x52 [ 736.373316] should_fail.cold.4+0xa/0x1a [ 736.377392] ? __kmalloc_track_caller+0x14a/0x760 2018/05/13 06:34:40 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000000000000000000000000034165d4000"}}) 2018/05/13 06:34:40 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0xb04, 0x1000000000282) 2018/05/13 06:34:40 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000000000200"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 736.382247] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 736.387361] ? device_add+0x3a5/0x16d0 [ 736.391271] ? device_create_groups_vargs+0x1ff/0x270 [ 736.396473] ? device_create_vargs+0x46/0x60 [ 736.400893] ? bdi_register_va.part.10+0xbb/0x9b0 [ 736.405742] ? bdi_register_va+0x68/0x80 [ 736.409812] ? super_setup_bdi_name+0x123/0x220 [ 736.414486] ? fuse_fill_super+0xe6e/0x1e20 [ 736.418818] ? graph_lock+0x170/0x170 [ 736.422629] ? do_mount+0x564/0x3070 [ 736.426348] ? ksys_mount+0x12d/0x140 [ 736.430159] ? __x64_sys_mount+0xbe/0x150 2018/05/13 06:34:40 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000f00"}}) [ 736.434313] ? do_syscall_64+0x1b1/0x800 [ 736.438386] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 736.443763] ? find_held_lock+0x36/0x1c0 [ 736.447839] ? __lock_is_held+0xb5/0x140 [ 736.451929] ? check_same_owner+0x320/0x320 [ 736.456264] ? rcu_note_context_switch+0x710/0x710 [ 736.461208] ? rcu_read_lock_sched_held+0x108/0x120 [ 736.466241] __should_failslab+0x124/0x180 [ 736.470492] should_failslab+0x9/0x14 [ 736.474305] kmem_cache_alloc+0x2af/0x760 [ 736.478466] ? memcpy+0x45/0x50 2018/05/13 06:34:40 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000000000000000fffffe00"}}) [ 736.481761] ? kstrdup+0x59/0x70 [ 736.485145] __kernfs_new_node+0xe7/0x580 [ 736.489310] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 736.494087] ? lock_downgrade+0x8e0/0x8e0 [ 736.498262] kernfs_new_node+0x80/0xf0 [ 736.502176] kernfs_create_dir_ns+0x3d/0x140 [ 736.506609] sysfs_create_dir_ns+0xbe/0x1d0 [ 736.510945] kobject_add_internal+0x354/0xac0 [ 736.515461] ? kobj_ns_type_registered+0x60/0x60 [ 736.520232] ? lock_downgrade+0x8e0/0x8e0 [ 736.524404] ? refcount_add_not_zero+0x320/0x320 [ 736.529171] ? kasan_check_read+0x11/0x20 2018/05/13 06:34:41 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000500"}}) [ 736.533326] kobject_add+0x13a/0x190 [ 736.537047] ? kset_create_and_add+0x190/0x190 [ 736.541640] ? mutex_unlock+0xd/0x10 [ 736.545371] device_add+0x3a5/0x16d0 [ 736.549098] ? device_private_init+0x230/0x230 [ 736.553690] ? kfree+0x1e9/0x260 [ 736.557068] ? kfree_const+0x5e/0x70 [ 736.558617] IPVS: Unknown mcast interface: rose0 [ 736.560789] device_create_groups_vargs+0x1ff/0x270 [ 736.560809] device_create_vargs+0x46/0x60 [ 736.560830] bdi_register_va.part.10+0xbb/0x9b0 [ 736.560847] ? cgwb_kill+0x630/0x630 2018/05/13 06:34:41 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x40a, 0x1000000000282) [ 736.560866] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 736.560879] ? bdi_init+0x416/0x510 [ 736.560891] ? wb_init+0x9e0/0x9e0 [ 736.560907] ? bdi_alloc_node+0x67/0xe0 [ 736.599883] ? bdi_alloc_node+0x67/0xe0 [ 736.603868] ? rcu_read_lock_sched_held+0x108/0x120 [ 736.608900] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 736.614188] ? _raw_spin_unlock+0x22/0x30 [ 736.618354] bdi_register_va+0x68/0x80 [ 736.622269] super_setup_bdi_name+0x123/0x220 [ 736.626773] ? kill_block_super+0x100/0x100 [ 736.631106] ? kmem_cache_alloc_trace+0x616/0x780 [ 736.635959] ? match_wildcard+0x3c0/0x3c0 [ 736.640115] ? trace_hardirqs_on+0xd/0x10 [ 736.644272] fuse_fill_super+0xe6e/0x1e20 [ 736.648435] ? fuse_get_root_inode+0x190/0x190 [ 736.653024] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 736.658059] ? kasan_check_read+0x11/0x20 [ 736.662241] ? cap_capable+0x1f9/0x260 [ 736.666152] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 736.671700] ? security_capable+0x99/0xc0 [ 736.675864] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 2018/05/13 06:34:41 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x408, 0x1000000000282) [ 736.681412] ? ns_capable_common+0x13f/0x170 [ 736.682353] IPVS: Unknown mcast interface: rose0 [ 736.685830] ? get_anon_bdev+0x2f0/0x2f0 [ 736.685845] ? sget+0x113/0x150 [ 736.685863] ? fuse_get_root_inode+0x190/0x190 [ 736.685879] mount_nodev+0x6b/0x110 [ 736.685896] fuse_mount+0x2c/0x40 [ 736.685913] mount_fs+0xae/0x328 [ 736.685933] vfs_kern_mount.part.34+0xd4/0x4d0 [ 736.685949] ? may_umount+0xb0/0xb0 [ 736.685962] ? _raw_read_unlock+0x22/0x30 [ 736.685973] ? __get_fs_type+0x97/0xc0 [ 736.685991] do_mount+0x564/0x3070 [ 736.732753] ? copy_mount_string+0x40/0x40 [ 736.736999] ? rcu_pm_notify+0xc0/0xc0 [ 736.740905] ? copy_mount_options+0x5f/0x380 [ 736.745672] ? rcu_read_lock_sched_held+0x108/0x120 [ 736.750700] ? kmem_cache_alloc_trace+0x616/0x780 [ 736.755565] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 736.761113] ? copy_mount_options+0x285/0x380 [ 736.765627] ksys_mount+0x12d/0x140 [ 736.769269] __x64_sys_mount+0xbe/0x150 [ 736.773256] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 736.778294] do_syscall_64+0x1b1/0x800 [ 736.782193] ? finish_task_switch+0x1ca/0x810 [ 736.786704] ? syscall_return_slowpath+0x5c0/0x5c0 [ 736.791649] ? syscall_return_slowpath+0x30f/0x5c0 [ 736.796592] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 736.801969] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 736.806834] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 736.812037] RIP: 0033:0x455979 [ 736.815233] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 736.822954] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 736.830237] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 736.837522] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 736.844803] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 736.852082] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 736.859446] kobject_add_internal failed for 0:45 (error: -12 parent: bdi) [ 736.914162] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 2018/05/13 06:34:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121"}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:41 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00'}}) 2018/05/13 06:34:41 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\x00\x00\v\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:41 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x900000000000000, 0x1000000000282) 2018/05/13 06:34:41 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 2018/05/13 06:34:41 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, 0x0) sync() socketpair(0x11, 0x6, 0xffff, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) accept4(r1, 0x0, &(0x7f00000002c0), 0x80800) lsetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000001140)=""/121, 0x56) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1f, 0x800) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x8000, 0x0) syz_mount_image$cifs(&(0x7f0000000480)='cifs\x00', &(0x7f00000004c0)='./file0\x00', 0x81, 0x6, &(0x7f0000000900)=[{&(0x7f0000000500)="4d826ae93b3e1ac0cc29d159ebae8666c27335ef4f1fbf3d8cdc477c91af56594ed550a328506234e0880ad9e01fe65d5285cd850a562e8b0c09ce8e437e80d7416934aa63fce0c68ca72a6dbd2fa39e1cb72556ad143be321efa42d040ebb55dd53b94c01987c9b16a3dd1bf7ce068e332ec4f7cd6b212937698af59cfca36646964117640787ae00d27b08cf0a7e7f39a4e7470d1b4fe8793ed1736d91d8db9806a3dec27649d3aa91c78b1d92f974710741a6200b", 0xb6, 0x4}, {&(0x7f00000005c0)="b46a9f08d5e98b51c20dcc1106366ece8532c5c564bbc0a41b3a49673bdad09cf84fe3beb0c0f51eb7067ce480cd074e4841a8a3f78c46a707241115e45bbcc5f37f3782b06c14854025b3fc06e0dd62feb4a685412fb85777618ece90bdd6f44e7c68651a8cd65e3e2963a0c29d3a1559a31cbdc63958d547678d981865f8eb80b1c9de0b6276f319828a18891a5a8f0c03a9e9d2", 0x95, 0x80000001}, {&(0x7f0000000680)="975f6cc004e40ca5ae32", 0xa, 0x3}, {&(0x7f00000006c0)="526372ec42dfed3c9c8b2f3762b26ec3df42f9c0375b7ac93c9c8b09f91277fb5ed7627ae39e61f21feadac8b1bccaef2e7d0f6133fc787694af3698053c3bb14e001351bdd822d006fb437945c3", 0x4e, 0x6}, {&(0x7f0000000740)="8391030f6fd2342d33d93cccc9743c0631b539a6dd74e162a0fd93c27062bfd7cc4af6719f1f2a7965231efe21a2eb5c71f096ed2b3d1504aac5a218d7ebd6a5077329070257ba7058558358663cb78b6f38698d59b7a38dc979d3377e6ff552dd29878dc6da36a9dcf9b5f5f5094d128e7840be98af1f5e317bf90108ce9d806bea2babe76b97a460b8abeaac374c95284a68b036bf28bf698bcadef277bf53f8b9f76b3c7314706fe74ac0dbf04b1a466ba680db9d827e8ff26dc696cff522439c2ec28d40b4809a9692f7cdb82319a694aeff97c1a6e137851f81c9ed1be1fbbbe0ca27c94dd7", 0xe8, 0x6}, {&(0x7f0000000840)="3a3e05d218309beb5c4ad4e95d2a567c05210c13b6768a53fddcf5e1d90fd25eeac5ef11c532d466a09f4f5c11a656bf1139a997fcd0e8f4d9e9ea4ffd653d7932ca554b839b58e72d45c84d9d5ccf950f7d354d889c900a008c4d7e7034df6309699e7be43148a977c59ba5ecd4f8fcf1212b770e5318ab7ab15adb7f09a64cf52718a28d424e6bf670f243358fc692019df54c2901b3b66726da16", 0x9c, 0x8000}], 0x2, &(0x7f00000009c0)='/dev/audio#\x00') sendto$unix(r3, &(0x7f00000001c0)="47a1bd8cd85398b14cb442412eaa935963f1faf75b0a4f51f720ebc9d5c241de504749f56df5a09a824d232298602f5c65fe0a9afdcaf38612cd118032239c707c4b999e078a5610deefc6b06a2c5009471831ab3b6469d449e9d496e6c71bbf79a0b32e7a7c20e6f3bf2533571dcf57bf3181640aca73c85130724382e0fac67bb8320a", 0x84, 0x44000, 0x0, 0x0) renameat2(r2, &(0x7f0000000080)='./file0\x00', r3, &(0x7f0000000180)='./file0\x00', 0x3) readlinkat(r0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)=""/210, 0xd2) 2018/05/13 06:34:41 executing program 1 (fault-call:3 fault-nth:50): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:34:41 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121"}, 0x20003e80, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:41 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0xe04000000000000, 0x1000000000282) [ 737.154718] IPVS: Unknown mcast interface: rose0 [ 737.166999] FAULT_INJECTION: forcing a failure. [ 737.166999] name failslab, interval 1, probability 0, space 0, times 0 [ 737.178886] CPU: 0 PID: 18369 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 737.186182] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 737.195551] Call Trace: [ 737.198158] dump_stack+0x1b9/0x294 2018/05/13 06:34:41 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}}) [ 737.201806] ? dump_stack_print_info.cold.2+0x52/0x52 [ 737.207020] should_fail.cold.4+0xa/0x1a [ 737.211096] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 737.216222] ? graph_lock+0x170/0x170 [ 737.220037] ? print_usage_bug+0xc0/0xc0 [ 737.224112] ? __update_load_avg_blocked_se.isra.33+0x460/0x460 [ 737.230179] ? graph_lock+0x170/0x170 [ 737.233993] ? graph_lock+0x170/0x170 [ 737.237807] ? graph_lock+0x170/0x170 [ 737.241618] ? print_usage_bug+0xc0/0xc0 [ 737.245699] ? print_usage_bug+0xc0/0xc0 [ 737.249773] __should_failslab+0x124/0x180 [ 737.254021] should_failslab+0x9/0x14 [ 737.257837] kmem_cache_alloc+0x47/0x760 [ 737.261914] ? lock_downgrade+0x8e0/0x8e0 [ 737.266081] radix_tree_node_alloc.constprop.19+0x1e6/0x310 [ 737.271814] idr_get_free+0x891/0x10a0 [ 737.275729] ? radix_tree_clear_tags+0xc0/0xc0 [ 737.280331] ? unwind_get_return_address+0x61/0xa0 [ 737.285274] ? __save_stack_trace+0x7e/0xd0 [ 737.286117] IPVS: Unknown mcast interface: rose0 [ 737.289633] ? save_stack+0xa9/0xd0 [ 737.298035] ? save_stack+0x43/0xd0 [ 737.301672] ? kasan_kmalloc+0xc4/0xe0 2018/05/13 06:34:41 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:41 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}}) [ 737.305567] ? kasan_slab_alloc+0x12/0x20 [ 737.309734] ? kmem_cache_alloc+0x12e/0x760 [ 737.314090] ? __kernfs_new_node+0xe7/0x580 [ 737.318418] ? kernfs_new_node+0x80/0xf0 [ 737.322481] ? kernfs_create_dir_ns+0x3d/0x140 [ 737.327068] ? sysfs_create_dir_ns+0xbe/0x1d0 [ 737.331570] ? kobject_add_internal+0x354/0xac0 [ 737.336244] ? kobject_add+0x13a/0x190 [ 737.340140] ? device_create_groups_vargs+0x1ff/0x270 [ 737.345332] ? device_create_vargs+0x46/0x60 [ 737.349741] ? bdi_register_va.part.10+0xbb/0x9b0 [ 737.354593] ? bdi_register_va+0x68/0x80 [ 737.358665] ? super_setup_bdi_name+0x123/0x220 [ 737.363341] ? fuse_fill_super+0xe6e/0x1e20 [ 737.367668] ? mount_nodev+0x6b/0x110 [ 737.370300] IPVS: Unknown mcast interface: rose0 [ 737.371472] ? mount_fs+0xae/0x328 [ 737.371488] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 737.371501] ? do_mount+0x564/0x3070 [ 737.371515] ? ksys_mount+0x12d/0x140 [ 737.371528] ? __x64_sys_mount+0xbe/0x150 [ 737.371543] ? do_syscall_64+0x1b1/0x800 [ 737.371559] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 2018/05/13 06:34:41 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000000200"}}) [ 737.371573] ? print_usage_bug+0xc0/0xc0 [ 737.371594] idr_alloc_u32+0x1f9/0x3d0 [ 737.413574] ? __fprop_inc_percpu_max+0x2c0/0x2c0 [ 737.418431] ? lock_acquire+0x1dc/0x520 [ 737.422417] ? __kernfs_new_node+0x10e/0x580 [ 737.423852] IPVS: Unknown mcast interface: rose0 [ 737.426828] ? __lock_is_held+0xb5/0x140 [ 737.426852] idr_alloc_cyclic+0x167/0x340 [ 737.426872] ? idr_alloc+0x1a0/0x1a0 [ 737.426888] ? kasan_check_write+0x14/0x20 [ 737.426907] ? do_raw_spin_lock+0xc1/0x200 [ 737.451981] __kernfs_new_node+0x1a3/0x580 [ 737.456234] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 737.461010] ? lock_downgrade+0x8e0/0x8e0 [ 737.465178] kernfs_new_node+0x80/0xf0 [ 737.469079] kernfs_create_dir_ns+0x3d/0x140 [ 737.473501] sysfs_create_dir_ns+0xbe/0x1d0 [ 737.477829] kobject_add_internal+0x354/0xac0 [ 737.482337] ? kobj_ns_type_registered+0x60/0x60 [ 737.487104] ? lock_downgrade+0x8e0/0x8e0 [ 737.491267] ? refcount_add_not_zero+0x320/0x320 [ 737.496038] ? kasan_check_read+0x11/0x20 [ 737.500200] kobject_add+0x13a/0x190 2018/05/13 06:34:41 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000500"}}) [ 737.503921] ? kset_create_and_add+0x190/0x190 [ 737.508515] ? mutex_unlock+0xd/0x10 [ 737.512240] device_add+0x3a5/0x16d0 [ 737.515965] ? device_private_init+0x230/0x230 [ 737.520554] ? kfree+0x1e9/0x260 [ 737.523931] ? kfree_const+0x5e/0x70 [ 737.527656] device_create_groups_vargs+0x1ff/0x270 [ 737.532688] device_create_vargs+0x46/0x60 [ 737.536940] bdi_register_va.part.10+0xbb/0x9b0 [ 737.541622] ? cgwb_kill+0x630/0x630 [ 737.545351] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 737.550897] ? bdi_init+0x416/0x510 2018/05/13 06:34:42 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}}) [ 737.554531] ? wb_init+0x9e0/0x9e0 [ 737.558081] ? bdi_alloc_node+0x67/0xe0 [ 737.562059] ? bdi_alloc_node+0x67/0xe0 [ 737.566038] ? rcu_read_lock_sched_held+0x108/0x120 [ 737.571061] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 737.576354] ? _raw_spin_unlock+0x22/0x30 [ 737.580515] bdi_register_va+0x68/0x80 [ 737.584414] super_setup_bdi_name+0x123/0x220 [ 737.588926] ? kill_block_super+0x100/0x100 [ 737.593261] ? kmem_cache_alloc_trace+0x616/0x780 [ 737.598119] ? match_wildcard+0x3c0/0x3c0 [ 737.602285] ? trace_hardirqs_on+0xd/0x10 2018/05/13 06:34:42 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000000100"}}) [ 737.606450] fuse_fill_super+0xe6e/0x1e20 [ 737.610615] ? fuse_get_root_inode+0x190/0x190 [ 737.615212] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 737.620250] ? kasan_check_read+0x11/0x20 [ 737.624412] ? cap_capable+0x1f9/0x260 [ 737.628305] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 737.633844] ? security_capable+0x99/0xc0 [ 737.638004] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 737.643550] ? ns_capable_common+0x13f/0x170 [ 737.647967] ? get_anon_bdev+0x2f0/0x2f0 [ 737.652038] ? sget+0x113/0x150 [ 737.655332] ? fuse_get_root_inode+0x190/0x190 [ 737.659924] mount_nodev+0x6b/0x110 [ 737.663564] fuse_mount+0x2c/0x40 [ 737.667025] mount_fs+0xae/0x328 [ 737.670402] vfs_kern_mount.part.34+0xd4/0x4d0 [ 737.674993] ? may_umount+0xb0/0xb0 [ 737.678629] ? _raw_read_unlock+0x22/0x30 [ 737.682791] ? __get_fs_type+0x97/0xc0 [ 737.686693] do_mount+0x564/0x3070 [ 737.690246] ? copy_mount_string+0x40/0x40 [ 737.694492] ? rcu_pm_notify+0xc0/0xc0 [ 737.698397] ? copy_mount_options+0x5f/0x380 [ 737.702811] ? rcu_read_lock_sched_held+0x108/0x120 [ 737.707837] ? kmem_cache_alloc_trace+0x616/0x780 [ 737.712689] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 737.718237] ? _copy_from_user+0xdf/0x150 [ 737.722403] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 737.727950] ? copy_mount_options+0x285/0x380 [ 737.732463] ksys_mount+0x12d/0x140 [ 737.736093] __x64_sys_mount+0xbe/0x150 [ 737.740064] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 737.745071] do_syscall_64+0x1b1/0x800 [ 737.748945] ? finish_task_switch+0x1ca/0x810 [ 737.753442] ? syscall_return_slowpath+0x5c0/0x5c0 [ 737.758370] ? syscall_return_slowpath+0x30f/0x5c0 [ 737.763297] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 737.768649] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 737.773539] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 737.778749] RIP: 0033:0x455979 [ 737.781944] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 737.789637] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 737.796904] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 737.804170] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 737.811423] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 737.818678] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 737.849284] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 737.951648] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 2018/05/13 06:34:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121"}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:42 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121"}, 0x7ffff000, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:42 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, 0x0) sync() lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@random={'osx.', '\x00'}, &(0x7f00002b2fec)="00000002010000000022000104e7000000000000", 0x14, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000001140)=""/121, 0x56) 2018/05/13 06:34:42 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000001400"}}) 2018/05/13 06:34:42 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000000000000000100"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:42 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000000000000000000f0ffffff7f00"}}) 2018/05/13 06:34:42 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0xb000000, 0x1000000000282) 2018/05/13 06:34:42 executing program 1 (fault-call:3 fault-nth:51): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) [ 738.112807] IPVS: Unknown mcast interface: rose0 2018/05/13 06:34:42 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x4000000, 0x1000000000282) [ 738.140777] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 738.144795] IPVS: Unknown mcast interface: rose0 [ 738.152477] FAULT_INJECTION: forcing a failure. [ 738.152477] name failslab, interval 1, probability 0, space 0, times 0 [ 738.164598] CPU: 0 PID: 18451 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 738.171881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 738.181250] Call Trace: [ 738.183855] dump_stack+0x1b9/0x294 2018/05/13 06:34:42 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000200"}}) 2018/05/13 06:34:42 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000000000000300"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 738.187504] ? dump_stack_print_info.cold.2+0x52/0x52 [ 738.192707] ? mutex_trylock+0x2a0/0x2a0 [ 738.196784] should_fail.cold.4+0xa/0x1a [ 738.200858] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 738.205973] ? graph_lock+0x170/0x170 [ 738.209783] ? find_held_lock+0x36/0x1c0 [ 738.213855] ? find_held_lock+0x36/0x1c0 [ 738.217935] ? __lock_is_held+0xb5/0x140 [ 738.222017] ? check_same_owner+0x320/0x320 [ 738.226354] ? graph_lock+0x170/0x170 [ 738.230173] ? rcu_note_context_switch+0x710/0x710 [ 738.235118] ? kasan_check_write+0x14/0x20 [ 738.239375] __should_failslab+0x124/0x180 [ 738.243627] should_failslab+0x9/0x14 [ 738.247437] kmem_cache_alloc+0x2af/0x760 [ 738.251602] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 738.256629] __kernfs_new_node+0xe7/0x580 [ 738.260795] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 738.265564] ? lock_downgrade+0x8e0/0x8e0 [ 738.269731] ? kasan_check_read+0x11/0x20 [ 738.273893] ? do_raw_spin_unlock+0x9e/0x2e0 [ 738.278322] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 738.282928] kernfs_new_node+0x80/0xf0 [ 738.286829] kernfs_create_link+0x33/0x180 2018/05/13 06:34:42 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x8040000, 0x1000000000282) [ 738.291076] sysfs_do_create_link_sd.isra.2+0x90/0x130 [ 738.294598] IPVS: Unknown mcast interface: rose0 [ 738.296364] sysfs_create_link+0x65/0xc0 [ 738.296383] device_add+0x481/0x16d0 [ 738.296403] ? device_private_init+0x230/0x230 [ 738.296422] ? kfree+0x1e9/0x260 [ 738.316911] ? kfree_const+0x5e/0x70 [ 738.320728] device_create_groups_vargs+0x1ff/0x270 [ 738.324217] IPVS: Unknown mcast interface: rose0 [ 738.325765] device_create_vargs+0x46/0x60 [ 738.325788] bdi_register_va.part.10+0xbb/0x9b0 2018/05/13 06:34:42 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000040d200"}}) 2018/05/13 06:34:42 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\x00\x00\b\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 738.325802] ? cgwb_kill+0x630/0x630 [ 738.325823] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 738.348702] ? bdi_init+0x416/0x510 [ 738.352338] ? wb_init+0x9e0/0x9e0 [ 738.355887] ? bdi_alloc_node+0x67/0xe0 [ 738.359869] ? bdi_alloc_node+0x67/0xe0 [ 738.363853] ? rcu_read_lock_sched_held+0x108/0x120 [ 738.368875] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 738.374162] ? _raw_spin_unlock+0x22/0x30 [ 738.378328] bdi_register_va+0x68/0x80 [ 738.382226] super_setup_bdi_name+0x123/0x220 [ 738.386728] ? kill_block_super+0x100/0x100 2018/05/13 06:34:42 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0xa04, 0x1000000000282) [ 738.391058] ? kmem_cache_alloc_trace+0x616/0x780 [ 738.395911] ? match_wildcard+0x3c0/0x3c0 [ 738.400085] ? trace_hardirqs_on+0xd/0x10 [ 738.404251] fuse_fill_super+0xe6e/0x1e20 [ 738.408415] ? fuse_get_root_inode+0x190/0x190 [ 738.413010] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 738.418039] ? kasan_check_read+0x11/0x20 [ 738.422205] ? cap_capable+0x1f9/0x260 [ 738.426107] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 738.431651] ? security_capable+0x99/0xc0 [ 738.435810] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 738.441359] ? ns_capable_common+0x13f/0x170 [ 738.445535] IPVS: Unknown mcast interface: rose0 [ 738.445776] ? get_anon_bdev+0x2f0/0x2f0 [ 738.454587] ? sget+0x113/0x150 [ 738.457875] ? fuse_get_root_inode+0x190/0x190 [ 738.462469] mount_nodev+0x6b/0x110 [ 738.466107] fuse_mount+0x2c/0x40 [ 738.468924] IPVS: Unknown mcast interface: rose0 [ 738.469564] mount_fs+0xae/0x328 [ 738.469586] vfs_kern_mount.part.34+0xd4/0x4d0 [ 738.482255] ? may_umount+0xb0/0xb0 [ 738.485888] ? _raw_read_unlock+0x22/0x30 2018/05/13 06:34:42 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x7000000, 0x1000000000282) [ 738.490042] ? __get_fs_type+0x97/0xc0 [ 738.493938] do_mount+0x564/0x3070 [ 738.497485] ? copy_mount_string+0x40/0x40 [ 738.501729] ? rcu_pm_notify+0xc0/0xc0 [ 738.505626] ? copy_mount_options+0x5f/0x380 [ 738.510039] ? rcu_read_lock_sched_held+0x108/0x120 [ 738.515062] ? kmem_cache_alloc_trace+0x616/0x780 [ 738.519921] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 738.525464] ? _copy_from_user+0xdf/0x150 [ 738.529623] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 738.535166] ? copy_mount_options+0x285/0x380 [ 738.539677] ksys_mount+0x12d/0x140 [ 738.543316] __x64_sys_mount+0xbe/0x150 [ 738.547299] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 738.552325] do_syscall_64+0x1b1/0x800 [ 738.556220] ? finish_task_switch+0x1ca/0x810 [ 738.560727] ? syscall_return_slowpath+0x5c0/0x5c0 [ 738.565681] ? syscall_return_slowpath+0x30f/0x5c0 [ 738.570622] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 738.575997] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 738.580853] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 738.586045] RIP: 0033:0x455979 [ 738.589240] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 738.596956] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 738.604225] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 738.611499] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 738.618775] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 738.626056] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 738.690807] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 2018/05/13 06:34:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121"}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:43 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000000009effffff00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:43 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000feffff00"}}) 2018/05/13 06:34:43 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x3000000, 0x1000000000282) 2018/05/13 06:34:43 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000000000000000000feffff00"}}) 2018/05/13 06:34:43 executing program 1 (fault-call:3 fault-nth:52): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:34:43 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121"}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:43 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, 0x0) sync() r0 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x4, 0x600000) fcntl$setpipe(r0, 0x407, 0xffffffff) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f0000000080)={0xffffffffffffff4a, 0x3, 0x100000000}) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000001140)=""/121, 0x56) sendmsg(r0, &(0x7f0000000500)={&(0x7f0000000140)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x1, 0x0, 0x2, {0xa, 0x4e24, 0x1, @remote={0xfe, 0x80, [], 0xbb}, 0xb2d1}}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000200)="340222d7641eebc8f90d1aaeed9df06b6623c2720f132c6278e45c9411425732b1ee738d8c3a553fc9bb11ec7d2ed3b3dffc1d515116e40facffcb1139ce02435dfd9a053537558c68", 0x49}, {&(0x7f0000000280)="c6469d101bb1a7539e810bc201593dc770b4336d12e4e2cc40c36b1fe277970d27db31bdd99e2b94826aac4ad3b206e9d4b91e5b303c4d601f4b35d5cf9e4b44b5372f01b19bacf1d88150cadeb8c98e5ca0ff5dd11da0a3aac9925264e57849049885ce8083ebace42fbcdd93b63a25f7215b717075e6c6b5ce6873c27540a71ed248205d999a35b0b8d5b1e508996602ee2659c81d8adf38dfff5d03a7d9541bdf2e56686104f3e00ccda8e296b0782729ca4612109d3a9ebfd55fbaa41d2507b07fc9765a6dacb9", 0xc9}, {&(0x7f00000011c0)="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", 0x1000}, {&(0x7f0000000380)="66d20ff50cf3b7ee953837773139dbca7ce1300752f403a95a31d227cd08aa1ce7c95a30ae04cecabb21ff86f1ab905bb723086b79bfe7785a6a27deb9930c54015f53588f5aa14cdbfdb005eaffe4b9f7f66571a1ffe94fe03b52b4ef55192326869e33e9f9ec1a98d9c737a93ee553beb3ecd5cdc6a7a9d747af1b4a9bb4d08933867810f065595069fbd23a3a7f4c3ab75b4441968c1416a42053085e3c566a3045b7cc0a7fbb", 0xa8}, {&(0x7f0000000440)="c1770ca5cebed64bc73dbb2bf0df75534ce66a60af58913667205f93eeab34252c278ea8bc", 0x25}], 0x5, 0x0, 0x0, 0x10}, 0x80) write(r0, &(0x7f0000000000)="2bbe37b08dc9694701f9505301ba8b608e", 0x11) [ 739.092164] IPVS: Unknown mcast interface: rose0 [ 739.125085] IPVS: Unknown mcast interface: rose0 [ 739.141089] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 739.157083] FAULT_INJECTION: forcing a failure. [ 739.157083] name failslab, interval 1, probability 0, space 0, times 0 [ 739.168427] CPU: 1 PID: 18527 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 739.175706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 739.185065] Call Trace: [ 739.187668] dump_stack+0x1b9/0x294 [ 739.191314] ? dump_stack_print_info.cold.2+0x52/0x52 [ 739.196522] ? __might_sleep+0x95/0x190 [ 739.200516] should_fail.cold.4+0xa/0x1a [ 739.204596] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 739.209719] ? mutex_trylock+0x2a0/0x2a0 [ 739.213798] ? graph_lock+0x170/0x170 [ 739.217615] ? __mutex_lock+0x7d9/0x17f0 [ 739.221697] ? find_held_lock+0x36/0x1c0 [ 739.225775] ? __lock_is_held+0xb5/0x140 [ 739.229861] ? check_same_owner+0x320/0x320 [ 739.234198] ? rcu_note_context_switch+0x710/0x710 [ 739.239142] __should_failslab+0x124/0x180 [ 739.243394] should_failslab+0x9/0x14 [ 739.247207] __kmalloc_track_caller+0x2c4/0x760 [ 739.251889] ? graph_lock+0x170/0x170 [ 739.255701] ? graph_lock+0x170/0x170 [ 739.259540] ? kstrdup_const+0x66/0x80 [ 739.263445] kstrdup+0x39/0x70 [ 739.266657] kstrdup_const+0x66/0x80 [ 739.270380] __kernfs_new_node+0xa8/0x580 2018/05/13 06:34:43 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x6040000, 0x1000000000282) 2018/05/13 06:34:43 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 2018/05/13 06:34:43 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000405d163400"}}) 2018/05/13 06:34:43 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 739.274539] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 739.279310] ? lock_downgrade+0x8e0/0x8e0 [ 739.283471] ? kasan_check_read+0x11/0x20 [ 739.287633] ? do_raw_spin_unlock+0x9e/0x2e0 [ 739.292050] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 739.296651] kernfs_new_node+0x80/0xf0 [ 739.300561] kernfs_create_link+0x33/0x180 [ 739.304812] sysfs_do_create_link_sd.isra.2+0x90/0x130 [ 739.307787] IPVS: Unknown mcast interface: rose0 [ 739.310102] sysfs_create_link+0x65/0xc0 [ 739.310121] device_add+0x7a0/0x16d0 2018/05/13 06:34:43 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x2600, 0x1000000000282) 2018/05/13 06:34:43 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000000500"}}) [ 739.310141] ? device_private_init+0x230/0x230 [ 739.310154] ? kfree+0x1e9/0x260 [ 739.310172] ? kfree_const+0x5e/0x70 [ 739.310190] device_create_groups_vargs+0x1ff/0x270 [ 739.310209] device_create_vargs+0x46/0x60 [ 739.310228] bdi_register_va.part.10+0xbb/0x9b0 [ 739.310242] ? cgwb_kill+0x630/0x630 [ 739.310261] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 739.310273] ? bdi_init+0x416/0x510 [ 739.310285] ? wb_init+0x9e0/0x9e0 [ 739.310299] ? bdi_alloc_node+0x67/0xe0 [ 739.310309] ? bdi_alloc_node+0x67/0xe0 [ 739.310322] ? rcu_read_lock_sched_held+0x108/0x120 [ 739.310336] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 739.310354] ? _raw_spin_unlock+0x22/0x30 [ 739.310373] bdi_register_va+0x68/0x80 [ 739.347139] IPVS: Unknown mcast interface: rose0 [ 739.348378] super_setup_bdi_name+0x123/0x220 [ 739.348395] ? kill_block_super+0x100/0x100 [ 739.348414] ? kmem_cache_alloc_trace+0x616/0x780 [ 739.348432] ? match_wildcard+0x3c0/0x3c0 [ 739.348449] ? trace_hardirqs_on+0xd/0x10 [ 739.348470] fuse_fill_super+0xe6e/0x1e20 [ 739.348490] ? fuse_get_root_inode+0x190/0x190 2018/05/13 06:34:43 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 739.348509] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 739.431821] ? kasan_check_read+0x11/0x20 [ 739.435978] ? cap_capable+0x1f9/0x260 [ 739.439880] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 739.445427] ? security_capable+0x99/0xc0 [ 739.449590] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 739.455141] ? ns_capable_common+0x13f/0x170 [ 739.459559] ? get_anon_bdev+0x2f0/0x2f0 [ 739.463632] ? sget+0x113/0x150 [ 739.466920] ? fuse_get_root_inode+0x190/0x190 [ 739.471510] mount_nodev+0x6b/0x110 2018/05/13 06:34:43 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x4, 0x1000000000282) [ 739.475148] fuse_mount+0x2c/0x40 [ 739.478611] mount_fs+0xae/0x328 [ 739.481992] vfs_kern_mount.part.34+0xd4/0x4d0 [ 739.486584] ? may_umount+0xb0/0xb0 [ 739.490221] ? _raw_read_unlock+0x22/0x30 [ 739.494373] ? __get_fs_type+0x97/0xc0 [ 739.498278] do_mount+0x564/0x3070 [ 739.501916] ? copy_mount_string+0x40/0x40 [ 739.506165] ? rcu_pm_notify+0xc0/0xc0 [ 739.510068] ? copy_mount_options+0x5f/0x380 [ 739.514478] ? rcu_read_lock_sched_held+0x108/0x120 [ 739.519503] ? kmem_cache_alloc_trace+0x616/0x780 [ 739.523518] IPVS: Unknown mcast interface: rose0 [ 739.524361] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 739.524378] ? copy_mount_options+0x285/0x380 [ 739.524398] ksys_mount+0x12d/0x140 [ 739.524416] __x64_sys_mount+0xbe/0x150 [ 739.524432] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 739.524452] do_syscall_64+0x1b1/0x800 [ 739.524467] ? finish_task_switch+0x1ca/0x810 [ 739.524486] ? syscall_return_slowpath+0x5c0/0x5c0 [ 739.558195] IPVS: Unknown mcast interface: rose0 [ 739.560188] ? syscall_return_slowpath+0x30f/0x5c0 [ 739.560210] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 739.560231] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 739.560252] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 739.560263] RIP: 0033:0x455979 [ 739.560271] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 739.560286] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 739.560296] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 739.560304] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 739.560316] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 739.630169] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 739.704872] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 2018/05/13 06:34:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121"}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:44 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000400"}}) 2018/05/13 06:34:44 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000000000000001000"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:44 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000000000000000034165d4000"}}) 2018/05/13 06:34:44 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x402, 0x1000000000282) 2018/05/13 06:34:44 executing program 1 (fault-call:3 fault-nth:53): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:34:44 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, 0x0) sync() r0 = syz_open_dev$dmmidi(&(0x7f0000000340)='/dev/dmmidi#\x00', 0xa, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000080)={'veth0_to_bridge\x00', 0x5}) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='system.advise\x00', &(0x7f00000001c0)=""/175, 0xaf) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000000280)=""/121, 0x79) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000380)=""/117) 2018/05/13 06:34:44 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121"}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) [ 739.987270] IPVS: Unknown mcast interface: rose0 [ 740.008907] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 740.020430] IPVS: Unknown mcast interface: rose0 [ 740.033446] FAULT_INJECTION: forcing a failure. [ 740.033446] name failslab, interval 1, probability 0, space 0, times 0 [ 740.044837] CPU: 0 PID: 18592 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 740.052123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 740.061484] Call Trace: [ 740.064099] dump_stack+0x1b9/0x294 [ 740.067739] ? dump_stack_print_info.cold.2+0x52/0x52 [ 740.072943] ? __might_sleep+0x95/0x190 [ 740.076924] should_fail.cold.4+0xa/0x1a [ 740.080975] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 740.086074] ? mutex_trylock+0x2a0/0x2a0 [ 740.090122] ? graph_lock+0x170/0x170 [ 740.093908] ? __mutex_lock+0x7d9/0x17f0 [ 740.097959] ? find_held_lock+0x36/0x1c0 [ 740.102013] ? __lock_is_held+0xb5/0x140 [ 740.106074] ? check_same_owner+0x320/0x320 [ 740.110383] ? rcu_note_context_switch+0x710/0x710 [ 740.115299] __should_failslab+0x124/0x180 [ 740.119523] should_failslab+0x9/0x14 [ 740.123310] __kmalloc_track_caller+0x2c4/0x760 [ 740.127962] ? graph_lock+0x170/0x170 [ 740.131757] ? graph_lock+0x170/0x170 [ 740.135544] ? kstrdup_const+0x66/0x80 [ 740.139418] kstrdup+0x39/0x70 [ 740.142597] kstrdup_const+0x66/0x80 [ 740.146298] __kernfs_new_node+0xa8/0x580 [ 740.150430] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 740.155171] ? lock_downgrade+0x8e0/0x8e0 [ 740.159308] ? kasan_check_read+0x11/0x20 [ 740.163445] ? do_raw_spin_unlock+0x9e/0x2e0 [ 740.167839] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 740.172408] kernfs_new_node+0x80/0xf0 [ 740.176282] kernfs_create_link+0x33/0x180 [ 740.180502] sysfs_do_create_link_sd.isra.2+0x90/0x130 [ 740.185765] sysfs_create_link+0x65/0xc0 [ 740.189812] device_add+0x7a0/0x16d0 [ 740.193513] ? device_private_init+0x230/0x230 [ 740.198080] ? kfree+0x1e9/0x260 [ 740.201432] ? kfree_const+0x5e/0x70 [ 740.205135] device_create_groups_vargs+0x1ff/0x270 [ 740.210139] device_create_vargs+0x46/0x60 [ 740.214361] bdi_register_va.part.10+0xbb/0x9b0 [ 740.219020] ? cgwb_kill+0x630/0x630 [ 740.222726] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 740.228245] ? bdi_init+0x416/0x510 [ 740.231854] ? wb_init+0x9e0/0x9e0 [ 740.235379] ? bdi_alloc_node+0x67/0xe0 [ 740.239336] ? bdi_alloc_node+0x67/0xe0 [ 740.243295] ? rcu_read_lock_sched_held+0x108/0x120 [ 740.248299] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 740.253563] ? _raw_spin_unlock+0x22/0x30 [ 740.257699] bdi_register_va+0x68/0x80 [ 740.261580] super_setup_bdi_name+0x123/0x220 [ 740.266059] ? kill_block_super+0x100/0x100 [ 740.270367] ? kmem_cache_alloc_trace+0x616/0x780 [ 740.275194] ? match_wildcard+0x3c0/0x3c0 [ 740.279327] ? trace_hardirqs_on+0xd/0x10 [ 740.283462] fuse_fill_super+0xe6e/0x1e20 [ 740.287598] ? fuse_get_root_inode+0x190/0x190 [ 740.292168] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 740.297170] ? kasan_check_read+0x11/0x20 [ 740.301305] ? cap_capable+0x1f9/0x260 [ 740.305182] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 740.310707] ? security_capable+0x99/0xc0 [ 740.314850] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 740.320394] ? ns_capable_common+0x13f/0x170 [ 740.324805] ? get_anon_bdev+0x2f0/0x2f0 [ 740.328855] ? sget+0x113/0x150 [ 740.332121] ? fuse_get_root_inode+0x190/0x190 [ 740.336687] mount_nodev+0x6b/0x110 [ 740.340298] fuse_mount+0x2c/0x40 [ 740.343738] mount_fs+0xae/0x328 [ 740.347097] vfs_kern_mount.part.34+0xd4/0x4d0 [ 740.351664] ? may_umount+0xb0/0xb0 [ 740.355275] ? _raw_read_unlock+0x22/0x30 [ 740.359405] ? __get_fs_type+0x97/0xc0 [ 740.363282] do_mount+0x564/0x3070 [ 740.366811] ? copy_mount_string+0x40/0x40 [ 740.371041] ? rcu_pm_notify+0xc0/0xc0 [ 740.374920] ? copy_mount_options+0x5f/0x380 [ 740.379313] ? rcu_read_lock_sched_held+0x108/0x120 [ 740.384325] ? kmem_cache_alloc_trace+0x616/0x780 [ 740.389156] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 740.394678] ? _copy_from_user+0xdf/0x150 [ 740.398835] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 740.404360] ? copy_mount_options+0x285/0x380 [ 740.408841] ksys_mount+0x12d/0x140 [ 740.412456] __x64_sys_mount+0xbe/0x150 [ 740.416413] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 740.421421] do_syscall_64+0x1b1/0x800 [ 740.425293] ? finish_task_switch+0x1ca/0x810 [ 740.429773] ? syscall_return_slowpath+0x5c0/0x5c0 [ 740.434690] ? syscall_return_slowpath+0x30f/0x5c0 [ 740.439609] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 740.444960] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 740.449791] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 740.454963] RIP: 0033:0x455979 2018/05/13 06:34:44 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x1000000000000000, 0x1000000000282) 2018/05/13 06:34:44 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000000f00"}}) 2018/05/13 06:34:44 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000000000000000000000001000"}}) [ 740.458139] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 740.465831] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 740.473084] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 740.480337] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 740.487587] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 740.494838] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 2018/05/13 06:34:45 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:45 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x24000000, 0x1000000000282) [ 740.602858] IPVS: Unknown mcast interface: rose0 2018/05/13 06:34:45 executing program 1 (fault-call:3 fault-nth:54): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:34:45 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00'}}) 2018/05/13 06:34:45 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x26000000, 0x1000000000282) [ 740.636942] IPVS: Unknown mcast interface: rose0 [ 740.720181] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 740.737286] FAULT_INJECTION: forcing a failure. [ 740.737286] name failslab, interval 1, probability 0, space 0, times 0 [ 740.748650] CPU: 0 PID: 18625 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 740.755928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 740.765268] Call Trace: [ 740.767848] dump_stack+0x1b9/0x294 [ 740.771464] ? dump_stack_print_info.cold.2+0x52/0x52 [ 740.776641] ? __might_sleep+0x95/0x190 [ 740.780607] should_fail.cold.4+0xa/0x1a [ 740.784655] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 740.789748] ? mutex_trylock+0x2a0/0x2a0 [ 740.793794] ? graph_lock+0x170/0x170 [ 740.797581] ? __mutex_lock+0x7d9/0x17f0 [ 740.801632] ? find_held_lock+0x36/0x1c0 [ 740.805682] ? __lock_is_held+0xb5/0x140 [ 740.809735] ? check_same_owner+0x320/0x320 [ 740.814046] ? rcu_note_context_switch+0x710/0x710 [ 740.818964] __should_failslab+0x124/0x180 [ 740.823189] should_failslab+0x9/0x14 [ 740.826981] __kmalloc_track_caller+0x2c4/0x760 [ 740.831656] ? graph_lock+0x170/0x170 [ 740.835444] ? graph_lock+0x170/0x170 [ 740.839231] ? kstrdup_const+0x66/0x80 [ 740.843110] kstrdup+0x39/0x70 [ 740.846291] kstrdup_const+0x66/0x80 [ 740.850015] __kernfs_new_node+0xa8/0x580 [ 740.854174] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 740.858923] ? lock_downgrade+0x8e0/0x8e0 [ 740.863064] ? kasan_check_read+0x11/0x20 [ 740.867197] ? do_raw_spin_unlock+0x9e/0x2e0 [ 740.871589] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 740.876158] kernfs_new_node+0x80/0xf0 [ 740.880039] kernfs_create_link+0x33/0x180 [ 740.884264] sysfs_do_create_link_sd.isra.2+0x90/0x130 [ 740.889531] sysfs_create_link+0x65/0xc0 [ 740.893592] device_add+0x7a0/0x16d0 [ 740.897293] ? device_private_init+0x230/0x230 [ 740.901858] ? kfree+0x1e9/0x260 [ 740.905221] ? kfree_const+0x5e/0x70 [ 740.908924] device_create_groups_vargs+0x1ff/0x270 [ 740.913939] device_create_vargs+0x46/0x60 [ 740.918161] bdi_register_va.part.10+0xbb/0x9b0 [ 740.922817] ? cgwb_kill+0x630/0x630 [ 740.926519] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 740.932042] ? bdi_init+0x416/0x510 [ 740.935653] ? wb_init+0x9e0/0x9e0 [ 740.939189] ? bdi_alloc_node+0x67/0xe0 [ 740.943148] ? bdi_alloc_node+0x67/0xe0 [ 740.947109] ? rcu_read_lock_sched_held+0x108/0x120 [ 740.952110] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 740.957374] ? _raw_spin_unlock+0x22/0x30 [ 740.961508] bdi_register_va+0x68/0x80 [ 740.965382] super_setup_bdi_name+0x123/0x220 [ 740.969861] ? kill_block_super+0x100/0x100 [ 740.974169] ? kmem_cache_alloc_trace+0x616/0x780 [ 740.978999] ? match_wildcard+0x3c0/0x3c0 [ 740.983139] ? trace_hardirqs_on+0xd/0x10 [ 740.987275] fuse_fill_super+0xe6e/0x1e20 [ 740.991414] ? fuse_get_root_inode+0x190/0x190 [ 740.995987] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 741.000992] ? kasan_check_read+0x11/0x20 [ 741.005132] ? cap_capable+0x1f9/0x260 [ 741.009012] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 741.014539] ? security_capable+0x99/0xc0 [ 741.019425] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 741.024951] ? ns_capable_common+0x13f/0x170 [ 741.029352] ? get_anon_bdev+0x2f0/0x2f0 [ 741.033398] ? sget+0x113/0x150 [ 741.036666] ? fuse_get_root_inode+0x190/0x190 [ 741.041234] mount_nodev+0x6b/0x110 [ 741.044849] fuse_mount+0x2c/0x40 [ 741.048291] mount_fs+0xae/0x328 [ 741.051647] vfs_kern_mount.part.34+0xd4/0x4d0 [ 741.056214] ? may_umount+0xb0/0xb0 [ 741.059825] ? _raw_read_unlock+0x22/0x30 [ 741.063961] ? __get_fs_type+0x97/0xc0 [ 741.067836] do_mount+0x564/0x3070 [ 741.071363] ? do_raw_spin_unlock+0x9e/0x2e0 [ 741.075758] ? copy_mount_string+0x40/0x40 [ 741.079979] ? rcu_pm_notify+0xc0/0xc0 [ 741.083867] ? copy_mount_options+0x5f/0x380 [ 741.088263] ? rcu_read_lock_sched_held+0x108/0x120 [ 741.093267] ? kmem_cache_alloc_trace+0x616/0x780 [ 741.098102] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 741.103629] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 741.109151] ? copy_mount_options+0x285/0x380 [ 741.113635] ksys_mount+0x12d/0x140 [ 741.117250] __x64_sys_mount+0xbe/0x150 [ 741.121210] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 741.126218] do_syscall_64+0x1b1/0x800 [ 741.130093] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 741.134924] ? syscall_return_slowpath+0x5c0/0x5c0 [ 741.139845] ? syscall_return_slowpath+0x30f/0x5c0 [ 741.144763] ? retint_user+0x18/0x18 [ 741.148467] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 741.153297] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 741.158469] RIP: 0033:0x455979 [ 741.161643] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 741.169336] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 741.176602] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 741.183854] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 741.191111] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 741.198377] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 2018/05/13 06:34:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121"}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:45 executing program 1 (fault-call:3 fault-nth:55): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:34:45 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000100"}}) 2018/05/13 06:34:45 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121"}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:45 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, 0x0) sync() lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000001140)=""/121, 0x56) openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x180, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f0000000080)) 2018/05/13 06:34:45 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000000000f0ffff00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:45 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}}) 2018/05/13 06:34:45 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x900, 0x1000000000282) [ 741.361189] IPVS: Unknown mcast interface: rose0 2018/05/13 06:34:45 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0xe040000, 0x1000000000282) 2018/05/13 06:34:45 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000000000000000000000000000000200"}}) [ 741.396202] IPVS: Unknown mcast interface: rose0 [ 741.409461] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 2018/05/13 06:34:45 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000000000000000200"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:45 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000f00"}}) [ 741.498382] FAULT_INJECTION: forcing a failure. [ 741.498382] name failslab, interval 1, probability 0, space 0, times 0 [ 741.509796] CPU: 0 PID: 18672 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 741.517086] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 741.526454] Call Trace: [ 741.529066] dump_stack+0x1b9/0x294 [ 741.532720] ? dump_stack_print_info.cold.2+0x52/0x52 [ 741.537946] should_fail.cold.4+0xa/0x1a [ 741.542027] ? __kmalloc_track_caller+0x14a/0x760 [ 741.545470] IPVS: Unknown mcast interface: rose0 [ 741.546883] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 741.546903] ? device_create_groups_vargs+0x1ff/0x270 [ 741.546923] ? device_create_vargs+0x46/0x60 [ 741.546939] ? bdi_register_va.part.10+0xbb/0x9b0 [ 741.546951] ? bdi_register_va+0x68/0x80 [ 741.546969] ? super_setup_bdi_name+0x123/0x220 [ 741.579878] ? fuse_fill_super+0xe6e/0x1e20 [ 741.584204] ? mount_nodev+0x6b/0x110 [ 741.588004] ? graph_lock+0x170/0x170 [ 741.591798] ? ksys_mount+0x12d/0x140 [ 741.595586] ? __x64_sys_mount+0xbe/0x150 [ 741.599721] ? do_syscall_64+0x1b1/0x800 [ 741.603767] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 741.609118] ? find_held_lock+0x36/0x1c0 [ 741.613167] ? __lock_is_held+0xb5/0x140 [ 741.617222] ? check_same_owner+0x320/0x320 [ 741.621534] ? rcu_note_context_switch+0x710/0x710 [ 741.626451] ? rcu_read_lock_sched_held+0x108/0x120 [ 741.631455] __should_failslab+0x124/0x180 [ 741.635678] should_failslab+0x9/0x14 [ 741.639466] kmem_cache_alloc+0x2af/0x760 [ 741.643602] ? memcpy+0x45/0x50 [ 741.647001] ? kstrdup+0x59/0x70 [ 741.650365] __kernfs_new_node+0xe7/0x580 [ 741.654513] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 741.659260] ? lock_downgrade+0x8e0/0x8e0 [ 741.663405] ? kasan_check_read+0x11/0x20 [ 741.667550] ? do_raw_spin_unlock+0x9e/0x2e0 [ 741.671955] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 741.676532] kernfs_new_node+0x80/0xf0 [ 741.680410] kernfs_create_link+0x33/0x180 [ 741.684646] sysfs_do_create_link_sd.isra.2+0x90/0x130 [ 741.689927] sysfs_create_link+0x65/0xc0 [ 741.693978] device_add+0x7a0/0x16d0 [ 741.697684] ? device_private_init+0x230/0x230 [ 741.702250] ? kfree+0x1e9/0x260 [ 741.705625] ? kfree_const+0x5e/0x70 [ 741.709338] device_create_groups_vargs+0x1ff/0x270 [ 741.714344] device_create_vargs+0x46/0x60 [ 741.718569] bdi_register_va.part.10+0xbb/0x9b0 [ 741.723229] ? cgwb_kill+0x630/0x630 [ 741.726934] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 741.732455] ? bdi_init+0x416/0x510 [ 741.736065] ? wb_init+0x9e0/0x9e0 [ 741.739601] ? bdi_alloc_node+0x67/0xe0 [ 741.743560] ? bdi_alloc_node+0x67/0xe0 [ 741.747519] ? rcu_read_lock_sched_held+0x108/0x120 [ 741.752522] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 741.757788] ? _raw_spin_unlock+0x22/0x30 [ 741.761924] bdi_register_va+0x68/0x80 [ 741.765801] super_setup_bdi_name+0x123/0x220 [ 741.770280] ? kill_block_super+0x100/0x100 [ 741.774590] ? kmem_cache_alloc_trace+0x616/0x780 [ 741.779421] ? match_wildcard+0x3c0/0x3c0 [ 741.783554] ? trace_hardirqs_on+0xd/0x10 [ 741.787690] fuse_fill_super+0xe6e/0x1e20 [ 741.791828] ? fuse_get_root_inode+0x190/0x190 [ 741.796398] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 741.801405] ? kasan_check_read+0x11/0x20 [ 741.805540] ? cap_capable+0x1f9/0x260 [ 741.809431] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 741.814956] ? security_capable+0x99/0xc0 [ 741.819098] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 741.824624] ? ns_capable_common+0x13f/0x170 [ 741.829049] ? get_anon_bdev+0x2f0/0x2f0 [ 741.833097] ? sget+0x113/0x150 [ 741.836363] ? fuse_get_root_inode+0x190/0x190 [ 741.840934] mount_nodev+0x6b/0x110 [ 741.844546] fuse_mount+0x2c/0x40 [ 741.847987] mount_fs+0xae/0x328 [ 741.851346] vfs_kern_mount.part.34+0xd4/0x4d0 [ 741.855914] ? may_umount+0xb0/0xb0 [ 741.859524] ? _raw_read_unlock+0x22/0x30 [ 741.863658] ? __get_fs_type+0x97/0xc0 [ 741.867533] do_mount+0x564/0x3070 [ 741.871060] ? interrupt_entry+0xb1/0xf0 [ 741.875204] ? copy_mount_string+0x40/0x40 [ 741.879430] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 741.884173] ? retint_kernel+0x10/0x10 [ 741.888053] ? copy_mount_options+0x213/0x380 [ 741.892537] ? write_comp_data+0x11/0x70 [ 741.896589] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 741.902110] ? copy_mount_options+0x285/0x380 [ 741.906594] ksys_mount+0x12d/0x140 [ 741.910210] __x64_sys_mount+0xbe/0x150 [ 741.914167] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 741.919169] do_syscall_64+0x1b1/0x800 [ 741.923045] ? finish_task_switch+0x1ca/0x810 [ 741.927525] ? syscall_return_slowpath+0x5c0/0x5c0 [ 741.932453] ? syscall_return_slowpath+0x30f/0x5c0 [ 741.937373] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 741.942898] ? retint_user+0x18/0x18 [ 741.946599] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 741.951432] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 741.956603] RIP: 0033:0x455979 [ 741.959774] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 741.967467] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 741.974722] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 741.981974] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 741.989227] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 2018/05/13 06:34:46 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x3, 0x1000000000282) [ 741.996481] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 742.021117] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 2018/05/13 06:34:46 executing program 1 (fault-call:3 fault-nth:56): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:34:46 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000000000000000000500"}}) [ 742.063834] IPVS: Unknown mcast interface: rose0 [ 742.139621] FAULT_INJECTION: forcing a failure. [ 742.139621] name failslab, interval 1, probability 0, space 0, times 0 [ 742.150955] CPU: 1 PID: 18695 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 742.158240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 742.167598] Call Trace: [ 742.170207] dump_stack+0x1b9/0x294 [ 742.173509] IPVS: Unknown mcast interface: rose0 [ 742.173859] ? dump_stack_print_info.cold.2+0x52/0x52 [ 742.183794] ? __mutex_lock+0x7d9/0x17f0 2018/05/13 06:34:46 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\x00\x00\x00\t\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 742.185295] IPVS: Unknown mcast interface: rose0 [ 742.187874] should_fail.cold.4+0xa/0x1a [ 742.187896] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 742.187914] ? kasan_kmalloc+0xc4/0xe0 [ 742.187936] ? graph_lock+0x170/0x170 [ 742.187955] ? find_held_lock+0x36/0x1c0 [ 742.187973] ? __lock_is_held+0xb5/0x140 [ 742.188000] ? check_same_owner+0x320/0x320 [ 742.221962] ? kasan_check_write+0x14/0x20 [ 742.226212] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 742.231151] ? rcu_note_context_switch+0x710/0x710 [ 742.236087] __should_failslab+0x124/0x180 [ 742.240331] should_failslab+0x9/0x14 [ 742.244144] kmem_cache_alloc+0x2af/0x760 [ 742.248300] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 742.253240] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 742.258268] __kernfs_new_node+0xe7/0x580 [ 742.262424] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 742.267188] ? mutex_unlock+0xd/0x10 [ 742.270904] ? kernfs_activate+0x20e/0x2a0 [ 742.275145] ? kernfs_walk_and_get_ns+0x320/0x320 [ 742.279997] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 742.285542] ? kernfs_link_sibling+0x1d2/0x3b0 [ 742.290142] kernfs_new_node+0x80/0xf0 [ 742.294039] __kernfs_create_file+0x4d/0x330 [ 742.298459] sysfs_add_file_mode_ns+0x21a/0x560 [ 742.303143] internal_create_group+0x282/0x970 [ 742.307742] sysfs_create_groups+0x9b/0x150 [ 742.312076] device_add+0x84d/0x16d0 [ 742.315800] ? device_private_init+0x230/0x230 [ 742.320386] ? kfree+0x1e9/0x260 [ 742.323764] ? kfree_const+0x5e/0x70 [ 742.327488] device_create_groups_vargs+0x1ff/0x270 [ 742.332518] device_create_vargs+0x46/0x60 [ 742.336767] bdi_register_va.part.10+0xbb/0x9b0 [ 742.341433] ? cgwb_kill+0x630/0x630 [ 742.345147] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 742.350689] ? bdi_init+0x416/0x510 [ 742.354320] ? wb_init+0x9e0/0x9e0 [ 742.357873] ? bdi_alloc_node+0x67/0xe0 [ 742.361847] ? bdi_alloc_node+0x67/0xe0 [ 742.365829] ? rcu_read_lock_sched_held+0x108/0x120 [ 742.370851] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 742.376141] ? _raw_spin_unlock+0x22/0x30 [ 742.380290] bdi_register_va+0x68/0x80 [ 742.384172] super_setup_bdi_name+0x123/0x220 [ 742.388653] ? kill_block_super+0x100/0x100 [ 742.392959] ? kmem_cache_alloc_trace+0x616/0x780 [ 742.397784] ? match_wildcard+0x3c0/0x3c0 [ 742.401917] ? trace_hardirqs_on+0xd/0x10 [ 742.406057] fuse_fill_super+0xe6e/0x1e20 [ 742.410193] ? fuse_get_root_inode+0x190/0x190 [ 742.414765] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 742.419765] ? kasan_check_read+0x11/0x20 [ 742.423899] ? cap_capable+0x1f9/0x260 [ 742.427778] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 742.433301] ? security_capable+0x99/0xc0 [ 742.437434] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 742.442960] ? ns_capable_common+0x13f/0x170 [ 742.447355] ? get_anon_bdev+0x2f0/0x2f0 [ 742.451401] ? sget+0x113/0x150 [ 742.454668] ? fuse_get_root_inode+0x190/0x190 [ 742.459235] mount_nodev+0x6b/0x110 [ 742.462848] fuse_mount+0x2c/0x40 [ 742.466283] mount_fs+0xae/0x328 [ 742.469632] vfs_kern_mount.part.34+0xd4/0x4d0 [ 742.474195] ? may_umount+0xb0/0xb0 [ 742.477819] ? _raw_read_unlock+0x22/0x30 [ 742.481959] ? __get_fs_type+0x97/0xc0 [ 742.485843] do_mount+0x564/0x3070 [ 742.489367] ? copy_mount_string+0x40/0x40 [ 742.493596] ? rcu_pm_notify+0xc0/0xc0 [ 742.497478] ? copy_mount_options+0x5f/0x380 [ 742.501878] ? rcu_read_lock_sched_held+0x108/0x120 [ 742.506875] ? kmem_cache_alloc_trace+0x616/0x780 [ 742.511703] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 742.517223] ? _copy_from_user+0xdf/0x150 [ 742.521364] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 742.526899] ? copy_mount_options+0x285/0x380 [ 742.531385] ksys_mount+0x12d/0x140 [ 742.535000] __x64_sys_mount+0xbe/0x150 [ 742.538973] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 742.543973] do_syscall_64+0x1b1/0x800 [ 742.547845] ? finish_task_switch+0x1ca/0x810 [ 742.552327] ? syscall_return_slowpath+0x5c0/0x5c0 [ 742.557242] ? syscall_return_slowpath+0x30f/0x5c0 [ 742.562174] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 742.567531] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 742.572359] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 742.577530] RIP: 0033:0x455979 [ 742.580699] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/05/13 06:34:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121"}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:47 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, 0x0) sync() lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)=@random={'system.', "0000000201000000000000010400"}, &(0x7f0000000080)="0000000201000000000000010400000000000000", 0x14, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000001140)=""/121, 0x56) 2018/05/13 06:34:47 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000e800"}}) 2018/05/13 06:34:47 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x407, 0x1000000000282) 2018/05/13 06:34:47 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00'}}) 2018/05/13 06:34:47 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000000000600"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:47 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121"}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:47 executing program 1 (fault-call:3 fault-nth:57): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) [ 742.588397] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 742.595661] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 742.602925] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 742.610178] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 742.617431] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 742.690393] IPVS: Unknown mcast interface: rose0 [ 742.708600] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 742.710742] FAULT_INJECTION: forcing a failure. [ 742.710742] name failslab, interval 1, probability 0, space 0, times 0 [ 742.719203] IPVS: Unknown mcast interface: rose0 [ 742.727639] CPU: 1 PID: 18714 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 2018/05/13 06:34:47 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0xb00000000000000, 0x1000000000282) [ 742.727649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 742.727654] Call Trace: [ 742.727679] dump_stack+0x1b9/0x294 [ 742.727697] ? dump_stack_print_info.cold.2+0x52/0x52 [ 742.727717] ? __mutex_lock+0x7d9/0x17f0 [ 742.764521] should_fail.cold.4+0xa/0x1a [ 742.768598] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 742.773712] ? kasan_kmalloc+0xc4/0xe0 [ 742.777610] ? graph_lock+0x170/0x170 [ 742.781424] ? find_held_lock+0x36/0x1c0 [ 742.785503] ? __lock_is_held+0xb5/0x140 2018/05/13 06:34:47 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000000000000000000000000000f4f2e600"}}) 2018/05/13 06:34:47 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000e800"}}) 2018/05/13 06:34:47 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000000000400300"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 742.789576] ? snd_hda_codec_new+0x9e0/0xe70 [ 742.793998] ? check_same_owner+0x320/0x320 [ 742.798336] ? kasan_check_write+0x14/0x20 [ 742.802578] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 742.807508] ? rcu_note_context_switch+0x710/0x710 [ 742.812443] __should_failslab+0x124/0x180 [ 742.816689] should_failslab+0x9/0x14 [ 742.820503] kmem_cache_alloc+0x2af/0x760 [ 742.824658] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 742.829606] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 742.834635] __kernfs_new_node+0xe7/0x580 [ 742.838801] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 742.843579] ? mutex_unlock+0xd/0x10 [ 742.848011] ? kernfs_activate+0x20e/0x2a0 [ 742.852268] ? kernfs_walk_and_get_ns+0x320/0x320 [ 742.857135] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 742.862697] ? kernfs_link_sibling+0x1d2/0x3b0 [ 742.864171] IPVS: Unknown mcast interface: rose0 [ 742.867303] kernfs_new_node+0x80/0xf0 [ 742.867324] __kernfs_create_file+0x4d/0x330 [ 742.867344] sysfs_add_file_mode_ns+0x21a/0x560 [ 742.867366] internal_create_group+0x282/0x970 2018/05/13 06:34:47 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000000000000000034165d408e2400"}}) [ 742.867389] sysfs_create_groups+0x9b/0x150 [ 742.867405] device_add+0x84d/0x16d0 [ 742.867424] ? device_private_init+0x230/0x230 [ 742.902539] ? kfree+0x1e9/0x260 [ 742.905920] ? kfree_const+0x5e/0x70 [ 742.909650] device_create_groups_vargs+0x1ff/0x270 [ 742.910802] IPVS: Unknown mcast interface: rose0 [ 742.914674] device_create_vargs+0x46/0x60 [ 742.914695] bdi_register_va.part.10+0xbb/0x9b0 [ 742.914711] ? cgwb_kill+0x630/0x630 [ 742.914731] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 742.914744] ? bdi_init+0x416/0x510 2018/05/13 06:34:47 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\x00\x00\n\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 742.914758] ? wb_init+0x9e0/0x9e0 [ 742.914774] ? bdi_alloc_node+0x67/0xe0 [ 742.914785] ? bdi_alloc_node+0x67/0xe0 [ 742.914800] ? rcu_read_lock_sched_held+0x108/0x120 [ 742.914819] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 742.963048] ? _raw_spin_unlock+0x22/0x30 [ 742.967218] bdi_register_va+0x68/0x80 [ 742.971119] super_setup_bdi_name+0x123/0x220 [ 742.975627] ? kill_block_super+0x100/0x100 [ 742.979963] ? kmem_cache_alloc_trace+0x616/0x780 [ 742.984817] ? match_wildcard+0x3c0/0x3c0 2018/05/13 06:34:47 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000068a6169000"}}) 2018/05/13 06:34:47 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000000000000000000000000ffffff8d00"}}) [ 742.988980] ? trace_hardirqs_on+0xd/0x10 [ 742.993148] fuse_fill_super+0xe6e/0x1e20 [ 742.997314] ? fuse_get_root_inode+0x190/0x190 [ 743.001990] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 743.007023] ? kasan_check_read+0x11/0x20 [ 743.011183] ? cap_capable+0x1f9/0x260 [ 743.015081] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 743.020618] ? security_capable+0x99/0xc0 [ 743.024777] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 743.028451] IPVS: Unknown mcast interface: rose0 [ 743.030320] ? ns_capable_common+0x13f/0x170 [ 743.030339] ? get_anon_bdev+0x2f0/0x2f0 [ 743.030354] ? sget+0x113/0x150 [ 743.030373] ? fuse_get_root_inode+0x190/0x190 [ 743.030389] mount_nodev+0x6b/0x110 [ 743.030406] fuse_mount+0x2c/0x40 [ 743.030422] mount_fs+0xae/0x328 [ 743.030440] vfs_kern_mount.part.34+0xd4/0x4d0 [ 743.030456] ? may_umount+0xb0/0xb0 [ 743.056188] IPVS: Unknown mcast interface: rose0 [ 743.058548] ? _raw_read_unlock+0x22/0x30 [ 743.058563] ? __get_fs_type+0x97/0xc0 [ 743.058583] do_mount+0x564/0x3070 [ 743.058605] ? copy_mount_string+0x40/0x40 [ 743.058622] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 743.058640] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 743.058658] ? retint_kernel+0x10/0x10 [ 743.058677] ? copy_mount_options+0x1f0/0x380 [ 743.108826] ? copy_mount_options+0x202/0x380 [ 743.113340] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 743.118886] ? copy_mount_options+0x285/0x380 [ 743.123393] ksys_mount+0x12d/0x140 [ 743.127027] __x64_sys_mount+0xbe/0x150 [ 743.131010] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 743.136037] do_syscall_64+0x1b1/0x800 [ 743.139933] ? finish_task_switch+0x1ca/0x810 [ 743.144440] ? syscall_return_slowpath+0x5c0/0x5c0 [ 743.149381] ? syscall_return_slowpath+0x30f/0x5c0 [ 743.154323] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 743.159699] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 743.164558] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 743.169761] RIP: 0033:0x455979 [ 743.172948] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 743.180663] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 743.188035] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 743.195319] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 743.202601] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 743.209883] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 743.290839] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 2018/05/13 06:34:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121"}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:47 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000000000000000007fffff"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:47 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00'}}) 2018/05/13 06:34:47 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000001400"}}) 2018/05/13 06:34:47 executing program 1 (fault-call:3 fault-nth:58): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:34:47 executing program 5: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r0, 0x4010ae74, &(0x7f0000000000)={0x4, 0x1, 0xffffffffffffffff}) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, 0x0) sync() lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)=0x0) ptrace$setregs(0xf, r1, 0xc10, &(0x7f0000000140)="3d635f7b54ae291344d69030e7941776dfdb85d3908c0d7662ee9555d8923dbdf86366f154bf92a1c8676827d83f292683ff416c0d556716cd669646e7605643e65028e63015b0b198e2ff43270fd6a65ad891ff6c890072daa712f5f81fd24b03a580f56d18d6a07a9bb2700e707fc22b8d2270be767471f63993f6ba65") getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000001140)=""/121, 0x56) 2018/05/13 06:34:47 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0xa04000000000000, 0x1000000000282) 2018/05/13 06:34:47 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121"}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) [ 743.555045] IPVS: Unknown mcast interface: rose0 2018/05/13 06:34:48 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x200000000000000, 0x1000000000282) [ 743.582717] IPVS: Unknown mcast interface: rose0 [ 743.622557] FAULT_INJECTION: forcing a failure. [ 743.622557] name failslab, interval 1, probability 0, space 0, times 0 [ 743.634367] CPU: 0 PID: 18795 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 743.641659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 743.651021] Call Trace: [ 743.653628] dump_stack+0x1b9/0x294 [ 743.657277] ? dump_stack_print_info.cold.2+0x52/0x52 [ 743.662491] should_fail.cold.4+0xa/0x1a [ 743.666573] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 743.671705] ? graph_lock+0x170/0x170 [ 743.675523] ? lock_downgrade+0x8e0/0x8e0 [ 743.679683] ? find_held_lock+0x36/0x1c0 [ 743.683776] ? __lock_is_held+0xb5/0x140 [ 743.687867] ? check_same_owner+0x320/0x320 [ 743.692207] ? wait_for_completion+0x870/0x870 [ 743.696805] ? rcu_note_context_switch+0x710/0x710 [ 743.701749] ? graph_lock+0x170/0x170 [ 743.705569] __should_failslab+0x124/0x180 [ 743.709829] should_failslab+0x9/0x14 [ 743.713644] kmem_cache_alloc+0x2af/0x760 [ 743.717821] ? __sanitizer_cov_trace_cmp8+0x18/0x20 2018/05/13 06:34:48 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:48 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000400"}}) 2018/05/13 06:34:48 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000000000000000e6f2f400"}}) [ 743.722852] __kernfs_new_node+0xe7/0x580 [ 743.727014] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 743.727625] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 743.731776] ? kernfs_walk_and_get_ns+0x320/0x320 [ 743.731800] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 743.731820] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 743.731836] ? kernfs_put+0x493/0x750 [ 743.731852] ? kernfs_add_one+0x129/0x4d0 [ 743.731868] ? kernfs_get+0x30/0x30 [ 743.731883] kernfs_new_node+0x80/0xf0 2018/05/13 06:34:48 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000000000000000000000000400"}}) [ 743.731902] kernfs_create_dir_ns+0x3d/0x140 [ 743.775297] internal_create_group+0x110/0x970 [ 743.779890] ? internal_create_group+0x347/0x970 [ 743.784660] sysfs_create_group+0x1f/0x30 [ 743.788834] dpm_sysfs_add+0x26/0x210 [ 743.790466] IPVS: Unknown mcast interface: rose0 [ 743.792650] device_add+0xa11/0x16d0 [ 743.792672] ? device_private_init+0x230/0x230 [ 743.792689] ? kfree+0x1e9/0x260 [ 743.792713] ? kfree_const+0x5e/0x70 [ 743.792733] device_create_groups_vargs+0x1ff/0x270 [ 743.792750] device_create_vargs+0x46/0x60 2018/05/13 06:34:48 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000009016a66800"}}) [ 743.792768] bdi_register_va.part.10+0xbb/0x9b0 [ 743.826747] ? cgwb_kill+0x630/0x630 [ 743.830481] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 743.836029] ? bdi_init+0x416/0x510 [ 743.839680] ? wb_init+0x9e0/0x9e0 [ 743.843233] ? bdi_alloc_node+0x67/0xe0 [ 743.847213] ? bdi_alloc_node+0x67/0xe0 [ 743.851196] ? rcu_read_lock_sched_held+0x108/0x120 [ 743.856229] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 743.861519] ? _raw_spin_unlock+0x22/0x30 [ 743.865684] bdi_register_va+0x68/0x80 2018/05/13 06:34:48 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000000000000000000f00"}}) [ 743.869602] super_setup_bdi_name+0x123/0x220 [ 743.874110] ? kill_block_super+0x100/0x100 [ 743.878449] ? kmem_cache_alloc_trace+0x616/0x780 [ 743.883310] ? match_wildcard+0x3c0/0x3c0 [ 743.887474] ? trace_hardirqs_on+0xd/0x10 [ 743.891640] fuse_fill_super+0xe6e/0x1e20 [ 743.895811] ? fuse_get_root_inode+0x190/0x190 [ 743.900420] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 743.905465] ? kasan_check_read+0x11/0x20 [ 743.909630] ? cap_capable+0x1f9/0x260 [ 743.913541] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 743.919094] ? security_capable+0x99/0xc0 [ 743.923258] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 743.928802] ? ns_capable_common+0x13f/0x170 [ 743.933218] ? get_anon_bdev+0x2f0/0x2f0 [ 743.937288] ? sget+0x113/0x150 [ 743.940580] ? fuse_get_root_inode+0x190/0x190 [ 743.945170] mount_nodev+0x6b/0x110 [ 743.948806] fuse_mount+0x2c/0x40 [ 743.952267] mount_fs+0xae/0x328 [ 743.955648] vfs_kern_mount.part.34+0xd4/0x4d0 [ 743.960240] ? may_umount+0xb0/0xb0 [ 743.963876] ? _raw_read_unlock+0x22/0x30 [ 743.968117] ? __get_fs_type+0x97/0xc0 2018/05/13 06:34:48 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000f00"}}) [ 743.972014] do_mount+0x564/0x3070 [ 743.976265] ? copy_mount_string+0x40/0x40 [ 743.980508] ? rcu_pm_notify+0xc0/0xc0 [ 743.984411] ? copy_mount_options+0x5f/0x380 [ 743.988831] ? rcu_read_lock_sched_held+0x108/0x120 [ 743.993860] ? kmem_cache_alloc_trace+0x616/0x780 [ 743.998732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 744.004303] ? _copy_from_user+0xdf/0x150 [ 744.008474] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 744.014024] ? copy_mount_options+0x285/0x380 [ 744.018539] ksys_mount+0x12d/0x140 [ 744.022187] __x64_sys_mount+0xbe/0x150 [ 744.026173] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 744.031199] do_syscall_64+0x1b1/0x800 [ 744.035095] ? finish_task_switch+0x1ca/0x810 [ 744.039598] ? syscall_return_slowpath+0x5c0/0x5c0 [ 744.044548] ? syscall_return_slowpath+0x30f/0x5c0 [ 744.049487] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 744.054865] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 744.059729] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 744.064917] RIP: 0033:0x455979 [ 744.068110] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 744.075831] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 744.083104] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 744.090366] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 744.097624] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 744.104883] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 744.180743] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 2018/05/13 06:34:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121"}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:48 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000000000000000000007ffffffff000"}}) 2018/05/13 06:34:48 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000000000000000000003"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:48 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}}) 2018/05/13 06:34:48 executing program 1 (fault-call:3 fault-nth:59): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:34:48 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x300000000000000, 0x1000000000282) 2018/05/13 06:34:48 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, 0x0) sync() r0 = open(&(0x7f0000000280)='./file0\x00', 0x8001, 0x2) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f00000002c0)={{0x9, 0x223}, 'port0\x00', 0x2, 0x1000, 0x1ff, 0xfffffffffffff00e, 0xacc, 0x214, 0x3f, 0x0, 0x2, 0x4}) socketpair(0x11, 0x801, 0xfffffffffffffffd, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCSABS3F(r1, 0x401845ff, &(0x7f0000000240)={0x80000001, 0x5, 0x4, 0xffffffff, 0x0, 0x5}) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f0000000380)="0000000201000000000000010400000000000000", 0x14, 0x4000000000000000) listen$netrom(r1, 0x2) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000001140)=""/121, 0x56) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xd7ee, 0x200) sendto$ax25(r2, &(0x7f0000000140)="2a5d8cae2cd3a689eea946eea069d835b39c5441e98dddc5ad64929faf85ccc7c905cc54e43ec51b1e5a418418514f04cdf76995ef038b51700353ec7cad5c81deed2ab44926aa147c1fcb08e50d0d865ba80160ea4b8daad6f20c5e49ed2132d2dd124d96455a970e9f99d456878502f2e2130d31f1280aaeccc0b5c42e44877c62da3c0a976c9d87ae8859ac34ef25db37a2922dc1b890d3126461024c7c236899a9ac5a7badeb08b35fa223a7931676cc7cbb189ed869", 0xb8, 0x800, &(0x7f0000000080)={0x3, {"4b33c7bc9eca87"}, 0x3}, 0x10) 2018/05/13 06:34:48 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121"}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) [ 744.432188] IPVS: Unknown mcast interface: rose0 2018/05/13 06:34:48 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x804000000000000, 0x1000000000282) [ 744.455401] FAULT_INJECTION: forcing a failure. [ 744.455401] name failslab, interval 1, probability 0, space 0, times 0 [ 744.466748] CPU: 0 PID: 18856 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 744.474037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 744.483407] Call Trace: [ 744.486020] dump_stack+0x1b9/0x294 [ 744.489674] ? dump_stack_print_info.cold.2+0x52/0x52 [ 744.492960] IPVS: Unknown mcast interface: rose0 [ 744.494881] should_fail.cold.4+0xa/0x1a 2018/05/13 06:34:48 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) [ 744.494902] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 744.494924] ? graph_lock+0x170/0x170 [ 744.494943] ? lock_downgrade+0x8e0/0x8e0 [ 744.516807] ? find_held_lock+0x36/0x1c0 [ 744.520897] ? __lock_is_held+0xb5/0x140 [ 744.524987] ? check_same_owner+0x320/0x320 [ 744.529330] ? wait_for_completion+0x870/0x870 [ 744.533935] ? rcu_note_context_switch+0x710/0x710 [ 744.538875] ? graph_lock+0x170/0x170 [ 744.542692] __should_failslab+0x124/0x180 [ 744.546942] should_failslab+0x9/0x14 [ 744.550757] kmem_cache_alloc+0x2af/0x760 2018/05/13 06:34:49 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 744.554927] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 744.559955] __kernfs_new_node+0xe7/0x580 [ 744.564119] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 744.568888] ? kernfs_walk_and_get_ns+0x320/0x320 [ 744.573743] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 744.579296] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 744.584848] ? kernfs_put+0x493/0x750 [ 744.588666] ? kernfs_add_one+0x129/0x4d0 [ 744.592824] ? kernfs_get+0x30/0x30 [ 744.596465] kernfs_new_node+0x80/0xf0 [ 744.600364] kernfs_create_dir_ns+0x3d/0x140 2018/05/13 06:34:49 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000600"}}) [ 744.604788] internal_create_group+0x110/0x970 [ 744.609378] ? internal_create_group+0x347/0x970 [ 744.614152] sysfs_create_group+0x1f/0x30 [ 744.618317] dpm_sysfs_add+0x26/0x210 [ 744.619990] IPVS: Unknown mcast interface: rose0 [ 744.622182] device_add+0xa11/0x16d0 [ 744.622205] ? device_private_init+0x230/0x230 [ 744.622220] ? kfree+0x1e9/0x260 [ 744.622239] ? kfree_const+0x5e/0x70 [ 744.622259] device_create_groups_vargs+0x1ff/0x270 [ 744.622277] device_create_vargs+0x46/0x60 [ 744.622296] bdi_register_va.part.10+0xbb/0x9b0 [ 744.622313] ? cgwb_kill+0x630/0x630 [ 744.622329] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 744.622344] ? bdi_init+0x416/0x510 [ 744.644668] IPVS: Unknown mcast interface: rose0 [ 744.647436] ? wb_init+0x9e0/0x9e0 [ 744.647454] ? bdi_alloc_node+0x67/0xe0 [ 744.647467] ? bdi_alloc_node+0x67/0xe0 [ 744.647484] ? rcu_read_lock_sched_held+0x108/0x120 [ 744.647501] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 744.647522] ? _raw_spin_unlock+0x22/0x30 [ 744.647541] bdi_register_va+0x68/0x80 2018/05/13 06:34:49 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000000000000000000000000fffffe00"}}) 2018/05/13 06:34:49 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000000007fffffff00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:49 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000500"}}) [ 744.647561] super_setup_bdi_name+0x123/0x220 [ 744.647575] ? kill_block_super+0x100/0x100 [ 744.647593] ? kmem_cache_alloc_trace+0x616/0x780 [ 744.717396] ? match_wildcard+0x3c0/0x3c0 [ 744.721558] ? trace_hardirqs_on+0xd/0x10 [ 744.725729] fuse_fill_super+0xe6e/0x1e20 [ 744.729895] ? fuse_get_root_inode+0x190/0x190 [ 744.734487] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 744.739518] ? kasan_check_read+0x11/0x20 [ 744.743677] ? cap_capable+0x1f9/0x260 [ 744.747592] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 744.753234] ? security_capable+0x99/0xc0 [ 744.757402] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 744.762954] ? ns_capable_common+0x13f/0x170 [ 744.767384] ? get_anon_bdev+0x2f0/0x2f0 [ 744.771462] ? sget+0x113/0x150 [ 744.774758] ? fuse_get_root_inode+0x190/0x190 [ 744.774941] IPVS: Unknown mcast interface: rose0 [ 744.779352] mount_nodev+0x6b/0x110 [ 744.779369] fuse_mount+0x2c/0x40 [ 744.779386] mount_fs+0xae/0x328 [ 744.779406] vfs_kern_mount.part.34+0xd4/0x4d0 [ 744.779422] ? may_umount+0xb0/0xb0 [ 744.779436] ? _raw_read_unlock+0x22/0x30 2018/05/13 06:34:49 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000000000000000000000000000000400"}}) [ 744.779449] ? __get_fs_type+0x97/0xc0 [ 744.779469] do_mount+0x564/0x3070 [ 744.779489] ? copy_mount_string+0x40/0x40 [ 744.779507] ? rcu_pm_notify+0xc0/0xc0 [ 744.817735] IPVS: Unknown mcast interface: rose0 [ 744.818691] ? copy_mount_options+0x5f/0x380 [ 744.818708] ? rcu_read_lock_sched_held+0x108/0x120 [ 744.818726] ? kmem_cache_alloc_trace+0x616/0x780 [ 744.818748] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 744.818766] ? _copy_from_user+0xdf/0x150 [ 744.818786] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 744.818805] ? copy_mount_options+0x285/0x380 [ 744.861343] ksys_mount+0x12d/0x140 [ 744.864981] __x64_sys_mount+0xbe/0x150 [ 744.868967] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 744.873998] do_syscall_64+0x1b1/0x800 [ 744.877893] ? finish_task_switch+0x1ca/0x810 [ 744.882408] ? syscall_return_slowpath+0x5c0/0x5c0 [ 744.887348] ? syscall_return_slowpath+0x30f/0x5c0 [ 744.892297] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 744.897684] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 744.902543] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 744.907741] RIP: 0033:0x455979 [ 744.910932] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 744.918648] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 744.922783] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 744.925921] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 744.925931] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 744.925939] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 744.925948] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 745.059549] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 2018/05/13 06:34:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121"}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:49 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000300"}}) 2018/05/13 06:34:49 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000000000000500"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:49 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000000000000000000000000500"}}) 2018/05/13 06:34:49 executing program 1 (fault-call:3 fault-nth:60): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:34:49 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x7, 0x1000000000282) 2018/05/13 06:34:49 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, 0x0) sync() sync() lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000240)=0xc) r1 = gettid() r2 = syz_fuse_mount(&(0x7f0000000280)='./file0\x00', 0x2000, 0xffffffffffffffff, 0xffffffffffffffff, 0x9, 0x4000) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x4000, 0x0) openat$cgroup(r3, &(0x7f0000000440)='syz0\x00', 0x200002, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xd, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2}, [@call={0x85, 0x0, 0x0, 0x3e}], {0x95}}, &(0x7f0000000300)='GPL\x00', 0x2, 0x13, &(0x7f0000000340)=""/19, 0x9060b91ed389ca29, 0x1}, 0x48) kcmp(r0, r1, 0x7, r2, r4) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x8000, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r5, 0x800442d3, &(0x7f0000000080)={0x1, 0x3e, 0x5477, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'bond_slave_1\x00'}) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000001140)=""/121, 0x56) rename(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00') setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000140)=0x7f, 0x4) 2018/05/13 06:34:49 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121"}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) [ 745.338671] IPVS: Unknown mcast interface: rose0 2018/05/13 06:34:49 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x8, 0x1000000000282) [ 745.367800] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 745.376790] IPVS: Unknown mcast interface: rose0 [ 745.386774] FAULT_INJECTION: forcing a failure. [ 745.386774] name failslab, interval 1, probability 0, space 0, times 0 [ 745.398103] CPU: 0 PID: 18919 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 745.405390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 745.414926] Call Trace: 2018/05/13 06:34:49 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 745.417538] dump_stack+0x1b9/0x294 [ 745.421185] ? dump_stack_print_info.cold.2+0x52/0x52 [ 745.426390] ? __mutex_lock+0x7d9/0x17f0 [ 745.430473] should_fail.cold.4+0xa/0x1a [ 745.434561] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 745.439679] ? kasan_kmalloc+0xc4/0xe0 [ 745.443601] ? graph_lock+0x170/0x170 [ 745.447423] ? find_held_lock+0x36/0x1c0 [ 745.451509] ? __lock_is_held+0xb5/0x140 [ 745.455607] ? check_same_owner+0x320/0x320 [ 745.459941] ? kasan_check_write+0x14/0x20 2018/05/13 06:34:49 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x700000000000000, 0x1000000000282) 2018/05/13 06:34:49 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000000000000000000500"}}) [ 745.460223] IPVS: Unknown mcast interface: rose0 [ 745.464187] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 745.464207] ? rcu_note_context_switch+0x710/0x710 [ 745.464229] __should_failslab+0x124/0x180 [ 745.464248] should_failslab+0x9/0x14 [ 745.464263] kmem_cache_alloc+0x2af/0x760 [ 745.464277] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 745.464302] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 745.500972] __kernfs_new_node+0xe7/0x580 [ 745.505146] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 745.509928] ? mutex_unlock+0xd/0x10 [ 745.513666] ? kernfs_activate+0x20e/0x2a0 2018/05/13 06:34:49 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000040d200"}}) [ 745.515143] IPVS: Unknown mcast interface: rose0 [ 745.517914] ? kernfs_walk_and_get_ns+0x320/0x320 [ 745.517936] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 745.517952] ? kernfs_link_sibling+0x1d2/0x3b0 [ 745.517973] kernfs_new_node+0x80/0xf0 [ 745.517992] __kernfs_create_file+0x4d/0x330 [ 745.518011] sysfs_add_file_mode_ns+0x21a/0x560 [ 745.518033] sysfs_add_file+0x4e/0x60 [ 745.518055] sysfs_merge_group+0xfa/0x230 [ 745.558603] dpm_sysfs_add+0x161/0x210 [ 745.562502] device_add+0xa11/0x16d0 [ 745.566229] ? device_private_init+0x230/0x230 [ 745.570816] ? kfree+0x1e9/0x260 [ 745.574197] ? kfree_const+0x5e/0x70 [ 745.577924] device_create_groups_vargs+0x1ff/0x270 [ 745.582952] device_create_vargs+0x46/0x60 [ 745.587207] bdi_register_va.part.10+0xbb/0x9b0 [ 745.591880] ? cgwb_kill+0x630/0x630 [ 745.595606] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 745.601152] ? bdi_init+0x416/0x510 [ 745.604783] ? wb_init+0x9e0/0x9e0 [ 745.608325] ? bdi_alloc_node+0x67/0xe0 [ 745.612302] ? bdi_alloc_node+0x67/0xe0 2018/05/13 06:34:50 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\x00\x00\x00\x00\x00\a\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:50 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000000000000000000000000100"}}) 2018/05/13 06:34:50 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000200"}}) [ 745.616287] ? rcu_read_lock_sched_held+0x108/0x120 [ 745.621316] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 745.626611] ? _raw_spin_unlock+0x22/0x30 [ 745.630771] bdi_register_va+0x68/0x80 [ 745.634673] super_setup_bdi_name+0x123/0x220 [ 745.639174] ? kill_block_super+0x100/0x100 [ 745.643505] ? kmem_cache_alloc_trace+0x616/0x780 [ 745.648360] ? match_wildcard+0x3c0/0x3c0 [ 745.652518] ? trace_hardirqs_on+0xd/0x10 [ 745.656688] fuse_fill_super+0xe6e/0x1e20 [ 745.660852] ? fuse_get_root_inode+0x190/0x190 [ 745.665450] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 745.670485] ? kasan_check_read+0x11/0x20 [ 745.674658] ? cap_capable+0x1f9/0x260 [ 745.678582] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 745.684136] ? security_capable+0x99/0xc0 [ 745.688306] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 745.693857] ? ns_capable_common+0x13f/0x170 [ 745.698282] ? get_anon_bdev+0x2f0/0x2f0 [ 745.702358] ? sget+0x113/0x150 [ 745.705655] ? fuse_get_root_inode+0x190/0x190 [ 745.710253] mount_nodev+0x6b/0x110 [ 745.713896] fuse_mount+0x2c/0x40 [ 745.717361] mount_fs+0xae/0x328 [ 745.720741] vfs_kern_mount.part.34+0xd4/0x4d0 [ 745.725328] ? may_umount+0xb0/0xb0 [ 745.728960] ? _raw_read_unlock+0x22/0x30 [ 745.733116] ? __get_fs_type+0x97/0xc0 [ 745.737016] do_mount+0x564/0x3070 [ 745.740569] ? copy_mount_string+0x40/0x40 [ 745.744810] ? rcu_pm_notify+0xc0/0xc0 [ 745.748716] ? copy_mount_options+0x5f/0x380 [ 745.753131] ? rcu_read_lock_sched_held+0x108/0x120 [ 745.758156] ? kmem_cache_alloc_trace+0x616/0x780 [ 745.763013] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 745.768566] ? _copy_from_user+0xdf/0x150 [ 745.772728] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 745.778273] ? copy_mount_options+0x285/0x380 [ 745.782784] ksys_mount+0x12d/0x140 [ 745.786421] __x64_sys_mount+0xbe/0x150 [ 745.790403] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 745.795434] do_syscall_64+0x1b1/0x800 [ 745.799345] ? finish_task_switch+0x1ca/0x810 [ 745.800935] IPVS: Unknown mcast interface: rose0 [ 745.803853] ? syscall_return_slowpath+0x5c0/0x5c0 [ 745.803870] ? syscall_return_slowpath+0x30f/0x5c0 [ 745.803890] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 745.803910] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 745.803930] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 745.803942] RIP: 0033:0x455979 [ 745.803950] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 745.803966] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 745.803974] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 745.803982] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 745.803990] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 745.804003] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 745.815373] IPVS: Unknown mcast interface: rose0 [ 745.960624] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 2018/05/13 06:34:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121"}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:50 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000feffff00"}}) 2018/05/13 06:34:50 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0xb040000, 0x1000000000282) 2018/05/13 06:34:50 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000000000000f00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:50 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000000000000000405d163400"}}) 2018/05/13 06:34:50 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, 0x0) syz_read_part_table(0x4, 0xa, &(0x7f0000000640)=[{&(0x7f0000000140)="a2e308644dab7437e6a7ddde1ddc6df3616c8ac9aca0e29f34c1f2305b710b8301be68efb4c00fca1b5bf6537e655123ebc42c873e6fde9edc764c7af74f257987a2e57e9cb0e84c1027208a96c8442719f24f68b2d1a9c0dc35bfb6a4e2b462260cae36c869cc7b04", 0x69, 0x31a0}, {&(0x7f00000001c0)="d185be98bf90c185ae728bc5a604dde5804e46392e5a474a86a2ee24539742447453343940152bec1683a35633e63441a1bce7c80e5babd502ca2f0962092f605421f43823c21c592977e47e4cd46ded8fe77febf1bdd30131932602284c96ac662d5b33e6930ba9a89e2ae51405b3c5733240b5f6eba521ed2b03de6261208670d709e1906613586b10653d7a52ae7b8d70dddfd9a763de09f879c554f8232da491ee35afe63931723611eb05cc566f1ab0a08f60f93d837f85e9afae5cd27d42f2edc16d837ff0784e13670446280fdd94aff11a290b409d15b5f2b8b351d843753111d348be954112106c", 0xec, 0x3}, {&(0x7f00000002c0)="3cf0f8d79fd806649b3545f76f37809d4c9688077fb501262942c338ece4ae4b91fa5f863ff10bcd1fbe824dbc5e770e59d247fd96da45d35f72279f74a3a519c025f1536f4df1dcbb151abc72e82e4e6ce45050c07f124261108a034d0947fad426afbb4e5c12110c9bc5ecfa2325297d06dcb4be72fd73d3b0147b98e032d3adbb9aa46507d09cf8d30fbe39d3258eb842b397fe4a75bfea7adf01fdb1a696966afc9d1367d351b48e50ec34abf3", 0xaf, 0x6}, {&(0x7f0000000380)="e08e3fa30a426285e79f50953518c3268d27918e78d443b8406aca6adf8183d53bb124b01666ece6134b8c74e8ed575e544370bd1a60f0fc5c16f264e1bf791208d97d3d1e", 0x45, 0xff}, {&(0x7f0000000400)="f77a269db21d8004ce6bff15688b91db24b9c9cf34786f1f3703605eeb40ad16b2e3fed33366784c2d876573221d292fd7d6d3b9e95bf3994625333afa27f7a6e26e1d20700e18868b1aefdc5577c38001261226f1d4901e3b276aa9b1971be7e9bca032daaa2bfa", 0x68, 0x6}, {&(0x7f0000000000)="9393b77041", 0x5, 0x80000001}, {&(0x7f0000000480)="7b726c62ac6124ff4515eb98274756bf0c33670deed0c5917c8a74f32cba43ffda900c57c79e5f6d0114a4c84c830e6151d29acfba2d19f63cdfb7d00162bddac49372aff4b563367773b542cb56d90eec15fa847cc9246cce2c5177a27d88092c72aa7f61cb27a5c367b5021377877357ea546d044f01afca65a9ae386c0f6c8accf3d23e8823581b0052439216b8c85f471424994e31ab99d3c30985d024db1ac6091af1d5623c49551d271e7b0a80a250d8021a9a31d4762147ce7c9355974208d20e4458e21770cf9e4eab4c97fe76", 0xd1, 0x4}, {&(0x7f0000000580)="035e33817a17fbd7d5d98b9268bb57a1ff198a8d0ad616aa5fea46fe2da3ef6872a15903edee333fda9d6a2000f31af6614dcaed5c59005c01488acc3eaaa9f7fe4518745ebfc7bbfa6426f38cff413f13835846890ee82c2c2e29fdf0a7185ede7f4376b55350d118a84ca6c17e767c75084deb5295ed5de1ffed10788ba974d633eb47655647efb940c0c3b51e202f2c3d6b24258760b75c2eba2bed33f9c971", 0xa1, 0x8}, {&(0x7f0000000080)="743819ee81bf6aa16269821c1937fe24a0ba5f4e", 0x14, 0x3}, {&(0x7f00000011c0)="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", 0x1000, 0x8}]) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000740)) sync() lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000001140)=""/121, 0x56) 2018/05/13 06:34:50 executing program 1 (fault-call:3 fault-nth:61): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:34:50 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121"}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) [ 746.217376] IPVS: Unknown mcast interface: rose0 [ 746.249088] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 746.257407] IPVS: Unknown mcast interface: rose0 [ 746.268407] FAULT_INJECTION: forcing a failure. [ 746.268407] name failslab, interval 1, probability 0, space 0, times 0 [ 746.279791] CPU: 0 PID: 18980 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 746.287083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 746.296443] Call Trace: [ 746.299055] dump_stack+0x1b9/0x294 [ 746.302705] ? dump_stack_print_info.cold.2+0x52/0x52 [ 746.307908] ? __mutex_lock+0x7d9/0x17f0 [ 746.312011] should_fail.cold.4+0xa/0x1a [ 746.316090] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 746.321205] ? kasan_kmalloc+0xc4/0xe0 [ 746.325107] ? graph_lock+0x170/0x170 [ 746.328927] ? find_held_lock+0x36/0x1c0 [ 746.333000] ? __lock_is_held+0xb5/0x140 [ 746.337084] ? check_same_owner+0x320/0x320 [ 746.341488] ? kasan_check_write+0x14/0x20 [ 746.345733] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 746.350676] ? rcu_note_context_switch+0x710/0x710 [ 746.355619] __should_failslab+0x124/0x180 [ 746.359865] should_failslab+0x9/0x14 [ 746.363676] kmem_cache_alloc+0x2af/0x760 [ 746.367840] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 746.372790] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 746.377827] __kernfs_new_node+0xe7/0x580 [ 746.381990] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 746.386758] ? mutex_unlock+0xd/0x10 [ 746.390489] ? kernfs_activate+0x20e/0x2a0 [ 746.394744] ? kernfs_walk_and_get_ns+0x320/0x320 [ 746.399604] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 746.405145] ? kernfs_link_sibling+0x1d2/0x3b0 [ 746.409748] kernfs_new_node+0x80/0xf0 [ 746.413653] __kernfs_create_file+0x4d/0x330 [ 746.418085] sysfs_add_file_mode_ns+0x21a/0x560 [ 746.422772] sysfs_add_file+0x4e/0x60 [ 746.426589] sysfs_merge_group+0xfa/0x230 [ 746.430753] dpm_sysfs_add+0x161/0x210 [ 746.434654] device_add+0xa11/0x16d0 [ 746.438385] ? device_private_init+0x230/0x230 [ 746.443065] ? kfree+0x1e9/0x260 [ 746.446450] ? kfree_const+0x5e/0x70 [ 746.450194] device_create_groups_vargs+0x1ff/0x270 [ 746.455227] device_create_vargs+0x46/0x60 [ 746.459484] bdi_register_va.part.10+0xbb/0x9b0 [ 746.464163] ? cgwb_kill+0x630/0x630 [ 746.467888] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 746.473433] ? bdi_init+0x416/0x510 [ 746.477067] ? wb_init+0x9e0/0x9e0 [ 746.480617] ? bdi_alloc_node+0x67/0xe0 [ 746.484603] ? bdi_alloc_node+0x67/0xe0 [ 746.488594] ? rcu_read_lock_sched_held+0x108/0x120 [ 746.493621] ? kmem_cache_alloc_node_trace+0x34e/0x770 2018/05/13 06:34:50 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x1000000, 0x1000000000282) 2018/05/13 06:34:50 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000068a6169000"}}) 2018/05/13 06:34:50 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000000000000000001000"}}) 2018/05/13 06:34:50 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x2400, 0x1000000000282) 2018/05/13 06:34:50 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000000000000000000000000000008000"}}) 2018/05/13 06:34:50 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000300"}}) 2018/05/13 06:34:50 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x406, 0x1000000000282) [ 746.498915] ? _raw_spin_unlock+0x22/0x30 [ 746.503085] bdi_register_va+0x68/0x80 [ 746.506990] super_setup_bdi_name+0x123/0x220 [ 746.511496] ? kill_block_super+0x100/0x100 [ 746.515830] ? kmem_cache_alloc_trace+0x616/0x780 [ 746.520685] ? match_wildcard+0x3c0/0x3c0 [ 746.524845] ? trace_hardirqs_on+0xd/0x10 [ 746.529013] fuse_fill_super+0xe6e/0x1e20 [ 746.533181] ? fuse_get_root_inode+0x190/0x190 [ 746.537779] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 746.542812] ? kasan_check_read+0x11/0x20 [ 746.546975] ? cap_capable+0x1f9/0x260 2018/05/13 06:34:51 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}}) [ 746.550880] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 746.556427] ? security_capable+0x99/0xc0 [ 746.560600] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 746.566146] ? ns_capable_common+0x13f/0x170 [ 746.570569] ? get_anon_bdev+0x2f0/0x2f0 [ 746.574641] ? sget+0x113/0x150 [ 746.577929] ? fuse_get_root_inode+0x190/0x190 [ 746.582517] mount_nodev+0x6b/0x110 [ 746.586152] fuse_mount+0x2c/0x40 [ 746.589620] mount_fs+0xae/0x328 [ 746.593005] vfs_kern_mount.part.34+0xd4/0x4d0 [ 746.597597] ? may_umount+0xb0/0xb0 [ 746.601230] ? _raw_read_unlock+0x22/0x30 [ 746.605384] ? __get_fs_type+0x97/0xc0 [ 746.609282] do_mount+0x564/0x3070 [ 746.612831] ? copy_mount_string+0x40/0x40 [ 746.617073] ? rcu_pm_notify+0xc0/0xc0 [ 746.620973] ? copy_mount_options+0x5f/0x380 [ 746.625390] ? rcu_read_lock_sched_held+0x108/0x120 [ 746.630413] ? kmem_cache_alloc_trace+0x616/0x780 [ 746.635274] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 746.640820] ? _copy_from_user+0xdf/0x150 [ 746.644980] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 746.650527] ? copy_mount_options+0x285/0x380 [ 746.655035] ksys_mount+0x12d/0x140 [ 746.658672] __x64_sys_mount+0xbe/0x150 [ 746.662657] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 746.667683] do_syscall_64+0x1b1/0x800 [ 746.671579] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 746.676437] ? syscall_return_slowpath+0x5c0/0x5c0 [ 746.681474] ? syscall_return_slowpath+0x30f/0x5c0 [ 746.686417] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 746.691805] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 746.696667] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 746.701858] RIP: 0033:0x455979 [ 746.705054] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 746.712766] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 746.720030] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 746.727296] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 746.734552] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 746.741817] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 746.840402] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 2018/05/13 06:34:51 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}}) 2018/05/13 06:34:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121"}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:51 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000000000000000000000000000000f00"}}) 2018/05/13 06:34:51 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0xb04000000000000, 0x1000000000282) 2018/05/13 06:34:51 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, 0x0) sync() lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x44100, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000240)={{0x2, 0x4e22}, {0x306, @random="1dfd200c5124"}, 0x50, {0x2, 0x4e23, @rand_addr=0x3}, 'ip6gretap0\x00'}) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000001140)=""/121, 0x56) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc800, 0x0) sendto$inet(r1, &(0x7f0000000140)="357fc450ae64da2a550d48065854e705f5305a5c8b4d61618759290c32a2d9b2e76ebe83c77362abb2d91aaa71690fe7ab13d24e04c729fd6f827316213efa02d9d91a5c91de55f16c7232d303481a2155b9de3509830cc7916a6c0bc2a5f7b94da2d5f8cbf9491967109129b035da36ce52dcbbd1beb9b55d0aed99715b20e2782858d8df586697f3eaf71a0ed1fc804d0ca27fbbb3e3efafa1b4880f", 0x9d, 0xd02fe0443a9af711, &(0x7f0000000080)={0x2, 0x4e21}, 0x10) 2018/05/13 06:34:51 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121"}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:51 executing program 1 (fault-call:3 fault-nth:62): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:34:51 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000000000000600"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 747.105661] IPVS: Unknown mcast interface: rose0 [ 747.132604] IPVS: Unknown mcast interface: rose0 [ 747.146196] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 747.152574] FAULT_INJECTION: forcing a failure. [ 747.152574] name failslab, interval 1, probability 0, space 0, times 0 [ 747.165247] CPU: 1 PID: 19056 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 747.172525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 747.181883] Call Trace: [ 747.184492] dump_stack+0x1b9/0x294 [ 747.188134] ? dump_stack_print_info.cold.2+0x52/0x52 [ 747.193337] ? __mutex_lock+0x7d9/0x17f0 [ 747.197416] should_fail.cold.4+0xa/0x1a [ 747.201494] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 747.206613] ? kasan_kmalloc+0xc4/0xe0 [ 747.210521] ? graph_lock+0x170/0x170 [ 747.214342] ? find_held_lock+0x36/0x1c0 [ 747.218419] ? __lock_is_held+0xb5/0x140 [ 747.222510] ? check_same_owner+0x320/0x320 [ 747.226843] ? kasan_check_write+0x14/0x20 2018/05/13 06:34:51 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0xa00000000000000, 0x1000000000282) 2018/05/13 06:34:51 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000000000000000500"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:51 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000000000000000000000000000001000"}}) [ 747.231088] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 747.231162] IPVS: Unknown mcast interface: rose0 [ 747.236023] ? rcu_note_context_switch+0x710/0x710 [ 747.236045] __should_failslab+0x124/0x180 [ 747.236066] should_failslab+0x9/0x14 [ 747.236084] kmem_cache_alloc+0x2af/0x760 [ 747.236101] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 747.236124] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 747.236142] __kernfs_new_node+0xe7/0x580 [ 747.236162] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 747.263132] IPVS: Unknown mcast interface: rose0 2018/05/13 06:34:51 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00'}}) 2018/05/13 06:34:51 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000000000000000f00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 747.267911] ? mutex_unlock+0xd/0x10 [ 747.267930] ? kernfs_activate+0x20e/0x2a0 [ 747.267948] ? kernfs_walk_and_get_ns+0x320/0x320 [ 747.267968] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 747.267984] ? kernfs_link_sibling+0x1d2/0x3b0 [ 747.268005] kernfs_new_node+0x80/0xf0 [ 747.268024] __kernfs_create_file+0x4d/0x330 [ 747.268042] sysfs_add_file_mode_ns+0x21a/0x560 [ 747.268062] sysfs_add_file+0x4e/0x60 [ 747.268076] sysfs_merge_group+0xfa/0x230 [ 747.268097] dpm_sysfs_add+0x161/0x210 [ 747.268114] device_add+0xa11/0x16d0 2018/05/13 06:34:51 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}}) [ 747.268131] ? device_private_init+0x230/0x230 [ 747.268143] ? kfree+0x1e9/0x260 [ 747.268159] ? kfree_const+0x5e/0x70 [ 747.268174] device_create_groups_vargs+0x1ff/0x270 [ 747.268190] device_create_vargs+0x46/0x60 [ 747.268207] bdi_register_va.part.10+0xbb/0x9b0 [ 747.268220] ? cgwb_kill+0x630/0x630 [ 747.268236] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 747.268247] ? bdi_init+0x416/0x510 [ 747.268258] ? wb_init+0x9e0/0x9e0 [ 747.268271] ? bdi_alloc_node+0x67/0xe0 [ 747.268281] ? bdi_alloc_node+0x67/0xe0 [ 747.268298] ? rcu_read_lock_sched_held+0x108/0x120 [ 747.352010] IPVS: Unknown mcast interface: rose0 [ 747.354028] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 747.354050] ? _raw_spin_unlock+0x22/0x30 [ 747.354070] bdi_register_va+0x68/0x80 [ 747.354089] super_setup_bdi_name+0x123/0x220 [ 747.354105] ? kill_block_super+0x100/0x100 [ 747.354121] ? kmem_cache_alloc_trace+0x616/0x780 [ 747.354135] ? match_wildcard+0x3c0/0x3c0 [ 747.354153] ? trace_hardirqs_on+0xd/0x10 [ 747.375663] IPVS: Unknown mcast interface: rose0 2018/05/13 06:34:51 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000000000fffff000"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 747.379143] fuse_fill_super+0xe6e/0x1e20 [ 747.379166] ? fuse_get_root_inode+0x190/0x190 [ 747.379187] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 747.379208] ? kasan_check_read+0x11/0x20 [ 747.379226] ? cap_capable+0x1f9/0x260 [ 747.379249] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 747.379264] ? security_capable+0x99/0xc0 [ 747.379284] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 747.469830] ? ns_capable_common+0x13f/0x170 [ 747.474259] ? get_anon_bdev+0x2f0/0x2f0 [ 747.478336] ? sget+0x113/0x150 [ 747.479071] IPVS: Unknown mcast interface: rose0 [ 747.481629] ? fuse_get_root_inode+0x190/0x190 [ 747.481647] mount_nodev+0x6b/0x110 [ 747.481664] fuse_mount+0x2c/0x40 [ 747.481682] mount_fs+0xae/0x328 [ 747.481703] vfs_kern_mount.part.34+0xd4/0x4d0 [ 747.481718] ? may_umount+0xb0/0xb0 [ 747.481732] ? _raw_read_unlock+0x22/0x30 [ 747.481745] ? __get_fs_type+0x97/0xc0 [ 747.481766] do_mount+0x564/0x3070 [ 747.502593] IPVS: Unknown mcast interface: rose0 [ 747.506099] ? copy_mount_string+0x40/0x40 [ 747.506115] ? rcu_pm_notify+0xc0/0xc0 [ 747.506137] ? copy_mount_options+0x5f/0x380 [ 747.506152] ? rcu_read_lock_sched_held+0x108/0x120 [ 747.506170] ? kmem_cache_alloc_trace+0x616/0x780 [ 747.506192] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 747.506209] ? _copy_from_user+0xdf/0x150 [ 747.506228] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 747.506239] ? copy_mount_options+0x285/0x380 [ 747.506256] ksys_mount+0x12d/0x140 [ 747.571793] __x64_sys_mount+0xbe/0x150 [ 747.575782] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 747.580816] do_syscall_64+0x1b1/0x800 [ 747.584718] ? finish_task_switch+0x1ca/0x810 [ 747.589229] ? syscall_return_slowpath+0x5c0/0x5c0 [ 747.594175] ? syscall_return_slowpath+0x30f/0x5c0 [ 747.599117] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 747.604498] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 747.609359] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 747.614558] RIP: 0033:0x455979 [ 747.617745] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 747.625479] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 2018/05/13 06:34:51 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000000000000000000000000200"}}) [ 747.632766] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 747.640033] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 747.647305] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 747.654566] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 747.729995] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 2018/05/13 06:34:52 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000500"}}) 2018/05/13 06:34:52 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121"}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:52 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000000000000000000f00"}}) 2018/05/13 06:34:52 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000000000f00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:52 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x500000000000000, 0x1000000000282) 2018/05/13 06:34:52 executing program 1 (fault-call:3 fault-nth:63): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:34:52 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, 0x0) sync() r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000340)={0xffff, 0xffffffffffffff01, 0x0, 'queue1\x00', 0x10000}) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc02c5341, &(0x7f00000001c0)) ioctl$BLKGETSIZE(r1, 0x1260, &(0x7f0000000400)) ioctl$KVM_CHECK_EXTENSION(r1, 0xae03, 0x2) socket$vsock_dgram(0x28, 0x2, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) getsockopt$sock_buf(r0, 0x1, 0x3f, &(0x7f0000000240)=""/225, &(0x7f0000000140)=0xe1) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=@known='trusted.syz\x00', &(0x7f0000001140)=""/121, 0x79) 2018/05/13 06:34:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121"}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) [ 748.005757] IPVS: Unknown mcast interface: rose0 [ 748.022182] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 748.026411] IPVS: Unknown mcast interface: rose0 [ 748.046831] FAULT_INJECTION: forcing a failure. 2018/05/13 06:34:52 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000000000000000000405d163400"}}) 2018/05/13 06:34:52 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000000000500"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 748.046831] name failslab, interval 1, probability 0, space 0, times 0 [ 748.058183] CPU: 1 PID: 19122 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 748.065470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 748.074837] Call Trace: [ 748.077450] dump_stack+0x1b9/0x294 [ 748.081098] ? dump_stack_print_info.cold.2+0x52/0x52 [ 748.086320] ? __mutex_lock+0x7d9/0x17f0 [ 748.090421] should_fail.cold.4+0xa/0x1a [ 748.094505] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 748.099626] ? kasan_kmalloc+0xc4/0xe0 [ 748.103537] ? graph_lock+0x170/0x170 [ 748.107363] ? find_held_lock+0x36/0x1c0 [ 748.111453] ? __lock_is_held+0xb5/0x140 [ 748.115547] ? check_same_owner+0x320/0x320 [ 748.119886] ? kasan_check_write+0x14/0x20 [ 748.124138] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 748.129086] ? rcu_note_context_switch+0x710/0x710 [ 748.130357] IPVS: Unknown mcast interface: rose0 [ 748.134033] __should_failslab+0x124/0x180 [ 748.134056] should_failslab+0x9/0x14 [ 748.134074] kmem_cache_alloc+0x2af/0x760 [ 748.134093] ? __mutex_unlock_slowpath+0x180/0x8a0 2018/05/13 06:34:52 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000000000000000000000000000000000200"}}) 2018/05/13 06:34:52 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x1100, 0x1000000000282) [ 748.134114] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 748.134136] __kernfs_new_node+0xe7/0x580 [ 748.165100] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 748.169866] ? mutex_unlock+0xd/0x10 [ 748.173592] ? kernfs_activate+0x20e/0x2a0 [ 748.177850] ? kernfs_walk_and_get_ns+0x320/0x320 [ 748.182709] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 748.188260] ? kernfs_link_sibling+0x1d2/0x3b0 [ 748.192860] kernfs_new_node+0x80/0xf0 [ 748.196766] __kernfs_create_file+0x4d/0x330 [ 748.201189] sysfs_add_file_mode_ns+0x21a/0x560 [ 748.205873] sysfs_add_file+0x4e/0x60 [ 748.209684] sysfs_merge_group+0xfa/0x230 [ 748.213848] dpm_sysfs_add+0x161/0x210 [ 748.217752] device_add+0xa11/0x16d0 [ 748.221485] ? device_private_init+0x230/0x230 [ 748.226078] ? kfree+0x1e9/0x260 [ 748.229453] ? kfree_const+0x5e/0x70 [ 748.233176] device_create_groups_vargs+0x1ff/0x270 [ 748.238205] device_create_vargs+0x46/0x60 [ 748.242454] bdi_register_va.part.10+0xbb/0x9b0 [ 748.247124] ? cgwb_kill+0x630/0x630 [ 748.250843] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 748.256380] ? bdi_init+0x416/0x510 [ 748.260007] ? wb_init+0x9e0/0x9e0 [ 748.263551] ? bdi_alloc_node+0x67/0xe0 [ 748.267531] ? bdi_alloc_node+0x67/0xe0 [ 748.271509] ? rcu_read_lock_sched_held+0x108/0x120 [ 748.276534] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 748.281832] ? _raw_spin_unlock+0x22/0x30 [ 748.286001] bdi_register_va+0x68/0x80 [ 748.289907] super_setup_bdi_name+0x123/0x220 [ 748.294408] ? kill_block_super+0x100/0x100 [ 748.298739] ? kmem_cache_alloc_trace+0x616/0x780 [ 748.303591] ? match_wildcard+0x3c0/0x3c0 [ 748.307746] ? trace_hardirqs_on+0xd/0x10 [ 748.311906] fuse_fill_super+0xe6e/0x1e20 [ 748.316072] ? fuse_get_root_inode+0x190/0x190 [ 748.318205] IPVS: Unknown mcast interface: rose0 [ 748.320660] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 748.320682] ? kasan_check_read+0x11/0x20 [ 748.320701] ? cap_capable+0x1f9/0x260 [ 748.320724] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 748.320739] ? security_capable+0x99/0xc0 [ 748.320758] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 748.320772] ? ns_capable_common+0x13f/0x170 [ 748.320787] ? get_anon_bdev+0x2f0/0x2f0 [ 748.320806] ? sget+0x113/0x150 [ 748.320824] ? fuse_get_root_inode+0x190/0x190 [ 748.320839] mount_nodev+0x6b/0x110 [ 748.320855] fuse_mount+0x2c/0x40 [ 748.377119] mount_fs+0xae/0x328 [ 748.380484] vfs_kern_mount.part.34+0xd4/0x4d0 [ 748.385070] ? may_umount+0xb0/0xb0 [ 748.388705] ? _raw_read_unlock+0x22/0x30 [ 748.392848] ? __get_fs_type+0x97/0xc0 [ 748.396726] do_mount+0x564/0x3070 [ 748.400268] ? copy_mount_string+0x40/0x40 [ 748.404493] ? rcu_pm_notify+0xc0/0xc0 [ 748.408370] ? copy_mount_options+0x5f/0x380 [ 748.412762] ? rcu_read_lock_sched_held+0x108/0x120 [ 748.417779] ? kmem_cache_alloc_trace+0x616/0x780 [ 748.422627] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 748.428161] ? _copy_from_user+0xdf/0x150 [ 748.432311] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 748.437854] ? copy_mount_options+0x285/0x380 [ 748.442349] ksys_mount+0x12d/0x140 [ 748.445968] __x64_sys_mount+0xbe/0x150 [ 748.449931] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 748.454935] do_syscall_64+0x1b1/0x800 [ 748.458818] ? finish_task_switch+0x1ca/0x810 [ 748.463300] ? syscall_return_slowpath+0x5c0/0x5c0 [ 748.468216] ? syscall_return_slowpath+0x30f/0x5c0 [ 748.473136] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 748.478488] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 748.483331] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 748.488520] RIP: 0033:0x455979 [ 748.491701] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 748.499396] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 748.506653] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 748.513907] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 748.521173] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 748.528437] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 748.594186] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 2018/05/13 06:34:53 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000009016a66800"}}) 2018/05/13 06:34:53 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x104, 0x1000000000282) 2018/05/13 06:34:53 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 2018/05/13 06:34:53 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000000000400"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:53 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, 0x0) sync() lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000d8e000)=@random={'system.', '\x00'}, &(0x7f0000001140)=""/121, 0x79) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='user.syz\x00', &(0x7f0000000140)=""/147, 0x93) 2018/05/13 06:34:53 executing program 1 (fault-call:3 fault-nth:64): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:34:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121"}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:53 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121"}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) [ 748.909922] IPVS: Unknown mcast interface: rose0 [ 748.936651] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 748.940176] IPVS: Unknown mcast interface: rose0 [ 748.964887] FAULT_INJECTION: forcing a failure. [ 748.964887] name failslab, interval 1, probability 0, space 0, times 0 [ 748.976765] CPU: 0 PID: 19179 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 2018/05/13 06:34:53 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x2400000000000000, 0x1000000000282) 2018/05/13 06:34:53 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000000e800"}}) 2018/05/13 06:34:53 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000000000000000000000feffff00"}}) [ 748.984051] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 748.993411] Call Trace: [ 748.996015] dump_stack+0x1b9/0x294 [ 748.999675] ? dump_stack_print_info.cold.2+0x52/0x52 [ 749.004873] ? kobject_uevent_env+0x62e/0xea0 [ 749.009383] should_fail.cold.4+0xa/0x1a [ 749.014065] ? debug_check_no_locks_freed+0x310/0x310 [ 749.019274] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 749.024393] ? __might_sleep+0x95/0x190 [ 749.028382] ? graph_lock+0x170/0x170 [ 749.032191] ? __mutex_lock+0x7d9/0x17f0 2018/05/13 06:34:53 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000000000fffffffffffff0"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:53 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}}) [ 749.036270] ? unwind_get_return_address+0x61/0xa0 [ 749.041211] ? find_held_lock+0x36/0x1c0 [ 749.045296] ? __lock_is_held+0xb5/0x140 [ 749.049380] ? check_same_owner+0x320/0x320 [ 749.053713] ? rcu_note_context_switch+0x710/0x710 [ 749.058651] ? put_dec+0xf0/0xf0 [ 749.062030] ? format_decode+0x1a9/0xae0 [ 749.066102] __should_failslab+0x124/0x180 [ 749.070350] should_failslab+0x9/0x14 [ 749.074164] kmem_cache_alloc_node+0x272/0x780 [ 749.078866] __alloc_skb+0x111/0x780 [ 749.082593] ? skb_scrub_packet+0x580/0x580 [ 749.086927] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 749.092138] ? netlink_has_listeners+0x2ff/0x4c0 [ 749.096913] ? netlink_tap_init_net+0x3c0/0x3c0 [ 749.101598] kobject_uevent_env+0x801/0xea0 [ 749.105925] ? device_pm_add+0x221/0x340 [ 749.110003] kobject_uevent+0x1f/0x30 [ 749.113815] device_add+0xb01/0x16d0 [ 749.117540] ? device_private_init+0x230/0x230 [ 749.122135] ? kfree+0x1e9/0x260 [ 749.125512] ? kfree_const+0x5e/0x70 [ 749.127151] IPVS: Unknown mcast interface: rose0 2018/05/13 06:34:53 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000001400"}}) [ 749.129290] device_create_groups_vargs+0x1ff/0x270 [ 749.139143] device_create_vargs+0x46/0x60 [ 749.143394] bdi_register_va.part.10+0xbb/0x9b0 [ 749.148067] ? cgwb_kill+0x630/0x630 [ 749.151784] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 749.157335] ? bdi_init+0x416/0x510 [ 749.160968] ? wb_init+0x9e0/0x9e0 [ 749.164515] ? bdi_alloc_node+0x67/0xe0 [ 749.168498] ? bdi_alloc_node+0x67/0xe0 [ 749.169711] IPVS: Unknown mcast interface: rose0 [ 749.172480] ? rcu_read_lock_sched_held+0x108/0x120 [ 749.172499] ? kmem_cache_alloc_node_trace+0x34e/0x770 2018/05/13 06:34:53 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000000000000000000f00"}}) [ 749.172520] ? _raw_spin_unlock+0x22/0x30 [ 749.172541] bdi_register_va+0x68/0x80 [ 749.172560] super_setup_bdi_name+0x123/0x220 [ 749.172576] ? kill_block_super+0x100/0x100 [ 749.172594] ? kmem_cache_alloc_trace+0x616/0x780 [ 749.172611] ? match_wildcard+0x3c0/0x3c0 [ 749.172624] ? trace_hardirqs_on+0xd/0x10 [ 749.172643] fuse_fill_super+0xe6e/0x1e20 [ 749.221707] ? fuse_get_root_inode+0x190/0x190 [ 749.226300] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 749.231330] ? kasan_check_read+0x11/0x20 2018/05/13 06:34:53 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:53 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}}) [ 749.235490] ? cap_capable+0x1f9/0x260 [ 749.239396] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 749.244942] ? security_capable+0x99/0xc0 [ 749.249105] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 749.254652] ? ns_capable_common+0x13f/0x170 [ 749.259071] ? get_anon_bdev+0x2f0/0x2f0 [ 749.263139] ? sget+0x113/0x150 [ 749.266430] ? fuse_get_root_inode+0x190/0x190 [ 749.271020] mount_nodev+0x6b/0x110 [ 749.274658] fuse_mount+0x2c/0x40 [ 749.276037] IPVS: Unknown mcast interface: rose0 [ 749.278114] mount_fs+0xae/0x328 2018/05/13 06:34:53 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000000000000000000005"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 749.278135] vfs_kern_mount.part.34+0xd4/0x4d0 [ 749.278152] ? may_umount+0xb0/0xb0 [ 749.278166] ? _raw_read_unlock+0x22/0x30 [ 749.278180] ? __get_fs_type+0x97/0xc0 [ 749.278200] do_mount+0x564/0x3070 [ 749.278224] ? copy_mount_string+0x40/0x40 [ 749.278238] ? rcu_pm_notify+0xc0/0xc0 [ 749.278256] ? copy_mount_options+0x5f/0x380 [ 749.298133] IPVS: Unknown mcast interface: rose0 [ 749.298687] ? rcu_read_lock_sched_held+0x108/0x120 [ 749.298705] ? kmem_cache_alloc_trace+0x616/0x780 2018/05/13 06:34:53 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000600"}}) [ 749.298728] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 749.338986] ? copy_mount_options+0x285/0x380 [ 749.343500] ksys_mount+0x12d/0x140 [ 749.347138] __x64_sys_mount+0xbe/0x150 [ 749.351128] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 749.356165] do_syscall_64+0x1b1/0x800 [ 749.360076] ? finish_task_switch+0x1ca/0x810 [ 749.364583] ? syscall_return_slowpath+0x5c0/0x5c0 [ 749.368661] IPVS: Unknown mcast interface: rose0 [ 749.369515] ? syscall_return_slowpath+0x30f/0x5c0 [ 749.369537] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 749.369558] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 749.369578] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 749.369591] RIP: 0033:0x455979 [ 749.369599] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 749.369615] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 749.369624] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 749.369632] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 749.369644] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 749.387084] IPVS: Unknown mcast interface: rose0 [ 749.389478] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 2018/05/13 06:34:53 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x10000000, 0x1000000000282) [ 749.548857] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 2018/05/13 06:34:54 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, 0x0) sync() lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x4c0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f0000000140)={r1, r2/1000+30000}, 0x10) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000001140)=""/121, 0x56) 2018/05/13 06:34:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121"}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:54 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121"}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:54 executing program 1 (fault-call:3 fault-nth:65): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:34:54 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000000000000000000000000000f4f2e600"}}) 2018/05/13 06:34:54 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000034165d408e2400"}}) 2018/05/13 06:34:54 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x700, 0x1000000000282) 2018/05/13 06:34:54 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000000000000000400"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 749.795831] IPVS: Unknown mcast interface: rose0 [ 749.837289] IPVS: Unknown mcast interface: rose0 [ 749.842778] FAULT_INJECTION: forcing a failure. [ 749.842778] name failslab, interval 1, probability 0, space 0, times 0 [ 749.854119] CPU: 0 PID: 19253 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 749.861408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 749.870762] Call Trace: [ 749.873364] dump_stack+0x1b9/0x294 [ 749.877008] ? dump_stack_print_info.cold.2+0x52/0x52 [ 749.882210] ? __mutex_lock+0x7d9/0x17f0 [ 749.886292] should_fail.cold.4+0xa/0x1a [ 749.890364] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 749.895477] ? kasan_kmalloc+0xc4/0xe0 [ 749.899377] ? graph_lock+0x170/0x170 [ 749.903199] ? find_held_lock+0x36/0x1c0 [ 749.907275] ? __lock_is_held+0xb5/0x140 [ 749.911348] ? btrfs_reloc_pre_snapshot+0xc0/0x240 [ 749.916300] ? check_same_owner+0x320/0x320 [ 749.917710] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 749.920627] ? kasan_check_write+0x14/0x20 [ 749.920647] ? __mutex_unlock_slowpath+0x180/0x8a0 2018/05/13 06:34:54 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\x00\x00\x00\x00\x00`\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:54 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000000000000000000000007ffffffff000"}}) 2018/05/13 06:34:54 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000000600"}}) 2018/05/13 06:34:54 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x500, 0x1000000000282) [ 749.920667] ? rcu_note_context_switch+0x710/0x710 [ 749.920685] __should_failslab+0x124/0x180 [ 749.920702] should_failslab+0x9/0x14 [ 749.920716] kmem_cache_alloc+0x2af/0x760 [ 749.920731] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 749.920749] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 749.920770] __kernfs_new_node+0xe7/0x580 [ 749.968653] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 749.973421] ? mutex_unlock+0xd/0x10 [ 749.977147] ? kernfs_activate+0x20e/0x2a0 [ 749.981390] ? kernfs_walk_and_get_ns+0x320/0x320 2018/05/13 06:34:54 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000000000000000000000000000ffffff8d00"}}) [ 749.986241] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 749.991782] ? kernfs_link_sibling+0x1d2/0x3b0 [ 749.996376] kernfs_new_node+0x80/0xf0 [ 750.000273] __kernfs_create_file+0x4d/0x330 [ 750.004698] sysfs_add_file_mode_ns+0x21a/0x560 [ 750.009378] sysfs_add_file+0x4e/0x60 [ 750.013186] sysfs_merge_group+0xfa/0x230 [ 750.017345] dpm_sysfs_add+0x161/0x210 [ 750.021239] device_add+0xa11/0x16d0 [ 750.024965] ? device_private_init+0x230/0x230 [ 750.029553] ? kfree+0x1e9/0x260 [ 750.032932] ? kfree_const+0x5e/0x70 2018/05/13 06:34:54 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00'}}) [ 750.036658] device_create_groups_vargs+0x1ff/0x270 [ 750.041685] device_create_vargs+0x46/0x60 [ 750.045935] bdi_register_va.part.10+0xbb/0x9b0 [ 750.050617] ? cgwb_kill+0x630/0x630 [ 750.054346] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 750.059891] ? bdi_init+0x416/0x510 [ 750.063529] ? wb_init+0x9e0/0x9e0 [ 750.067079] ? bdi_alloc_node+0x67/0xe0 [ 750.071055] ? bdi_alloc_node+0x67/0xe0 [ 750.075033] ? rcu_read_lock_sched_held+0x108/0x120 [ 750.080058] ? kmem_cache_alloc_node_trace+0x34e/0x770 2018/05/13 06:34:54 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000fffffe00"}}) [ 750.085346] ? _raw_spin_unlock+0x22/0x30 [ 750.089509] bdi_register_va+0x68/0x80 [ 750.093407] super_setup_bdi_name+0x123/0x220 [ 750.097913] ? kill_block_super+0x100/0x100 [ 750.102249] ? kmem_cache_alloc_trace+0x616/0x780 [ 750.107102] ? match_wildcard+0x3c0/0x3c0 [ 750.111270] ? trace_hardirqs_on+0xd/0x10 [ 750.115439] fuse_fill_super+0xe6e/0x1e20 [ 750.119603] ? fuse_get_root_inode+0x190/0x190 [ 750.124201] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 750.129233] ? kasan_check_read+0x11/0x20 [ 750.133387] ? cap_capable+0x1f9/0x260 2018/05/13 06:34:54 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000000000000000000000000000000000100"}}) [ 750.137287] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 750.142839] ? security_capable+0x99/0xc0 [ 750.147002] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 750.152550] ? ns_capable_common+0x13f/0x170 [ 750.156967] ? get_anon_bdev+0x2f0/0x2f0 [ 750.161034] ? sget+0x113/0x150 [ 750.164328] ? fuse_get_root_inode+0x190/0x190 [ 750.168923] mount_nodev+0x6b/0x110 [ 750.172559] fuse_mount+0x2c/0x40 [ 750.176019] mount_fs+0xae/0x328 [ 750.179394] vfs_kern_mount.part.34+0xd4/0x4d0 [ 750.183994] ? may_umount+0xb0/0xb0 [ 750.187625] ? _raw_read_unlock+0x22/0x30 [ 750.191778] ? __get_fs_type+0x97/0xc0 [ 750.195682] do_mount+0x564/0x3070 [ 750.199239] ? copy_mount_string+0x40/0x40 [ 750.203481] ? rcu_pm_notify+0xc0/0xc0 [ 750.207380] ? copy_mount_options+0x5f/0x380 [ 750.211796] ? rcu_read_lock_sched_held+0x108/0x120 [ 750.216828] ? kmem_cache_alloc_trace+0x616/0x780 [ 750.221679] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 750.227225] ? _copy_from_user+0xdf/0x150 [ 750.231393] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 750.236940] ? copy_mount_options+0x285/0x380 [ 750.241449] ksys_mount+0x12d/0x140 [ 750.245088] __x64_sys_mount+0xbe/0x150 [ 750.249072] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 750.254102] do_syscall_64+0x1b1/0x800 [ 750.258003] ? finish_task_switch+0x1ca/0x810 [ 750.262509] ? syscall_return_slowpath+0x5c0/0x5c0 [ 750.267447] ? syscall_return_slowpath+0x30f/0x5c0 [ 750.272388] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 750.277853] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 750.282706] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 750.283553] IPVS: Unknown mcast interface: rose0 [ 750.287891] RIP: 0033:0x455979 [ 750.287900] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 750.287916] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 750.287925] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 750.287934] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 750.287942] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 750.287951] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 750.356783] IPVS: Unknown mcast interface: rose0 [ 750.392336] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 2018/05/13 06:34:55 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, 0x0) sync() r0 = add_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000001c0)="f4c21dfbd5291c1992a1400786d2edf90b4805b062b95bd87b474eb02dcd6dbf790d15af1aefd77b4298a0146f89d06a4c8d19b749aa9e9734eaaa0d0377202f1b49a33369bd71675b70bd4ac9e66f1d94f7e0c30c5c655fde254c5b224d", 0x5e, 0xffffffffffffffff) keyctl$get_keyring_id(0x0, r0, 0x5) socket$packet(0x11, 0x3, 0x300) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0106401, &(0x7f00000002c0)={0x2f, &(0x7f0000000180)=""/47}) getxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="6f73782e487773f400f794db2047bad370dd51ad5f01a1cc83ba8cc66671f458a582a99f39796bae2517e88a4135bca0bcd13682777d"], &(0x7f0000001140)=""/121, 0xfffffffffffffcaf) 2018/05/13 06:34:55 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000000000000000000e6f2f400"}}) 2018/05/13 06:34:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121"}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:55 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121"}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:55 executing program 1 (fault-call:3 fault-nth:66): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:34:55 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 2018/05/13 06:34:55 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x0, 0x1000000100000) 2018/05/13 06:34:55 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000000000000000600"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 750.690647] IPVS: Unknown mcast interface: rose0 [ 750.714648] FAULT_INJECTION: forcing a failure. [ 750.714648] name failslab, interval 1, probability 0, space 0, times 0 [ 750.726063] CPU: 1 PID: 19324 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 750.733352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 750.742716] Call Trace: [ 750.745325] dump_stack+0x1b9/0x294 [ 750.747608] IPVS: Unknown mcast interface: rose0 [ 750.748967] ? dump_stack_print_info.cold.2+0x52/0x52 [ 750.748983] ? is_bpf_text_address+0xd7/0x170 2018/05/13 06:34:55 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x0, 0x1000000000016) 2018/05/13 06:34:55 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000000000000000000000248e405d163400"}}) [ 750.749002] ? kernel_text_address+0x79/0xf0 [ 750.749022] ? __unwind_start+0x166/0x330 [ 750.749047] should_fail.cold.4+0xa/0x1a [ 750.776148] ? __save_stack_trace+0x7e/0xd0 [ 750.780489] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 750.785614] ? graph_lock+0x170/0x170 [ 750.789431] ? save_stack+0x43/0xd0 [ 750.793072] ? kasan_kmalloc+0xc4/0xe0 [ 750.796983] ? kasan_slab_alloc+0x12/0x20 [ 750.801148] ? find_held_lock+0x36/0x1c0 [ 750.805236] ? __lock_is_held+0xb5/0x140 [ 750.809314] ? check_same_owner+0x320/0x320 2018/05/13 06:34:55 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000500"}}) 2018/05/13 06:34:55 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\x00\x00\x00\v\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 750.813649] ? rcu_note_context_switch+0x710/0x710 [ 750.818601] __should_failslab+0x124/0x180 [ 750.822849] should_failslab+0x9/0x14 [ 750.826659] kmem_cache_alloc_node_trace+0x26f/0x770 [ 750.831783] __kmalloc_node_track_caller+0x33/0x70 [ 750.836729] __kmalloc_reserve.isra.38+0x3a/0xe0 [ 750.841501] __alloc_skb+0x14d/0x780 [ 750.845232] ? skb_scrub_packet+0x580/0x580 [ 750.850117] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 750.855324] ? netlink_has_listeners+0x2ff/0x4c0 [ 750.860090] ? netlink_tap_init_net+0x3c0/0x3c0 2018/05/13 06:34:55 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000000000000000000400"}}) [ 750.864774] kobject_uevent_env+0x801/0xea0 [ 750.867070] IPVS: Unknown mcast interface: rose0 [ 750.869105] ? device_pm_add+0x221/0x340 [ 750.869130] kobject_uevent+0x1f/0x30 [ 750.869146] device_add+0xb01/0x16d0 [ 750.869167] ? device_private_init+0x230/0x230 [ 750.869183] ? kfree+0x1e9/0x260 [ 750.869202] ? kfree_const+0x5e/0x70 [ 750.869220] device_create_groups_vargs+0x1ff/0x270 [ 750.869239] device_create_vargs+0x46/0x60 [ 750.889056] IPVS: Unknown mcast interface: rose0 2018/05/13 06:34:55 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:55 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000000000000000000034165d408e2400"}}) [ 750.890099] bdi_register_va.part.10+0xbb/0x9b0 [ 750.890116] ? cgwb_kill+0x630/0x630 [ 750.890137] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 750.890150] ? bdi_init+0x416/0x510 [ 750.890163] ? wb_init+0x9e0/0x9e0 [ 750.890179] ? bdi_alloc_node+0x67/0xe0 [ 750.890193] ? bdi_alloc_node+0x67/0xe0 [ 750.890206] ? rcu_read_lock_sched_held+0x108/0x120 [ 750.890226] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 750.950442] ? _raw_spin_unlock+0x22/0x30 [ 750.954606] bdi_register_va+0x68/0x80 [ 750.958604] super_setup_bdi_name+0x123/0x220 [ 750.962607] IPVS: Unknown mcast interface: rose0 [ 750.963109] ? kill_block_super+0x100/0x100 [ 750.963130] ? kmem_cache_alloc_trace+0x616/0x780 [ 750.963147] ? match_wildcard+0x3c0/0x3c0 [ 750.963164] ? trace_hardirqs_on+0xd/0x10 [ 750.963186] fuse_fill_super+0xe6e/0x1e20 [ 750.963205] ? fuse_get_root_inode+0x190/0x190 [ 750.963223] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 750.979572] IPVS: Unknown mcast interface: rose0 [ 750.981259] ? kasan_check_read+0x11/0x20 [ 750.981278] ? cap_capable+0x1f9/0x260 2018/05/13 06:34:55 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fgetxattr(r0, &(0x7f0000000040)=@random={'system.', '/dev/snapshot\x00'}, &(0x7f0000000080)=""/138, 0x213) dup(r0) [ 750.981302] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 750.981317] ? security_capable+0x99/0xc0 [ 750.981337] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 750.981353] ? ns_capable_common+0x13f/0x170 [ 750.981371] ? get_anon_bdev+0x2f0/0x2f0 [ 750.981384] ? sget+0x113/0x150 [ 750.981404] ? fuse_get_root_inode+0x190/0x190 [ 751.043444] mount_nodev+0x6b/0x110 [ 751.047084] fuse_mount+0x2c/0x40 [ 751.050552] mount_fs+0xae/0x328 [ 751.053933] vfs_kern_mount.part.34+0xd4/0x4d0 [ 751.058525] ? may_umount+0xb0/0xb0 [ 751.062164] ? _raw_read_unlock+0x22/0x30 [ 751.066320] ? __get_fs_type+0x97/0xc0 [ 751.070218] do_mount+0x564/0x3070 [ 751.073773] ? copy_mount_string+0x40/0x40 [ 751.078016] ? rcu_pm_notify+0xc0/0xc0 [ 751.081921] ? copy_mount_options+0x5f/0x380 [ 751.086338] ? rcu_read_lock_sched_held+0x108/0x120 [ 751.091362] ? kmem_cache_alloc_trace+0x616/0x780 [ 751.096216] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 751.101764] ? _copy_from_user+0xdf/0x150 [ 751.105929] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 751.111497] ? copy_mount_options+0x285/0x380 [ 751.116016] ksys_mount+0x12d/0x140 [ 751.119664] __x64_sys_mount+0xbe/0x150 [ 751.123643] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 751.128655] do_syscall_64+0x1b1/0x800 [ 751.132532] ? finish_task_switch+0x1ca/0x810 [ 751.137033] ? syscall_return_slowpath+0x5c0/0x5c0 [ 751.141955] ? syscall_return_slowpath+0x30f/0x5c0 [ 751.146871] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 751.152237] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 751.157092] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 751.162283] RIP: 0033:0x455979 [ 751.165464] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 751.173169] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 751.180432] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 751.187686] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 751.194939] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 751.202204] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 751.213490] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 751.287622] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 2018/05/13 06:34:55 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x40, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000080)={0x0, 0x40}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000180)={r1, @in={{0x2, 0x4e23, @multicast2=0xe0000002}}, [0x40, 0x7ff, 0x80, 0x5, 0x0, 0x1286, 0x2, 0x97, 0xfffffffeffffffff, 0x5, 0x1, 0x44, 0x2, 0x4, 0x40]}, &(0x7f0000000280)=0x100) sync() flistxattr(r0, &(0x7f00000002c0)=""/141, 0x8d) lsetxattr(&(0x7f0000000580)='\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00000005c0)="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", 0x258, 0xfffffffffffffffe) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000001140)=""/121, 0x56) 2018/05/13 06:34:55 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000000000000000000000000100"}}) 2018/05/13 06:34:55 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121"}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121"}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:55 executing program 2: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = socket(0xa, 0x802, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_pktinfo(r1, 0x0, 0x12, &(0x7f0000000280)={0x0, @rand_addr}, 0xc) r2 = socket$inet6(0xa, 0x400007fffffe, 0x100000000000) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x0, 0x1000000000282) getsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f0000000180), &(0x7f00000034c0)=0x6) r4 = getpgrp(0xffffffffffffffff) ioctl$TIOCSPGRP(r3, 0x5410, &(0x7f00000035c0)=r4) setsockopt$inet6_int(r2, 0x29, 0x16, &(0x7f0000000000)=0xe8b, 0x4) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f00000002c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="50000000697bf25b6c6e5bbc193db6575bc9de6065caf38cd4803e6e2a3a07e46c27c5e0ed508bcf3c03005df8931b5ff1eab03ea36f85676530809659f29e48473bf79bbfffaf9ab6e8584a8d91e14e7b8fe3edf0df2e1864ba40cba8"], &(0x7f0000003440)=0x58) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000003500)=ANY=[@ANYRES32=r5, @ANYBLOB="00000080f48c2ea3c16a076f24b935775f8c18fe53292daed3fdd31b425d3a0ea6bc1f02000000083097d90a22e2afb33b5b2f49c45a0000000000000021d8db5929ff006978568346a73c"], &(0x7f0000003580)=0x5e) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000000c0)) gettid() geteuid() fcntl$getownex(r3, 0x10, &(0x7f0000000100)) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000001780)) getpid() getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000002f40)={{{@in=@multicast1, @in6=@loopback}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000003040)=0xe8) stat(&(0x7f0000003080)='./file0\x00', &(0x7f00000030c0)) getpid() fstat(r3, &(0x7f0000003140)) getgid() gettid() getresuid(&(0x7f00000031c0), &(0x7f0000003200), &(0x7f0000003240)) getgroups(0x2, &(0x7f0000003280)=[0xffffffffffffffff, 0xffffffffffffffff]) setsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000003600)={r6, 0x4, 0x8, 0x6}, 0x10) 2018/05/13 06:34:55 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:55 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000300"}}) 2018/05/13 06:34:55 executing program 1 (fault-call:3 fault-nth:67): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) [ 751.577318] IPVS: Unknown mcast interface: rose0 [ 751.614958] IPVS: Unknown mcast interface: rose0 [ 751.637859] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 751.654521] FAULT_INJECTION: forcing a failure. [ 751.654521] name failslab, interval 1, probability 0, space 0, times 0 [ 751.665910] CPU: 0 PID: 19390 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 751.673201] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 751.682543] Call Trace: [ 751.685126] dump_stack+0x1b9/0x294 [ 751.688744] ? dump_stack_print_info.cold.2+0x52/0x52 [ 751.693939] ? is_bpf_text_address+0xd7/0x170 [ 751.698424] ? kernel_text_address+0x79/0xf0 [ 751.702821] ? __unwind_start+0x166/0x330 [ 751.706959] should_fail.cold.4+0xa/0x1a [ 751.711015] ? __save_stack_trace+0x7e/0xd0 [ 751.715337] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 751.720431] ? graph_lock+0x170/0x170 [ 751.724220] ? save_stack+0x43/0xd0 [ 751.727833] ? kasan_kmalloc+0xc4/0xe0 [ 751.731721] ? kasan_slab_alloc+0x12/0x20 [ 751.735867] ? find_held_lock+0x36/0x1c0 [ 751.739921] ? __lock_is_held+0xb5/0x140 [ 751.743976] ? check_same_owner+0x320/0x320 [ 751.748296] ? rcu_note_context_switch+0x710/0x710 [ 751.753214] __should_failslab+0x124/0x180 [ 751.757444] should_failslab+0x9/0x14 [ 751.761235] kmem_cache_alloc_node_trace+0x26f/0x770 [ 751.766336] __kmalloc_node_track_caller+0x33/0x70 [ 751.771608] __kmalloc_reserve.isra.38+0x3a/0xe0 [ 751.776359] __alloc_skb+0x14d/0x780 [ 751.780065] ? skb_scrub_packet+0x580/0x580 [ 751.784378] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 751.789564] ? netlink_has_listeners+0x2ff/0x4c0 [ 751.794309] ? netlink_tap_init_net+0x3c0/0x3c0 [ 751.798971] kobject_uevent_env+0x801/0xea0 [ 751.803284] ? device_pm_add+0x221/0x340 [ 751.807341] kobject_uevent+0x1f/0x30 [ 751.811143] device_add+0xb01/0x16d0 [ 751.814847] ? device_private_init+0x230/0x230 [ 751.819418] ? kfree+0x1e9/0x260 [ 751.822776] ? kfree_const+0x5e/0x70 [ 751.826480] device_create_groups_vargs+0x1ff/0x270 [ 751.831494] device_create_vargs+0x46/0x60 [ 751.835719] bdi_register_va.part.10+0xbb/0x9b0 [ 751.840372] ? cgwb_kill+0x630/0x630 [ 751.844078] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 751.849598] ? bdi_init+0x416/0x510 [ 751.853220] ? wb_init+0x9e0/0x9e0 [ 751.856756] ? bdi_alloc_node+0x67/0xe0 [ 751.860714] ? bdi_alloc_node+0x67/0xe0 [ 751.864677] ? rcu_read_lock_sched_held+0x108/0x120 [ 751.869683] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 751.874957] ? _raw_spin_unlock+0x22/0x30 [ 751.879098] bdi_register_va+0x68/0x80 [ 751.882990] super_setup_bdi_name+0x123/0x220 [ 751.887481] ? kill_block_super+0x100/0x100 [ 751.891791] ? kmem_cache_alloc_trace+0x616/0x780 [ 751.896623] ? match_wildcard+0x3c0/0x3c0 [ 751.900844] ? trace_hardirqs_on+0xd/0x10 [ 751.904997] fuse_fill_super+0xe6e/0x1e20 [ 751.909144] ? fuse_get_root_inode+0x190/0x190 [ 751.913719] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 751.918723] ? kasan_check_read+0x11/0x20 [ 751.922873] ? cap_capable+0x1f9/0x260 [ 751.926755] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 751.932283] ? security_capable+0x99/0xc0 [ 751.936421] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 751.941945] ? ns_capable_common+0x13f/0x170 [ 751.946352] ? get_anon_bdev+0x2f0/0x2f0 [ 751.950400] ? sget+0x113/0x150 [ 751.953669] ? fuse_get_root_inode+0x190/0x190 [ 751.958249] mount_nodev+0x6b/0x110 [ 751.961866] fuse_mount+0x2c/0x40 [ 751.965309] mount_fs+0xae/0x328 [ 751.968677] vfs_kern_mount.part.34+0xd4/0x4d0 [ 751.973246] ? may_umount+0xb0/0xb0 [ 751.976862] ? _raw_read_unlock+0x22/0x30 [ 751.980999] ? __get_fs_type+0x97/0xc0 [ 751.984882] do_mount+0x564/0x3070 [ 751.988414] ? copy_mount_string+0x40/0x40 [ 751.992643] ? rcu_pm_notify+0xc0/0xc0 [ 751.996521] ? copy_mount_options+0x5f/0x380 [ 752.000914] ? rcu_read_lock_sched_held+0x108/0x120 [ 752.005920] ? kmem_cache_alloc_trace+0x616/0x780 [ 752.010766] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 752.016292] ? _copy_from_user+0xdf/0x150 [ 752.020433] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 752.025967] ? copy_mount_options+0x285/0x380 [ 752.030454] ksys_mount+0x12d/0x140 [ 752.034071] __x64_sys_mount+0xbe/0x150 [ 752.038036] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 752.043041] do_syscall_64+0x1b1/0x800 [ 752.046914] ? finish_task_switch+0x1ca/0x810 [ 752.051395] ? syscall_return_slowpath+0x5c0/0x5c0 [ 752.056311] ? syscall_return_slowpath+0x30f/0x5c0 [ 752.061239] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 752.066593] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 752.071772] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 752.076945] RIP: 0033:0x455979 [ 752.080122] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/05/13 06:34:56 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000000000000000000000001000"}}) 2018/05/13 06:34:56 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000400"}}) 2018/05/13 06:34:56 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) socketpair(0x4, 0x807, 0x1, &(0x7f0000000000)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x0, 0x1000000000282) [ 752.087816] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 752.095071] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 752.102323] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 752.109579] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 752.116833] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 2018/05/13 06:34:56 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\x00\x00\x00\x00\x00\b\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:56 executing program 1 (fault-call:3 fault-nth:68): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) [ 752.219162] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 2018/05/13 06:34:56 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) [ 752.270654] IPVS: Unknown mcast interface: rose0 2018/05/13 06:34:56 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}}) 2018/05/13 06:34:56 executing program 2: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) tee(r0, r1, 0x8, 0x4) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r4 = dup(r2) fcntl$notify(r4, 0x0, 0x80000001) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 752.317131] IPVS: Unknown mcast interface: rose0 [ 752.464194] FAULT_INJECTION: forcing a failure. [ 752.464194] name failslab, interval 1, probability 0, space 0, times 0 [ 752.475516] CPU: 1 PID: 19442 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 752.482802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 752.492166] Call Trace: [ 752.494775] dump_stack+0x1b9/0x294 [ 752.498419] ? dump_stack_print_info.cold.2+0x52/0x52 [ 752.503616] ? kobject_uevent_env+0x62e/0xea0 [ 752.508117] should_fail.cold.4+0xa/0x1a [ 752.512170] ? debug_check_no_locks_freed+0x310/0x310 [ 752.517350] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 752.522447] ? __might_sleep+0x95/0x190 [ 752.526414] ? graph_lock+0x170/0x170 [ 752.530205] ? __mutex_lock+0x7d9/0x17f0 [ 752.534260] ? unwind_get_return_address+0x61/0xa0 [ 752.539183] ? find_held_lock+0x36/0x1c0 [ 752.543242] ? __lock_is_held+0xb5/0x140 [ 752.547297] ? check_same_owner+0x320/0x320 [ 752.551608] ? rcu_note_context_switch+0x710/0x710 [ 752.556523] ? put_dec+0xf0/0xf0 [ 752.559884] ? format_decode+0x1a9/0xae0 [ 752.563941] __should_failslab+0x124/0x180 [ 752.568178] should_failslab+0x9/0x14 [ 752.571972] kmem_cache_alloc_node+0x272/0x780 [ 752.576559] __alloc_skb+0x111/0x780 [ 752.580260] ? skb_scrub_packet+0x580/0x580 [ 752.584572] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 752.589759] ? netlink_has_listeners+0x2ff/0x4c0 [ 752.594510] ? netlink_tap_init_net+0x3c0/0x3c0 [ 752.599175] kobject_uevent_env+0x801/0xea0 [ 752.603491] ? device_pm_add+0x221/0x340 [ 752.607546] kobject_uevent+0x1f/0x30 [ 752.611337] device_add+0xb01/0x16d0 [ 752.615048] ? device_private_init+0x230/0x230 [ 752.619617] ? kfree+0x1e9/0x260 [ 752.622972] ? kfree_const+0x5e/0x70 [ 752.626675] device_create_groups_vargs+0x1ff/0x270 [ 752.631684] device_create_vargs+0x46/0x60 [ 752.635927] bdi_register_va.part.10+0xbb/0x9b0 [ 752.640585] ? cgwb_kill+0x630/0x630 [ 752.644286] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 752.649806] ? bdi_init+0x416/0x510 [ 752.653435] ? wb_init+0x9e0/0x9e0 [ 752.656968] ? bdi_alloc_node+0x67/0xe0 [ 752.660939] ? bdi_alloc_node+0x67/0xe0 [ 752.664902] ? rcu_read_lock_sched_held+0x108/0x120 [ 752.669903] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 752.675180] ? _raw_spin_unlock+0x22/0x30 [ 752.679504] bdi_register_va+0x68/0x80 [ 752.683399] super_setup_bdi_name+0x123/0x220 [ 752.687881] ? kill_block_super+0x100/0x100 [ 752.692190] ? kmem_cache_alloc_trace+0x616/0x780 [ 752.697025] ? match_wildcard+0x3c0/0x3c0 [ 752.701169] ? trace_hardirqs_on+0xd/0x10 [ 752.705308] fuse_fill_super+0xe6e/0x1e20 [ 752.709446] ? fuse_get_root_inode+0x190/0x190 [ 752.714029] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 752.719054] ? kasan_check_read+0x11/0x20 [ 752.723192] ? cap_capable+0x1f9/0x260 [ 752.727076] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 752.732610] ? security_capable+0x99/0xc0 [ 752.736762] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 752.742293] ? ns_capable_common+0x13f/0x170 [ 752.746687] ? get_anon_bdev+0x2f0/0x2f0 [ 752.750730] ? sget+0x113/0x150 [ 752.754006] ? fuse_get_root_inode+0x190/0x190 [ 752.758595] mount_nodev+0x6b/0x110 [ 752.762218] fuse_mount+0x2c/0x40 [ 752.765669] mount_fs+0xae/0x328 [ 752.769036] vfs_kern_mount.part.34+0xd4/0x4d0 [ 752.773636] ? may_umount+0xb0/0xb0 [ 752.777300] ? _raw_read_unlock+0x22/0x30 [ 752.781449] ? __get_fs_type+0x97/0xc0 [ 752.785328] do_mount+0x564/0x3070 [ 752.788859] ? copy_mount_string+0x40/0x40 [ 752.793085] ? rcu_pm_notify+0xc0/0xc0 [ 752.796975] ? copy_mount_options+0x5f/0x380 [ 752.801380] ? rcu_read_lock_sched_held+0x108/0x120 [ 752.806414] ? kmem_cache_alloc_trace+0x616/0x780 [ 752.811244] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 752.816776] ? _copy_from_user+0xdf/0x150 [ 752.820927] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 752.826471] ? copy_mount_options+0x285/0x380 [ 752.830962] ksys_mount+0x12d/0x140 [ 752.834586] __x64_sys_mount+0xbe/0x150 [ 752.838550] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 752.843557] do_syscall_64+0x1b1/0x800 [ 752.847431] ? finish_task_switch+0x1ca/0x810 [ 752.851910] ? syscall_return_slowpath+0x5c0/0x5c0 [ 752.857452] ? syscall_return_slowpath+0x30f/0x5c0 [ 752.862406] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 752.867759] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 752.872591] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 752.877763] RIP: 0033:0x455979 [ 752.880934] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 752.888627] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 752.895884] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 752.903144] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 2018/05/13 06:34:57 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, 0x0) sync() lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000001140)=""/121, 0x56) r0 = gettid() getpriority(0x2, r0) 2018/05/13 06:34:57 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000000000ffffff9e00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:57 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x0, 0x1000000000282) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x7, @dev={0xfe, 0x80, [], 0x15}, 0x4}, @in={0x2, 0x4e21, @broadcast=0xffffffff}, @in6={0xa, 0x4e24, 0x81, @local={0xfe, 0x80, [], 0xaa}, 0x1}], 0x48) 2018/05/13 06:34:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121"}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:57 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121"}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:57 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000000000000000000000000500"}}) 2018/05/13 06:34:57 executing program 1 (fault-call:3 fault-nth:69): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:34:57 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000d24000"}}) [ 752.910405] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 752.917666] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 752.985293] IPVS: Unknown mcast interface: rose0 [ 753.019450] IPVS: Unknown mcast interface: rose0 [ 753.028067] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 753.045276] FAULT_INJECTION: forcing a failure. [ 753.045276] name failslab, interval 1, probability 0, space 0, times 0 [ 753.057227] CPU: 1 PID: 19467 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 753.064520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 753.073880] Call Trace: [ 753.076489] dump_stack+0x1b9/0x294 [ 753.080137] ? dump_stack_print_info.cold.2+0x52/0x52 [ 753.085345] ? __lock_is_held+0xb5/0x140 [ 753.089431] ? __account_cfs_rq_runtime+0x600/0x600 [ 753.094471] should_fail.cold.4+0xa/0x1a [ 753.098549] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 753.103675] ? update_load_avg+0x2570/0x2570 [ 753.108103] ? graph_lock+0x170/0x170 [ 753.111929] ? find_held_lock+0x36/0x1c0 [ 753.116015] ? __lock_is_held+0xb5/0x140 2018/05/13 06:34:57 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r2 = dup(r0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000080)={0x5851, 0xaeee, 0x8, 0x20, 0x2, 0x2, 0x2c, 0x7fffffff, 0x0}, &(0x7f00000000c0)=0x20) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x80000) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000100)={0xffffffff7effffff, 0x6, 0x4, 0x6, 0x5, 0x5f9e, 0x9, 0xfffffffffffffeff, r3}, &(0x7f0000000180)=0x20) getsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x8) fcntl$notify(r2, 0x0, 0x80000000) 2018/05/13 06:34:57 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000000000000000000000500"}}) 2018/05/13 06:34:57 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000000200"}}) 2018/05/13 06:34:57 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000000000fffffff000"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 753.120109] ? check_same_owner+0x320/0x320 [ 753.124450] ? rcu_note_context_switch+0x710/0x710 [ 753.129402] __should_failslab+0x124/0x180 [ 753.133654] should_failslab+0x9/0x14 [ 753.137466] kmem_cache_alloc+0x2af/0x760 [ 753.141625] ? _raw_spin_unlock_irq+0x27/0x70 [ 753.146133] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 753.151159] __d_alloc+0xc0/0xd30 [ 753.154634] ? shrink_dcache_for_umount+0x290/0x290 [ 753.159682] ? preempt_notifier_register+0x1e0/0x1e0 [ 753.164810] ? debug_check_no_locks_freed+0x310/0x310 [ 753.170018] ? __schedule+0x809/0x1e30 [ 753.173930] d_alloc+0x8e/0x370 [ 753.177227] ? print_usage_bug+0xc0/0xc0 [ 753.181300] ? __d_alloc+0xd30/0xd30 [ 753.185032] d_alloc_parallel+0x152/0x1e80 [ 753.189279] ? kobject_uevent+0x1f/0x30 [ 753.193279] ? graph_lock+0x170/0x170 [ 753.197095] ? __lock_acquire+0x7f5/0x5140 [ 753.201344] ? __d_lookup_rcu+0xa80/0xa80 [ 753.205510] ? print_usage_bug+0xc0/0xc0 [ 753.209581] ? find_held_lock+0x36/0x1c0 [ 753.213662] ? lock_downgrade+0x8e0/0x8e0 2018/05/13 06:34:57 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000000f00"}}) [ 753.215341] IPVS: Unknown mcast interface: rose0 [ 753.217824] ? mark_held_locks+0xc9/0x160 [ 753.226833] ? __raw_spin_lock_init+0x1c/0x100 [ 753.231430] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 753.236458] ? __lockdep_init_map+0x105/0x590 [ 753.240962] ? __lockdep_init_map+0x105/0x590 [ 753.245467] ? lockdep_init_map+0x9/0x10 [ 753.249542] ? __init_waitqueue_head+0x96/0x140 [ 753.251294] IPVS: Unknown mcast interface: rose0 [ 753.254218] ? init_wait_entry+0x1b0/0x1b0 [ 753.254234] ? d_alloc_parallel+0x1e80/0x1e80 2018/05/13 06:34:57 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000000000000000008dffffff00"}}) 2018/05/13 06:34:57 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000000000f000"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 753.254252] ? lock_release+0xa10/0xa10 [ 753.254264] ? graph_lock+0x170/0x170 [ 753.254284] __lookup_slow+0x1e6/0x540 [ 753.254300] ? vfs_unlink+0x510/0x510 [ 753.254319] ? d_lookup+0x219/0x330 [ 753.254356] lookup_one_len+0x1c7/0x210 [ 753.290797] ? lookup_one_len_unlocked+0xf0/0xf0 [ 753.295565] ? down_write+0x87/0x120 [ 753.299310] ? start_creating+0xb1/0x200 [ 753.303394] ? down_read+0x1b0/0x1b0 [ 753.307115] ? mntput+0x74/0xa0 [ 753.310398] ? simple_pin_fs+0xa4/0x190 [ 753.314388] start_creating+0xc6/0x200 [ 753.318288] debugfs_create_dir+0x23/0x3c0 [ 753.322534] bdi_register_va.part.10+0x318/0x9b0 [ 753.327300] ? cgwb_kill+0x630/0x630 [ 753.331022] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 753.336568] ? bdi_init+0x416/0x510 [ 753.340202] ? wb_init+0x9e0/0x9e0 [ 753.343751] ? bdi_alloc_node+0x67/0xe0 [ 753.347280] IPVS: Unknown mcast interface: rose0 [ 753.347744] ? bdi_alloc_node+0x67/0xe0 [ 753.347762] ? rcu_read_lock_sched_held+0x108/0x120 [ 753.347778] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 753.347800] ? _raw_spin_unlock+0x22/0x30 [ 753.365346] IPVS: Unknown mcast interface: rose0 [ 753.366778] bdi_register_va+0x68/0x80 [ 753.366798] super_setup_bdi_name+0x123/0x220 [ 753.366814] ? kill_block_super+0x100/0x100 [ 753.366832] ? kmem_cache_alloc_trace+0x616/0x780 [ 753.366849] ? match_wildcard+0x3c0/0x3c0 [ 753.366866] ? trace_hardirqs_on+0xd/0x10 [ 753.366888] fuse_fill_super+0xe6e/0x1e20 [ 753.366908] ? fuse_get_root_inode+0x190/0x190 [ 753.366927] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 753.415281] ? kasan_check_read+0x11/0x20 2018/05/13 06:34:57 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r2, 0xc01064b5, &(0x7f0000000040)={&(0x7f0000000000)=[0x0], 0x1}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r2, 0xc02c5341, &(0x7f0000000280)) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000100)={0x0}) getsockopt$inet6_dccp_int(r1, 0x21, 0x4, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$DRM_IOCTL_GET_SAREA_CTX(r2, 0xc010641d, &(0x7f0000000240)={r3, &(0x7f0000000180)=""/156}) fcntl$notify(r0, 0x0, 0x18) personality(0x400000) [ 753.419443] ? cap_capable+0x1f9/0x260 [ 753.423345] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 753.428886] ? security_capable+0x99/0xc0 [ 753.433045] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 753.438584] ? ns_capable_common+0x13f/0x170 [ 753.443000] ? get_anon_bdev+0x2f0/0x2f0 [ 753.447068] ? sget+0x113/0x150 [ 753.450361] ? fuse_get_root_inode+0x190/0x190 [ 753.454955] mount_nodev+0x6b/0x110 [ 753.458594] fuse_mount+0x2c/0x40 [ 753.462054] mount_fs+0xae/0x328 [ 753.465433] vfs_kern_mount.part.34+0xd4/0x4d0 [ 753.470019] ? may_umount+0xb0/0xb0 [ 753.473649] ? _raw_read_unlock+0x22/0x30 [ 753.477804] ? __get_fs_type+0x97/0xc0 [ 753.481706] do_mount+0x564/0x3070 [ 753.485263] ? copy_mount_string+0x40/0x40 [ 753.489508] ? rcu_pm_notify+0xc0/0xc0 [ 753.493411] ? copy_mount_options+0x5f/0x380 [ 753.497823] ? rcu_read_lock_sched_held+0x108/0x120 [ 753.502851] ? kmem_cache_alloc_trace+0x616/0x780 [ 753.507708] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 753.513260] ? _copy_from_user+0xdf/0x150 [ 753.517426] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 753.522975] ? copy_mount_options+0x285/0x380 [ 753.527479] ksys_mount+0x12d/0x140 [ 753.531109] __x64_sys_mount+0xbe/0x150 [ 753.535087] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 753.540113] do_syscall_64+0x1b1/0x800 [ 753.544010] ? finish_task_switch+0x1ca/0x810 [ 753.548518] ? syscall_return_slowpath+0x5c0/0x5c0 [ 753.553463] ? syscall_return_slowpath+0x30f/0x5c0 [ 753.558408] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 753.563787] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 753.568652] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 753.573849] RIP: 0033:0x455979 [ 753.577041] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 753.584765] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 753.592042] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 753.599319] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 753.606576] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 753.613833] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 753.676192] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 2018/05/13 06:34:58 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121"}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121"}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:58 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\x00\x00\x00 \x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:58 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000fffffe00"}}) 2018/05/13 06:34:58 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, 0x0) sync() lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f0000000140)="bd2b749327a45d855dcfbca3a623783a9f642282209f3e5fe43199a8672d2f2cb9c5087bfc913d1e9b3c9f3ffa62e40855a7d298bb37be3497722083a86c6327dba789536b56c29b62ba6ac54e80b77c3d088b7c3ad8480e33eaeb") setsockopt$inet_buf(r0, 0x0, 0x2e, &(0x7f00000001c0)="39d6e1df914bd709debb36c81e27a0a0cfeab44526c8747b2f9b8ab69e90fbec55236294049d7659d1b98aeb528e35d65bdbd486745168dcd3bf64aa11faa24965531a3e4b5f03b98c01b5065cbe88b15b1df751a4aa0c37d85d6a8f73f4de2c4c11f965ce7101277b3d91c85a1d0d316fff0d8e32b82c94a3c8b14e7ab10ec936431eeda740ed226d6c5a7c1acb7987a7d00584ad0c00f7a9e03c0c1c3756e77bd86d0275fb6494bdba812abb", 0xad) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000001140)=""/121, 0x56) 2018/05/13 06:34:58 executing program 1 (fault-call:3 fault-nth:70): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:34:58 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000000000000000000000000000000001000"}}) 2018/05/13 06:34:58 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x0, 0x20) [ 753.870893] IPVS: Unknown mcast interface: rose0 2018/05/13 06:34:58 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}}) [ 753.917516] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 753.920931] IPVS: Unknown mcast interface: rose0 [ 753.942931] FAULT_INJECTION: forcing a failure. [ 753.942931] name failslab, interval 1, probability 0, space 0, times 0 [ 753.954363] CPU: 1 PID: 19527 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 2018/05/13 06:34:58 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\x00\x00`\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:58 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x400000000000000, 0x0) r2 = dup(r0) r3 = accept4$alg(r2, 0x0, 0x0, 0x80000) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x3b8, 0xffffffff, 0x0, 0x248, 0x248, 0xffffffff, 0xffffffff, 0x320, 0x320, 0x320, 0xffffffff, 0x4, &(0x7f0000000000), {[{{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x800, 0x0, 0x1}}, @common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x10, 0x200, 0x1, 0x1}}]}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x4}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x1, 0x3f}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x100000001, 0x6, [0x2d, 0x39, 0x35, 0xe, 0x23, 0x37, 0x11, 0x36, 0x26, 0x11, 0x1c, 0x26, 0x23, 0x17, 0x31, 0x36], 0x2, 0x6, 0xe91}}}, {{@ip={@broadcast=0xffffffff, @broadcast=0xffffffff, 0xffffff00, 0xffffff00, 'sit0\x00', 'ip6_vti0\x00', {}, {0xff}, 0x0, 0x1, 0x2}, 0x0, 0x98, 0xd8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "1206e09d3d1c5ae299ff85ae4b3d4853548d578c2d3de5288ec5e997a9c8"}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x418) fcntl$notify(r3, 0x0, 0x1000000000284) [ 753.961647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 753.971009] Call Trace: [ 753.973612] dump_stack+0x1b9/0x294 [ 753.977261] ? dump_stack_print_info.cold.2+0x52/0x52 [ 753.982467] ? kobject_uevent_env+0x62e/0xea0 [ 753.986987] should_fail.cold.4+0xa/0x1a [ 753.991057] ? debug_check_no_locks_freed+0x310/0x310 [ 753.996261] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 753.999308] IPVS: Unknown mcast interface: rose0 [ 754.001381] ? __might_sleep+0x95/0x190 [ 754.001401] ? graph_lock+0x170/0x170 [ 754.001419] ? __mutex_lock+0x7d9/0x17f0 2018/05/13 06:34:58 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000000000000000000000000400"}}) [ 754.001437] ? unwind_get_return_address+0x61/0xa0 [ 754.001455] ? find_held_lock+0x36/0x1c0 [ 754.001474] ? __lock_is_held+0xb5/0x140 [ 754.031063] ? check_same_owner+0x320/0x320 [ 754.032148] IPVS: Unknown mcast interface: rose0 [ 754.035398] ? rcu_note_context_switch+0x710/0x710 [ 754.035416] ? put_dec+0xf0/0xf0 [ 754.035432] ? format_decode+0x1a9/0xae0 [ 754.035452] __should_failslab+0x124/0x180 [ 754.035471] should_failslab+0x9/0x14 [ 754.035488] kmem_cache_alloc_node+0x272/0x780 2018/05/13 06:34:58 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept(r0, &(0x7f0000000240)=@pppol2tpv3, &(0x7f0000000080)=0x80) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/qat_adf_ctl\x00', 0x8000, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f00000000c0)=0xc) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r3, r4) ioctl$sock_netdev_private(r0, 0x89fa, &(0x7f0000000000)="b056af7336bdfa16032a9f000506cf008c0cdd4ad39d971fe49312a3bd30b50cf3727ae9a62ba11cb2a55f12a51771f3493fc73d80cfac057d3c354d30092c8b8202126a183a5957e511c0e3") r5 = dup(r0) fcntl$notify(r5, 0x0, 0x1000000000282) 2018/05/13 06:34:58 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\x00\x00\a\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 754.035513] __alloc_skb+0x111/0x780 [ 754.035532] ? skb_scrub_packet+0x580/0x580 [ 754.073187] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 754.078396] ? netlink_has_listeners+0x2ff/0x4c0 [ 754.083163] ? netlink_tap_init_net+0x3c0/0x3c0 [ 754.087845] kobject_uevent_env+0x801/0xea0 [ 754.092183] ? device_pm_add+0x221/0x340 [ 754.096256] kobject_uevent+0x1f/0x30 [ 754.100071] device_add+0xb01/0x16d0 [ 754.103797] ? device_private_init+0x230/0x230 [ 754.108388] ? kfree+0x1e9/0x260 [ 754.111767] ? kfree_const+0x5e/0x70 2018/05/13 06:34:58 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000034165d4000"}}) [ 754.115493] device_create_groups_vargs+0x1ff/0x270 [ 754.120521] device_create_vargs+0x46/0x60 [ 754.124769] bdi_register_va.part.10+0xbb/0x9b0 [ 754.128573] QAT: Invalid ioctl [ 754.129440] ? cgwb_kill+0x630/0x630 [ 754.129462] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 754.129475] ? bdi_init+0x416/0x510 [ 754.129489] ? wb_init+0x9e0/0x9e0 [ 754.129505] ? bdi_alloc_node+0x67/0xe0 [ 754.129515] ? bdi_alloc_node+0x67/0xe0 [ 754.129533] ? rcu_read_lock_sched_held+0x108/0x120 [ 754.162024] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 754.167319] ? _raw_spin_unlock+0x22/0x30 [ 754.171481] bdi_register_va+0x68/0x80 [ 754.175378] super_setup_bdi_name+0x123/0x220 [ 754.179883] ? kill_block_super+0x100/0x100 [ 754.184249] ? kmem_cache_alloc_trace+0x616/0x780 [ 754.189110] ? match_wildcard+0x3c0/0x3c0 [ 754.193270] ? trace_hardirqs_on+0xd/0x10 [ 754.197434] fuse_fill_super+0xe6e/0x1e20 [ 754.201594] ? fuse_get_root_inode+0x190/0x190 [ 754.206183] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 754.211209] ? kasan_check_read+0x11/0x20 2018/05/13 06:34:58 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000000000000000000034165d4000"}}) [ 754.215366] ? cap_capable+0x1f9/0x260 [ 754.219274] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 754.224819] ? security_capable+0x99/0xc0 [ 754.228979] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 754.234522] ? ns_capable_common+0x13f/0x170 [ 754.238940] ? get_anon_bdev+0x2f0/0x2f0 [ 754.243005] ? sget+0x113/0x150 [ 754.246295] ? fuse_get_root_inode+0x190/0x190 [ 754.250886] mount_nodev+0x6b/0x110 [ 754.254519] fuse_mount+0x2c/0x40 [ 754.257981] mount_fs+0xae/0x328 [ 754.261353] vfs_kern_mount.part.34+0xd4/0x4d0 [ 754.265712] IPVS: Unknown mcast interface: rose0 [ 754.265938] ? may_umount+0xb0/0xb0 [ 754.274302] ? _raw_read_unlock+0x22/0x30 [ 754.278455] ? __get_fs_type+0x97/0xc0 [ 754.282373] do_mount+0x564/0x3070 [ 754.285920] ? do_raw_spin_unlock+0x9e/0x2e0 [ 754.290339] ? copy_mount_string+0x40/0x40 [ 754.294582] ? rcu_pm_notify+0xc0/0xc0 [ 754.298480] ? copy_mount_options+0x5f/0x380 [ 754.300072] IPVS: Unknown mcast interface: rose0 [ 754.302893] ? rcu_read_lock_sched_held+0x108/0x120 [ 754.302910] ? kmem_cache_alloc_trace+0x616/0x780 [ 754.302929] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 754.302948] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 754.328668] ? copy_mount_options+0x285/0x380 [ 754.333185] ksys_mount+0x12d/0x140 [ 754.336817] __x64_sys_mount+0xbe/0x150 [ 754.340783] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 754.345791] do_syscall_64+0x1b1/0x800 [ 754.349665] ? finish_task_switch+0x1ca/0x810 [ 754.354147] ? syscall_return_slowpath+0x5c0/0x5c0 [ 754.359070] ? syscall_return_slowpath+0x30f/0x5c0 [ 754.363990] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 754.369356] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 754.374195] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 754.379378] RIP: 0033:0x455979 [ 754.382558] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 754.390276] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 754.397536] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 754.404796] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 754.412069] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 754.419338] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 754.455399] QAT: Invalid ioctl [ 754.516121] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 2018/05/13 06:34:59 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121"}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) 2018/05/13 06:34:59 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00'}}) 2018/05/13 06:34:59 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000000000000000000000000f0ffffff7f00"}}) 2018/05/13 06:34:59 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\x00\x00\x00\x00\x00\v\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:59 executing program 1 (fault-call:3 fault-nth:71): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:34:59 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000fcbff7)='/dev/kvm\x00', 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x4) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r1, 0xc0105303, &(0x7f0000000100)={0x20, 0x7ffffffd, 0x1}) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_KVMCLOCK_CTRL(r3, 0xaead) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r2, 0x4008ae48, &(0x7f00000001c0)) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, 0x0) sync() r4 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f00000002c0)={0x1, 0x2, 0x8000, 0xed84, 0x81, 0x1, 0x6, 0x3, 0x0}, &(0x7f0000000300)=0x20) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000340)={r5, 0xfffffffffffffffb}, 0x8) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000d8e000)=ANY=[@ANYBLOB="732b007502baaf2d40166af1f182"], &(0x7f0000001140)=""/121, 0x79) 2018/05/13 06:34:59 executing program 2: r0 = socket$inet6(0xa, 0x4, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x4000000000000, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x0, 0x100000038) getsockopt$inet_buf(r1, 0x0, 0x2f, &(0x7f0000000040)=""/131, &(0x7f0000000100)=0x83) 2018/05/13 06:34:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121"}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) [ 754.742360] IPVS: Unknown mcast interface: rose0 [ 754.788355] IPVS: Unknown mcast interface: rose0 [ 754.806179] FAULT_INJECTION: forcing a failure. [ 754.806179] name failslab, interval 1, probability 0, space 0, times 0 [ 754.817670] CPU: 1 PID: 19605 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 754.824949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 754.834300] Call Trace: [ 754.836894] dump_stack+0x1b9/0x294 [ 754.840516] ? dump_stack_print_info.cold.2+0x52/0x52 [ 754.846190] ? is_bpf_text_address+0xd7/0x170 [ 754.850677] ? kernel_text_address+0x79/0xf0 [ 754.855074] ? __unwind_start+0x166/0x330 [ 754.859214] should_fail.cold.4+0xa/0x1a [ 754.863286] ? __save_stack_trace+0x7e/0xd0 [ 754.867597] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 754.872690] ? graph_lock+0x170/0x170 [ 754.876479] ? save_stack+0x43/0xd0 [ 754.880095] ? kasan_kmalloc+0xc4/0xe0 [ 754.883967] ? kasan_slab_alloc+0x12/0x20 [ 754.888467] ? find_held_lock+0x36/0x1c0 [ 754.892517] ? __lock_is_held+0xb5/0x140 [ 754.896571] ? check_same_owner+0x320/0x320 [ 754.900892] ? rcu_note_context_switch+0x710/0x710 [ 754.905810] __should_failslab+0x124/0x180 [ 754.910038] should_failslab+0x9/0x14 [ 754.913842] kmem_cache_alloc_node_trace+0x26f/0x770 [ 754.918943] __kmalloc_node_track_caller+0x33/0x70 [ 754.923862] __kmalloc_reserve.isra.38+0x3a/0xe0 [ 754.928604] __alloc_skb+0x14d/0x780 [ 754.932307] ? skb_scrub_packet+0x580/0x580 [ 754.936615] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 754.941796] ? netlink_has_listeners+0x2ff/0x4c0 [ 754.946539] ? netlink_tap_init_net+0x3c0/0x3c0 [ 754.951204] kobject_uevent_env+0x801/0xea0 [ 754.955513] ? device_pm_add+0x221/0x340 [ 754.959566] kobject_uevent+0x1f/0x30 [ 754.963350] device_add+0xb01/0x16d0 [ 754.967053] ? device_private_init+0x230/0x230 [ 754.971621] ? kfree+0x1e9/0x260 [ 754.974978] ? kfree_const+0x5e/0x70 [ 754.978683] device_create_groups_vargs+0x1ff/0x270 [ 754.983689] device_create_vargs+0x46/0x60 [ 754.987912] bdi_register_va.part.10+0xbb/0x9b0 [ 754.992570] ? cgwb_kill+0x630/0x630 [ 754.996275] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 755.001797] ? bdi_init+0x416/0x510 [ 755.005410] ? wb_init+0x9e0/0x9e0 [ 755.008936] ? bdi_alloc_node+0x67/0xe0 [ 755.012904] ? bdi_alloc_node+0x67/0xe0 [ 755.016876] ? rcu_read_lock_sched_held+0x108/0x120 [ 755.021881] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 755.027150] ? _raw_spin_unlock+0x22/0x30 [ 755.031302] bdi_register_va+0x68/0x80 [ 755.035178] super_setup_bdi_name+0x123/0x220 [ 755.039664] ? kill_block_super+0x100/0x100 [ 755.043975] ? kmem_cache_alloc_trace+0x616/0x780 [ 755.048805] ? match_wildcard+0x3c0/0x3c0 [ 755.052937] ? trace_hardirqs_on+0xd/0x10 [ 755.057071] fuse_fill_super+0xe6e/0x1e20 [ 755.061208] ? fuse_get_root_inode+0x190/0x190 [ 755.065778] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 755.070783] ? kasan_check_read+0x11/0x20 [ 755.074921] ? cap_capable+0x1f9/0x260 [ 755.078800] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 755.084322] ? security_capable+0x99/0xc0 [ 755.088457] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 755.093979] ? ns_capable_common+0x13f/0x170 [ 755.098374] ? get_anon_bdev+0x2f0/0x2f0 [ 755.102419] ? sget+0x113/0x150 [ 755.105684] ? fuse_get_root_inode+0x190/0x190 [ 755.110251] mount_nodev+0x6b/0x110 [ 755.113867] fuse_mount+0x2c/0x40 [ 755.117310] mount_fs+0xae/0x328 [ 755.120666] vfs_kern_mount.part.34+0xd4/0x4d0 [ 755.125233] ? may_umount+0xb0/0xb0 [ 755.128847] ? _raw_read_unlock+0x22/0x30 [ 755.132979] ? __get_fs_type+0x97/0xc0 [ 755.136855] do_mount+0x564/0x3070 [ 755.140384] ? copy_mount_string+0x40/0x40 [ 755.144604] ? rcu_pm_notify+0xc0/0xc0 [ 755.148478] ? copy_mount_options+0x5f/0x380 [ 755.152873] ? rcu_read_lock_sched_held+0x108/0x120 [ 755.157877] ? kmem_cache_alloc_trace+0x616/0x780 [ 755.162714] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 755.168247] ? copy_mount_options+0x285/0x380 [ 755.172743] ksys_mount+0x12d/0x140 [ 755.176361] __x64_sys_mount+0xbe/0x150 [ 755.180322] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 755.185326] do_syscall_64+0x1b1/0x800 [ 755.189200] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 755.194033] ? syscall_return_slowpath+0x5c0/0x5c0 [ 755.198951] ? syscall_return_slowpath+0x30f/0x5c0 [ 755.203871] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 755.209225] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 755.214057] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 755.219232] RIP: 0033:0x455979 [ 755.222408] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 755.230101] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 2018/05/13 06:34:59 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000000000000000001000"}}) [ 755.237365] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 755.244619] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 755.251874] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 755.259125] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 2018/05/13 06:34:59 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000000000000005f200"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:34:59 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000200"}}) [ 755.294456] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 2018/05/13 06:34:59 executing program 1 (fault-call:3 fault-nth:72): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) [ 755.353939] IPVS: Unknown mcast interface: rose0 2018/05/13 06:34:59 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x1, 0x0, 0x3, 0x8, 0x0, "eda91dc78cc9f67c46956b0d996bc3f9ee1fe73af7631113a6b7bfa92bf375fcb8fd470798cf540fb5a221e3cd6021db03ee94e174df41f2d5e4a76789394a", 0x12}, 0x80, &(0x7f0000002380)=[{&(0x7f0000000180)="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", 0x1000}, {&(0x7f0000001180)="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", 0x1000}, {&(0x7f0000002180)="ff2c8e8b447027a7e0f1ef195c14ca3e25dd2323c35df8d8d8c7dec6e2dadc362d2e6ca262aef48373b12ba6f0bb9a02e9c1623ff59f44cfb8e77d224bd40ff8c3beca2d800178899933ba7186e580b714069e655a1891532e8d0feec3aa9b284bd04523ce8be959636d619abbecd1389078b52af217f1e687d0b08036d236e8013f54dda4cbe229003c213ae6280bfaa5527e5479b63b785fae1a76c3342870b0b258f013ab3f5f13677037a0f1d45f9973df1e725db635bc383d9ab2bf49667e66b116d66ac1d7a4edfbaca3481290", 0xd0}, {&(0x7f0000002280)="c1ae3a25999050967cfff251decd07d82a516b8eba5c2e45da8c4fb811d4bc19733168273606a916edfa2fbc4a9561f43986a55f78f0d3290bf606603c5c0fe70e4de60fb8e5cc2ee00d6f5599b9e85313c2088823d84308457403fd020d7f9e99efb74074a7b4550d481cc560367aec4469f8f4fb76ed3854e79a6a5f4f518f58b6753c2c0f6720076c20f94b2c11e62b1d124dd1f33ae531e82542ba9df9d5033fadf00c8f317918fca13502f95a1d7ebdfadab61dbe74544891a81fed97f446bc25b0bd5eafaf241556380ef967fd", 0xd0}, {&(0x7f0000000080)="e0c5cc4669599aa6af037174b5bc7a45afb6cbec975dc7d64c57e9d6f304132faebe12f9fc14cdb4e14d16c1fbd6da50a05861d565035ab36020c7fc9afa11e128fe98d7578336aab3c3d5bbff6b6bc66a98e8213e78a8aaa6247938b3c8ad78a3", 0x61}], 0x5, &(0x7f0000002400)=[{0x78, 0x11f, 0x0, "49fc40b1a82e6fe2836cd0a42c7da77f19b114e0cfa1f92b93703a7fbbc69f616392c2678e1d81e0e38164f7c14178f45137b0253c49e2ea87343dbdb7b46513ee0c2aea6c8e3a5e7be01b9d269de40c01573a6481eb3870093509ee7b0b25aabb19ab14c20279"}, {0x48, 0x115, 0xa88, "ebbbbd5c735d3eaa6e043b96a01ca1a0e2ac6221c6bd9d3a57926920abfbd6f023ff0662637a7218fbd378485d504a2bbd44fadf49d1980f"}, {0x18, 0x10f, 0x1, "479fa59ac9"}, {0x90, 0x10c, 0x100000001, "1b82826112863d41db6b1a6c4e194e8a976376f88571f9fadfdc34866e575b7e72a9f7fb89afb0499c7a8313ac93e620d65af751e43582cea0ea0e65de663cd393c8cc125544a9e3f9babf20b3441a0acac50ef81595b10732ad6f0003bdc2a50e7622cea63d1e1120a0f13df957b3cd1ef748220a3e31dfe186df44dec0"}, {0xb8, 0x113, 0x3d6, "eb4a468a2d02addf82b03be264a9b91aa520c31df812779ee369b2018dae11c410f98666552ea5634927d54ea53ccd1871b3d8ff27556858b598a75823300a7bf0f27104189703eaada1789ad641a5460301092b2374b14b6653e005616ea00be82493483a8c39dd2841a871f599b9c518eb97cd6629e0fdbc630e1ef526aca605cd0c460cd92ed9e13110379c9379ea658269587b2f4f64aadf522017a9fd5050e942e99c0b343d"}, {0x20, 0x19f, 0x2230000000000, "3bb8b7dd2cf59e3115b0"}], 0x240, 0x4000}, 0x20040000) fcntl$notify(r1, 0x0, 0x1000000000282) [ 755.376138] IPVS: Unknown mcast interface: rose0 2018/05/13 06:34:59 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}}) 2018/05/13 06:34:59 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000600"}}) 2018/05/13 06:34:59 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000000005f200"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 755.510012] FAULT_INJECTION: forcing a failure. [ 755.510012] name failslab, interval 1, probability 0, space 0, times 0 [ 755.521479] CPU: 0 PID: 19630 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 755.528776] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 755.538137] Call Trace: [ 755.540725] dump_stack+0x1b9/0x294 [ 755.544343] ? dump_stack_print_info.cold.2+0x52/0x52 [ 755.549519] ? d_add+0x605/0xa10 [ 755.552872] ? lock_downgrade+0x8e0/0x8e0 [ 755.557014] should_fail.cold.4+0xa/0x1a [ 755.561066] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 755.566157] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 755.571161] ? graph_lock+0x170/0x170 [ 755.574950] ? __lockdep_init_map+0x105/0x590 [ 755.579435] ? find_held_lock+0x36/0x1c0 [ 755.583485] ? __lock_is_held+0xb5/0x140 [ 755.587539] ? check_same_owner+0x320/0x320 [ 755.591849] ? rcu_note_context_switch+0x710/0x710 [ 755.596767] __should_failslab+0x124/0x180 [ 755.600993] should_failslab+0x9/0x14 [ 755.604784] kmem_cache_alloc+0x2af/0x760 [ 755.608923] alloc_inode+0xb2/0x190 [ 755.612535] new_inode_pseudo+0x69/0x1a0 [ 755.616583] ? prune_icache_sb+0x1a0/0x1a0 [ 755.620803] ? down_read+0x1b0/0x1b0 [ 755.624500] ? mntput+0x74/0xa0 [ 755.627770] new_inode+0x1c/0x40 [ 755.631128] debugfs_get_inode+0x19/0x120 [ 755.635263] debugfs_create_dir+0x75/0x3c0 [ 755.639484] bdi_register_va.part.10+0x318/0x9b0 [ 755.644224] ? cgwb_kill+0x630/0x630 [ 755.647928] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 755.653451] ? bdi_init+0x416/0x510 [ 755.657066] ? wb_init+0x9e0/0x9e0 [ 755.660592] ? bdi_alloc_node+0x67/0xe0 [ 755.664551] ? bdi_alloc_node+0x67/0xe0 [ 755.668512] ? rcu_read_lock_sched_held+0x108/0x120 [ 755.673514] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 755.678782] ? _raw_spin_unlock+0x22/0x30 [ 755.682929] bdi_register_va+0x68/0x80 [ 755.686816] super_setup_bdi_name+0x123/0x220 [ 755.691296] ? kill_block_super+0x100/0x100 [ 755.695604] ? kmem_cache_alloc_trace+0x616/0x780 [ 755.700434] ? match_wildcard+0x3c0/0x3c0 [ 755.704568] ? trace_hardirqs_on+0xd/0x10 [ 755.708706] fuse_fill_super+0xe6e/0x1e20 [ 755.712846] ? fuse_get_root_inode+0x190/0x190 [ 755.717416] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 755.722423] ? kasan_check_read+0x11/0x20 [ 755.726560] ? cap_capable+0x1f9/0x260 [ 755.730438] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 755.735979] ? security_capable+0x99/0xc0 [ 755.740126] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 755.745650] ? ns_capable_common+0x13f/0x170 [ 755.750047] ? get_anon_bdev+0x2f0/0x2f0 [ 755.754093] ? sget+0x113/0x150 [ 755.757362] ? fuse_get_root_inode+0x190/0x190 [ 755.762362] mount_nodev+0x6b/0x110 [ 755.765975] fuse_mount+0x2c/0x40 [ 755.769415] mount_fs+0xae/0x328 [ 755.772789] vfs_kern_mount.part.34+0xd4/0x4d0 [ 755.777357] ? may_umount+0xb0/0xb0 [ 755.780968] ? _raw_read_unlock+0x22/0x30 [ 755.785099] ? __get_fs_type+0x97/0xc0 [ 755.788974] do_mount+0x564/0x3070 [ 755.792504] ? copy_mount_string+0x40/0x40 [ 755.796724] ? rcu_pm_notify+0xc0/0xc0 [ 755.800600] ? copy_mount_options+0x5f/0x380 [ 755.805006] ? rcu_read_lock_sched_held+0x108/0x120 [ 755.810018] ? kmem_cache_alloc_trace+0x616/0x780 [ 755.814856] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 755.820382] ? _copy_from_user+0xdf/0x150 [ 755.824522] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 755.830048] ? copy_mount_options+0x285/0x380 [ 755.834531] ksys_mount+0x12d/0x140 [ 755.838145] __x64_sys_mount+0xbe/0x150 [ 755.842106] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 755.847115] do_syscall_64+0x1b1/0x800 [ 755.850990] ? finish_task_switch+0x1ca/0x810 [ 755.855486] ? syscall_return_slowpath+0x5c0/0x5c0 [ 755.860404] ? syscall_return_slowpath+0x30f/0x5c0 [ 755.865321] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 755.870674] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 755.875505] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 755.880681] RIP: 0033:0x455979 [ 755.883865] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 755.891559] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 755.898814] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 755.906081] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 755.913336] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 755.920594] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 755.971634] IPVS: Unknown mcast interface: rose0 2018/05/13 06:35:00 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121"}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) 2018/05/13 06:35:00 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000000000f20500"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:35:00 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000000000000000000000000200"}}) 2018/05/13 06:35:00 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000f00"}}) 2018/05/13 06:35:00 executing program 1 (fault-call:3 fault-nth:73): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:35:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121"}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 2018/05/13 06:35:00 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, 0x0) sync() lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = dup3(r3, r1, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@text32={0x20, &(0x7f00000000c0)="f0836d473c66b819008ec00f20c035000000200f22c0360f32b8010000000f01c10f08df79fa66b8c5000f00d0660f3882bb59b10000360f0b", 0x39}], 0x1, 0x1a, &(0x7f0000000040), 0x1000000000000053) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$BLKRRPART(r4, 0x125f, 0x0) r5 = getegid() getresgid(&(0x7f0000000140)=0x0, &(0x7f0000000180), &(0x7f00000001c0)) setresgid(r0, r5, r6) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000001140)=""/121, 0x56) 2018/05/13 06:35:00 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0x7, "696e6c6f832c3d"}, &(0x7f0000000040)=0x2b) r2 = dup(r0) fcntl$notify(r2, 0x0, 0x1000000000282) [ 756.045301] IPVS: Unknown mcast interface: rose0 [ 756.127477] IPVS: Unknown mcast interface: rose0 [ 756.144052] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 756.153100] FAULT_INJECTION: forcing a failure. [ 756.153100] name failslab, interval 1, probability 0, space 0, times 0 [ 756.164511] CPU: 0 PID: 19663 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 2018/05/13 06:35:00 executing program 2: socket$inet6(0xa, 0x400000000001, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) ioctl$DRM_IOCTL_MAP_BUFS(r1, 0xc0186419, &(0x7f0000000380)={0x3, &(0x7f0000000000)=""/6, &(0x7f0000000300)=[{0x6, 0xffffff79, 0x8000000000000401, &(0x7f00000003c0)=""/200}, {0x2, 0xba, 0x400, &(0x7f0000000180)=""/186}, {0x7, 0x8a, 0x0, &(0x7f00000004c0)=""/155}]}) fcntl$notify(r0, 0x0, 0x201000000000286) 2018/05/13 06:35:00 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\x00\x00\x00\x00\x00\n\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 756.171797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 756.181163] Call Trace: [ 756.183767] dump_stack+0x1b9/0x294 [ 756.183771] IPVS: Unknown mcast interface: rose0 [ 756.192163] ? dump_stack_print_info.cold.2+0x52/0x52 [ 756.197370] ? d_add+0x605/0xa10 [ 756.200747] ? lock_downgrade+0x8e0/0x8e0 [ 756.204912] should_fail.cold.4+0xa/0x1a [ 756.208991] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 756.214112] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 756.219147] ? graph_lock+0x170/0x170 [ 756.222961] ? __lockdep_init_map+0x105/0x590 [ 756.227477] ? find_held_lock+0x36/0x1c0 [ 756.231560] ? __lock_is_held+0xb5/0x140 [ 756.235665] ? check_same_owner+0x320/0x320 [ 756.240015] ? rcu_note_context_switch+0x710/0x710 [ 756.244964] __should_failslab+0x124/0x180 [ 756.248314] IPVS: Unknown mcast interface: rose0 [ 756.249213] should_failslab+0x9/0x14 [ 756.249233] kmem_cache_alloc+0x2af/0x760 [ 756.249260] alloc_inode+0xb2/0x190 [ 756.249279] new_inode_pseudo+0x69/0x1a0 [ 756.249295] ? prune_icache_sb+0x1a0/0x1a0 [ 756.249311] ? down_read+0x1b0/0x1b0 2018/05/13 06:35:00 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}}) 2018/05/13 06:35:00 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00'}}) [ 756.249328] ? mntput+0x74/0xa0 [ 756.249348] new_inode+0x1c/0x40 [ 756.275461] IPVS: Unknown mcast interface: rose0 [ 756.277679] debugfs_get_inode+0x19/0x120 [ 756.277699] debugfs_create_dir+0x75/0x3c0 [ 756.277719] bdi_register_va.part.10+0x318/0x9b0 [ 756.277735] ? cgwb_kill+0x630/0x630 [ 756.277757] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 756.277770] ? bdi_init+0x416/0x510 [ 756.277783] ? wb_init+0x9e0/0x9e0 [ 756.277800] ? bdi_alloc_node+0x67/0xe0 [ 756.322603] ? bdi_alloc_node+0x67/0xe0 2018/05/13 06:35:00 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 756.326598] ? rcu_read_lock_sched_held+0x108/0x120 [ 756.331627] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 756.336926] bdi_register_va+0x68/0x80 [ 756.340836] super_setup_bdi_name+0x123/0x220 [ 756.345345] ? kill_block_super+0x100/0x100 [ 756.349677] ? kmem_cache_alloc_trace+0x616/0x780 [ 756.354529] ? match_wildcard+0x3c0/0x3c0 [ 756.358691] ? trace_hardirqs_on+0xd/0x10 [ 756.362858] fuse_fill_super+0xe6e/0x1e20 [ 756.367027] ? fuse_get_root_inode+0x190/0x190 [ 756.371625] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 756.373111] IPVS: Unknown mcast interface: rose0 [ 756.376649] ? kasan_check_read+0x11/0x20 [ 756.376670] ? cap_capable+0x1f9/0x260 [ 756.376694] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 756.376709] ? security_capable+0x99/0xc0 [ 756.376729] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 756.376744] ? ns_capable_common+0x13f/0x170 [ 756.376763] ? get_anon_bdev+0x2f0/0x2f0 [ 756.376776] ? sget+0x113/0x150 [ 756.376793] ? fuse_get_root_inode+0x190/0x190 [ 756.376810] mount_nodev+0x6b/0x110 2018/05/13 06:35:00 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}}) 2018/05/13 06:35:00 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 756.401540] IPVS: Unknown mcast interface: rose0 [ 756.404752] fuse_mount+0x2c/0x40 [ 756.404771] mount_fs+0xae/0x328 [ 756.404792] vfs_kern_mount.part.34+0xd4/0x4d0 [ 756.404809] ? may_umount+0xb0/0xb0 [ 756.404823] ? _raw_read_unlock+0x22/0x30 [ 756.404837] ? __get_fs_type+0x97/0xc0 [ 756.404856] do_mount+0x564/0x3070 [ 756.404877] ? copy_mount_string+0x40/0x40 [ 756.404896] ? rcu_pm_notify+0xc0/0xc0 [ 756.464146] ? copy_mount_options+0x5f/0x380 [ 756.468588] ? rcu_read_lock_sched_held+0x108/0x120 [ 756.473622] ? kmem_cache_alloc_trace+0x616/0x780 [ 756.478487] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 756.484038] ? _copy_from_user+0xdf/0x150 [ 756.488204] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 756.493750] ? copy_mount_options+0x285/0x380 [ 756.498262] ksys_mount+0x12d/0x140 [ 756.500789] IPVS: Unknown mcast interface: rose0 [ 756.501904] __x64_sys_mount+0xbe/0x150 [ 756.501920] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 756.501940] do_syscall_64+0x1b1/0x800 [ 756.501957] ? finish_task_switch+0x1ca/0x810 [ 756.501975] ? syscall_return_slowpath+0x5c0/0x5c0 [ 756.501993] ? syscall_return_slowpath+0x30f/0x5c0 [ 756.502012] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 756.502032] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 756.502053] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 756.502064] RIP: 0033:0x455979 [ 756.502072] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 756.520849] IPVS: Unknown mcast interface: rose0 [ 756.524155] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 2018/05/13 06:35:01 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000000000100"}}) [ 756.524164] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 756.524172] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 756.524181] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 756.524189] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 756.728443] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 2018/05/13 06:35:01 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121"}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) 2018/05/13 06:35:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121"}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 2018/05/13 06:35:01 executing program 1 (fault-call:3 fault-nth:74): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:35:01 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}}) 2018/05/13 06:35:01 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000000000000000000000f00"}}) 2018/05/13 06:35:01 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) fcntl$notify(r1, 0x0, 0x1000000000282) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000280)=0x0) ioctl$KVM_SET_XCRS(r1, 0x4188aea7, &(0x7f0000000200)=ANY=[@ANYBLOB="0700000000000000090000000000000004000000000000009b0000000000000004000000000000000700000000000000ff0700000000000005000000009d2e471f00000000000000000001000000000003000000000000003f00000000000000050000000000000002000000000000007f05000000000000"]) accept4$packet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000140)=0x14, 0x800) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000000180)={[0x0, 0xf000, 0x2, 0xf000], 0x0, 0x80, 0x5d}) migrate_pages(r2, 0x0, &(0x7f0000000040)=0x9, &(0x7f00000000c0)) 2018/05/13 06:35:01 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x337, &(0x7f0000000500), 0x0, &(0x7f0000000080)=ANY=[]) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000001c0)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000040)='./control/file0\x00') syz_mount_image$hfsplus(&(0x7f0000000080)='hfsplus\x00', &(0x7f0000000140)='./control/file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB]) rename(&(0x7f0000000240)='./control/file0\x00', &(0x7f0000000280)='./file0/file0\x00') close(r0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, 0x0) sync() lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000001140)=""/121, 0x56) 2018/05/13 06:35:01 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 756.971355] IPVS: Unknown mcast interface: rose0 [ 757.003564] IPVS: Unknown mcast interface: rose0 [ 757.025649] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. [ 757.037195] FAULT_INJECTION: forcing a failure. [ 757.037195] name failslab, interval 1, probability 0, space 0, times 0 [ 757.048692] CPU: 0 PID: 19736 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 757.055977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 757.065337] Call Trace: [ 757.067940] dump_stack+0x1b9/0x294 [ 757.071587] ? dump_stack_print_info.cold.2+0x52/0x52 [ 757.076792] ? kernel_text_address+0x79/0xf0 [ 757.081214] ? __unwind_start+0x166/0x330 [ 757.085379] ? __kernel_text_address+0xd/0x40 [ 757.089894] should_fail.cold.4+0xa/0x1a [ 757.093969] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 757.099088] ? __lock_acquire+0x7f5/0x5140 [ 757.103339] ? __lock_acquire+0x7f5/0x5140 [ 757.107585] ? save_stack+0xa9/0xd0 [ 757.111218] ? graph_lock+0x170/0x170 [ 757.115028] ? kasan_kmalloc+0xc4/0xe0 [ 757.118925] ? kasan_slab_alloc+0x12/0x20 2018/05/13 06:35:01 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000600"}}) 2018/05/13 06:35:01 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:35:01 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x264843, 0x0) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000040)={0x100000001, 0x73, "88dd6d6b1790ac416d4007bc4083b9091e74dc4da2dd1dae6c4bcc8515627eeb8d0d321c976d8470a408f1e7913c972262168020dbf366c865ad41e067e854e56abedaa0975fee999e20515fae43ef1e446f91e8d1c162d323336cc54a7296f33a0a902fc445fb81a58e057b6b3860f011786a"}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r2 = dup(r0) fcntl$notify(r2, 0x0, 0x1000000000282) 2018/05/13 06:35:01 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000000000000000000000000034165d4000"}}) [ 757.123174] ? find_held_lock+0x36/0x1c0 [ 757.127246] ? __lock_is_held+0xb5/0x140 [ 757.131333] ? check_same_owner+0x320/0x320 [ 757.135676] ? __lock_acquire+0x7f5/0x5140 [ 757.139927] ? rcu_note_context_switch+0x710/0x710 [ 757.144871] __should_failslab+0x124/0x180 [ 757.149122] should_failslab+0x9/0x14 [ 757.152931] kmem_cache_alloc+0x2af/0x760 [ 757.157098] ? debug_check_no_locks_freed+0x310/0x310 [ 757.162305] __d_alloc+0xc0/0xd30 [ 757.165769] ? __lock_acquire+0x7f5/0x5140 [ 757.170019] ? shrink_dcache_for_umount+0x290/0x290 2018/05/13 06:35:01 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000001400"}}) [ 757.175045] ? print_usage_bug+0xc0/0xc0 [ 757.179124] ? debug_check_no_locks_freed+0x310/0x310 [ 757.184318] ? print_usage_bug+0xc0/0xc0 [ 757.188388] ? __lock_acquire+0x7f5/0x5140 [ 757.192648] d_alloc+0x8e/0x370 [ 757.195938] ? __d_alloc+0xd30/0xd30 [ 757.199677] d_alloc_parallel+0x152/0x1e80 [ 757.203924] ? graph_lock+0x170/0x170 [ 757.207740] ? __lock_acquire+0x7f5/0x5140 [ 757.211980] ? debug_check_no_locks_freed+0x310/0x310 [ 757.217180] ? __d_lookup_rcu+0xa80/0xa80 [ 757.221341] ? print_usage_bug+0xc0/0xc0 [ 757.225413] ? find_held_lock+0x36/0x1c0 [ 757.229510] ? lock_downgrade+0x8e0/0x8e0 [ 757.233667] ? __kernel_text_address+0xd/0x40 [ 757.238175] ? mark_held_locks+0xc9/0x160 [ 757.242331] ? __raw_spin_lock_init+0x1c/0x100 [ 757.246920] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 757.251946] ? __lockdep_init_map+0x105/0x590 [ 757.256454] ? __lockdep_init_map+0x105/0x590 [ 757.259609] IPVS: Unknown mcast interface: rose0 [ 757.260964] ? lockdep_init_map+0x9/0x10 [ 757.260981] ? __init_waitqueue_head+0x96/0x140 2018/05/13 06:35:01 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000e800"}}) 2018/05/13 06:35:01 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000000000000000000000000000000008000"}}) [ 757.260996] ? init_wait_entry+0x1b0/0x1b0 [ 757.261012] ? d_alloc_parallel+0x1e80/0x1e80 [ 757.261030] ? lock_release+0xa10/0xa10 [ 757.261049] __lookup_slow+0x1e6/0x540 [ 757.261066] ? vfs_unlink+0x510/0x510 [ 757.261086] ? d_lookup+0x219/0x330 [ 757.261113] lookup_one_len+0x1c7/0x210 [ 757.281325] IPVS: Unknown mcast interface: rose0 [ 757.283280] ? lookup_one_len_unlocked+0xf0/0xf0 [ 757.283300] ? down_write+0x87/0x120 [ 757.283318] ? start_creating+0xb1/0x200 [ 757.283333] ? down_read+0x1b0/0x1b0 [ 757.283347] ? mntput+0x74/0xa0 2018/05/13 06:35:01 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000000000005f200"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 757.283363] ? simple_pin_fs+0xa4/0x190 [ 757.283379] start_creating+0xc6/0x200 [ 757.283400] __debugfs_create_file+0x63/0x400 [ 757.339126] debugfs_create_file+0x57/0x70 [ 757.343376] bdi_register_va.part.10+0x365/0x9b0 [ 757.348141] ? cgwb_kill+0x630/0x630 [ 757.351874] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 757.357417] ? bdi_init+0x416/0x510 [ 757.361044] ? wb_init+0x9e0/0x9e0 [ 757.364592] ? bdi_alloc_node+0x67/0xe0 [ 757.368574] ? bdi_alloc_node+0x67/0xe0 [ 757.372561] ? rcu_read_lock_sched_held+0x108/0x120 [ 757.377590] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 757.382882] ? _raw_spin_unlock+0x22/0x30 [ 757.387040] bdi_register_va+0x68/0x80 [ 757.390937] super_setup_bdi_name+0x123/0x220 [ 757.395437] ? kill_block_super+0x100/0x100 [ 757.399770] ? kmem_cache_alloc_trace+0x616/0x780 [ 757.399802] IPVS: Unknown mcast interface: rose0 [ 757.404611] ? match_wildcard+0x3c0/0x3c0 [ 757.404628] ? trace_hardirqs_on+0xd/0x10 [ 757.404650] fuse_fill_super+0xe6e/0x1e20 [ 757.404670] ? fuse_get_root_inode+0x190/0x190 [ 757.404688] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 757.404709] ? kasan_check_read+0x11/0x20 [ 757.404727] ? cap_capable+0x1f9/0x260 [ 757.404750] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 757.404762] ? security_capable+0x99/0xc0 [ 757.404782] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 757.442915] IPVS: Unknown mcast interface: rose0 [ 757.445031] ? ns_capable_common+0x13f/0x170 [ 757.445050] ? get_anon_bdev+0x2f0/0x2f0 [ 757.445065] ? sget+0x113/0x150 [ 757.445083] ? fuse_get_root_inode+0x190/0x190 [ 757.445099] mount_nodev+0x6b/0x110 [ 757.445116] fuse_mount+0x2c/0x40 [ 757.445132] mount_fs+0xae/0x328 [ 757.445151] vfs_kern_mount.part.34+0xd4/0x4d0 [ 757.490759] ? may_umount+0xb0/0xb0 [ 757.494383] ? _raw_read_unlock+0x22/0x30 [ 757.498539] ? __get_fs_type+0x97/0xc0 [ 757.502427] do_mount+0x564/0x3070 [ 757.505969] ? do_raw_spin_unlock+0x9e/0x2e0 [ 757.510370] ? copy_mount_string+0x40/0x40 [ 757.514595] ? rcu_pm_notify+0xc0/0xc0 [ 757.518492] ? copy_mount_options+0x5f/0x380 [ 757.522893] ? rcu_read_lock_sched_held+0x108/0x120 [ 757.527905] ? kmem_cache_alloc_trace+0x616/0x780 [ 757.532742] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 757.538272] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 757.543799] ? copy_mount_options+0x285/0x380 [ 757.548300] ksys_mount+0x12d/0x140 [ 757.551923] __x64_sys_mount+0xbe/0x150 [ 757.555883] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 757.560891] do_syscall_64+0x1b1/0x800 [ 757.564774] ? finish_task_switch+0x1ca/0x810 [ 757.569267] ? syscall_return_slowpath+0x5c0/0x5c0 [ 757.574185] ? syscall_return_slowpath+0x30f/0x5c0 [ 757.579118] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 757.584482] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 757.589318] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 757.594499] RIP: 0033:0x455979 [ 757.597694] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 757.605404] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 757.613626] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 757.620888] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 757.628151] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 757.635408] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 757.873827] hfsplus: unable to find HFS+ superblock 2018/05/13 06:35:02 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121"}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), 0x4) 2018/05/13 06:35:02 executing program 1 (fault-call:3 fault-nth:75): r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0xa001, 0x0, 0x0, 0x0, 0x0) 2018/05/13 06:35:02 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000000000000000000000000000000000500"}}) 2018/05/13 06:35:02 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x0, 0x0) sync() lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0104262c8523bf012cf66f") clock_gettime(0xfffffffffffffff8, &(0x7f0000001b00)) r1 = memfd_create(&(0x7f0000000000)='security.capability\x00', 0x1) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000080), &(0x7f0000000140)=0x4) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000001140)=""/121, 0x56) 2018/05/13 06:35:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000300)=0x4, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3d086bfbef6ceccebd8b96edf863ccf3bee36de82beb7232265849e62938fbfbdea2e1ca32691724bfffaaaaddf9c9047f6581cb5830b89d16a4507a735121"}, 0x3d40, &(0x7f00000012c0), 0x35f, &(0x7f0000000240)=ANY=[]}, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 2018/05/13 06:35:02 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000000000001000"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) 2018/05/13 06:35:02 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e65726963000000000000000000000000000000000400"}}) 2018/05/13 06:35:02 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000000)={&(0x7f00009fe000/0x600000)=nil, 0x600000}) r2 = dup(r0) fcntl$notify(r2, 0x0, 0x1000000000282) acct(&(0x7f0000000180)='./file0\x00') ioctl$KVM_PPC_GET_PVINFO(r2, 0x4080aea1, &(0x7f0000000040)=""/195) [ 757.912646] ntfs: (device loop5): parse_options(): Unrecognized mount option hfsplus. [ 757.934742] hfsplus: unable to find HFS+ superblock [ 758.004342] IPVS: Unknown mcast interface: rose0 [ 758.030836] IPVS: Unknown mcast interface: rose0 [ 758.065888] FAULT_INJECTION: forcing a failure. [ 758.065888] name failslab, interval 1, probability 0, space 0, times 0 [ 758.067592] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 758.077249] CPU: 0 PID: 19813 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 758.092131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 758.101493] Call Trace: [ 758.104100] dump_stack+0x1b9/0x294 [ 758.107747] ? dump_stack_print_info.cold.2+0x52/0x52 [ 758.112954] ? __lock_acquire+0x7f5/0x5140 [ 758.117195] ? __lock_acquire+0x7f5/0x5140 [ 758.121447] should_fail.cold.4+0xa/0x1a [ 758.125500] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 758.130591] ? debug_check_no_locks_freed+0x310/0x310 [ 758.135766] ? kasan_check_write+0x14/0x20 [ 758.139991] ? __init_rwsem+0x1c4/0x290 [ 758.143953] ? graph_lock+0x170/0x170 [ 758.147741] ? find_held_lock+0x36/0x1c0 [ 758.151795] ? find_held_lock+0x36/0x1c0 [ 758.155849] ? __lock_is_held+0xb5/0x140 [ 758.159907] ? check_same_owner+0x320/0x320 [ 758.164224] ? graph_lock+0x170/0x170 [ 758.168020] ? rcu_note_context_switch+0x710/0x710 [ 758.172942] __should_failslab+0x124/0x180 [ 758.177163] should_failslab+0x9/0x14 [ 758.180949] kmem_cache_alloc+0x2af/0x760 [ 758.185091] ? find_held_lock+0x36/0x1c0 [ 758.189140] fuse_alloc_inode+0x96/0x4f0 [ 758.193184] ? fuse_dev_alloc+0x4e0/0x4e0 [ 758.197315] ? lock_downgrade+0x8e0/0x8e0 [ 758.201454] ? kasan_check_read+0x11/0x20 [ 758.205603] ? do_raw_spin_unlock+0x9e/0x2e0 [ 758.209999] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 758.214572] ? kasan_check_write+0x14/0x20 [ 758.218794] ? find_inode.isra.19+0xc3/0x1d0 [ 758.223200] ? fuse_dev_alloc+0x4e0/0x4e0 [ 758.227355] alloc_inode+0x63/0x190 [ 758.230969] iget5_locked+0x20e/0x570 [ 758.234753] ? fuse_inode_eq+0x80/0x80 [ 758.238625] ? fuse_init_file_inode+0x70/0x70 [ 758.243106] ? inode_lru_isolate+0x580/0x580 [ 758.247502] ? cgwb_kill+0x630/0x630 [ 758.251204] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 758.256728] ? print_usage_bug+0xc0/0xc0 [ 758.260776] fuse_iget+0x1cc/0x820 [ 758.264306] ? fuse_change_attributes+0x810/0x810 [ 758.269136] ? _raw_spin_unlock+0x22/0x30 [ 758.273272] fuse_get_root_inode+0x121/0x190 [ 758.277665] ? fuse_iget+0x820/0x820 [ 758.281380] ? _raw_spin_unlock_bh+0x30/0x40 [ 758.285781] ? bdi_set_max_ratio+0x112/0x150 [ 758.290175] fuse_fill_super+0x11e0/0x1e20 [ 758.294402] ? fuse_get_root_inode+0x190/0x190 [ 758.298972] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 758.303977] ? kasan_check_read+0x11/0x20 [ 758.308115] ? cap_capable+0x1f9/0x260 [ 758.312023] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 758.317554] ? security_capable+0x99/0xc0 [ 758.321698] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 758.327221] ? ns_capable_common+0x13f/0x170 [ 758.331617] ? get_anon_bdev+0x2f0/0x2f0 [ 758.335669] ? sget+0x113/0x150 [ 758.338946] ? fuse_get_root_inode+0x190/0x190 [ 758.343513] mount_nodev+0x6b/0x110 [ 758.347128] fuse_mount+0x2c/0x40 [ 758.350571] mount_fs+0xae/0x328 [ 758.353927] vfs_kern_mount.part.34+0xd4/0x4d0 [ 758.358495] ? may_umount+0xb0/0xb0 [ 758.362106] ? _raw_read_unlock+0x22/0x30 [ 758.366237] ? __get_fs_type+0x97/0xc0 [ 758.370115] do_mount+0x564/0x3070 [ 758.373641] ? interrupt_entry+0xb1/0xf0 [ 758.377691] ? copy_mount_string+0x40/0x40 [ 758.381913] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 758.386655] ? retint_kernel+0x10/0x10 [ 758.390534] ? copy_mount_options+0x1e3/0x380 [ 758.395020] ? write_comp_data+0x6d/0x70 [ 758.399070] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 758.404593] ? copy_mount_options+0x285/0x380 [ 758.409078] ksys_mount+0x12d/0x140 [ 758.412704] __x64_sys_mount+0xbe/0x150 [ 758.416667] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 758.421671] do_syscall_64+0x1b1/0x800 [ 758.425544] ? finish_task_switch+0x1ca/0x810 [ 758.430032] ? syscall_return_slowpath+0x5c0/0x5c0 [ 758.434950] ? syscall_return_slowpath+0x30f/0x5c0 [ 758.439867] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 758.445219] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 758.450049] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 758.455234] RIP: 0033:0x455979 [ 758.458407] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/05/13 06:35:02 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 2018/05/13 06:35:02 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = dup(r0) ioctl$SG_GET_KEEP_ORPHAN(r1, 0x2288, &(0x7f0000000000)) fcntl$notify(r1, 0x0, 0x1000000000282) 2018/05/13 06:35:02 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000000000000000000000000000000000f00"}}) 2018/05/13 06:35:02 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000000000000000000500"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 758.466101] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 758.473703] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 758.480957] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 758.488226] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 758.495491] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 758.539926] ================================================================== [ 758.547359] BUG: KASAN: use-after-free in __lock_acquire+0x3888/0x5140 [ 758.554042] Read of size 8 at addr ffff8801a9ddcbc8 by task syz-executor1/19813 [ 758.561486] [ 758.563122] CPU: 0 PID: 19813 Comm: syz-executor1 Not tainted 4.17.0-rc4+ #44 [ 758.570395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 758.579748] Call Trace: [ 758.582342] dump_stack+0x1b9/0x294 2018/05/13 06:35:03 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e6572696300000000000000000000000000000000000000000000000400"}}) [ 758.585983] ? dump_stack_print_info.cold.2+0x52/0x52 [ 758.591176] ? printk+0x9e/0xba [ 758.592204] IPVS: Unknown mcast interface: rose0 [ 758.594460] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 758.594477] ? kasan_check_write+0x14/0x20 [ 758.594491] print_address_description+0x6c/0x20b [ 758.594505] ? __lock_acquire+0x3888/0x5140 [ 758.594517] kasan_report.cold.7+0x242/0x2fe [ 758.594532] __asan_report_load8_noabort+0x14/0x20 [ 758.594544] __lock_acquire+0x3888/0x5140 [ 758.594555] ? print_usage_bug+0xc0/0xc0 2018/05/13 06:35:03 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={"726d643235362d67656e657269630000000000000000000000000000000000000000000000000000000000fffffe00"}}) 2018/05/13 06:35:03 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003640)={&(0x7f0000003300)={0x10}, 0xc, &(0x7f0000003600)={&(0x7f0000003340)={0x50, r1, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\x00\x00\x00\x00 \x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x50}, 0x1}, 0x0) [ 758.594572] ? debug_check_no_locks_freed+0x310/0x310 [ 758.626673] IPVS: Unknown mcast interface: rose0 [ 758.629596] ? mark_held_locks+0xc9/0x160 [ 758.629612] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 758.629626] ? _raw_spin_unlock_irq+0x27/0x70 [ 758.629638] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 758.629651] ? trace_hardirqs_on+0xd/0x10 [ 758.629661] ? _raw_spin_unlock_irq+0x27/0x70 [ 758.629676] ? finish_task_switch+0x1ca/0x810 [ 758.629692] ? finish_task_switch+0x182/0x810 [ 758.683546] ? preempt_notifier_register+0x1e0/0x1e0 2018/05/13 06:35:03 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00', 0x1, r3) keyctl$link(0x8, r4, r2) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000180)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'rmd256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00'}}) [ 758.688665] ? lock_repin_lock+0x410/0x410 [ 758.692920] ? __schedule+0x809/0x1e30 [ 758.696811] ? kasan_check_read+0x11/0x20 [ 758.700958] ? __sched_text_start+0x8/0x8 [ 758.705107] ? kasan_check_write+0x14/0x20 [ 758.709354] lock_acquire+0x1dc/0x520 [ 758.713157] ? fuse_kill_sb_anon+0x50/0xb0 [ 758.717401] ? lock_release+0xa10/0xa10 [ 758.721393] ? check_same_owner+0x320/0x320 [ 758.725731] down_write+0x87/0x120 [ 758.729267] ? fuse_kill_sb_anon+0x50/0xb0 [ 758.733498] ? down_read+0x1b0/0x1b0 [ 758.737202] ? perf_trace_mm_vmscan_writepage+0x750/0x750 [ 758.742738] fuse_kill_sb_anon+0x50/0xb0 [ 758.746808] deactivate_locked_super+0x97/0x100 [ 758.751481] ? fuse_get_root_inode+0x190/0x190 [ 758.756081] mount_nodev+0xfa/0x110 [ 758.759712] fuse_mount+0x2c/0x40 [ 758.763164] mount_fs+0xae/0x328 [ 758.766512] vfs_kern_mount.part.34+0xd4/0x4d0 [ 758.771445] ? may_umount+0xb0/0xb0 [ 758.775060] ? _raw_read_unlock+0x22/0x30 [ 758.779185] ? __get_fs_type+0x97/0xc0 [ 758.783060] do_mount+0x564/0x3070 [ 758.786593] ? interrupt_entry+0xb1/0xf0 [ 758.790646] ? copy_mount_string+0x40/0x40 [ 758.794884] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 758.799633] ? retint_kernel+0x10/0x10 [ 758.803507] ? copy_mount_options+0x1e3/0x380 [ 758.808000] ? write_comp_data+0x6d/0x70 [ 758.812066] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 758.817593] ? copy_mount_options+0x285/0x380 [ 758.822082] ksys_mount+0x12d/0x140 [ 758.825696] __x64_sys_mount+0xbe/0x150 [ 758.829661] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 758.834685] do_syscall_64+0x1b1/0x800 [ 758.838571] ? finish_task_switch+0x1ca/0x810 [ 758.843073] ? syscall_return_slowpath+0x5c0/0x5c0 [ 758.848011] ? syscall_return_slowpath+0x30f/0x5c0 [ 758.852947] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 758.858321] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 758.863177] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 758.868368] RIP: 0033:0x455979 [ 758.871546] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 758.879251] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 758.886511] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 758.893772] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 758.901031] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 758.908294] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 758.915547] [ 758.917166] Allocated by task 19813: [ 758.920884] save_stack+0x43/0xd0 [ 758.924346] kasan_kmalloc+0xc4/0xe0 [ 758.928055] kmem_cache_alloc_trace+0x152/0x780 [ 758.932713] fuse_fill_super+0xc92/0x1e20 [ 758.936861] mount_nodev+0x6b/0x110 [ 758.940485] fuse_mount+0x2c/0x40 [ 758.943923] mount_fs+0xae/0x328 [ 758.947288] vfs_kern_mount.part.34+0xd4/0x4d0 [ 758.951858] do_mount+0x564/0x3070 [ 758.955391] ksys_mount+0x12d/0x140 [ 758.958999] __x64_sys_mount+0xbe/0x150 [ 758.962960] do_syscall_64+0x1b1/0x800 [ 758.966829] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 758.971998] [ 758.973611] Freed by task 10273: [ 758.976960] save_stack+0x43/0xd0 [ 758.980396] __kasan_slab_free+0x11a/0x170 [ 758.984615] kasan_slab_free+0xe/0x10 [ 758.988396] kfree+0xd9/0x260 [ 758.991488] rcu_process_callbacks+0xa69/0x15f0 [ 758.996136] __do_softirq+0x2e0/0xaf5 [ 758.999925] [ 759.001534] The buggy address belongs to the object at ffff8801a9ddc900 [ 759.001534] which belongs to the cache kmalloc-1024 of size 1024 [ 759.014358] The buggy address is located 712 bytes inside of [ 759.014358] 1024-byte region [ffff8801a9ddc900, ffff8801a9ddcd00) [ 759.027119] The buggy address belongs to the page: [ 759.032052] page:ffffea0006a77700 count:1 mapcount:0 mapping:ffff8801a9ddc000 index:0x0 compound_mapcount: 0 [ 759.042006] flags: 0x2fffc0000008100(slab|head) [ 759.046665] raw: 02fffc0000008100 ffff8801a9ddc000 0000000000000000 0000000100000007 [ 759.054528] raw: ffffea0006a57e20 ffffea0006c6b720 ffff8801da800ac0 0000000000000000 [ 759.062404] page dumped because: kasan: bad access detected [ 759.068099] [ 759.069704] Memory state around the buggy address: [ 759.074618] ffff8801a9ddca80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 759.081968] ffff8801a9ddcb00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 759.089307] >ffff8801a9ddcb80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 759.096649] ^ [ 759.102342] ffff8801a9ddcc00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 759.109683] ffff8801a9ddcc80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 759.117024] ================================================================== [ 759.124371] Disabling lock debugging due to kernel taint [ 759.129800] Kernel panic - not syncing: panic_on_warn set ... [ 759.129800] [ 759.137150] CPU: 0 PID: 19813 Comm: syz-executor1 Tainted: G B 4.17.0-rc4+ #44 [ 759.145790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 759.155141] Call Trace: [ 759.157716] dump_stack+0x1b9/0x294 [ 759.161333] ? dump_stack_print_info.cold.2+0x52/0x52 [ 759.166506] ? lock_downgrade+0x8e0/0x8e0 [ 759.170638] ? vprintk_default+0x28/0x30 [ 759.174686] ? __lock_acquire+0x3790/0x5140 [ 759.179011] panic+0x22f/0x4de [ 759.182205] ? add_taint.cold.5+0x16/0x16 [ 759.186336] ? add_taint.cold.5+0x5/0x16 [ 759.190378] ? do_raw_spin_unlock+0x9e/0x2e0 [ 759.194766] ? __lock_acquire+0x3888/0x5140 [ 759.199068] kasan_end_report+0x47/0x4f [ 759.203033] kasan_report.cold.7+0x76/0x2fe [ 759.207343] __asan_report_load8_noabort+0x14/0x20 [ 759.212256] __lock_acquire+0x3888/0x5140 [ 759.216388] ? print_usage_bug+0xc0/0xc0 [ 759.220454] ? debug_check_no_locks_freed+0x310/0x310 [ 759.225630] ? mark_held_locks+0xc9/0x160 [ 759.229761] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 759.234323] ? _raw_spin_unlock_irq+0x27/0x70 [ 759.238798] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 759.243795] ? trace_hardirqs_on+0xd/0x10 [ 759.247926] ? _raw_spin_unlock_irq+0x27/0x70 [ 759.252406] ? finish_task_switch+0x1ca/0x810 [ 759.256879] ? finish_task_switch+0x182/0x810 [ 759.261358] ? preempt_notifier_register+0x1e0/0x1e0 [ 759.266446] ? lock_repin_lock+0x410/0x410 [ 759.270668] ? __schedule+0x809/0x1e30 [ 759.274548] ? kasan_check_read+0x11/0x20 [ 759.278678] ? __sched_text_start+0x8/0x8 [ 759.282821] ? kasan_check_write+0x14/0x20 [ 759.287045] lock_acquire+0x1dc/0x520 [ 759.290831] ? fuse_kill_sb_anon+0x50/0xb0 [ 759.295051] ? lock_release+0xa10/0xa10 [ 759.299011] ? check_same_owner+0x320/0x320 [ 759.303334] down_write+0x87/0x120 [ 759.306858] ? fuse_kill_sb_anon+0x50/0xb0 [ 759.311074] ? down_read+0x1b0/0x1b0 [ 759.314773] ? perf_trace_mm_vmscan_writepage+0x750/0x750 [ 759.320304] fuse_kill_sb_anon+0x50/0xb0 [ 759.324351] deactivate_locked_super+0x97/0x100 [ 759.329016] ? fuse_get_root_inode+0x190/0x190 [ 759.333590] mount_nodev+0xfa/0x110 [ 759.337199] fuse_mount+0x2c/0x40 [ 759.340630] mount_fs+0xae/0x328 [ 759.343983] vfs_kern_mount.part.34+0xd4/0x4d0 [ 759.348548] ? may_umount+0xb0/0xb0 [ 759.352174] ? _raw_read_unlock+0x22/0x30 [ 759.356306] ? __get_fs_type+0x97/0xc0 [ 759.360176] do_mount+0x564/0x3070 [ 759.363699] ? interrupt_entry+0xb1/0xf0 [ 759.367745] ? copy_mount_string+0x40/0x40 [ 759.371982] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 759.376722] ? retint_kernel+0x10/0x10 [ 759.380603] ? copy_mount_options+0x1e3/0x380 [ 759.385087] ? write_comp_data+0x6d/0x70 [ 759.389134] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 759.394656] ? copy_mount_options+0x285/0x380 [ 759.399137] ksys_mount+0x12d/0x140 [ 759.402745] __x64_sys_mount+0xbe/0x150 [ 759.406701] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 759.411701] do_syscall_64+0x1b1/0x800 [ 759.415570] ? finish_task_switch+0x1ca/0x810 [ 759.420050] ? syscall_return_slowpath+0x5c0/0x5c0 [ 759.424959] ? syscall_return_slowpath+0x30f/0x5c0 [ 759.429872] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 759.435221] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 759.440069] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 759.445238] RIP: 0033:0x455979 [ 759.448408] RSP: 002b:00007f69a798f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 759.456099] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455979 [ 759.463349] RDX: 00000000004c1e16 RSI: 0000000020000340 RDI: 00000000004de025 [ 759.470602] RBP: 0000000000000000 R08: 00007f69a798f820 R09: 0000000000000000 [ 759.477875] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 759.485151] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 759.492921] Dumping ftrace buffer: [ 759.496441] (ftrace buffer empty) [ 759.500138] Kernel Offset: disabled [ 759.503742] Rebooting in 86400 seconds..