6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0x4004ae8b, 0x0) 00:25:12 executing program 4: io_setup(0x3, &(0x7f0000000100)) r0 = syz_open_dev$adsp(&(0x7f0000001a00)='/dev/adsp#\x00', 0x68a9b0b2, 0x80000) signalfd(r0, &(0x7f0000001a40)={0x80000001}, 0x8) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80400, 0x0) sendmsg$tipc(r1, &(0x7f0000001880)={&(0x7f0000000140)=@name={0x1e, 0x2, 0x3, {{0x41, 0x3}, 0x1}}, 0x10, &(0x7f0000001700)=[{&(0x7f0000000280)="c1dfec359046172c585647f4a63a53abff3162d8c5a91b7939fb89b896e3df7011d51ddd2f06ea0c12710b48dafc4e69cfa42c7682c14f38c2a0ec71298ce4dd65c6fe97688595f73152a54eaa6d828c03cd031ab215ebd314b1b005c2c9b38f965bdedd1f2f0058697de934e2de2597321c85b6308b49df391ae41d166f3647acf34c88365dc948a8d42fd69fa8d22bf13ef977be78f7caa4d1d0009fc0fecbec0dbc0296ed4a2454b684b300c57c972aec715bb5853cd3b3e99569fe05818d6f621e59", 0xc4}, {&(0x7f0000000180)="844a1d4afeaab96cd4858f93bc7d301e062d9e52ddfa2fd581ea3ed70c14357fa6b11f96b6ca569b9286f1c4ed2741961aacc2778fb08908290773295efa8e201465dcfb0a37c88254c3c33939bc13c31f3898590498b74c36a910f6340b705c5f9ccd4473359b74554f5bf8f168f31ae03fde569be3408d0c9c24edfadd3fe031225653499be84abd8a475ce5", 0x8d}, {&(0x7f0000000480)="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", 0x1000}, {&(0x7f0000001480)="c9002fbd8f16ea49522b963a43edad7b0bf1589500ac1be6ce1c53596590b369f00acc64ebfcf19003cc98a914ee290a0ef327f9a7c7b546c2d774d3c00774a21bdc1182ebc11d9e870b571d3dad534d6e4c71b11e4c8ec7b45bc0fb3f6ccc228782f808fa02a032d0c7a6afa67d5a7fb6f8354897969ae110d641c358abc7744d71437f538fdeba5c4ab5d69bed170715abe262221f308d5cf3a34db279a4c57e2541b9c08a48442de27a2d733d", 0xae}, {&(0x7f0000001540)="e0d145a1b53c925dce16f952452482ba68945e059ba3bd5580eb6166cd2d3013f72b00ce41a871e313ae7aa02ba07a07df6ab2accfb9b2e20400d968adf7bd68ce2eaa7e7096fa9a006df7bf7d00241a96f660baec8c0cac0f1c7f2752a58045bcafc734f2abe10d8f58748065444b778ff78bb762f90fc2", 0x78}, {&(0x7f00000015c0)="d5e42477817631679f866897157aa92b7ceec708d51d332b069e69976dc284784709284dd9017c2923627408c8c8ad1c7ef8600eefc898eb2ca108ec38255f449fb78dc0d37980848b69edbb688e8ecc6bdae0f35a8bd1efa156f4594ef6dd480cbd6500557a99bd560031e3b6d25c97a3ec2813b9d6f98bbb04b88fb63d356699fd1ac9bf8e9adaad47c7b57cbc829103f8a91b08cb304d332188bd040ba79db9495bc090823e91d703e8155690702bf802e15231afa53de5c2126429153f45af0775e9912bca895de8beba828ee3", 0xcf}, {&(0x7f00000016c0)="5728b0bdd8cf57fc76c5e2fd905f32e54b94fb94264a4ef9c64fc1dbb1c6422a995cb643c4fc8a", 0x27}], 0x7, &(0x7f0000001780)="dfcd5a5d3773331806b5ff8ef28adacdc32f9769daf0eabebc6e42c3fb45a20b6740477602d7f194b3dfad2ed0646e89f25aa5e7a0b7f24e09bf0b3f0dacc6335e03f1092b746c00485d98984787d6088b7ec4d453217dcba0de6b817dfaf0870138a2ba94e4efe7818579b7569db730c3ca9e4f816081dd66fd857e749eb9ef0df09945f73a97602a8718d74acb6deb773975d3661fa24bb89694dd4e7a987d226c280e5e7760143d13c7e3cd02989346cf004880bea932d4019221b6be45600b660b180f09f7fe1412c85c164f6e57cc63f2bf54ccf30fd2e48a13a62dec", 0xdf, 0x40080}, 0x48000) ioctl$KVM_GET_EMULATED_CPUID(r1, 0xc008ae09, &(0x7f0000001a80)=""/151) r2 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) write$smack_current(r3, &(0x7f00000018c0)='/dev/full\x00', 0xa) ioctl$TIOCMBIC(r3, 0x5417, &(0x7f0000001900)=0x4) ioctl$KDDELIO(r1, 0x4b35, 0x0) accept4$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14, 0x80000) ioctl$VIDIOC_CREATE_BUFS(r2, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) 00:25:12 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x82842) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x2, 0x10000, 0x4, {0x2, @sliced={0x400, [0xbd, 0x6, 0x74f, 0x8, 0x48e0b4eb, 0x8, 0x1, 0xfffffffffffffffc, 0x0, 0x7ff, 0x1ff, 0x9, 0x5, 0x4, 0x1, 0x200, 0x0, 0x0, 0x1000, 0x8001, 0x200, 0x9, 0x5, 0xbfb, 0x20, 0x0, 0xc3, 0x9, 0x9, 0x5, 0x401, 0x3f5ea6ed, 0x3e87, 0x8, 0x8, 0x2, 0xffffffff, 0x7, 0x2, 0x1, 0x4, 0x1, 0x6, 0x9, 0x8, 0x7, 0xffffffffffffff00, 0x1], 0x6}}}) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x8, {0x724, 0x7, 0x4d326f9e, 0x4}, {0x8, 0x7, 0x1, 0xffff}, {0x7, 0xffffffffffffffaa}}) r1 = accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000040), 0x800) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000780)={0x0, 0x1}, &(0x7f00000007c0)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000800)={r2, 0x9}, &(0x7f0000000840)=0x8) setxattr$trusted_overlay_upper(&(0x7f0000000280)='./file0\x00', &(0x7f0000000240)='trusted.overlay.upper\x00', &(0x7f0000000880)=ANY=[], 0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000480)={{{@in=@remote, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000300)=0xfffffffffffffccd) 00:25:12 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000000)={0x4, 0x1, 0x1, {0x2, @pix_mp={0x1, 0x10000, 0x0, 0xd472d641f2bd6646, 0xc, [{0x3, 0x8000}, {0x3, 0x4}, {0x6, 0x80000000}, {0x101, 0x6}, {0x0, 0x7}, {0x3f, 0x8}, {0x0, 0x101}, {0x0, 0x2d79}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) 00:25:12 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'brou%e\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030700000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000000000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000000000000892f0700636f6e6e6c6162656c0000000000000000000000000000000000000000000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000000000000007000000070000000a0000000434f4e4e5345434d41524bff6eef1d192516e43f9a305e46692c00000000000000000000000000000000000000000008"]}, 0x2a8) 00:25:12 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000000)={0x4, 0x1, 0x1, {0x2, @pix_mp={0x1, 0x10000, 0x0, 0xd472d641f2bd6646, 0xc, [{0x3, 0x8000}, {0x3, 0x4}, {0x6, 0x80000000}, {0x101, 0x6}, {0x0, 0x7}, {0x3f, 0x8}, {0x0, 0x101}, {0x0, 0x2d79}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) 00:25:12 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x82842) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x2, 0x10000, 0x4, {0x2, @sliced={0x400, [0xbd, 0x6, 0x74f, 0x8, 0x48e0b4eb, 0x8, 0x1, 0xfffffffffffffffc, 0x0, 0x7ff, 0x1ff, 0x9, 0x5, 0x4, 0x1, 0x200, 0x0, 0x0, 0x1000, 0x8001, 0x200, 0x9, 0x5, 0xbfb, 0x20, 0x0, 0xc3, 0x9, 0x9, 0x5, 0x401, 0x3f5ea6ed, 0x3e87, 0x8, 0x8, 0x2, 0xffffffff, 0x7, 0x2, 0x1, 0x4, 0x1, 0x6, 0x9, 0x8, 0x7, 0xffffffffffffff00, 0x1], 0x6}}}) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x8, {0x724, 0x7, 0x4d326f9e, 0x4}, {0x8, 0x7, 0x1, 0xffff}, {0x7, 0xffffffffffffffaa}}) r1 = accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000040), 0x800) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000780)={0x0, 0x1}, &(0x7f00000007c0)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000800)={r2, 0x9}, &(0x7f0000000840)=0x8) setxattr$trusted_overlay_upper(&(0x7f0000000280)='./file0\x00', &(0x7f0000000240)='trusted.overlay.upper\x00', &(0x7f0000000880)=ANY=[], 0x0, 0x2) 00:25:12 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'brou\ne\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 2263.969710] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2264.007803] FAULT_INJECTION: forcing a failure. [ 2264.007803] name failslab, interval 1, probability 0, space 0, times 0 [ 2264.045965] CPU: 1 PID: 8979 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2264.053289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2264.062656] Call Trace: [ 2264.062689] dump_stack+0x244/0x39d [ 2264.062726] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2264.062750] ? lock_downgrade+0x900/0x900 [ 2264.062777] should_fail.cold.4+0xa/0x17 [ 2264.062800] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2264.062826] ? lock_downgrade+0x900/0x900 [ 2264.062850] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2264.062870] ? proc_fail_nth_write+0x9e/0x210 [ 2264.062888] ? proc_cwd_link+0x1d0/0x1d0 [ 2264.062915] ? find_held_lock+0x36/0x1c0 [ 2264.062954] ? perf_trace_sched_process_exec+0x860/0x860 [ 2264.062989] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2264.117424] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2264.121208] __should_failslab+0x124/0x180 [ 2264.121229] should_failslab+0x9/0x14 [ 2264.121244] __kmalloc+0x2e0/0x760 [ 2264.121261] ? strncpy_from_user+0x5a0/0x5a0 [ 2264.121283] ? fput+0x130/0x1a0 [ 2264.148670] ? do_syscall_64+0x9a/0x820 [ 2264.152668] ? __x64_sys_memfd_create+0x142/0x4f0 [ 2264.157532] ? do_syscall_64+0x9a/0x820 [ 2264.157553] __x64_sys_memfd_create+0x142/0x4f0 [ 2264.157571] ? memfd_fcntl+0x1910/0x1910 [ 2264.157599] do_syscall_64+0x1b9/0x820 [ 2264.157630] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2264.157669] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2264.166313] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2264.166335] ? trace_hardirqs_on_caller+0x310/0x310 [ 2264.166353] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2264.166372] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2264.166394] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2264.166417] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2264.166434] RIP: 0033:0x457679 [ 2264.217806] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2264.237226] RSP: 002b:00007f004a854a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 00:25:12 executing program 2: r0 = syz_open_dev$video(0x0, 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x4, 0x1, 0x1, {0x2, @pix_mp={0x1, 0x10000, 0x0, 0xd472d641f2bd6646, 0xc, [{0x3, 0x8000}, {0x3, 0x4}, {0x6, 0x80000000}, {0x101, 0x6}, {0x0, 0x7}, {0x3f, 0x8}, {0x0, 0x101}, {0x0, 0x2d79}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) 00:25:12 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'brout\n\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:25:12 executing program 2: r0 = syz_open_dev$video(0x0, 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x4, 0x1, 0x1, {0x2, @pix_mp={0x1, 0x10000, 0x0, 0xd472d641f2bd6646, 0xc, [{0x3, 0x8000}, {0x3, 0x4}, {0x6, 0x80000000}, {0x101, 0x6}, {0x0, 0x7}, {0x3f, 0x8}, {0x0, 0x101}, {0x0, 0x2d79}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) [ 2264.240468] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2264.244945] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457679 [ 2264.244955] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc816 [ 2264.244964] RBP: 000000000072bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 2264.244974] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f004a8556d4 [ 2264.244983] R13: 00000000004c55d8 R14: 00000000004d9b98 R15: 0000000000000003 00:25:13 executing program 1 (fault-call:0 fault-nth:1): syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:25:13 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'brout%\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:25:13 executing program 4 (fault-call:4 fault-nth:0): r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x462c) 00:25:13 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x82842) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x2, 0x10000, 0x4, {0x2, @sliced={0x400, [0xbd, 0x6, 0x74f, 0x8, 0x48e0b4eb, 0x8, 0x1, 0xfffffffffffffffc, 0x0, 0x7ff, 0x1ff, 0x9, 0x5, 0x4, 0x1, 0x200, 0x0, 0x0, 0x1000, 0x8001, 0x200, 0x9, 0x5, 0xbfb, 0x20, 0x0, 0xc3, 0x9, 0x9, 0x5, 0x401, 0x3f5ea6ed, 0x3e87, 0x8, 0x8, 0x2, 0xffffffff, 0x7, 0x2, 0x1, 0x4, 0x1, 0x6, 0x9, 0x8, 0x7, 0xffffffffffffff00, 0x1], 0x6}}}) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x8, {0x724, 0x7, 0x4d326f9e, 0x4}, {0x8, 0x7, 0x1, 0xffff}, {0x7, 0xffffffffffffffaa}}) r1 = accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000040), 0x800) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000780)={0x0, 0x1}, &(0x7f00000007c0)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000800)={r2, 0x9}, &(0x7f0000000840)=0x8) 00:25:13 executing program 2: r0 = syz_open_dev$video(0x0, 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x4, 0x1, 0x1, {0x2, @pix_mp={0x1, 0x10000, 0x0, 0xd472d641f2bd6646, 0xc, [{0x3, 0x8000}, {0x3, 0x4}, {0x6, 0x80000000}, {0x101, 0x6}, {0x0, 0x7}, {0x3f, 0x8}, {0x0, 0x101}, {0x0, 0x2d79}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) 00:25:13 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0x81a0ae8c, 0x0) [ 2264.472729] FAULT_INJECTION: forcing a failure. [ 2264.472729] name failslab, interval 1, probability 0, space 0, times 0 [ 2264.492710] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2264.519615] FAULT_INJECTION: forcing a failure. [ 2264.519615] name failslab, interval 1, probability 0, space 0, times 0 [ 2264.526596] CPU: 1 PID: 9004 Comm: syz-executor4 Not tainted 4.20.0-rc6+ #371 [ 2264.538142] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2264.547532] Call Trace: [ 2264.550155] dump_stack+0x244/0x39d [ 2264.550179] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2264.550198] ? mark_held_locks+0x130/0x130 [ 2264.550225] should_fail.cold.4+0xa/0x17 [ 2264.559036] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2264.572417] ? print_usage_bug+0xc0/0xc0 [ 2264.576498] ? rcu_softirq_qs+0x20/0x20 [ 2264.580498] ? dput.part.25+0x241/0x860 [ 2264.584499] ? find_held_lock+0x36/0x1c0 [ 2264.588590] ? find_held_lock+0x36/0x1c0 [ 2264.592690] ? perf_trace_sched_process_exec+0x860/0x860 [ 2264.598178] ? refcount_inc_not_zero_checked+0x1e5/0x2f0 [ 2264.601563] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2264.603648] __should_failslab+0x124/0x180 [ 2264.603670] should_failslab+0x9/0x14 [ 2264.603688] kmem_cache_alloc_trace+0x2d7/0x750 [ 2264.603718] ? aa_file_perm+0x490/0x1060 [ 2264.603748] alloc_pipe_info+0x164/0x5d0 [ 2264.616121] ? aa_path_link+0x5e0/0x5e0 [ 2264.616137] ? pipe_read+0x940/0x940 [ 2264.616168] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 2264.624613] ? common_file_perm+0x236/0x7f0 [ 2264.624652] splice_direct_to_actor+0x786/0x9d0 [ 2264.624668] ? fsnotify+0x50e/0xef0 [ 2264.624687] ? pipe_to_sendpage+0x400/0x400 [ 2264.624718] ? apparmor_file_permission+0x24/0x30 [ 2264.667200] ? do_splice_to+0x190/0x190 [ 2264.671204] ? security_file_permission+0x1c2/0x220 [ 2264.676241] ? rw_verify_area+0x118/0x360 [ 2264.680404] do_splice_direct+0x2d4/0x420 [ 2264.684585] ? splice_direct_to_actor+0x9d0/0x9d0 [ 2264.689437] ? apparmor_file_permission+0x24/0x30 [ 2264.694306] ? rw_verify_area+0x118/0x360 [ 2264.698508] do_sendfile+0x62a/0xe20 [ 2264.702246] ? do_compat_pwritev64+0x1c0/0x1c0 [ 2264.706845] ? __sb_end_write+0xd9/0x110 [ 2264.710926] ? fput+0x130/0x1a0 [ 2264.714223] ? do_syscall_64+0x9a/0x820 [ 2264.718216] ? do_syscall_64+0x9a/0x820 [ 2264.718542] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2264.722239] __x64_sys_sendfile64+0x1fd/0x250 [ 2264.722260] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 2264.722289] do_syscall_64+0x1b9/0x820 [ 2264.722305] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2264.722325] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2264.753776] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2264.758643] ? trace_hardirqs_on_caller+0x310/0x310 [ 2264.763721] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2264.768752] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2264.773786] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2264.778656] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2264.783865] RIP: 0033:0x457679 [ 2264.787067] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2264.805982] RSP: 002b:00007f3779498c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2264.813713] RAX: ffffffffffffffda RBX: 00007f3779498c90 RCX: 0000000000457679 00:25:13 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\a\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:25:13 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f7574650600", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:25:13 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f757465000000000000000600", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 2264.820995] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 2264.828272] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2264.828551] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2264.835549] R10: 000000000000462c R11: 0000000000000246 R12: 00007f37794996d4 [ 2264.835559] R13: 00000000004c3e2b R14: 00000000004d6c40 R15: 0000000000000008 [ 2264.860370] CPU: 0 PID: 9015 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2264.867663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2264.877065] Call Trace: [ 2264.879664] dump_stack+0x244/0x39d [ 2264.883309] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2264.888525] should_fail.cold.4+0xa/0x17 [ 2264.892601] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2264.897740] ? zap_class+0x640/0x640 [ 2264.901465] ? __lock_acquire+0x62f/0x4c20 [ 2264.905722] ? lock_downgrade+0x900/0x900 [ 2264.909881] ? check_preemption_disabled+0x48/0x280 [ 2264.914910] ? find_held_lock+0x36/0x1c0 [ 2264.919007] ? expand_files.part.8+0x571/0x9a0 [ 2264.923601] ? perf_trace_sched_process_exec+0x860/0x860 [ 2264.929068] ? find_held_lock+0x36/0x1c0 [ 2264.933147] __should_failslab+0x124/0x180 [ 2264.937399] should_failslab+0x9/0x14 [ 2264.941209] kmem_cache_alloc+0x2be/0x730 [ 2264.945375] ? shmem_destroy_callback+0xc0/0xc0 [ 2264.950057] shmem_alloc_inode+0x1b/0x40 [ 2264.954129] alloc_inode+0x63/0x190 [ 2264.957809] new_inode_pseudo+0x71/0x1a0 [ 2264.961899] ? prune_icache_sb+0x1c0/0x1c0 [ 2264.966158] ? _raw_spin_unlock+0x2c/0x50 [ 2264.970328] new_inode+0x1c/0x40 [ 2264.973720] shmem_get_inode+0xf1/0x920 [ 2264.977726] ? shmem_encode_fh+0x340/0x340 [ 2264.981985] ? lock_downgrade+0x900/0x900 [ 2264.986152] ? lock_release+0xa00/0xa00 [ 2264.990138] ? perf_trace_sched_process_exec+0x860/0x860 [ 2264.995604] ? usercopy_warn+0x110/0x110 [ 2264.999729] __shmem_file_setup.part.50+0x83/0x2a0 [ 2265.004680] shmem_file_setup+0x65/0x90 [ 2265.008679] __x64_sys_memfd_create+0x2af/0x4f0 [ 2265.013395] ? memfd_fcntl+0x1910/0x1910 [ 2265.017478] do_syscall_64+0x1b9/0x820 [ 2265.021377] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2265.026754] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2265.031692] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2265.036558] ? trace_hardirqs_on_caller+0x310/0x310 [ 2265.041614] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2265.046673] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2265.051747] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2265.051772] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2265.051790] RIP: 0033:0x457679 [ 2265.061817] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2265.061827] RSP: 002b:00007f004a854a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2265.061841] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457679 [ 2265.061860] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc816 [ 2265.106171] RBP: 000000000072bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 2265.113478] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f004a8556d4 00:25:13 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f757465000000007fffffff00", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:25:13 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x82842) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x2, 0x10000, 0x4, {0x2, @sliced={0x400, [0xbd, 0x6, 0x74f, 0x8, 0x48e0b4eb, 0x8, 0x1, 0xfffffffffffffffc, 0x0, 0x7ff, 0x1ff, 0x9, 0x5, 0x4, 0x1, 0x200, 0x0, 0x0, 0x1000, 0x8001, 0x200, 0x9, 0x5, 0xbfb, 0x20, 0x0, 0xc3, 0x9, 0x9, 0x5, 0x401, 0x3f5ea6ed, 0x3e87, 0x8, 0x8, 0x2, 0xffffffff, 0x7, 0x2, 0x1, 0x4, 0x1, 0x6, 0x9, 0x8, 0x7, 0xffffffffffffff00, 0x1], 0x6}}}) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x8, {0x724, 0x7, 0x4d326f9e, 0x4}, {0x8, 0x7, 0x1, 0xffff}, {0x7, 0xffffffffffffffaa}}) r1 = accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000040), 0x800) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000780)={0x0, 0x1}, &(0x7f00000007c0)=0x8) 00:25:13 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x4, 0x1, 0x1, {0x2, @pix_mp={0x1, 0x10000, 0x0, 0xd472d641f2bd6646, 0xc, [{0x3, 0x8000}, {0x3, 0x4}, {0x6, 0x80000000}, {0x101, 0x6}, {0x0, 0x7}, {0x3f, 0x8}, {0x0, 0x101}, {0x0, 0x2d79}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) [ 2265.120758] R13: 00000000004c55d8 R14: 00000000004d9b98 R15: 0000000000000003 [ 2265.191737] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:25:13 executing program 1 (fault-call:0 fault-nth:2): syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:25:13 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0x40049409, 0x0) 00:25:13 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x462c) 00:25:13 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f757465000000000000000100", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030700000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000000000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000000000000892f0700636f6e6e6c6162656c0000000000000000000000000000000000000000000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000000000000007000000070000000a0000000434f4e4e5345434d41524bff6eef1d192516e43f9a305e46692c00000000000000000000000000000000000000000008"]}, 0x2a8) 00:25:13 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x4, 0x1, 0x1, {0x2, @pix_mp={0x1, 0x10000, 0x0, 0xd472d641f2bd6646, 0xc, [{0x3, 0x8000}, {0x3, 0x4}, {0x6, 0x80000000}, {0x101, 0x6}, {0x0, 0x7}, {0x3f, 0x8}, {0x0, 0x101}, {0x0, 0x2d79}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) 00:25:13 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x82842) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x2, 0x10000, 0x4, {0x2, @sliced={0x400, [0xbd, 0x6, 0x74f, 0x8, 0x48e0b4eb, 0x8, 0x1, 0xfffffffffffffffc, 0x0, 0x7ff, 0x1ff, 0x9, 0x5, 0x4, 0x1, 0x200, 0x0, 0x0, 0x1000, 0x8001, 0x200, 0x9, 0x5, 0xbfb, 0x20, 0x0, 0xc3, 0x9, 0x9, 0x5, 0x401, 0x3f5ea6ed, 0x3e87, 0x8, 0x8, 0x2, 0xffffffff, 0x7, 0x2, 0x1, 0x4, 0x1, 0x6, 0x9, 0x8, 0x7, 0xffffffffffffff00, 0x1], 0x6}}}) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x8, {0x724, 0x7, 0x4d326f9e, 0x4}, {0x8, 0x7, 0x1, 0xffff}, {0x7, 0xffffffffffffffaa}}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000040), 0x800) [ 2265.334012] FAULT_INJECTION: forcing a failure. [ 2265.334012] name failslab, interval 1, probability 0, space 0, times 0 [ 2265.358897] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2265.365688] CPU: 1 PID: 9051 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2265.374369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2265.383732] Call Trace: [ 2265.386343] dump_stack+0x244/0x39d [ 2265.390008] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2265.395243] should_fail.cold.4+0xa/0x17 [ 2265.395279] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2265.395301] ? __kernel_text_address+0xd/0x40 [ 2265.404487] ? unwind_get_return_address+0x61/0xa0 [ 2265.404529] ? find_held_lock+0x36/0x1c0 [ 2265.404565] ? perf_trace_sched_process_exec+0x860/0x860 [ 2265.423517] __should_failslab+0x124/0x180 [ 2265.427772] should_failslab+0x9/0x14 [ 2265.431585] kmem_cache_alloc+0x2be/0x730 [ 2265.435747] ? mpol_shared_policy_init+0x235/0x650 [ 2265.440693] ? current_time+0x72/0x1b0 [ 2265.444617] __d_alloc+0xc8/0xb90 [ 2265.448087] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 2265.448106] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2265.448137] ? ktime_get_coarse_real_ts64+0x22e/0x370 [ 2265.448157] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2265.458186] ? timespec64_trunc+0xea/0x180 [ 2265.458204] ? inode_init_owner+0x340/0x340 [ 2265.458222] ? _raw_spin_unlock+0x2c/0x50 [ 2265.458244] ? current_time+0x131/0x1b0 [ 2265.458261] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2265.458285] ? __lockdep_init_map+0x105/0x590 [ 2265.495692] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2265.501260] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 2265.506816] d_alloc_pseudo+0x1d/0x30 [ 2265.510666] alloc_file_pseudo+0x158/0x3f0 [ 2265.514935] ? alloc_file+0x4d0/0x4d0 [ 2265.518760] ? usercopy_warn+0x110/0x110 [ 2265.522848] __shmem_file_setup.part.50+0x110/0x2a0 [ 2265.527885] shmem_file_setup+0x65/0x90 [ 2265.531875] __x64_sys_memfd_create+0x2af/0x4f0 [ 2265.536559] ? memfd_fcntl+0x1910/0x1910 [ 2265.540655] do_syscall_64+0x1b9/0x820 [ 2265.544605] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2265.549981] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2265.554928] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2265.559787] ? trace_hardirqs_on_caller+0x310/0x310 [ 2265.564815] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2265.569850] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2265.574891] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2265.579756] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2265.584958] RIP: 0033:0x457679 [ 2265.588163] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2265.607078] RSP: 002b:00007f004a854a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2265.614799] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457679 [ 2265.622109] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc816 00:25:14 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x8f) 00:25:14 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x82842) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x2, 0x10000, 0x4, {0x2, @sliced={0x400, [0xbd, 0x6, 0x74f, 0x8, 0x48e0b4eb, 0x8, 0x1, 0xfffffffffffffffc, 0x0, 0x7ff, 0x1ff, 0x9, 0x5, 0x4, 0x1, 0x200, 0x0, 0x0, 0x1000, 0x8001, 0x200, 0x9, 0x5, 0xbfb, 0x20, 0x0, 0xc3, 0x9, 0x9, 0x5, 0x401, 0x3f5ea6ed, 0x3e87, 0x8, 0x8, 0x2, 0xffffffff, 0x7, 0x2, 0x1, 0x4, 0x1, 0x6, 0x9, 0x8, 0x7, 0xffffffffffffff00, 0x1], 0x6}}}) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x8, {0x724, 0x7, 0x4d326f9e, 0x4}, {0x8, 0x7, 0x1, 0xffff}, {0x7, 0xffffffffffffffaa}}) 00:25:14 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x4, 0x1, 0x1, {0x2, @pix_mp={0x1, 0x10000, 0x0, 0xd472d641f2bd6646, 0xc, [{0x3, 0x8000}, {0x3, 0x4}, {0x6, 0x80000000}, {0x101, 0x6}, {0x0, 0x7}, {0x3f, 0x8}, {0x0, 0x101}, {0x0, 0x2d79}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) 00:25:14 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 2265.629387] RBP: 000000000072bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 2265.636694] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f004a8556d4 [ 2265.643981] R13: 00000000004c55d8 R14: 00000000004d9b98 R15: 0000000000000003 00:25:14 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$llc(r0, &(0x7f0000000000)={0x1a, 0xf, 0x5, 0x1, 0x3c96}, 0x10) sendfile(r1, r0, 0x0, 0x3) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000140)={0x13, 0x0, &(0x7f00000000c0)}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)) 00:25:14 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x4, 0x1, 0x1, {0x2, @pix_mp={0x1, 0x10000, 0x0, 0xd472d641f2bd6646, 0xc, [{0x3, 0x8000}, {0x3, 0x4}, {0x6, 0x80000000}, {0x101, 0x6}, {0x0, 0x7}, {0x3f, 0x8}, {0x0, 0x101}, {0x0, 0x2d79}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) [ 2265.751331] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:25:14 executing program 1 (fault-call:0 fault-nth:3): syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:25:14 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0x4004ae99, 0x0) 00:25:14 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x82842) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x8, {0x724, 0x7, 0x4d326f9e, 0x4}, {0x8, 0x7, 0x1, 0xffff}, {0x7, 0xffffffffffffffaa}}) 00:25:14 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f757465000500", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:25:14 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x4001ff) statx(r0, &(0x7f00000000c0)='./file0\x00', 0x5c00, 0x20, &(0x7f0000000180)) sendfile(r1, r0, 0x0, 0x462c) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000000), &(0x7f0000000080)=0x6) r3 = shmget$private(0x0, 0x3000, 0x54000204, &(0x7f0000ffc000/0x3000)=nil) shmctl$IPC_RMID(r3, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000280)="65d02e93b8b1c4858d339907120571bd", 0x10) openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/autofs\x00', 0xe402, 0x0) 00:25:14 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x4, 0x1, 0x1, {0x2, @pix_mp={0x1, 0x10000, 0x0, 0xd472d641f2bd6646, 0xc, [{0x3, 0x8000}, {0x3, 0x4}, {0x6, 0x80000000}, {0x101, 0x6}, {0x0, 0x7}, {0x3f, 0x8}, {0x0, 0x101}, {0x0, 0x2d79}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) [ 2265.893240] FAULT_INJECTION: forcing a failure. [ 2265.893240] name failslab, interval 1, probability 0, space 0, times 0 [ 2265.908391] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2265.923908] CPU: 1 PID: 9084 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2265.931213] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2265.940580] Call Trace: [ 2265.943189] dump_stack+0x244/0x39d [ 2265.946841] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2265.952054] ? __save_stack_trace+0x8d/0xf0 [ 2265.956404] should_fail.cold.4+0xa/0x17 [ 2265.960492] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2265.965614] ? save_stack+0x43/0xd0 [ 2265.969257] ? kasan_kmalloc+0xc7/0xe0 [ 2265.973176] ? percpu_ref_put_many+0x11c/0x260 [ 2265.977778] ? zap_class+0x640/0x640 [ 2265.981505] ? find_held_lock+0x36/0x1c0 [ 2265.985595] ? perf_trace_sched_process_exec+0x860/0x860 [ 2265.985612] ? lock_downgrade+0x900/0x900 [ 2265.985633] __should_failslab+0x124/0x180 [ 2265.999483] should_failslab+0x9/0x14 [ 2266.003300] kmem_cache_alloc+0x2be/0x730 [ 2266.003316] ? d_set_d_op+0x31d/0x410 [ 2266.003342] __alloc_file+0xa8/0x470 [ 2266.011292] ? file_free_rcu+0xd0/0xd0 [ 2266.018905] ? d_instantiate+0x79/0xa0 [ 2266.022850] ? lock_downgrade+0x900/0x900 [ 2266.027023] ? kasan_check_read+0x11/0x20 [ 2266.031189] ? do_raw_spin_unlock+0xa7/0x330 [ 2266.035625] ? do_raw_spin_trylock+0x270/0x270 [ 2266.040227] alloc_empty_file+0x72/0x170 [ 2266.044307] alloc_file+0x5e/0x4d0 [ 2266.047859] ? _raw_spin_unlock+0x2c/0x50 [ 2266.052031] alloc_file_pseudo+0x261/0x3f0 [ 2266.056290] ? alloc_file+0x4d0/0x4d0 [ 2266.060115] ? usercopy_warn+0x110/0x110 [ 2266.064201] __shmem_file_setup.part.50+0x110/0x2a0 [ 2266.069249] shmem_file_setup+0x65/0x90 [ 2266.073242] __x64_sys_memfd_create+0x2af/0x4f0 [ 2266.077926] ? memfd_fcntl+0x1910/0x1910 [ 2266.082016] do_syscall_64+0x1b9/0x820 [ 2266.085916] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2266.091299] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2266.096241] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2266.101107] ? trace_hardirqs_on_caller+0x310/0x310 [ 2266.106451] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2266.106479] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2266.106501] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2266.106523] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2266.116548] RIP: 0033:0x457679 00:25:14 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x4, 0x1, 0x1, {0x2, @pix_mp={0x1, 0x10000, 0x0, 0xd472d641f2bd6646, 0xc, [{0x3, 0x8000}, {0x3, 0x4}, {0x6, 0x80000000}, {0x101, 0x6}, {0x0, 0x7}, {0x3f, 0x8}, {0x0, 0x101}, {0x0, 0x2d79}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) 00:25:14 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x4, 0x1, 0x1, {0x2, @pix_mp={0x1, 0x10000, 0x0, 0xd472d641f2bd6646, 0xc, [{0x3, 0x8000}, {0x3, 0x4}, {0x6, 0x80000000}, {0x101, 0x6}, {0x0, 0x7}, {0x3f, 0x8}, {0x0, 0x101}, {0x0, 0x2d79}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) 00:25:14 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x4, 0x1, 0x1, {0x2, @pix_mp={0x1, 0x10000, 0x0, 0xd472d641f2bd6646, 0xc, [{0x3, 0x8000}, {0x3, 0x4}, {0x6, 0x80000000}, {0x101, 0x6}, {0x0, 0x7}, {0x3f, 0x8}, {0x0, 0x101}, {0x0, 0x2d79}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) 00:25:14 executing program 0: ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f0000000200)={0x8, {0x724, 0x7, 0x4d326f9e, 0x4}, {0x8, 0x7, 0x1, 0xffff}, {0x7, 0xffffffffffffffaa}}) 00:25:14 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\a\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 2266.129758] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2266.148669] RSP: 002b:00007f004a854a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2266.156399] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457679 [ 2266.163674] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc816 [ 2266.170962] RBP: 000000000072bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 2266.178243] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f004a8556d4 [ 2266.185546] R13: 00000000004c55d8 R14: 00000000004d9b98 R15: 0000000000000003 00:25:14 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0x41a0ae8d, 0x0) 00:25:15 executing program 1 (fault-call:0 fault-nth:4): syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:25:15 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000)={0x8, 0x7, 0x7, 0x3, 0x100000001, 0x2400000000, 0xffff, 0x7, 0x6, 0xfffffffffffffffd, 0x8}, 0xb) ioctl$BLKBSZGET(r2, 0x80081270, &(0x7f00000000c0)) sendfile(r1, r0, 0x0, 0x462c) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=ANY=[@ANYBLOB="6d616e676c6500000000000000000000000000000000000000000000000000001f0000000600000060060000f000000040030000f00000007804000030020000900500009005000090050000900500009005000006000000", @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800f00000000000000000000000000000000000000000000000000028004e465155455545000000000000000000000000000000000000000000000037fd00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800400100000000000000000000000000000000000000000000000030006c3274700000000000000000000000000000000000000000000000000000040000000100000003010e00000000004800534e50540000000000000000000000000000000000000000000000000000fe80000000000000000000000000001300000000000000000000ffffe0000001292906000000000000000000000000000000ffff00000000fe8000000000000000000000000000bbffffffff000000ff000000ff000000ffff00000000000000ffffff00000000ff697036746e6c3000000000000000000062637366300000000000000000000000000000000000000000ff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400080306000000000000000000000000000000c80010010000000000000000000000000000000000000000000000004800444e50540000000000000000000000000000000000000000000000000000ff010000000000000000000000000001ff020000000000000000000000000001031001000000000000000000000000000000ffff0000fffffe8000000000000000000000000000bbffffff00ff000000000000ffffffff000000000000000000ffffffff0000000074756e6c30000000000000000000000076657468305f746f5f7465616d000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000002e0046051500000000000000000000000000000010013801000000000000000000000000000000000000000000000000480068626800000000000000000000000000000000000000000000000000000006000000010103000700ff7f04000600080008000000ff07070001000000020000040400070000002800484c0000000000000000000000000000000000000000000000000000000003ab00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f00018010000000000000000000000000000000000000000000000002800657569363400000000000000000000000000000000000000000000000000000000000000000028005443504d535300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000b8"], 0x6c0) 00:25:15 executing program 0: ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f0000000200)={0x8, {0x724, 0x7, 0x4d326f9e, 0x4}, {0x8, 0x7, 0x1, 0xffff}, {0x7, 0xffffffffffffffaa}}) 00:25:15 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f7574650200", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:25:15 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x4, 0x1, 0x1, {0x2, @pix_mp={0x1, 0x10000, 0x0, 0xd472d641f2bd6646, 0xc, [{0x3, 0x8000}, {0x3, 0x4}, {0x6, 0x80000000}, {0x101, 0x6}, {0x0, 0x7}, {0x3f, 0x8}, {0x0, 0x101}, {0x0, 0x2d79}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) 00:25:15 executing program 0: ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f0000000200)={0x8, {0x724, 0x7, 0x4d326f9e, 0x4}, {0x8, 0x7, 0x1, 0xffff}, {0x7, 0xffffffffffffffaa}}) 00:25:15 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x0, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x4, 0x1, 0x1, {0x2, @pix_mp={0x1, 0x10000, 0x0, 0xd472d641f2bd6646, 0xc, [{0x3, 0x8000}, {0x3, 0x4}, {0x6, 0x80000000}, {0x101, 0x6}, {0x0, 0x7}, {0x3f, 0x8}, {0x0, 0x101}, {0x0, 0x2d79}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) 00:25:15 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$vsock_dgram(r0, &(0x7f0000000000)={0x28, 0x0, 0xffffffff, @reserved}, 0x10) sendfile(r1, r0, 0x0, 0x4632) 00:25:15 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00 \x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 2266.437736] FAULT_INJECTION: forcing a failure. [ 2266.437736] name failslab, interval 1, probability 0, space 0, times 0 [ 2266.452121] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:25:15 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xc0045878, 0x0) [ 2266.506113] CPU: 0 PID: 9118 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2266.513466] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2266.522896] Call Trace: [ 2266.525506] dump_stack+0x244/0x39d [ 2266.529160] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2266.534369] ? lock_downgrade+0x900/0x900 [ 2266.538544] ? check_preemption_disabled+0x48/0x280 [ 2266.543605] should_fail.cold.4+0xa/0x17 [ 2266.547685] ? rcu_softirq_qs+0x20/0x20 [ 2266.551691] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2266.556837] ? is_bpf_text_address+0xd3/0x170 [ 2266.561354] ? kernel_text_address+0x79/0xf0 [ 2266.565806] ? __kernel_text_address+0xd/0x40 [ 2266.570321] ? unwind_get_return_address+0x61/0xa0 [ 2266.575266] ? __save_stack_trace+0x8d/0xf0 [ 2266.579607] ? find_held_lock+0x36/0x1c0 [ 2266.583711] ? handle_stripe+0x8688/0xa640 [ 2266.587985] ? __x64_sys_memfd_create+0x2af/0x4f0 [ 2266.588608] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2266.592847] ? perf_trace_sched_process_exec+0x860/0x860 00:25:15 executing program 0: r0 = syz_open_dev$video(0x0, 0xee1e, 0x82842) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x8, {0x724, 0x7, 0x4d326f9e, 0x4}, {0x8, 0x7, 0x1, 0xffff}, {0x7, 0xffffffffffffffaa}}) 00:25:15 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00`\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 2266.592876] __should_failslab+0x124/0x180 [ 2266.592897] should_failslab+0x9/0x14 [ 2266.592918] kmem_cache_alloc_trace+0x2d7/0x750 [ 2266.606519] ? __might_sleep+0x95/0x190 [ 2266.606543] apparmor_file_alloc_security+0x17b/0xac0 [ 2266.606563] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 2266.606583] ? apparmor_path_rename+0xcd0/0xcd0 [ 2266.606608] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2266.606628] ? kmem_cache_alloc+0x33a/0x730 [ 2266.619326] ? d_set_d_op+0x31d/0x410 [ 2266.619349] security_file_alloc+0x4c/0xa0 [ 2266.619369] __alloc_file+0x12a/0x470 [ 2266.619388] ? file_free_rcu+0xd0/0xd0 [ 2266.663762] ? d_instantiate+0x79/0xa0 [ 2266.667687] ? lock_downgrade+0x900/0x900 [ 2266.671881] ? kasan_check_read+0x11/0x20 [ 2266.676045] ? do_raw_spin_unlock+0xa7/0x330 [ 2266.676062] ? do_raw_spin_trylock+0x270/0x270 [ 2266.676085] alloc_empty_file+0x72/0x170 [ 2266.676105] alloc_file+0x5e/0x4d0 [ 2266.676119] ? _raw_spin_unlock+0x2c/0x50 [ 2266.676140] alloc_file_pseudo+0x261/0x3f0 [ 2266.676165] ? alloc_file+0x4d0/0x4d0 [ 2266.689239] ? usercopy_warn+0x110/0x110 [ 2266.689271] __shmem_file_setup.part.50+0x110/0x2a0 [ 2266.689292] shmem_file_setup+0x65/0x90 [ 2266.696978] __x64_sys_memfd_create+0x2af/0x4f0 [ 2266.696997] ? memfd_fcntl+0x1910/0x1910 [ 2266.697026] do_syscall_64+0x1b9/0x820 [ 2266.697041] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2266.697059] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2266.697079] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2266.714163] ? trace_hardirqs_on_caller+0x310/0x310 [ 2266.714183] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2266.714202] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2266.714229] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2266.755883] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2266.756008] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2266.779177] RIP: 0033:0x457679 [ 2266.782403] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00:25:15 executing program 1 (fault-call:0 fault-nth:5): syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:25:15 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x0, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x4, 0x1, 0x1, {0x2, @pix_mp={0x1, 0x10000, 0x0, 0xd472d641f2bd6646, 0xc, [{0x3, 0x8000}, {0x3, 0x4}, {0x6, 0x80000000}, {0x101, 0x6}, {0x0, 0x7}, {0x3f, 0x8}, {0x0, 0x101}, {0x0, 0x2d79}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) 00:25:15 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00 \x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:25:15 executing program 0: r0 = syz_open_dev$video(0x0, 0xee1e, 0x82842) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x8, {0x724, 0x7, 0x4d326f9e, 0x4}, {0x8, 0x7, 0x1, 0xffff}, {0x7, 0xffffffffffffffaa}}) [ 2266.801322] RSP: 002b:00007f004a854a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2266.801338] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457679 [ 2266.801348] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc816 [ 2266.801358] RBP: 000000000072bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 2266.801368] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f004a8556d4 [ 2266.801378] R13: 00000000004c55d8 R14: 00000000004d9b98 R15: 0000000000000003 00:25:15 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/bnep\x00') socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000080)={0xffffffff00000001, 0x0, 0x0, 0x3}) ioctl$DRM_IOCTL_AGP_UNBIND(r0, 0x40106437, &(0x7f0000000200)={r3, 0x4}) connect$nfc_llcp(r0, &(0x7f0000000140)={0x27, 0x1, 0x0, 0x2, 0x10001, 0x2, "a5e6347ca61f760becd590cbb85225157929527ea56f55e7e7128adf4ffd856bf2ec38094f92329dea26b4cf4c5246f58ae5892c43b52f294c10290e15c7f9", 0x3}, 0x60) sendfile(r1, r0, 0x0, 0x4630) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000100)=0xf2, 0x4) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f00000000c0)=0x4) 00:25:15 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xc0045878, 0x0) [ 2266.899255] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:25:15 executing program 0: r0 = syz_open_dev$video(0x0, 0xee1e, 0x82842) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x8, {0x724, 0x7, 0x4d326f9e, 0x4}, {0x8, 0x7, 0x1, 0xffff}, {0x7, 0xffffffffffffffaa}}) 00:25:15 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x0, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x4, 0x1, 0x1, {0x2, @pix_mp={0x1, 0x10000, 0x0, 0xd472d641f2bd6646, 0xc, [{0x3, 0x8000}, {0x3, 0x4}, {0x6, 0x80000000}, {0x101, 0x6}, {0x0, 0x7}, {0x3f, 0x8}, {0x0, 0x101}, {0x0, 0x2d79}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) [ 2266.967689] FAULT_INJECTION: forcing a failure. [ 2266.967689] name failslab, interval 1, probability 0, space 0, times 0 [ 2266.986228] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:25:15 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0x5, {0x5, 0x79, 0xffffffffffffffff, 0x3b1e, 0x80000000, 0x5}, 0x7f, 0x7}, 0xe) sendfile(r1, r0, 0x0, 0x462c) ioctl$VIDIOC_RESERVED(r0, 0x5601, 0x0) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000040)={&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, 0x2000, 0x1}) 00:25:15 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x82842) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x8, {0x724, 0x7, 0x4d326f9e, 0x4}, {0x8, 0x7, 0x1, 0xffff}, {0x7, 0xffffffffffffffaa}}) [ 2267.048676] CPU: 0 PID: 9156 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2267.056010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2267.065369] Call Trace: [ 2267.067999] dump_stack+0x244/0x39d [ 2267.071653] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2267.076868] ? find_held_lock+0x36/0x1c0 [ 2267.080954] should_fail.cold.4+0xa/0x17 [ 2267.085038] ? find_held_lock+0x36/0x1c0 [ 2267.089118] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2267.094243] ? lock_downgrade+0x900/0x900 00:25:15 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x0, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x4, 0x1, 0x1, {0x2, @pix_mp={0x1, 0x10000, 0x0, 0xd472d641f2bd6646, 0xc, [{0x3, 0x8000}, {0x3, 0x4}, {0x6, 0x80000000}, {0x101, 0x6}, {0x0, 0x7}, {0x3f, 0x8}, {0x0, 0x101}, {0x0, 0x2d79}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) [ 2267.098411] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2267.103975] ? timespec64_trunc+0xea/0x180 [ 2267.108248] ? inode_init_owner+0x340/0x340 [ 2267.112594] ? find_held_lock+0x36/0x1c0 [ 2267.116768] ? wacom_wac_irq+0x99b8/0x9fb0 [ 2267.121038] ? perf_trace_sched_process_exec+0x860/0x860 [ 2267.126523] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2267.132096] __should_failslab+0x124/0x180 [ 2267.132119] should_failslab+0x9/0x14 [ 2267.132142] kmem_cache_alloc+0x2be/0x730 [ 2267.132173] ? do_sys_ftruncate+0x428/0x550 [ 2267.148675] ? lock_downgrade+0x900/0x900 [ 2267.152857] getname_flags+0xd0/0x590 [ 2267.156682] ? __lock_is_held+0xb5/0x140 [ 2267.160778] getname+0x19/0x20 [ 2267.163991] do_sys_open+0x383/0x700 [ 2267.167728] ? filp_open+0x80/0x80 [ 2267.171286] ? trace_hardirqs_off_caller+0x310/0x310 [ 2267.176402] ? do_sys_ftruncate+0x449/0x550 [ 2267.180748] __x64_sys_open+0x7e/0xc0 [ 2267.184561] do_syscall_64+0x1b9/0x820 [ 2267.184579] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2267.184599] ? syscall_return_slowpath+0x5e0/0x5e0 00:25:15 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x82842) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x8, {0x724, 0x7, 0x4d326f9e, 0x4}, {0x8, 0x7, 0x1, 0xffff}, {0x7, 0xffffffffffffffaa}}) [ 2267.184614] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2267.184636] ? trace_hardirqs_on_caller+0x310/0x310 [ 2267.208650] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2267.213686] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2267.218751] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2267.223619] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2267.229004] RIP: 0033:0x4112b1 00:25:15 executing program 1 (fault-call:0 fault-nth:6): syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:25:15 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x0, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x4, 0x1, 0x1, {0x2, @pix_mp={0x1, 0x10000, 0x0, 0xd472d641f2bd6646, 0xc, [{0x3, 0x8000}, {0x3, 0x4}, {0x6, 0x80000000}, {0x101, 0x6}, {0x0, 0x7}, {0x3f, 0x8}, {0x0, 0x101}, {0x0, 0x2d79}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) 00:25:15 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x82842) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x8, {0x724, 0x7, 0x4d326f9e, 0x4}, {0x8, 0x7, 0x1, 0xffff}, {0x7, 0xffffffffffffffaa}}) 00:25:15 executing program 4: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) write$P9_RCREATE(r0, &(0x7f00000000c0)={0x18, 0x73, 0x1, {{0x41, 0x4, 0x8}, 0x100000000}}, 0x18) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f0000000000)={0x0, @aes128, 0x3, "7372e0c37bbcf1e5"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r2, r1, 0x0, 0x462c) 00:25:15 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f757465000300", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030700000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000000000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000000000000892f0700636f6e6e6c6162656c0000000000000000000000000000000000000000000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000000000000007000000070000000a0000000434f4e4e5345434d41524bff6eef1d192516e43f9a305e46692c00000000000000000000000000000000000000000008"]}, 0x2a8) [ 2267.232214] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2267.251129] RSP: 002b:00007f004a854a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 2267.258856] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004112b1 [ 2267.266141] RDX: 00007f004a854afa RSI: 0000000000000002 RDI: 00007f004a854af0 [ 2267.266152] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2267.266160] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 2267.266169] R13: 0000000000000000 R14: 00000000004d9b98 R15: 0000000000000003 00:25:16 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xc0189436, 0x0) 00:25:16 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x0, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x4, 0x1, 0x1, {0x2, @pix_mp={0x1, 0x10000, 0x0, 0xd472d641f2bd6646, 0xc, [{0x3, 0x8000}, {0x3, 0x4}, {0x6, 0x80000000}, {0x101, 0x6}, {0x0, 0x7}, {0x3f, 0x8}, {0x0, 0x101}, {0x0, 0x2d79}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) 00:25:16 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x8, {0x724, 0x7, 0x4d326f9e, 0x4}, {0x8, 0x7, 0x1, 0xffff}, {0x7, 0xffffffffffffffaa}}) [ 2267.397626] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2267.421489] FAULT_INJECTION: forcing a failure. [ 2267.421489] name failslab, interval 1, probability 0, space 0, times 0 [ 2267.465026] CPU: 1 PID: 9190 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2267.472363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2267.481736] Call Trace: [ 2267.481767] dump_stack+0x244/0x39d [ 2267.481790] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2267.481811] ? find_held_lock+0x36/0x1c0 [ 2267.481839] should_fail.cold.4+0xa/0x17 [ 2267.501327] ? find_held_lock+0x36/0x1c0 [ 2267.501351] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2267.501373] ? lock_downgrade+0x900/0x900 [ 2267.514760] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2267.520316] ? timespec64_trunc+0xea/0x180 [ 2267.524587] ? inode_init_owner+0x340/0x340 [ 2267.528937] ? find_held_lock+0x36/0x1c0 [ 2267.533041] ? perf_trace_sched_process_exec+0x860/0x860 [ 2267.538520] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2267.544087] __should_failslab+0x124/0x180 [ 2267.548343] should_failslab+0x9/0x14 [ 2267.552159] kmem_cache_alloc+0x2be/0x730 [ 2267.556319] ? do_sys_ftruncate+0x428/0x550 [ 2267.556338] ? lock_downgrade+0x900/0x900 [ 2267.556360] getname_flags+0xd0/0x590 [ 2267.556374] ? __lock_is_held+0xb5/0x140 [ 2267.556400] getname+0x19/0x20 [ 2267.575928] do_sys_open+0x383/0x700 [ 2267.579660] ? filp_open+0x80/0x80 [ 2267.579682] ? trace_hardirqs_off_caller+0x310/0x310 [ 2267.579712] ? do_sys_ftruncate+0x449/0x550 [ 2267.592838] __x64_sys_open+0x7e/0xc0 [ 2267.592859] do_syscall_64+0x1b9/0x820 [ 2267.592880] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2267.605917] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2267.610860] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2267.615734] ? trace_hardirqs_on_caller+0x310/0x310 [ 2267.620771] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2267.625808] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2267.630846] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2267.635720] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2267.635735] RIP: 0033:0x4112b1 [ 2267.635751] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 00:25:16 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x462c) 00:25:16 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f757465008800", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 2267.635759] RSP: 002b:00007f004a854a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 2267.635774] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004112b1 [ 2267.635790] RDX: 00007f004a854afa RSI: 0000000000000002 RDI: 00007f004a854af0 [ 2267.663076] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2267.663086] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 2267.663093] R13: 0000000000000000 R14: 00000000004d9b98 R15: 0000000000000003 00:25:16 executing program 0: syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f0000000200)={0x8, {0x724, 0x7, 0x4d326f9e, 0x4}, {0x8, 0x7, 0x1, 0xffff}, {0x7, 0xffffffffffffffaa}}) 00:25:16 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x0, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x4, 0x1, 0x1, {0x2, @pix_mp={0x1, 0x10000, 0x0, 0xd472d641f2bd6646, 0xc, [{0x3, 0x8000}, {0x3, 0x4}, {0x6, 0x80000000}, {0x101, 0x6}, {0x0, 0x7}, {0x3f, 0x8}, {0x0, 0x101}, {0x0, 0x2d79}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) 00:25:16 executing program 1 (fault-call:0 fault-nth:7): syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:25:16 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x462c) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)={0x18}) 00:25:16 executing program 0: syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f0000000200)={0x8, {0x724, 0x7, 0x4d326f9e, 0x4}, {0x8, 0x7, 0x1, 0xffff}, {0x7, 0xffffffffffffffaa}}) 00:25:16 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f757465001100", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 2267.833071] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:25:16 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0x8138ae83, 0x0) 00:25:16 executing program 0: syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f0000000200)={0x8, {0x724, 0x7, 0x4d326f9e, 0x4}, {0x8, 0x7, 0x1, 0xffff}, {0x7, 0xffffffffffffffaa}}) [ 2267.948773] FAULT_INJECTION: forcing a failure. [ 2267.948773] name failslab, interval 1, probability 0, space 0, times 0 [ 2267.966535] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2267.995793] CPU: 0 PID: 9221 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2268.003125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2268.012492] Call Trace: [ 2268.015105] dump_stack+0x244/0x39d [ 2268.018757] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2268.023977] ? print_usage_bug+0xc0/0xc0 [ 2268.028073] should_fail.cold.4+0xa/0x17 [ 2268.032159] ? find_held_lock+0x36/0x1c0 [ 2268.036242] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2268.036267] ? lock_downgrade+0x900/0x900 [ 2268.036284] ? check_preemption_disabled+0x48/0x280 [ 2268.036302] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2268.036318] ? kasan_check_read+0x11/0x20 [ 2268.036341] ? find_held_lock+0x36/0x1c0 [ 2268.050622] ? perf_trace_sched_process_exec+0x860/0x860 [ 2268.050650] __should_failslab+0x124/0x180 [ 2268.073472] should_failslab+0x9/0x14 [ 2268.077300] kmem_cache_alloc+0x2be/0x730 [ 2268.081467] ? zap_class+0x640/0x640 [ 2268.085194] ? print_usage_bug+0xc0/0xc0 [ 2268.089275] ? mark_held_locks+0x130/0x130 [ 2268.093534] __alloc_file+0xa8/0x470 [ 2268.097273] ? file_free_rcu+0xd0/0xd0 [ 2268.101185] ? find_held_lock+0x36/0x1c0 [ 2268.105478] ? is_bpf_text_address+0xac/0x170 [ 2268.105498] ? lock_downgrade+0x900/0x900 [ 2268.105517] ? check_preemption_disabled+0x48/0x280 [ 2268.105539] alloc_empty_file+0x72/0x170 [ 2268.123277] path_openat+0x170/0x5150 [ 2268.123294] ? rcu_softirq_qs+0x20/0x20 [ 2268.123315] ? unwind_dump+0x190/0x190 [ 2268.135020] ? zap_class+0x640/0x640 [ 2268.138760] ? path_lookupat.isra.43+0xc00/0xc00 [ 2268.143532] ? unwind_get_return_address+0x61/0xa0 [ 2268.148487] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2268.153525] ? expand_files.part.8+0x571/0x9a0 [ 2268.158131] ? find_held_lock+0x36/0x1c0 [ 2268.162219] ? __alloc_fd+0x347/0x6e0 [ 2268.166036] ? lock_downgrade+0x900/0x900 [ 2268.170197] ? getname+0x19/0x20 [ 2268.170222] ? kasan_check_read+0x11/0x20 [ 2268.170241] ? do_raw_spin_unlock+0xa7/0x330 [ 2268.177754] ? do_raw_spin_trylock+0x270/0x270 [ 2268.177771] ? __lock_is_held+0xb5/0x140 [ 2268.177786] ? __check_object_size+0xb1/0x782 [ 2268.177807] ? _raw_spin_unlock+0x2c/0x50 [ 2268.177821] ? __alloc_fd+0x347/0x6e0 [ 2268.177848] do_filp_open+0x255/0x380 [ 2268.177865] ? may_open_dev+0x100/0x100 [ 2268.177893] ? get_unused_fd_flags+0x122/0x1a0 [ 2268.215768] ? __alloc_fd+0x6e0/0x6e0 [ 2268.219586] ? __lock_is_held+0xb5/0x140 [ 2268.223667] do_sys_open+0x568/0x700 [ 2268.227411] ? filp_open+0x80/0x80 [ 2268.230976] ? trace_hardirqs_off_caller+0x310/0x310 [ 2268.236207] ? do_sys_ftruncate+0x449/0x550 [ 2268.240549] __x64_sys_open+0x7e/0xc0 [ 2268.244366] do_syscall_64+0x1b9/0x820 [ 2268.248265] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2268.253645] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2268.258587] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2268.263444] ? trace_hardirqs_on_caller+0x310/0x310 [ 2268.268476] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2268.273508] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2268.278544] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2268.283406] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2268.288605] RIP: 0033:0x4112b1 [ 2268.291816] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2268.310732] RSP: 002b:00007f004a854a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 2268.318456] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004112b1 [ 2268.325740] RDX: 00007f004a854afa RSI: 0000000000000002 RDI: 00007f004a854af0 [ 2268.333019] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2268.340321] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 00:25:17 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x0, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x4, 0x1, 0x1, {0x2, @pix_mp={0x1, 0x10000, 0x0, 0xd472d641f2bd6646, 0xc, [{0x3, 0x8000}, {0x3, 0x4}, {0x6, 0x80000000}, {0x101, 0x6}, {0x0, 0x7}, {0x3f, 0x8}, {0x0, 0x101}, {0x0, 0x2d79}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) 00:25:17 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f7574650000000300", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:25:17 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001ff) syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) sendfile(r1, r0, 0x0, 0x462c) [ 2268.347603] R13: 0000000000000000 R14: 00000000004d9b98 R15: 0000000000000003 00:25:17 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x0, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x4, 0x1, 0x1, {0x2, @pix_mp={0x1, 0x10000, 0x0, 0xd472d641f2bd6646, 0xc, [{0x3, 0x8000}, {0x3, 0x4}, {0x6, 0x80000000}, {0x101, 0x6}, {0x0, 0x7}, {0x3f, 0x8}, {0x0, 0x101}, {0x0, 0x2d79}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) 00:25:17 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, 0x0) 00:25:17 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0x5451, 0x0) 00:25:17 executing program 1 (fault-call:0 fault-nth:8): syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:25:17 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f7574650000000100", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 2268.458570] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:25:17 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1000000000001, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x462c) 00:25:17 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, 0x0) 00:25:17 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0x0, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x4, 0x1, 0x1, {0x2, @pix_mp={0x1, 0x10000, 0x0, 0xd472d641f2bd6646, 0xc, [{0x3, 0x8000}, {0x3, 0x4}, {0x6, 0x80000000}, {0x101, 0x6}, {0x0, 0x7}, {0x3f, 0x8}, {0x0, 0x101}, {0x0, 0x2d79}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) [ 2268.549417] FAULT_INJECTION: forcing a failure. [ 2268.549417] name failslab, interval 1, probability 0, space 0, times 0 [ 2268.585833] CPU: 1 PID: 9249 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2268.592022] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2268.593140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2268.593148] Call Trace: [ 2268.593175] dump_stack+0x244/0x39d [ 2268.593202] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2268.622141] ? lock_downgrade+0x900/0x900 [ 2268.626306] ? check_preemption_disabled+0x48/0x280 [ 2268.631351] should_fail.cold.4+0xa/0x17 [ 2268.635426] ? rcu_softirq_qs+0x20/0x20 [ 2268.639428] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2268.644559] ? is_bpf_text_address+0xd3/0x170 [ 2268.644578] ? kernel_text_address+0x79/0xf0 [ 2268.644600] ? __kernel_text_address+0xd/0x40 [ 2268.658013] ? unwind_get_return_address+0x61/0xa0 [ 2268.662951] ? __save_stack_trace+0x8d/0xf0 [ 2268.662988] ? find_held_lock+0x36/0x1c0 [ 2268.663053] ? do_syscall_64+0x1b9/0x820 [ 2268.675507] ? perf_trace_sched_process_exec+0x860/0x860 [ 2268.681000] __should_failslab+0x124/0x180 [ 2268.685250] should_failslab+0x9/0x14 [ 2268.689067] kmem_cache_alloc_trace+0x2d7/0x750 [ 2268.693758] ? __might_sleep+0x95/0x190 [ 2268.697756] apparmor_file_alloc_security+0x17b/0xac0 [ 2268.702962] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 2268.708561] ? apparmor_path_rename+0xcd0/0xcd0 [ 2268.713267] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2268.718308] ? kmem_cache_alloc+0x33a/0x730 [ 2268.722644] ? zap_class+0x640/0x640 [ 2268.726407] security_file_alloc+0x4c/0xa0 [ 2268.730662] __alloc_file+0x12a/0x470 [ 2268.734495] ? file_free_rcu+0xd0/0xd0 [ 2268.738446] ? find_held_lock+0x36/0x1c0 [ 2268.742576] ? is_bpf_text_address+0xac/0x170 [ 2268.747089] ? lock_downgrade+0x900/0x900 [ 2268.751254] ? check_preemption_disabled+0x48/0x280 [ 2268.756293] alloc_empty_file+0x72/0x170 [ 2268.760377] path_openat+0x170/0x5150 [ 2268.764191] ? rcu_softirq_qs+0x20/0x20 [ 2268.768174] ? unwind_dump+0x190/0x190 [ 2268.772106] ? zap_class+0x640/0x640 [ 2268.775841] ? path_lookupat.isra.43+0xc00/0xc00 [ 2268.780607] ? unwind_get_return_address+0x61/0xa0 [ 2268.785550] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2268.790600] ? expand_files.part.8+0x571/0x9a0 [ 2268.795202] ? find_held_lock+0x36/0x1c0 [ 2268.799287] ? __alloc_fd+0x347/0x6e0 [ 2268.803129] ? lock_downgrade+0x900/0x900 [ 2268.807288] ? getname+0x19/0x20 [ 2268.810677] ? kasan_check_read+0x11/0x20 [ 2268.814856] ? do_raw_spin_unlock+0xa7/0x330 [ 2268.819275] ? do_raw_spin_trylock+0x270/0x270 [ 2268.823870] ? __lock_is_held+0xb5/0x140 [ 2268.827945] ? __check_object_size+0xb1/0x782 [ 2268.832468] ? _raw_spin_unlock+0x2c/0x50 [ 2268.836645] ? __alloc_fd+0x347/0x6e0 [ 2268.840481] do_filp_open+0x255/0x380 [ 2268.844299] ? may_open_dev+0x100/0x100 [ 2268.848304] ? get_unused_fd_flags+0x122/0x1a0 [ 2268.852900] ? __alloc_fd+0x6e0/0x6e0 [ 2268.856724] ? __lock_is_held+0xb5/0x140 [ 2268.860808] do_sys_open+0x568/0x700 [ 2268.864557] ? filp_open+0x80/0x80 [ 2268.868141] ? trace_hardirqs_off_caller+0x310/0x310 [ 2268.873253] ? do_sys_ftruncate+0x449/0x550 [ 2268.877587] __x64_sys_open+0x7e/0xc0 [ 2268.881405] do_syscall_64+0x1b9/0x820 [ 2268.885302] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2268.890678] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2268.895629] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2268.900492] ? trace_hardirqs_on_caller+0x310/0x310 [ 2268.905534] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2268.910562] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2268.915595] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2268.920470] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2268.925672] RIP: 0033:0x4112b1 [ 2268.928886] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 00:25:17 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f7574650000000200", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:25:17 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, 0x0) [ 2268.947815] RSP: 002b:00007f004a854a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 2268.955639] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004112b1 [ 2268.962922] RDX: 00007f004a854afa RSI: 0000000000000002 RDI: 00007f004a854af0 [ 2268.970200] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2268.977501] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 2268.984781] R13: 0000000000000000 R14: 00000000004d9b98 R15: 0000000000000003 00:25:17 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x8840) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_CAPBSET_READ(0x17, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x462c) 00:25:17 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0x0, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x4, 0x1, 0x1, {0x2, @pix_mp={0x1, 0x10000, 0x0, 0xd472d641f2bd6646, 0xc, [{0x3, 0x8000}, {0x3, 0x4}, {0x6, 0x80000000}, {0x101, 0x6}, {0x0, 0x7}, {0x3f, 0x8}, {0x0, 0x101}, {0x0, 0x2d79}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) 00:25:17 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x0, {0x724, 0x7, 0x4d326f9e, 0x4}, {0x8, 0x7, 0x1, 0xffff}, {0x7, 0xffffffffffffffaa}}) 00:25:17 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0x4090ae82, 0x0) 00:25:17 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0x0, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x4, 0x1, 0x1, {0x2, @pix_mp={0x1, 0x10000, 0x0, 0xd472d641f2bd6646, 0xc, [{0x3, 0x8000}, {0x3, 0x4}, {0x6, 0x80000000}, {0x101, 0x6}, {0x0, 0x7}, {0x3f, 0x8}, {0x0, 0x101}, {0x0, 0x2d79}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) 00:25:17 executing program 1 (fault-call:0 fault-nth:9): syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:25:17 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x0, {0x0, 0x7, 0x4d326f9e, 0x4}, {0x8, 0x7, 0x1, 0xffff}, {0x7, 0xffffffffffffffaa}}) 00:25:17 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$bt_hci(r2, 0x0, 0x3, &(0x7f0000000140)=""/250, &(0x7f0000000000)=0xfa) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x462c) 00:25:17 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000000)={0x4, 0x1, 0x1, {0x2, @pix_mp={0x1, 0x10000, 0x0, 0xd472d641f2bd6646, 0xc, [{0x3, 0x8000}, {0x3, 0x4}, {0x6, 0x80000000}, {0x101, 0x6}, {0x0, 0x7}, {0x3f, 0x8}, {0x0, 0x101}, {0x0, 0x2d79}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) 00:25:17 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x0, {0x0, 0x0, 0x4d326f9e, 0x4}, {0x8, 0x7, 0x1, 0xffff}, {0x7, 0xffffffffffffffaa}}) [ 2269.572106] FAULT_INJECTION: forcing a failure. [ 2269.572106] name failslab, interval 1, probability 0, space 0, times 0 [ 2269.584326] CPU: 1 PID: 9289 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2269.591612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2269.600994] Call Trace: [ 2269.603604] dump_stack+0x244/0x39d [ 2269.607264] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2269.612491] should_fail.cold.4+0xa/0x17 [ 2269.616586] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2269.621720] ? down_write_nested+0x130/0x130 [ 2269.626149] ? down_read+0x120/0x120 [ 2269.629884] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2269.635438] ? zap_class+0x640/0x640 [ 2269.639168] ? lock_acquire+0x1ed/0x520 [ 2269.643156] ? lo_ioctl+0x8e/0x1d60 [ 2269.646803] ? find_held_lock+0x36/0x1c0 [ 2269.650898] ? __lock_is_held+0xb5/0x140 [ 2269.655015] ? perf_trace_sched_process_exec+0x860/0x860 [ 2269.660512] __should_failslab+0x124/0x180 [ 2269.664763] should_failslab+0x9/0x14 [ 2269.668579] kmem_cache_alloc_trace+0x2d7/0x750 [ 2269.673265] ? check_preemption_disabled+0x48/0x280 [ 2269.678315] __kthread_create_on_node+0x137/0x540 [ 2269.683176] ? loop_get_status64+0x140/0x140 [ 2269.687598] ? kthread_parkme+0xb0/0xb0 [ 2269.691606] ? __lockdep_init_map+0x105/0x590 [ 2269.696118] ? __lockdep_init_map+0x105/0x590 [ 2269.700630] ? loop_get_status64+0x140/0x140 [ 2269.705054] kthread_create_on_node+0xb1/0xe0 [ 2269.709568] ? __kthread_create_on_node+0x540/0x540 [ 2269.714607] ? kasan_check_read+0x11/0x20 [ 2269.718789] lo_ioctl+0x7f6/0x1d60 [ 2269.722351] ? lo_rw_aio+0x1ef0/0x1ef0 [ 2269.726257] blkdev_ioctl+0x98e/0x21b0 [ 2269.730160] ? blkpg_ioctl+0xc10/0xc10 [ 2269.734060] ? lock_downgrade+0x900/0x900 [ 2269.738226] ? check_preemption_disabled+0x48/0x280 [ 2269.743367] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2269.748311] ? kasan_check_read+0x11/0x20 [ 2269.752476] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2269.757765] ? rcu_softirq_qs+0x20/0x20 [ 2269.761763] ? __fget+0x4d1/0x740 [ 2269.765233] ? ksys_dup3+0x680/0x680 [ 2269.769097] block_ioctl+0xee/0x130 [ 2269.772751] ? blkdev_fallocate+0x400/0x400 [ 2269.777085] do_vfs_ioctl+0x1de/0x1790 [ 2269.780988] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 2269.786544] ? ioctl_preallocate+0x300/0x300 [ 2269.790965] ? __fget_light+0x2e9/0x430 [ 2269.794955] ? fget_raw+0x20/0x20 [ 2269.798428] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2269.803468] ? kmem_cache_free+0x24f/0x290 [ 2269.807732] ? putname+0xf7/0x130 [ 2269.811204] ? do_syscall_64+0x9a/0x820 [ 2269.815212] ? do_syscall_64+0x9a/0x820 [ 2269.819204] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2269.823805] ? security_file_ioctl+0x94/0xc0 [ 2269.828228] ksys_ioctl+0xa9/0xd0 [ 2269.831700] __x64_sys_ioctl+0x73/0xb0 [ 2269.835614] do_syscall_64+0x1b9/0x820 [ 2269.839512] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2269.844890] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2269.849833] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2269.854691] ? trace_hardirqs_on_caller+0x310/0x310 [ 2269.859742] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2269.864778] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2269.869813] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2269.874674] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2269.879879] RIP: 0033:0x4574e7 [ 2269.883088] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2269.901999] RSP: 002b:00007f004a854a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2269.909730] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004574e7 [ 2269.917008] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2269.924291] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2269.931580] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2269.938866] R13: 0000000000000000 R14: 00000000004d9b98 R15: 0000000000000003 00:25:18 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00 \x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:25:18 executing program 1 (fault-call:0 fault-nth:10): syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:25:18 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x0, {0x0, 0x0, 0x0, 0x4}, {0x8, 0x7, 0x1, 0xffff}, {0x7, 0xffffffffffffffaa}}) 00:25:18 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000000)={0x4, 0x1, 0x1, {0x2, @pix_mp={0x1, 0x10000, 0x0, 0xd472d641f2bd6646, 0xc, [{0x3, 0x8000}, {0x3, 0x4}, {0x6, 0x80000000}, {0x101, 0x6}, {0x0, 0x7}, {0x3f, 0x8}, {0x0, 0x101}, {0x0, 0x2d79}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) 00:25:18 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0x8090ae81, 0x0) 00:25:18 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x1, 0x0) sendfile(r1, r0, 0x0, 0x462c) 00:25:18 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000000)={0x4, 0x1, 0x1, {0x2, @pix_mp={0x1, 0x10000, 0x0, 0xd472d641f2bd6646, 0xc, [{0x3, 0x8000}, {0x3, 0x4}, {0x6, 0x80000000}, {0x101, 0x6}, {0x0, 0x7}, {0x3f, 0x8}, {0x0, 0x101}, {0x0, 0x2d79}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) 00:25:18 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') ioctl$UI_DEV_CREATE(r0, 0x5501) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x462c) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0xc5, "27b805a27b11c201ea989e332f7d9d678a775c31a60254a86ce8ddd5bf0593bded1f3929463b3e38105618aa56dc10ce0cdb4c579434562d05cacd45756f9f726e4fc5c3313ecf0eec2a21613eccdbaedf7f92879c65aba440bc94012dfec824f8ed27caddbef2af133cfb765746b80c2aab9d37758f099e7f41c95cd6d1b6235c6d82cf138aedaa837ec998718b983ca6a79e679b35b0eb0ca43ec1c99167f53687f12e775d17d5dd3b893cb3000b83f73b96f104e1ea81e09967e1201821c12f8ef39fef"}, &(0x7f0000000000)=0xe9) 00:25:18 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x0, {}, {0x8, 0x7, 0x1, 0xffff}, {0x7, 0xffffffffffffffaa}}) [ 2270.233408] FAULT_INJECTION: forcing a failure. [ 2270.233408] name failslab, interval 1, probability 0, space 0, times 0 [ 2270.301023] CPU: 1 PID: 9301 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2270.308355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2270.317739] Call Trace: [ 2270.320350] dump_stack+0x244/0x39d [ 2270.324010] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2270.324036] ? radix_tree_tag_set+0x3d0/0x3d0 [ 2270.333739] should_fail.cold.4+0xa/0x17 [ 2270.337824] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2270.342951] ? kernfs_activate+0x8e/0x2c0 [ 2270.347118] ? zap_class+0x640/0x640 [ 2270.350842] ? lock_release+0xa00/0xa00 [ 2270.354828] ? perf_trace_sched_process_exec+0x860/0x860 [ 2270.354853] ? find_held_lock+0x36/0x1c0 [ 2270.354878] ? __lock_is_held+0xb5/0x140 [ 2270.368457] ? perf_trace_sched_process_exec+0x860/0x860 [ 2270.373930] ? find_held_lock+0x36/0x1c0 [ 2270.378019] __should_failslab+0x124/0x180 [ 2270.382270] should_failslab+0x9/0x14 [ 2270.382288] kmem_cache_alloc+0x2be/0x730 [ 2270.382310] ? find_held_lock+0x36/0x1c0 [ 2270.382331] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2270.390315] __kernfs_new_node+0x127/0x8d0 [ 2270.390338] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2270.390357] ? kasan_check_write+0x14/0x20 [ 2270.399422] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 2270.399440] ? __kernfs_new_node+0x697/0x8d0 [ 2270.399460] ? wait_for_completion+0x8a0/0x8a0 [ 2270.417605] ? zap_class+0x640/0x640 [ 2270.430298] ? kasan_check_write+0x14/0x20 [ 2270.434550] ? __lock_is_held+0xb5/0x140 [ 2270.438630] ? wait_for_completion+0x8a0/0x8a0 [ 2270.443245] ? mutex_unlock+0xd/0x10 [ 2270.446977] ? kernfs_activate+0x21a/0x2c0 [ 2270.451232] kernfs_new_node+0x95/0x120 [ 2270.455223] __kernfs_create_file+0x5a/0x340 [ 2270.459649] sysfs_add_file_mode_ns+0x222/0x530 [ 2270.464688] internal_create_group+0x3df/0xd80 [ 2270.469307] ? remove_files.isra.1+0x190/0x190 [ 2270.473899] ? up_write+0x7b/0x220 [ 2270.477450] ? down_write_nested+0x130/0x130 [ 2270.481897] ? down_read+0x120/0x120 [ 2270.485641] sysfs_create_group+0x1f/0x30 [ 2270.489801] lo_ioctl+0x1307/0x1d60 [ 2270.493444] ? lo_rw_aio+0x1ef0/0x1ef0 [ 2270.493470] blkdev_ioctl+0x98e/0x21b0 [ 2270.493489] ? blkpg_ioctl+0xc10/0xc10 [ 2270.505176] ? lock_downgrade+0x900/0x900 [ 2270.509342] ? check_preemption_disabled+0x48/0x280 [ 2270.514371] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2270.514388] ? kasan_check_read+0x11/0x20 [ 2270.514403] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2270.514423] ? rcu_softirq_qs+0x20/0x20 [ 2270.528799] ? __fget+0x4d1/0x740 [ 2270.528823] ? ksys_dup3+0x680/0x680 [ 2270.528851] block_ioctl+0xee/0x130 [ 2270.536267] ? blkdev_fallocate+0x400/0x400 [ 2270.547914] do_vfs_ioctl+0x1de/0x1790 [ 2270.551821] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 2270.551842] ? ioctl_preallocate+0x300/0x300 [ 2270.551858] ? __fget_light+0x2e9/0x430 [ 2270.551877] ? fget_raw+0x20/0x20 [ 2270.565787] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2270.565806] ? kmem_cache_free+0x24f/0x290 [ 2270.565827] ? putname+0xf7/0x130 [ 2270.565845] ? do_syscall_64+0x9a/0x820 [ 2270.565866] ? do_syscall_64+0x9a/0x820 [ 2270.590019] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2270.594718] ? security_file_ioctl+0x94/0xc0 [ 2270.599151] ksys_ioctl+0xa9/0xd0 [ 2270.602623] __x64_sys_ioctl+0x73/0xb0 [ 2270.606528] do_syscall_64+0x1b9/0x820 [ 2270.610430] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2270.615817] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2270.620758] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2270.625624] ? trace_hardirqs_on_caller+0x310/0x310 [ 2270.630655] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2270.635686] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2270.640743] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2270.645607] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2270.650817] RIP: 0033:0x4574e7 [ 2270.654020] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2270.672943] RSP: 002b:00007f004a854a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2270.680685] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004574e7 [ 2270.687990] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2270.695269] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 00:25:19 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendfile(r0, 0xffffffffffffffff, 0x0, 0x462c) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000980)='/dev/sequencer2\x00', 0x10000, 0x0) getpeername$unix(r0, &(0x7f0000000140)=@abs, &(0x7f0000000040)=0x6e) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x10e) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x3}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f00000009c0)={r4, @in={{0x2, 0x4e24, @remote}}}, 0x84) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r3, &(0x7f0000000580)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1c4, r5, 0x20, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_BEARER={0xc, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x20569e5}]}, @TIPC_NLA_NET={0x60, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x101}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xbde}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xffffffff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x100000001}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}]}, @TIPC_NLA_MEDIA={0xc0, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa42a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffe00}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xe59}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2526}]}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}]}, @TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xa0a}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}]}, @TIPC_NLA_BEARER={0x20, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'eth', 0x3a, 'nr0\x00'}}]}, @TIPC_NLA_LINK={0x24, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}]}, 0x1c4}, 0x1, 0x0, 0x0, 0x4}, 0x4008014) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r3, &(0x7f00000007c0)={0xa0, 0x19, 0x2, {0x6, {0x4, 0x4, 0x8}, 0x2, r6, r7, 0xacd, 0x6f, 0x9, 0x1, 0xffffffffffffffff, 0x1, 0x0, 0x6, 0xff, 0x2, 0xd1, 0x8, 0x401, 0x4}}, 0xa0) getsockopt$packet_buf(r3, 0x107, 0xd, &(0x7f0000000880)=""/167, &(0x7f0000000940)=0xa7) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000005c0)=@assoc_value={0x0, 0x401}, 0x8) 00:25:19 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r2, &(0x7f0000000180)='cgroup.controllers\x00', 0x0, 0x0) epoll_pwait(r0, &(0x7f0000000000)=[{}, {}, {}], 0x3, 0x2, &(0x7f00000000c0)={0xfff}, 0x8) syz_mount_image$hfsplus(&(0x7f00000001c0)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x5, 0x1, &(0x7f0000001240)=[{&(0x7f0000000240)="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", 0x1000, 0x7}], 0x20000, &(0x7f0000001280)=ANY=[@ANYBLOB='decompose,barrier,nodesompose,obj_type=net/ip_vs\x00,\x00']) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000140)) sendfile(r1, r0, 0x0, 0x462c) 00:25:19 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0x2, 0x0) [ 2270.702550] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2270.709830] R13: 0000000000000000 R14: 00000000004d9b98 R15: 0000000000000003 [ 2270.730337] FAT-fs (loop1): bogus number of reserved sectors [ 2270.750184] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2270.912840] IPVS: ftp: loaded support on port[0] = 21 [ 2270.996371] device bridge_slave_1 left promiscuous mode [ 2271.001966] bridge0: port 2(bridge_slave_1) entered disabled state [ 2271.056837] device bridge_slave_0 left promiscuous mode [ 2271.062336] bridge0: port 1(bridge_slave_0) entered disabled state [ 2271.163318] team0 (unregistering): Port device team_slave_1 removed [ 2271.178819] team0 (unregistering): Port device team_slave_0 removed [ 2271.192733] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2271.272557] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2271.381936] bond0 (unregistering): Released all slaves [ 2272.303845] bridge0: port 1(bridge_slave_0) entered blocking state [ 2272.310408] bridge0: port 1(bridge_slave_0) entered disabled state [ 2272.318243] device bridge_slave_0 entered promiscuous mode [ 2272.394393] bridge0: port 2(bridge_slave_1) entered blocking state [ 2272.415734] bridge0: port 2(bridge_slave_1) entered disabled state [ 2272.423244] device bridge_slave_1 entered promiscuous mode [ 2272.535038] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2272.644149] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2272.966977] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2273.086780] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2273.345154] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2273.356510] team0: Port device team_slave_0 added [ 2273.433738] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2273.441441] team0: Port device team_slave_1 added [ 2273.489603] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2273.496802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2273.516224] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2273.578400] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2273.585307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2273.603183] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2273.653597] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2273.660903] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2273.679526] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2273.722067] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2273.729292] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2273.747614] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2274.255187] bridge0: port 2(bridge_slave_1) entered blocking state [ 2274.261662] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2274.268454] bridge0: port 1(bridge_slave_0) entered blocking state [ 2274.274860] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2274.283457] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2274.525997] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2276.111903] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2276.285355] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2276.455482] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2276.461822] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2276.478775] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2276.643003] 8021q: adding VLAN 0 to HW filter on device team0 00:25:26 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00`\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030700000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000000000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000000000000892f0700636f6e6e6c6162656c0000000000000000000000000000000000000000000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000000000000007000000070000000a0000000434f4e4e5345434d41524bff6eef1d192516e43f9a305e46692c00000000000000000000000000000000000000000008"]}, 0x2a8) 00:25:26 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x0, {}, {0x0, 0x7, 0x1, 0xffff}, {0x7, 0xffffffffffffffaa}}) 00:25:26 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) 00:25:26 executing program 1 (fault-call:0 fault-nth:11): syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:25:26 executing program 4: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x7, 0x200101) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000002140)=""/4096) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000000c0)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000180)={{0x0, 0x3, 0x6, 0x5, 'syz1\x00', 0x2}, 0x0, 0x74, 0x9448, r4, 0x3, 0x6, 'syz0\x00', &(0x7f0000000140)=['*\x00', 'net/ip_vs\x00', '/dev/input/mouse#\x00'], 0x1e, [], [0x401, 0x10000, 0x7, 0x1]}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r2, r1, 0x0, 0x462c) 00:25:26 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0x5450, 0x0) [ 2277.638860] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2277.710923] FAULT_INJECTION: forcing a failure. [ 2277.710923] name failslab, interval 1, probability 0, space 0, times 0 [ 2277.753679] CPU: 1 PID: 9592 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2277.761004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2277.770364] Call Trace: [ 2277.772974] dump_stack+0x244/0x39d [ 2277.776626] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2277.781841] ? radix_tree_tag_set+0x3d0/0x3d0 [ 2277.786361] should_fail.cold.4+0xa/0x17 [ 2277.790442] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2277.795574] ? kernfs_activate+0x8e/0x2c0 [ 2277.799755] ? zap_class+0x640/0x640 [ 2277.803758] ? lock_release+0xa00/0xa00 [ 2277.807751] ? perf_trace_sched_process_exec+0x860/0x860 [ 2277.813228] ? find_held_lock+0x36/0x1c0 [ 2277.817313] ? __lock_is_held+0xb5/0x140 [ 2277.821406] ? perf_trace_sched_process_exec+0x860/0x860 [ 2277.826871] ? find_held_lock+0x36/0x1c0 [ 2277.830954] __should_failslab+0x124/0x180 [ 2277.835207] should_failslab+0x9/0x14 [ 2277.839020] kmem_cache_alloc+0x2be/0x730 [ 2277.843180] ? find_held_lock+0x36/0x1c0 [ 2277.847262] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2277.848796] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2277.852298] __kernfs_new_node+0x127/0x8d0 [ 2277.852323] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2277.852340] ? kasan_check_write+0x14/0x20 [ 2277.852364] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 2277.878657] ? __kernfs_new_node+0x697/0x8d0 [ 2277.883085] ? wait_for_completion+0x8a0/0x8a0 [ 2277.887735] ? zap_class+0x640/0x640 [ 2277.891480] ? kasan_check_write+0x14/0x20 [ 2277.895748] ? __lock_is_held+0xb5/0x140 [ 2277.899846] ? wait_for_completion+0x8a0/0x8a0 [ 2277.904456] ? mutex_unlock+0xd/0x10 [ 2277.908186] ? kernfs_activate+0x21a/0x2c0 [ 2277.912439] kernfs_new_node+0x95/0x120 [ 2277.916440] __kernfs_create_file+0x5a/0x340 [ 2277.920893] sysfs_add_file_mode_ns+0x222/0x530 [ 2277.925602] internal_create_group+0x3df/0xd80 [ 2277.930231] ? remove_files.isra.1+0x190/0x190 [ 2277.934830] ? up_write+0x7b/0x220 [ 2277.938382] ? down_write_nested+0x130/0x130 [ 2277.942804] ? down_read+0x120/0x120 [ 2277.946549] sysfs_create_group+0x1f/0x30 [ 2277.950720] lo_ioctl+0x1307/0x1d60 [ 2277.954372] ? lo_rw_aio+0x1ef0/0x1ef0 [ 2277.958286] blkdev_ioctl+0x98e/0x21b0 [ 2277.962195] ? blkpg_ioctl+0xc10/0xc10 [ 2277.966095] ? lock_downgrade+0x900/0x900 [ 2277.970262] ? check_preemption_disabled+0x48/0x280 [ 2277.975298] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2277.980262] ? kasan_check_read+0x11/0x20 [ 2277.984421] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2277.989720] ? rcu_softirq_qs+0x20/0x20 [ 2277.993731] ? __fget+0x4d1/0x740 [ 2277.997204] ? ksys_dup3+0x680/0x680 [ 2278.000948] block_ioctl+0xee/0x130 [ 2278.004586] ? blkdev_fallocate+0x400/0x400 [ 2278.008923] do_vfs_ioctl+0x1de/0x1790 [ 2278.012830] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 2278.018389] ? ioctl_preallocate+0x300/0x300 [ 2278.022814] ? __fget_light+0x2e9/0x430 [ 2278.026806] ? fget_raw+0x20/0x20 [ 2278.030278] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2278.035310] ? kmem_cache_free+0x24f/0x290 [ 2278.039558] ? putname+0xf7/0x130 [ 2278.043028] ? do_syscall_64+0x9a/0x820 [ 2278.047015] ? do_syscall_64+0x9a/0x820 [ 2278.051009] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2278.055606] ? security_file_ioctl+0x94/0xc0 [ 2278.060036] ksys_ioctl+0xa9/0xd0 [ 2278.063514] __x64_sys_ioctl+0x73/0xb0 [ 2278.067416] do_syscall_64+0x1b9/0x820 [ 2278.071320] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2278.076706] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2278.081657] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2278.086521] ? trace_hardirqs_on_caller+0x310/0x310 [ 2278.091552] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2278.096587] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2278.101620] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2278.106667] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2278.111871] RIP: 0033:0x4574e7 [ 2278.115082] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2278.134019] RSP: 002b:00007f004a854a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2278.141746] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004574e7 00:25:26 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x0, {}, {0x0, 0x0, 0x1, 0xffff}, {0x7, 0xffffffffffffffaa}}) 00:25:26 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, 0xfffffffffffffffe, &(0x7f0000000000)) r1 = semget(0x2, 0x0, 0x200) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000140)=""/245) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r2, r0, 0x0, 0x462c) 00:25:26 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) 00:25:26 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f7574650000000400", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 2278.149047] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2278.156324] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2278.163606] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2278.170883] R13: 0000000000000000 R14: 00000000004d9b98 R15: 0000000000000003 [ 2278.191988] FAT-fs (loop1): bogus number of reserved sectors [ 2278.214563] FAT-fs (loop1): Can't find a valid FAT filesystem 00:25:26 executing program 1 (fault-call:0 fault-nth:12): syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:25:26 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x0, {}, {0x0, 0x0, 0x0, 0xffff}, {0x7, 0xffffffffffffffaa}}) 00:25:26 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0x4048ae9b, 0x0) 00:25:26 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) 00:25:26 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') getsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000200), &(0x7f0000000240)=0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x8, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x462c) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f00000000c0)={{0xffffffffffffffff, 0x0, 0x1}, 0x2, 0x8000}) read$eventfd(r0, &(0x7f0000000080), 0x8) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000180)={{0x36, @remote, 0x4e24, 0x3, 'lc\x00', 0x23, 0x1, 0x60}, {@multicast2, 0x4e21, 0x1, 0x3, 0x0, 0x7fff}}, 0x44) 00:25:26 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00?\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 2278.289495] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2278.363302] FAULT_INJECTION: forcing a failure. [ 2278.363302] name failslab, interval 1, probability 0, space 0, times 0 [ 2278.405658] CPU: 1 PID: 9617 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2278.412986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2278.422382] Call Trace: [ 2278.424994] dump_stack+0x244/0x39d [ 2278.427189] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2278.428651] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2278.428690] should_fail.cold.4+0xa/0x17 [ 2278.428726] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2278.451212] ? lock_release+0xa00/0xa00 [ 2278.455201] ? perf_trace_sched_process_exec+0x860/0x860 [ 2278.460688] ? zap_class+0x640/0x640 [ 2278.464437] ? find_held_lock+0x36/0x1c0 [ 2278.468550] ? __lock_is_held+0xb5/0x140 [ 2278.472685] ? nvme_free_iod+0x328/0x610 [ 2278.476815] ? perf_trace_sched_process_exec+0x860/0x860 [ 2278.482273] ? kernfs_activate+0x21a/0x2c0 [ 2278.482303] __should_failslab+0x124/0x180 [ 2278.482324] should_failslab+0x9/0x14 [ 2278.482347] kmem_cache_alloc+0x2be/0x730 [ 2278.498760] ? lock_downgrade+0x900/0x900 [ 2278.498781] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2278.498804] __kernfs_new_node+0x127/0x8d0 [ 2278.498828] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2278.498844] ? zap_class+0x640/0x640 [ 2278.498868] ? __lock_is_held+0xb5/0x140 [ 2278.524763] ? wait_for_completion+0x8a0/0x8a0 [ 2278.529378] ? mutex_unlock+0xd/0x10 [ 2278.533108] ? kernfs_activate+0x21a/0x2c0 [ 2278.535721] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2278.537383] ? kernfs_walk_and_get_ns+0x340/0x340 [ 2278.537406] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2278.537420] ? kernfs_link_sibling+0x1d2/0x3b0 [ 2278.537442] kernfs_new_node+0x95/0x120 [ 2278.537463] __kernfs_create_file+0x5a/0x340 [ 2278.568939] sysfs_add_file_mode_ns+0x222/0x530 [ 2278.573632] internal_create_group+0x3df/0xd80 [ 2278.578247] ? remove_files.isra.1+0x190/0x190 [ 2278.582844] ? up_write+0x7b/0x220 [ 2278.586411] ? down_write_nested+0x130/0x130 [ 2278.586429] ? down_read+0x120/0x120 [ 2278.586496] sysfs_create_group+0x1f/0x30 [ 2278.586514] lo_ioctl+0x1307/0x1d60 [ 2278.586536] ? lo_rw_aio+0x1ef0/0x1ef0 [ 2278.594661] blkdev_ioctl+0x98e/0x21b0 [ 2278.594682] ? blkpg_ioctl+0xc10/0xc10 [ 2278.594697] ? lock_downgrade+0x900/0x900 [ 2278.594728] ? check_preemption_disabled+0x48/0x280 [ 2278.623296] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2278.628241] ? kasan_check_read+0x11/0x20 [ 2278.632431] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2278.634538] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2278.637755] ? rcu_softirq_qs+0x20/0x20 [ 2278.637785] ? __fget+0x4d1/0x740 [ 2278.637807] ? ksys_dup3+0x680/0x680 [ 2278.637833] block_ioctl+0xee/0x130 [ 2278.660723] ? blkdev_fallocate+0x400/0x400 [ 2278.665067] do_vfs_ioctl+0x1de/0x1790 [ 2278.668975] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 2278.674534] ? ioctl_preallocate+0x300/0x300 [ 2278.678966] ? __fget_light+0x2e9/0x430 [ 2278.682953] ? fget_raw+0x20/0x20 [ 2278.686420] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2278.686440] ? kmem_cache_free+0x24f/0x290 [ 2278.686461] ? putname+0xf7/0x130 [ 2278.686488] ? do_syscall_64+0x9a/0x820 [ 2278.686507] ? do_syscall_64+0x9a/0x820 [ 2278.695755] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2278.695776] ? security_file_ioctl+0x94/0xc0 [ 2278.695796] ksys_ioctl+0xa9/0xd0 [ 2278.695816] __x64_sys_ioctl+0x73/0xb0 [ 2278.695834] do_syscall_64+0x1b9/0x820 [ 2278.695855] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2278.732786] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2278.737743] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2278.740969] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2278.742602] ? trace_hardirqs_on_caller+0x310/0x310 00:25:27 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f7574650000001100", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030700000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000000000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000000000000892f0700636f6e6e6c6162656c0000000000000000000000000000000000000000000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000000000000007000000070000000a0000000434f4e4e5345434d41524bff6eef1d192516e43f9a305e46692c00000000000000000000000000000000000000000008"]}, 0x2a8) 00:25:27 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f7574657fffffff00", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:25:27 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f757465000000000000000200", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030700000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000000000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000000000000892f0700636f6e6e6c6162656c0000000000000000000000000000000000000000000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000000000000007000000070000000a0000000434f4e4e5345434d41524bff6eef1d192516e43f9a305e46692c00000000000000000000000000000000000000000008"]}, 0x2a8) 00:25:27 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f757465000000000000000300", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 2278.742622] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2278.742641] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2278.742664] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2278.742686] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2278.775908] RIP: 0033:0x4574e7 [ 2278.779113] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2278.798220] RSP: 002b:00007f004a854a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 00:25:27 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x800) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x462c) 00:25:27 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x0, {}, {}, {0x7, 0xffffffffffffffaa}}) [ 2278.798237] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004574e7 [ 2278.798246] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2278.798256] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2278.798266] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2278.798275] R13: 0000000000000000 R14: 00000000004d9b98 R15: 0000000000000003 [ 2278.883423] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2278.897701] FAT-fs (loop1): bogus number of reserved sectors [ 2278.903741] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2278.926066] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:25:27 executing program 1 (fault-call:0 fault-nth:13): syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:25:27 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x1, 0x10000, 0x0, 0xd472d641f2bd6646, 0xc, [{0x3, 0x8000}, {0x3, 0x4}, {0x6, 0x80000000}, {0x101, 0x6}, {0x0, 0x7}, {0x3f, 0x8}, {0x0, 0x101}, {0x0, 0x2d79}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) 00:25:27 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xc018ae85, 0x0) 00:25:27 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x462c) 00:25:27 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x0, {}, {}, {0x0, 0xffffffffffffffaa}}) 00:25:27 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00?\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:25:27 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x0, 0x1, {0x2, @pix_mp={0x1, 0x10000, 0x0, 0xd472d641f2bd6646, 0xc, [{0x3, 0x8000}, {0x3, 0x4}, {0x6, 0x80000000}, {0x101, 0x6}, {0x0, 0x7}, {0x3f, 0x8}, {0x0, 0x101}, {0x0, 0x2d79}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) [ 2279.073704] FAULT_INJECTION: forcing a failure. [ 2279.073704] name failslab, interval 1, probability 0, space 0, times 0 [ 2279.112370] CPU: 1 PID: 9665 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2279.118082] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2279.119704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2279.119721] Call Trace: [ 2279.119750] dump_stack+0x244/0x39d [ 2279.119777] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2279.137279] should_fail.cold.4+0xa/0x17 [ 2279.137302] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2279.137322] ? lock_release+0xa00/0xa00 [ 2279.137337] ? perf_trace_sched_process_exec+0x860/0x860 [ 2279.137360] ? zap_class+0x640/0x640 [ 2279.171025] ? find_held_lock+0x36/0x1c0 [ 2279.175107] ? __lock_is_held+0xb5/0x140 [ 2279.175207] ? rtl_op_add_interface+0xf38/0x1380 [ 2279.175236] ? perf_trace_sched_process_exec+0x860/0x860 [ 2279.189505] ? kernfs_activate+0x21a/0x2c0 [ 2279.193772] __should_failslab+0x124/0x180 [ 2279.198031] should_failslab+0x9/0x14 [ 2279.201856] kmem_cache_alloc+0x2be/0x730 [ 2279.206024] ? lock_downgrade+0x900/0x900 [ 2279.210196] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2279.215230] __kernfs_new_node+0x127/0x8d0 [ 2279.215255] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2279.215273] ? zap_class+0x640/0x640 [ 2279.215296] ? __lock_is_held+0xb5/0x140 [ 2279.232048] ? wait_for_completion+0x8a0/0x8a0 [ 2279.236659] ? mutex_unlock+0xd/0x10 [ 2279.240390] ? kernfs_activate+0x21a/0x2c0 [ 2279.244641] ? kernfs_walk_and_get_ns+0x340/0x340 [ 2279.249508] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2279.255075] ? kernfs_link_sibling+0x1d2/0x3b0 [ 2279.259678] kernfs_new_node+0x95/0x120 [ 2279.263685] __kernfs_create_file+0x5a/0x340 [ 2279.268124] sysfs_add_file_mode_ns+0x222/0x530 [ 2279.272817] internal_create_group+0x3df/0xd80 [ 2279.277430] ? remove_files.isra.1+0x190/0x190 [ 2279.282026] ? up_write+0x7b/0x220 [ 2279.285580] ? down_write_nested+0x130/0x130 [ 2279.290001] ? down_read+0x120/0x120 [ 2279.293757] sysfs_create_group+0x1f/0x30 [ 2279.297920] lo_ioctl+0x1307/0x1d60 [ 2279.301832] ? lo_rw_aio+0x1ef0/0x1ef0 [ 2279.305744] blkdev_ioctl+0x98e/0x21b0 [ 2279.309648] ? blkpg_ioctl+0xc10/0xc10 [ 2279.313548] ? lock_downgrade+0x900/0x900 [ 2279.317726] ? check_preemption_disabled+0x48/0x280 [ 2279.322766] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2279.327721] ? kasan_check_read+0x11/0x20 [ 2279.331940] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2279.337236] ? rcu_softirq_qs+0x20/0x20 [ 2279.341238] ? __fget+0x4d1/0x740 [ 2279.344708] ? ksys_dup3+0x680/0x680 [ 2279.348459] block_ioctl+0xee/0x130 [ 2279.352129] ? blkdev_fallocate+0x400/0x400 [ 2279.356468] do_vfs_ioctl+0x1de/0x1790 [ 2279.360381] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 2279.365946] ? ioctl_preallocate+0x300/0x300 [ 2279.370372] ? __fget_light+0x2e9/0x430 [ 2279.374361] ? fget_raw+0x20/0x20 [ 2279.377836] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2279.382871] ? kmem_cache_free+0x24f/0x290 [ 2279.387127] ? putname+0xf7/0x130 [ 2279.390598] ? do_syscall_64+0x9a/0x820 [ 2279.394587] ? do_syscall_64+0x9a/0x820 [ 2279.398578] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2279.403180] ? security_file_ioctl+0x94/0xc0 [ 2279.407608] ksys_ioctl+0xa9/0xd0 [ 2279.411085] __x64_sys_ioctl+0x73/0xb0 [ 2279.414996] do_syscall_64+0x1b9/0x820 [ 2279.418897] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2279.424285] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2279.429234] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2279.434096] ? trace_hardirqs_on_caller+0x310/0x310 [ 2279.439130] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2279.444175] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2279.449213] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2279.454088] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2279.459295] RIP: 0033:0x4574e7 [ 2279.462509] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2279.481427] RSP: 002b:00007f004a854a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2279.489188] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004574e7 [ 2279.496653] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2279.503941] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2279.511229] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2279.518518] R13: 0000000000000000 R14: 00000000004d9b98 R15: 0000000000000003 00:25:27 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)) 00:25:28 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f7574650000008800", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:25:28 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r0, 0x0, &(0x7f0000000140)="5a1c050f4124ae4eeceeac50d795fcb43aca424b51849789921d5219aaf18410ac82e78c39245d3f2ac1e890749dc1eeeb0c9c0bdb26e509166331bb3f5ea0f027cef7b762c77aa5bd2621d9834a420274c9c6d247f8d63903c8ed30516cfa4717a327476305f23389b46c03d4bd6c878ef61f810428e092e7b39b7111c8eb3ef8a1db4924ef37e01e5ead29d298c2536b9a0aeaa09a16b4a909da5fb98b6ceaaaebd17d030b7a06485d51220e8f6bfbcad818ba72536e0091484f2e2e932a7f74873b6d81aaa7cfbe3879ac2c55bdbcfb5547edee7f07bc8618f54fcaa64df917c33e124db976030321fe20") ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ceph(&(0x7f0000000000)='ceph\x00', &(0x7f00000000c0)='./file0\x00', 0x6, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="09850fb75dc39a7c1c8b449dc965c16a2c88007e8a757fcb479e9e0c71478e650d206519db13ee4e8cd674fedcd6d879acd2a7133aee11bcffbfff51dd91489bbadbe40ca813a07bb398b3c376ea64d064dc95b5b250ac0f862d6c8408ab2ac38918d03366dc39796d7b2b920196ef352683d59e93a6b266aa", 0x79, 0x1000}, {&(0x7f00000002c0)="b704151dfe2e99e52d20927e1340", 0xe, 0x10001}, {&(0x7f0000000300)="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", 0xff, 0x6}, {&(0x7f0000000400)="e137a511863fed75400dd8e2f1a6b3495fd3f83efc9d873b895f9fd847405c40ce4f14e3d99ddd94337d48c6699a2b64ded77b7e7794fcfd0796c7a9f52f38ba1906d6ad5c7743d0b65ca9ccb215f7902b3b5e0d422309e9b78510bb19c37cb62c94fca303c04991c436a0137fabdb80684e6bb9b59a550095c6c28ec09d9426881e24f992ad00d83225f564d4a82564c7ca5878a836592f64f1f1d1c73d1ad4b0f56d43ad", 0xa5, 0x30}, {&(0x7f00000004c0)="750737f68b3d97942832525d40468a02060150c3135d2ed54775a8645879562824cd7109d6f2a72fe3cc84395ae376490e22f3146bef4467b93dfb2d3f8502f3ef8aef44c5c6f7e70d8fd0334e8b6015b28f20696c0292f18a9ae6f913179b7625530abdcc5bc4d7ebfcfb6e7a5ceb9cd077d377a32ba5d8d600a8058a32d9dd3091675224b3767f4f433f4164f0cce41c164fed8e7f9495932a96ecc3e83b734279a8c8c59bf513912fcf15040d7d87ab04b7213e255b7be47b593e6057d042eda483ac68a74d0d3f5ad6b6e2ceb85693937ae29e1f23caed50562cf306888115bfb3108a635c4305b0582c3f4807fa39", 0xf1, 0xff}, {&(0x7f00000005c0)="e0667f48", 0x4, 0x8001}, {&(0x7f0000000600)="f76bb510f3759d157181acb87e59b69205e09fc6b28bb35c3d03eab8c8ab198d48cff3bedfe343e2c09aa737fa32058f517bdf6f8b5a49053337c57ee808f9bbd434407ae6163dc852a02fb0cf17fd0e71ea136ef91faed0e85cf093c63a7eaf8b7d63adc287d67afebaa6297edb86bfc41486b9d2737cdda882c47ca8e1f8f694462dcb2f2b", 0x86, 0x200}], 0x0, &(0x7f0000000780)='\x00') sendfile(r1, r0, 0x0, 0x462c) 00:25:28 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x0, 0x1, {0x2, @pix_mp={0x1, 0x10000, 0x0, 0xd472d641f2bd6646, 0xc, [{0x3, 0x8000}, {0x3, 0x4}, {0x6, 0x80000000}, {0x101, 0x6}, {0x0, 0x7}, {0x3f, 0x8}, {0x0, 0x101}, {0x0, 0x2d79}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) 00:25:28 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0x81a0ae8c, 0x0) [ 2279.626397] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2279.668969] ceph: device name is missing path (no : separator in /dev/loop4) [ 2279.712388] FAT-fs (loop1): bogus number of reserved sectors [ 2279.719062] FAT-fs (loop1): Can't find a valid FAT filesystem 00:25:28 executing program 1 (fault-call:0 fault-nth:14): syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:25:28 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f7574650400", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:25:28 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0x4020940d, 0x0) 00:25:28 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x0, 0x1, {0x2, @pix_mp={0x1, 0x10000, 0x0, 0xd472d641f2bd6646, 0xc, [{0x3, 0x8000}, {0x3, 0x4}, {0x6, 0x80000000}, {0x101, 0x6}, {0x0, 0x7}, {0x3f, 0x8}, {0x0, 0x101}, {0x0, 0x2d79}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) 00:25:28 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000000)={{0x2, 0x1000}, 0x10}, 0x10) sendfile(r1, r0, 0x0, 0x462c) 00:25:28 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0x81a0ae8c, 0x0) 00:25:28 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f757465000000000000000500", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 2279.849542] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:25:28 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x88080, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x462c) 00:25:28 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x0, {0x2, @pix_mp={0x1, 0x10000, 0x0, 0xd472d641f2bd6646, 0xc, [{0x3, 0x8000}, {0x3, 0x4}, {0x6, 0x80000000}, {0x101, 0x6}, {0x0, 0x7}, {0x3f, 0x8}, {0x0, 0x101}, {0x0, 0x2d79}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) 00:25:28 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0x81a0ae8c, 0x0) [ 2279.923449] FAULT_INJECTION: forcing a failure. [ 2279.923449] name failslab, interval 1, probability 0, space 0, times 0 [ 2279.984190] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2280.005834] CPU: 0 PID: 9716 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2280.013165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2280.022539] Call Trace: [ 2280.025151] dump_stack+0x244/0x39d [ 2280.028807] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2280.034037] should_fail.cold.4+0xa/0x17 [ 2280.038125] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2280.043253] ? lock_release+0xa00/0xa00 [ 2280.047249] ? perf_trace_sched_process_exec+0x860/0x860 [ 2280.052733] ? zap_class+0x640/0x640 [ 2280.056479] ? find_held_lock+0x36/0x1c0 [ 2280.060562] ? __lock_is_held+0xb5/0x140 [ 2280.064655] ? perf_trace_sched_process_exec+0x860/0x860 [ 2280.070121] ? kernfs_activate+0x21a/0x2c0 [ 2280.074383] __should_failslab+0x124/0x180 [ 2280.078638] should_failslab+0x9/0x14 [ 2280.082462] kmem_cache_alloc+0x2be/0x730 [ 2280.086636] ? lock_downgrade+0x900/0x900 [ 2280.090810] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2280.095875] __kernfs_new_node+0x127/0x8d0 [ 2280.100136] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2280.105406] ? zap_class+0x640/0x640 [ 2280.109152] ? __lock_is_held+0xb5/0x140 [ 2280.113230] ? wait_for_completion+0x8a0/0x8a0 [ 2280.117841] ? mutex_unlock+0xd/0x10 [ 2280.121573] ? kernfs_activate+0x21a/0x2c0 [ 2280.125827] ? kernfs_walk_and_get_ns+0x340/0x340 [ 2280.130698] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2280.136262] ? kernfs_link_sibling+0x1d2/0x3b0 [ 2280.140865] kernfs_new_node+0x95/0x120 [ 2280.140896] __kernfs_create_file+0x5a/0x340 [ 2280.149291] sysfs_add_file_mode_ns+0x222/0x530 [ 2280.153992] internal_create_group+0x3df/0xd80 [ 2280.158597] ? remove_files.isra.1+0x190/0x190 [ 2280.158612] ? up_write+0x7b/0x220 [ 2280.158632] ? down_write_nested+0x130/0x130 [ 2280.171172] ? down_read+0x120/0x120 [ 2280.174919] sysfs_create_group+0x1f/0x30 [ 2280.179085] lo_ioctl+0x1307/0x1d60 [ 2280.182749] ? lo_rw_aio+0x1ef0/0x1ef0 [ 2280.186661] blkdev_ioctl+0x98e/0x21b0 [ 2280.190568] ? blkpg_ioctl+0xc10/0xc10 [ 2280.194469] ? lock_downgrade+0x900/0x900 [ 2280.198635] ? check_preemption_disabled+0x48/0x280 [ 2280.203676] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2280.208629] ? kasan_check_read+0x11/0x20 [ 2280.212794] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2280.218087] ? rcu_softirq_qs+0x20/0x20 [ 2280.222093] ? __fget+0x4d1/0x740 [ 2280.225565] ? ksys_dup3+0x680/0x680 [ 2280.229310] block_ioctl+0xee/0x130 [ 2280.232956] ? blkdev_fallocate+0x400/0x400 [ 2280.237708] do_vfs_ioctl+0x1de/0x1790 [ 2280.241758] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 2280.247320] ? ioctl_preallocate+0x300/0x300 [ 2280.251756] ? __fget_light+0x2e9/0x430 [ 2280.255761] ? fget_raw+0x20/0x20 [ 2280.259235] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2280.264272] ? kmem_cache_free+0x24f/0x290 [ 2280.268527] ? putname+0xf7/0x130 [ 2280.272003] ? do_syscall_64+0x9a/0x820 [ 2280.276004] ? do_syscall_64+0x9a/0x820 [ 2280.280005] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2280.284606] ? security_file_ioctl+0x94/0xc0 [ 2280.289039] ksys_ioctl+0xa9/0xd0 [ 2280.292512] __x64_sys_ioctl+0x73/0xb0 [ 2280.296419] do_syscall_64+0x1b9/0x820 [ 2280.300328] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2280.305743] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2280.310695] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2280.315565] ? trace_hardirqs_on_caller+0x310/0x310 [ 2280.320601] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2280.325640] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2280.330682] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2280.330722] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2280.340761] RIP: 0033:0x4574e7 [ 2280.343971] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2280.362898] RSP: 002b:00007f004a854a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2280.362913] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004574e7 [ 2280.362921] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 00:25:29 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f7574650000000600", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:25:29 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x0, {0x2, @pix_mp={0x1, 0x10000, 0x0, 0xd472d641f2bd6646, 0xc, [{0x3, 0x8000}, {0x3, 0x4}, {0x6, 0x80000000}, {0x101, 0x6}, {0x0, 0x7}, {0x3f, 0x8}, {0x0, 0x101}, {0x0, 0x2d79}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) [ 2280.362928] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2280.362936] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2280.362944] R13: 0000000000000000 R14: 00000000004d9b98 R15: 0000000000000003 [ 2280.424732] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2280.449880] FAT-fs (loop1): bogus number of reserved sectors [ 2280.456620] FAT-fs (loop1): Can't find a valid FAT filesystem 00:25:29 executing program 1 (fault-call:0 fault-nth:15): syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:25:29 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0x5421, 0x0) 00:25:29 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f00000000c0)={0x1, 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) sendfile(r1, r0, 0x0, 0x462c) 00:25:29 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f7574651100", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:25:29 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x0, {0x2, @pix_mp={0x1, 0x10000, 0x0, 0xd472d641f2bd6646, 0xc, [{0x3, 0x8000}, {0x3, 0x4}, {0x6, 0x80000000}, {0x101, 0x6}, {0x0, 0x7}, {0x3f, 0x8}, {0x0, 0x101}, {0x0, 0x2d79}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) 00:25:29 executing program 0 (fault-call:1 fault-nth:0): r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)) 00:25:29 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f7574658800", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 2280.590974] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:25:29 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)) 00:25:29 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x0, @pix_mp={0x1, 0x10000, 0x0, 0xd472d641f2bd6646, 0xc, [{0x3, 0x8000}, {0x3, 0x4}, {0x6, 0x80000000}, {0x101, 0x6}, {0x0, 0x7}, {0x3f, 0x8}, {0x0, 0x101}, {0x0, 0x2d79}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) 00:25:29 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000000)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000000c0)={@empty, 0x66, r2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@remote, @in=@local}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x1000000000003) [ 2280.653120] FAULT_INJECTION: forcing a failure. [ 2280.653120] name failslab, interval 1, probability 0, space 0, times 0 [ 2280.728883] CPU: 1 PID: 9757 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2280.736215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2280.745591] Call Trace: [ 2280.748205] dump_stack+0x244/0x39d [ 2280.751862] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2280.757088] should_fail.cold.4+0xa/0x17 [ 2280.761186] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2280.766322] ? lock_release+0xa00/0xa00 [ 2280.770315] ? perf_trace_sched_process_exec+0x860/0x860 [ 2280.775796] ? zap_class+0x640/0x640 [ 2280.779543] ? find_held_lock+0x36/0x1c0 [ 2280.783627] ? __lock_is_held+0xb5/0x140 [ 2280.787728] ? perf_trace_sched_process_exec+0x860/0x860 [ 2280.793195] ? kernfs_activate+0x21a/0x2c0 [ 2280.797495] __should_failslab+0x124/0x180 [ 2280.801760] should_failslab+0x9/0x14 [ 2280.805577] kmem_cache_alloc+0x2be/0x730 [ 2280.809757] ? lock_downgrade+0x900/0x900 [ 2280.813933] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2280.814044] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2280.818973] __kernfs_new_node+0x127/0x8d0 [ 2280.818997] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2280.819015] ? zap_class+0x640/0x640 [ 2280.819042] ? __lock_is_held+0xb5/0x140 [ 2280.819057] ? wait_for_completion+0x8a0/0x8a0 [ 2280.819085] ? mutex_unlock+0xd/0x10 [ 2280.819103] ? kernfs_activate+0x21a/0x2c0 [ 2280.856543] ? kernfs_walk_and_get_ns+0x340/0x340 [ 2280.861414] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2280.866970] ? kernfs_link_sibling+0x1d2/0x3b0 [ 2280.871580] kernfs_new_node+0x95/0x120 [ 2280.875580] __kernfs_create_file+0x5a/0x340 [ 2280.880015] sysfs_add_file_mode_ns+0x222/0x530 [ 2280.884727] internal_create_group+0x3df/0xd80 [ 2280.889345] ? remove_files.isra.1+0x190/0x190 [ 2280.893948] ? up_write+0x7b/0x220 [ 2280.897517] ? down_write_nested+0x130/0x130 [ 2280.901939] ? down_read+0x120/0x120 [ 2280.905681] sysfs_create_group+0x1f/0x30 [ 2280.909857] lo_ioctl+0x1307/0x1d60 [ 2280.913510] ? lo_rw_aio+0x1ef0/0x1ef0 [ 2280.917419] blkdev_ioctl+0x98e/0x21b0 [ 2280.921328] ? blkpg_ioctl+0xc10/0xc10 [ 2280.925235] ? lock_downgrade+0x900/0x900 00:25:29 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x0, @pix_mp={0x1, 0x10000, 0x0, 0xd472d641f2bd6646, 0xc, [{0x3, 0x8000}, {0x3, 0x4}, {0x6, 0x80000000}, {0x101, 0x6}, {0x0, 0x7}, {0x3f, 0x8}, {0x0, 0x101}, {0x0, 0x2d79}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) 00:25:29 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = gettid() r4 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000023000)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, 0x28, 0xaff, 0x0, 0x0, {0x5}, [@nested={0x8, 0x1, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) rt_sigqueueinfo(r3, 0x1a, &(0x7f0000000140)={0x21, 0xcd}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x462c) [ 2280.929509] ? check_preemption_disabled+0x48/0x280 [ 2280.934553] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2280.939505] ? kasan_check_read+0x11/0x20 [ 2280.943668] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2280.948963] ? rcu_softirq_qs+0x20/0x20 [ 2280.952969] ? __fget+0x4d1/0x740 [ 2280.956446] ? ksys_dup3+0x680/0x680 [ 2280.960200] block_ioctl+0xee/0x130 [ 2280.963833] ? blkdev_fallocate+0x400/0x400 [ 2280.968154] do_vfs_ioctl+0x1de/0x1790 [ 2280.972037] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 2280.977574] ? ioctl_preallocate+0x300/0x300 [ 2280.981978] ? __fget_light+0x2e9/0x430 [ 2280.985949] ? fget_raw+0x20/0x20 [ 2280.989399] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2280.994409] ? kmem_cache_free+0x24f/0x290 [ 2280.998639] ? putname+0xf7/0x130 [ 2281.002088] ? do_syscall_64+0x9a/0x820 [ 2281.006059] ? do_syscall_64+0x9a/0x820 [ 2281.010026] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2281.014623] ? security_file_ioctl+0x94/0xc0 [ 2281.019030] ksys_ioctl+0xa9/0xd0 [ 2281.022484] __x64_sys_ioctl+0x73/0xb0 [ 2281.026381] do_syscall_64+0x1b9/0x820 [ 2281.030273] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2281.035632] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2281.040552] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2281.045389] ? trace_hardirqs_on_caller+0x310/0x310 [ 2281.050408] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2281.055430] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2281.060441] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2281.065291] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2281.070486] RIP: 0033:0x4574e7 [ 2281.073673] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2281.092589] RSP: 002b:00007f004a854a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2281.100326] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004574e7 [ 2281.107588] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2281.114849] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2281.122112] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2281.129375] R13: 0000000000000000 R14: 00000000004d9b98 R15: 0000000000000003 [ 2281.158044] FAT-fs (loop1): bogus number of reserved sectors [ 2281.164064] FAT-fs (loop1): Can't find a valid FAT filesystem 00:25:29 executing program 1 (fault-call:0 fault-nth:16): syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:25:29 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute`\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:25:29 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x0, @pix_mp={0x1, 0x10000, 0x0, 0xd472d641f2bd6646, 0xc, [{0x3, 0x8000}, {0x3, 0x4}, {0x6, 0x80000000}, {0x101, 0x6}, {0x0, 0x7}, {0x3f, 0x8}, {0x0, 0x101}, {0x0, 0x2d79}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) 00:25:29 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x200000, 0x0) symlinkat(&(0x7f0000000240)='./file0\x00', r0, &(0x7f00000002c0)='./file0\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x40, &(0x7f0000000280)='net/ip_vs\x00'}, 0x30) r2 = syz_open_procfs(r1, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x2000000000001, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) bind$nfc_llcp(r2, &(0x7f0000000340)={0x27, 0x0, 0x2, 0x3, 0x10000, 0x1, "314d88f8f6dc57fa7276757cac80743aa2bd046963384d9957b434e28b1448254c6474d09a5ac7ae8e9e0d75dba66b6e041e37f94f1057005a7824690a7a2f", 0x3d}, 0x60) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000000)={0x0, 0x1ff}, &(0x7f0000000100)=0x8) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000140)=0x7, 0x4) getsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000001c0)=@assoc_id=r4, &(0x7f0000000180)=0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendfile(r3, r2, 0x0, 0x5) 00:25:29 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc0585611, &(0x7f0000000200)) 00:25:29 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0x4138ae84, 0x0) 00:25:30 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x10000, 0x0, 0xd472d641f2bd6646, 0xc, [{0x3, 0x8000}, {0x3, 0x4}, {0x6, 0x80000000}, {0x101, 0x6}, {0x0, 0x7}, {0x3f, 0x8}, {0x0, 0x101}, {0x0, 0x2d79}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) [ 2281.321192] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:25:30 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f757465000000000000001100", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:25:30 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc0045878, &(0x7f0000000200)) 00:25:30 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@remote, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000000)=0xe8) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x462c) 00:25:30 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f757465000000000000008800", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030700000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000000000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000000000000892f0700636f6e6e6c6162656c0000000000000000000000000000000000000000000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000000000000007000000070000000a0000000434f4e4e5345434d41524bff6eef1d192516e43f9a305e46692c00000000000000000000000000000000000000000008"]}, 0x2a8) [ 2281.464456] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:25:30 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0xd472d641f2bd6646, 0xc, [{0x3, 0x8000}, {0x3, 0x4}, {0x6, 0x80000000}, {0x101, 0x6}, {0x0, 0x7}, {0x3f, 0x8}, {0x0, 0x101}, {0x0, 0x2d79}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) [ 2281.585477] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2281.612777] FAULT_INJECTION: forcing a failure. [ 2281.612777] name failslab, interval 1, probability 0, space 0, times 0 [ 2281.625030] CPU: 0 PID: 9810 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2281.632334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2281.641705] Call Trace: [ 2281.644329] dump_stack+0x244/0x39d [ 2281.647996] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2281.653223] should_fail.cold.4+0xa/0x17 [ 2281.657311] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2281.662438] ? lock_release+0xa00/0xa00 [ 2281.666427] ? perf_trace_sched_process_exec+0x860/0x860 [ 2281.671909] ? zap_class+0x640/0x640 [ 2281.675648] ? find_held_lock+0x36/0x1c0 [ 2281.679739] ? __lock_is_held+0xb5/0x140 [ 2281.683835] ? perf_trace_sched_process_exec+0x860/0x860 [ 2281.689303] ? kernfs_activate+0x21a/0x2c0 [ 2281.693570] __should_failslab+0x124/0x180 [ 2281.697830] should_failslab+0x9/0x14 [ 2281.701649] kmem_cache_alloc+0x2be/0x730 [ 2281.705820] ? lock_downgrade+0x900/0x900 [ 2281.709996] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2281.715032] __kernfs_new_node+0x127/0x8d0 [ 2281.719292] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2281.724065] ? zap_class+0x640/0x640 [ 2281.727803] ? __lock_is_held+0xb5/0x140 [ 2281.731877] ? wait_for_completion+0x8a0/0x8a0 [ 2281.736487] ? mutex_unlock+0xd/0x10 [ 2281.740214] ? kernfs_activate+0x21a/0x2c0 [ 2281.744464] ? kernfs_walk_and_get_ns+0x340/0x340 [ 2281.749330] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2281.754880] ? kernfs_link_sibling+0x1d2/0x3b0 [ 2281.759487] kernfs_new_node+0x95/0x120 [ 2281.763485] __kernfs_create_file+0x5a/0x340 [ 2281.767915] sysfs_add_file_mode_ns+0x222/0x530 [ 2281.772609] internal_create_group+0x3df/0xd80 [ 2281.777217] ? remove_files.isra.1+0x190/0x190 [ 2281.781815] ? up_write+0x7b/0x220 [ 2281.785368] ? down_write_nested+0x130/0x130 [ 2281.789789] ? down_read+0x120/0x120 [ 2281.793535] sysfs_create_group+0x1f/0x30 [ 2281.797700] lo_ioctl+0x1307/0x1d60 [ 2281.801361] ? lo_rw_aio+0x1ef0/0x1ef0 [ 2281.805268] blkdev_ioctl+0x98e/0x21b0 [ 2281.809174] ? blkpg_ioctl+0xc10/0xc10 [ 2281.813074] ? lock_downgrade+0x900/0x900 [ 2281.817238] ? check_preemption_disabled+0x48/0x280 [ 2281.822276] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2281.827239] ? kasan_check_read+0x11/0x20 [ 2281.831401] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2281.836692] ? rcu_softirq_qs+0x20/0x20 [ 2281.840700] ? __fget+0x4d1/0x740 [ 2281.844180] ? ksys_dup3+0x680/0x680 [ 2281.847920] block_ioctl+0xee/0x130 [ 2281.851564] ? blkdev_fallocate+0x400/0x400 [ 2281.855919] do_vfs_ioctl+0x1de/0x1790 [ 2281.859824] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 2281.865385] ? ioctl_preallocate+0x300/0x300 [ 2281.869841] ? __fget_light+0x2e9/0x430 [ 2281.873835] ? fget_raw+0x20/0x20 [ 2281.877304] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2281.882359] ? kmem_cache_free+0x24f/0x290 [ 2281.886627] ? putname+0xf7/0x130 [ 2281.890098] ? do_syscall_64+0x9a/0x820 [ 2281.894099] ? do_syscall_64+0x9a/0x820 [ 2281.898101] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2281.902703] ? security_file_ioctl+0x94/0xc0 [ 2281.907141] ksys_ioctl+0xa9/0xd0 [ 2281.910616] __x64_sys_ioctl+0x73/0xb0 [ 2281.914543] do_syscall_64+0x1b9/0x820 [ 2281.918457] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2281.923837] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2281.928785] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2281.933645] ? trace_hardirqs_on_caller+0x310/0x310 [ 2281.938680] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2281.943744] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2281.948782] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2281.953647] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2281.958867] RIP: 0033:0x4574e7 [ 2281.962101] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2281.981047] RSP: 002b:00007f004a854a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2281.988780] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004574e7 [ 2281.996071] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2282.003355] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2282.010644] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2282.017933] R13: 0000000000000000 R14: 00000000004d9b98 R15: 0000000000000003 [ 2282.039308] FAT-fs (loop1): bogus number of reserved sectors [ 2282.045306] FAT-fs (loop1): Can't find a valid FAT filesystem 00:25:30 executing program 1 (fault-call:0 fault-nth:17): syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:25:30 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc0205649, &(0x7f0000000200)) 00:25:30 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xc020660b, 0x0) 00:25:30 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f0000000080)={0x92e, 0x2, 0x1, {0x0, 0x989680}, 0x10000, 0x6afd}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x462c) 00:25:30 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\a\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:25:30 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0xc, [{0x3, 0x8000}, {0x3, 0x4}, {0x6, 0x80000000}, {0x101, 0x6}, {0x0, 0x7}, {0x3f, 0x8}, {0x0, 0x101}, {0x0, 0x2d79}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) 00:25:30 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3, 0x8000}, {0x3, 0x4}, {0x6, 0x80000000}, {0x101, 0x6}, {0x0, 0x7}, {0x3f, 0x8}, {0x0, 0x101}, {0x0, 0x2d79}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) [ 2282.191304] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:25:30 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc020660b, &(0x7f0000000200)) 00:25:30 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00`\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:25:30 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_G_ENC_INDEX(r0, 0x8818564c, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x462c) 00:25:30 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0x5460, 0x0) 00:25:31 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0x5451, &(0x7f0000000200)) [ 2282.349465] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2282.476554] FAULT_INJECTION: forcing a failure. [ 2282.476554] name failslab, interval 1, probability 0, space 0, times 0 [ 2282.515638] CPU: 1 PID: 9845 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2282.523009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2282.532369] Call Trace: [ 2282.532398] dump_stack+0x244/0x39d [ 2282.532425] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2282.532457] should_fail.cold.4+0xa/0x17 [ 2282.532500] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2282.538701] ? lock_release+0xa00/0xa00 [ 2282.538727] ? perf_trace_sched_process_exec+0x860/0x860 [ 2282.538754] ? zap_class+0x640/0x640 [ 2282.538781] ? find_held_lock+0x36/0x1c0 [ 2282.538801] ? __lock_is_held+0xb5/0x140 [ 2282.562577] ? perf_trace_sched_process_exec+0x860/0x860 [ 2282.562593] ? kernfs_activate+0x21a/0x2c0 [ 2282.562618] __should_failslab+0x124/0x180 [ 2282.570382] should_failslab+0x9/0x14 [ 2282.570400] kmem_cache_alloc+0x2be/0x730 [ 2282.570418] ? lock_downgrade+0x900/0x900 [ 2282.570439] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2282.605472] __kernfs_new_node+0x127/0x8d0 [ 2282.609747] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2282.614520] ? zap_class+0x640/0x640 [ 2282.618275] ? __lock_is_held+0xb5/0x140 [ 2282.622352] ? wait_for_completion+0x8a0/0x8a0 [ 2282.626965] ? mutex_unlock+0xd/0x10 [ 2282.630698] ? kernfs_activate+0x21a/0x2c0 [ 2282.634958] ? kernfs_walk_and_get_ns+0x340/0x340 [ 2282.639822] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2282.645369] ? kernfs_link_sibling+0x1d2/0x3b0 [ 2282.649975] kernfs_new_node+0x95/0x120 [ 2282.653970] __kernfs_create_file+0x5a/0x340 [ 2282.658400] sysfs_add_file_mode_ns+0x222/0x530 [ 2282.663094] internal_create_group+0x3df/0xd80 [ 2282.667700] ? remove_files.isra.1+0x190/0x190 [ 2282.672303] ? up_write+0x7b/0x220 [ 2282.675859] ? down_write_nested+0x130/0x130 [ 2282.680284] ? down_read+0x120/0x120 [ 2282.684025] sysfs_create_group+0x1f/0x30 [ 2282.688189] lo_ioctl+0x1307/0x1d60 [ 2282.691848] ? lo_rw_aio+0x1ef0/0x1ef0 [ 2282.695757] blkdev_ioctl+0x98e/0x21b0 [ 2282.699661] ? blkpg_ioctl+0xc10/0xc10 [ 2282.703584] ? lock_downgrade+0x900/0x900 [ 2282.707752] ? check_preemption_disabled+0x48/0x280 [ 2282.712789] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2282.717743] ? kasan_check_read+0x11/0x20 [ 2282.721909] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2282.727373] ? rcu_softirq_qs+0x20/0x20 [ 2282.731377] ? __fget+0x4d1/0x740 [ 2282.734850] ? ksys_dup3+0x680/0x680 [ 2282.738590] block_ioctl+0xee/0x130 [ 2282.742227] ? blkdev_fallocate+0x400/0x400 [ 2282.746561] do_vfs_ioctl+0x1de/0x1790 [ 2282.750463] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 2282.756021] ? ioctl_preallocate+0x300/0x300 [ 2282.760552] ? __fget_light+0x2e9/0x430 [ 2282.764561] ? fget_raw+0x20/0x20 [ 2282.768034] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2282.773066] ? kmem_cache_free+0x24f/0x290 [ 2282.777326] ? putname+0xf7/0x130 [ 2282.780797] ? do_syscall_64+0x9a/0x820 [ 2282.784800] ? do_syscall_64+0x9a/0x820 [ 2282.788789] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2282.793393] ? security_file_ioctl+0x94/0xc0 [ 2282.797821] ksys_ioctl+0xa9/0xd0 [ 2282.801296] __x64_sys_ioctl+0x73/0xb0 [ 2282.805201] do_syscall_64+0x1b9/0x820 [ 2282.809107] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2282.814496] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2282.819444] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2282.824306] ? trace_hardirqs_on_caller+0x310/0x310 [ 2282.829351] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2282.834390] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2282.839425] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2282.844297] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2282.849503] RIP: 0033:0x4574e7 [ 2282.852714] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2282.871643] RSP: 002b:00007f004a854a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2282.879373] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004574e7 [ 2282.886662] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2282.893949] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2282.901237] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2282.908525] R13: 0000000000000000 R14: 00000000004d9b98 R15: 0000000000000003 [ 2282.921458] FAT-fs (loop1): bogus number of reserved sectors [ 2282.927706] FAT-fs (loop1): Can't find a valid FAT filesystem 00:25:31 executing program 1 (fault-call:0 fault-nth:18): syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:25:31 executing program 4: r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r3, &(0x7f0000000080)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a067fbc45ff810040010000000058000b4824ca945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010009081000414900000004fcff", 0x58}], 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r1, 0x800455d1, &(0x7f00000001c0)) ioctl$void(r4, 0x5451) sendfile(r2, r1, 0x0, 0x462c) 00:25:31 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3, 0x8000}, {0x3, 0x4}, {0x6, 0x80000000}, {0x101, 0x6}, {0x0, 0x7}, {0x3f, 0x8}, {0x0, 0x101}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) 00:25:31 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f7574650300", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:25:31 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc0205647, &(0x7f0000000200)) 00:25:31 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0x5452, 0x0) 00:25:31 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f7574650500", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030700000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000000000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000000000000892f0700636f6e6e6c6162656c0000000000000000000000000000000000000000000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000000000000007000000070000000a0000000434f4e4e5345434d41524bff6eef1d192516e43f9a305e46692c00000000000000000000000000000000000000000008"]}, 0x2a8) [ 2283.027217] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:25:31 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc0189436, &(0x7f0000000200)) 00:25:31 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3, 0x8000}, {0x3, 0x4}, {0x6, 0x80000000}, {0x101, 0x6}, {0x0, 0x7}, {0x3f, 0x8}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) [ 2283.093700] FAULT_INJECTION: forcing a failure. [ 2283.093700] name failslab, interval 1, probability 0, space 0, times 0 [ 2283.129020] CPU: 1 PID: 9864 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2283.136370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2283.145744] Call Trace: [ 2283.145774] dump_stack+0x244/0x39d [ 2283.145800] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2283.145824] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2283.145854] should_fail.cold.4+0xa/0x17 [ 2283.166841] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2283.171964] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2283.177525] ? wake_up_klogd+0x11a/0x180 [ 2283.181602] ? console_device+0xc0/0xc0 [ 2283.185598] ? __down_trylock_console_sem+0x151/0x1f0 [ 2283.190815] ? zap_class+0x640/0x640 [ 2283.194547] ? vprintk_emit+0x293/0x990 [ 2283.198549] ? find_held_lock+0x36/0x1c0 [ 2283.202632] ? __lock_is_held+0xb5/0x140 [ 2283.206738] ? perf_trace_sched_process_exec+0x860/0x860 [ 2283.212209] ? vprintk_default+0x28/0x30 [ 2283.216289] __should_failslab+0x124/0x180 [ 2283.220546] should_failslab+0x9/0x14 [ 2283.224363] kmem_cache_alloc_trace+0x2d7/0x750 [ 2283.229063] kobject_uevent_env+0x2f3/0x101e [ 2283.233509] kobject_uevent+0x1f/0x24 [ 2283.237326] lo_ioctl+0x1385/0x1d60 [ 2283.240979] ? lo_rw_aio+0x1ef0/0x1ef0 [ 2283.244888] blkdev_ioctl+0x98e/0x21b0 [ 2283.248800] ? blkpg_ioctl+0xc10/0xc10 [ 2283.252705] ? lock_downgrade+0x900/0x900 [ 2283.257557] ? check_preemption_disabled+0x48/0x280 [ 2283.262599] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2283.267548] ? kasan_check_read+0x11/0x20 [ 2283.271725] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2283.277019] ? rcu_softirq_qs+0x20/0x20 [ 2283.281029] ? __fget+0x4d1/0x740 [ 2283.284513] ? ksys_dup3+0x680/0x680 [ 2283.288254] block_ioctl+0xee/0x130 [ 2283.291895] ? blkdev_fallocate+0x400/0x400 [ 2283.296236] do_vfs_ioctl+0x1de/0x1790 [ 2283.300144] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 2283.305704] ? ioctl_preallocate+0x300/0x300 [ 2283.310139] ? __fget_light+0x2e9/0x430 [ 2283.314131] ? fget_raw+0x20/0x20 [ 2283.317602] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2283.322640] ? kmem_cache_free+0x24f/0x290 [ 2283.326897] ? putname+0xf7/0x130 [ 2283.330366] ? do_syscall_64+0x9a/0x820 [ 2283.334359] ? do_syscall_64+0x9a/0x820 [ 2283.338350] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2283.342947] ? security_file_ioctl+0x94/0xc0 [ 2283.347383] ksys_ioctl+0xa9/0xd0 [ 2283.350957] __x64_sys_ioctl+0x73/0xb0 [ 2283.354861] do_syscall_64+0x1b9/0x820 [ 2283.358765] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2283.364148] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2283.369092] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2283.373954] ? trace_hardirqs_on_caller+0x310/0x310 [ 2283.378986] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2283.384029] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2283.389072] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2283.393942] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2283.399151] RIP: 0033:0x4574e7 [ 2283.402358] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2283.421280] RSP: 002b:00007f004a854a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2283.429011] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004574e7 [ 2283.436306] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 00:25:32 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x9, 0x40) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000180)={0xa, 0x3, 0x1f, 0xfffffffffffffff8}, 0xa) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f00000001c0)={'syz_tun\x00', 0xef}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$netlink(r1, &(0x7f00000000c0)=@unspec, 0xc) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000200)=0x726) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x5) sendfile(r2, r3, 0x0, 0x40004) [ 2283.443598] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2283.450886] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2283.458173] R13: 0000000000000000 R14: 00000000004d9b98 R15: 0000000000000003 00:25:32 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3, 0x8000}, {0x3, 0x4}, {0x6, 0x80000000}, {0x101, 0x6}, {0x0, 0x7}, {0x0, 0x8}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) 00:25:32 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc0285628, &(0x7f0000000200)) [ 2283.523924] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2283.640150] FAT-fs (loop1): bogus number of reserved sectors [ 2283.646660] FAT-fs (loop1): Can't find a valid FAT filesystem 00:25:32 executing program 1 (fault-call:0 fault-nth:19): syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:25:32 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f757465000000000000000400", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:25:32 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0xfffffffffffffffb) sendfile(r1, r0, 0x0, 0x462c) 00:25:32 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0x8004ae98, 0x0) 00:25:32 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc058560f, &(0x7f0000000200)) 00:25:32 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3, 0x8000}, {0x3, 0x4}, {0x6, 0x80000000}, {0x101, 0x6}, {0x0, 0x7}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) 00:25:32 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c5667, &(0x7f0000000200)) 00:25:32 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f7574650000000500", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:25:32 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3, 0x8000}, {0x3, 0x4}, {0x6, 0x80000000}, {0x101, 0x6}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) [ 2283.800316] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2283.833781] FAULT_INJECTION: forcing a failure. [ 2283.833781] name failslab, interval 1, probability 0, space 0, times 0 [ 2283.875248] CPU: 0 PID: 9899 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2283.882570] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2283.891934] Call Trace: [ 2283.894569] dump_stack+0x244/0x39d [ 2283.898223] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2283.903448] should_fail.cold.4+0xa/0x17 [ 2283.907539] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2283.912685] ? lock_release+0xa00/0xa00 [ 2283.916697] ? perf_trace_sched_process_exec+0x860/0x860 [ 2283.922176] ? zap_class+0x640/0x640 [ 2283.925909] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2283.930947] ? find_held_lock+0x36/0x1c0 [ 2283.935055] ? __lock_is_held+0xb5/0x140 [ 2283.939187] ? put_dec+0x3b/0xf0 [ 2283.942597] ? perf_trace_sched_process_exec+0x860/0x860 [ 2283.944232] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2283.948083] ? zap_class+0x640/0x640 [ 2283.948109] __should_failslab+0x124/0x180 [ 2283.948136] should_failslab+0x9/0x14 [ 2283.948153] kmem_cache_alloc_node+0x26e/0x730 [ 2283.948170] ? find_held_lock+0x36/0x1c0 [ 2283.948197] __alloc_skb+0x119/0x770 [ 2283.948215] ? netdev_alloc_frag+0x1f0/0x1f0 [ 2283.948230] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2283.948243] ? kasan_check_read+0x11/0x20 [ 2283.948257] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2283.948277] ? rcu_softirq_qs+0x20/0x20 [ 2284.003366] ? netlink_has_listeners+0x2cb/0x4a0 [ 2284.008139] ? netlink_tap_init_net+0x3d0/0x3d0 [ 2284.012832] alloc_uevent_skb+0x84/0x1da [ 2284.016919] kobject_uevent_env+0xa52/0x101e [ 2284.021353] kobject_uevent+0x1f/0x24 [ 2284.025202] lo_ioctl+0x1385/0x1d60 [ 2284.028856] ? lo_rw_aio+0x1ef0/0x1ef0 [ 2284.032771] blkdev_ioctl+0x98e/0x21b0 [ 2284.036674] ? blkpg_ioctl+0xc10/0xc10 [ 2284.040577] ? lock_downgrade+0x900/0x900 [ 2284.044754] ? check_preemption_disabled+0x48/0x280 [ 2284.049789] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2284.054746] ? kasan_check_read+0x11/0x20 [ 2284.058915] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2284.064209] ? rcu_softirq_qs+0x20/0x20 [ 2284.068209] ? __fget+0x4d1/0x740 [ 2284.068622] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2284.071686] ? ksys_dup3+0x680/0x680 [ 2284.071726] block_ioctl+0xee/0x130 [ 2284.071743] ? blkdev_fallocate+0x400/0x400 [ 2284.071760] do_vfs_ioctl+0x1de/0x1790 [ 2284.071785] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 2284.101021] ? ioctl_preallocate+0x300/0x300 [ 2284.105681] ? __fget_light+0x2e9/0x430 [ 2284.109704] ? fget_raw+0x20/0x20 [ 2284.113189] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2284.118220] ? kmem_cache_free+0x24f/0x290 [ 2284.122473] ? putname+0xf7/0x130 00:25:32 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000000)={'veth1\x00', {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000140)="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") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept(r3, &(0x7f0000000240)=@alg, &(0x7f00000002c0)=0x80) sendfile(r2, r1, 0x0, 0x462c) 00:25:32 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3, 0x8000}, {0x3, 0x4}, {0x6, 0x80000000}, {0x0, 0x6}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) 00:25:32 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00?\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030700000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000000000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000000000000892f0700636f6e6e6c6162656c0000000000000000000000000000000000000000000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000000000000007000000070000000a0000000434f4e4e5345434d41524bff6eef1d192516e43f9a305e46692c00000000000000000000000000000000000000000008"]}, 0x2a8) [ 2284.125947] ? do_syscall_64+0x9a/0x820 [ 2284.129944] ? do_syscall_64+0x9a/0x820 [ 2284.133939] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2284.138535] ? security_file_ioctl+0x94/0xc0 [ 2284.142962] ksys_ioctl+0xa9/0xd0 [ 2284.146444] __x64_sys_ioctl+0x73/0xb0 [ 2284.150351] do_syscall_64+0x1b9/0x820 [ 2284.154252] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2284.159632] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2284.164571] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2284.169408] ? trace_hardirqs_on_caller+0x310/0x310 [ 2284.174438] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2284.179445] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2284.184490] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2284.189344] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2284.194530] RIP: 0033:0x4574e7 [ 2284.197713] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2284.216628] RSP: 002b:00007f004a854a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2284.224363] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004574e7 [ 2284.231620] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2284.239155] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2284.246412] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2284.253673] R13: 0000000000000000 R14: 00000000004d9b98 R15: 0000000000000003 [ 2284.268064] FAT-fs (loop1): bogus number of reserved sectors [ 2284.274024] FAT-fs (loop1): Can't find a valid FAT filesystem 00:25:33 executing program 1 (fault-call:0 fault-nth:20): syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:25:33 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3, 0x8000}, {0x3, 0x4}, {0x6, 0x80000000}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) 00:25:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f757465000600", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:25:33 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc058565d, &(0x7f0000000200)) 00:25:33 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f00000000c0)={0x2, &(0x7f0000000000)=[{0xfffffffffffffffa, 0x4}, {0x87, 0x8}]}) connect(r0, &(0x7f0000000180)=@ax25={0x3, {"8e36b2832185a1"}, 0x1000}, 0x80) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400202) sendfile(r1, r0, 0x0, 0x462c) 00:25:33 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x1d00000000000000) 00:25:33 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0x5452, &(0x7f0000000200)) 00:25:33 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3, 0x8000}, {0x3, 0x4}, {0x0, 0x80000000}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) [ 2284.440442] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2284.465437] FAULT_INJECTION: forcing a failure. [ 2284.465437] name failslab, interval 1, probability 0, space 0, times 0 [ 2284.502065] CPU: 1 PID: 9940 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2284.509368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2284.518759] Call Trace: [ 2284.521372] dump_stack+0x244/0x39d [ 2284.525033] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2284.530287] should_fail.cold.4+0xa/0x17 [ 2284.534392] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2284.539525] ? lock_release+0xa00/0xa00 [ 2284.543524] ? perf_trace_sched_process_exec+0x860/0x860 [ 2284.548991] ? zap_class+0x640/0x640 [ 2284.552731] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2284.557774] ? find_held_lock+0x36/0x1c0 [ 2284.561851] ? __lock_is_held+0xb5/0x140 [ 2284.566004] ? pcie_aspm_exit_link_state+0x78/0x800 [ 2284.571054] ? put_dec+0x3b/0xf0 [ 2284.574434] ? perf_trace_sched_process_exec+0x860/0x860 [ 2284.579897] ? zap_class+0x640/0x640 [ 2284.583661] __should_failslab+0x124/0x180 [ 2284.587926] should_failslab+0x9/0x14 [ 2284.591753] kmem_cache_alloc_node+0x26e/0x730 [ 2284.596350] ? find_held_lock+0x36/0x1c0 [ 2284.600437] __alloc_skb+0x119/0x770 [ 2284.604166] ? netdev_alloc_frag+0x1f0/0x1f0 [ 2284.608707] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2284.613677] ? kasan_check_read+0x11/0x20 [ 2284.617836] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2284.623131] ? rcu_softirq_qs+0x20/0x20 [ 2284.627130] ? netlink_has_listeners+0x2cb/0x4a0 [ 2284.631919] ? netlink_tap_init_net+0x3d0/0x3d0 [ 2284.636624] alloc_uevent_skb+0x84/0x1da [ 2284.640707] kobject_uevent_env+0xa52/0x101e [ 2284.645151] kobject_uevent+0x1f/0x24 [ 2284.648964] lo_ioctl+0x1385/0x1d60 [ 2284.652609] ? lo_rw_aio+0x1ef0/0x1ef0 [ 2284.656521] blkdev_ioctl+0x98e/0x21b0 [ 2284.660426] ? blkpg_ioctl+0xc10/0xc10 [ 2284.664326] ? lock_downgrade+0x900/0x900 [ 2284.668493] ? check_preemption_disabled+0x48/0x280 [ 2284.673526] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2284.678468] ? kasan_check_read+0x11/0x20 [ 2284.682636] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2284.687928] ? rcu_softirq_qs+0x20/0x20 [ 2284.691927] ? __fget+0x4d1/0x740 [ 2284.695399] ? ksys_dup3+0x680/0x680 [ 2284.699137] block_ioctl+0xee/0x130 [ 2284.702801] ? blkdev_fallocate+0x400/0x400 [ 2284.707137] do_vfs_ioctl+0x1de/0x1790 [ 2284.711048] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 2284.716601] ? ioctl_preallocate+0x300/0x300 [ 2284.721022] ? __fget_light+0x2e9/0x430 [ 2284.725009] ? fget_raw+0x20/0x20 [ 2284.728487] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2284.733524] ? kmem_cache_free+0x24f/0x290 [ 2284.737780] ? putname+0xf7/0x130 [ 2284.741250] ? do_syscall_64+0x9a/0x820 [ 2284.745235] ? do_syscall_64+0x9a/0x820 [ 2284.749228] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2284.753826] ? security_file_ioctl+0x94/0xc0 [ 2284.758249] ksys_ioctl+0xa9/0xd0 [ 2284.761753] __x64_sys_ioctl+0x73/0xb0 [ 2284.765657] do_syscall_64+0x1b9/0x820 [ 2284.769563] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2284.774940] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2284.779881] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2284.784746] ? trace_hardirqs_on_caller+0x310/0x310 [ 2284.789780] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2284.794812] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2284.799849] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2284.804711] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2284.809918] RIP: 0033:0x4574e7 [ 2284.813124] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2284.832033] RSP: 002b:00007f004a854a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2284.839751] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004574e7 00:25:33 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3, 0x8000}, {0x3, 0x4}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) 00:25:33 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x462c) getsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000000), &(0x7f00000000c0)=0x4) 00:25:33 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc0045878, &(0x7f0000000200)) [ 2284.847033] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2284.854308] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2284.861584] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2284.868862] R13: 0000000000000000 R14: 00000000004d9b98 R15: 0000000000000003 00:25:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f757465000500", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 2284.906310] FAT-fs (loop1): bogus number of reserved sectors [ 2284.920091] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2285.010891] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2285.044166] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:25:33 executing program 1 (fault-call:0 fault-nth:21): syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:25:33 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0x2, &(0x7f0000000200)) 00:25:33 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3, 0x8000}, {0x0, 0x4}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) 00:25:33 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) utimensat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={{0x77359400}, {0x77359400}}, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f0000000140)) sendfile(r1, r0, 0x0, 0x462c) 00:25:33 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0xd00000000000000) 00:25:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f75746500000000000000000400", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:25:33 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc0285629, &(0x7f0000000200)) 00:25:33 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3, 0x8000}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) [ 2285.190252] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:25:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f757465000300", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 2285.231361] FAULT_INJECTION: forcing a failure. [ 2285.231361] name failslab, interval 1, probability 0, space 0, times 0 [ 2285.261358] CPU: 1 PID: 9979 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2285.268684] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2285.278057] Call Trace: [ 2285.280677] dump_stack+0x244/0x39d [ 2285.284318] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2285.289533] should_fail.cold.4+0xa/0x17 [ 2285.293652] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2285.298775] ? lock_release+0xa00/0xa00 [ 2285.302762] ? perf_trace_sched_process_exec+0x860/0x860 [ 2285.308222] ? zap_class+0x640/0x640 [ 2285.311943] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2285.317004] ? find_held_lock+0x36/0x1c0 [ 2285.321091] ? __lock_is_held+0xb5/0x140 [ 2285.325174] ? put_dec+0x3b/0xf0 [ 2285.328550] ? perf_trace_sched_process_exec+0x860/0x860 [ 2285.334009] ? zap_class+0x640/0x640 [ 2285.337762] __should_failslab+0x124/0x180 [ 2285.342007] should_failslab+0x9/0x14 [ 2285.345821] kmem_cache_alloc_node+0x26e/0x730 [ 2285.350414] ? find_held_lock+0x36/0x1c0 [ 2285.354495] __alloc_skb+0x119/0x770 [ 2285.358225] ? netdev_alloc_frag+0x1f0/0x1f0 [ 2285.362642] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2285.367580] ? kasan_check_read+0x11/0x20 [ 2285.371747] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2285.377036] ? rcu_softirq_qs+0x20/0x20 [ 2285.381031] ? netlink_has_listeners+0x2cb/0x4a0 [ 2285.385798] ? netlink_tap_init_net+0x3d0/0x3d0 [ 2285.390490] alloc_uevent_skb+0x84/0x1da [ 2285.394565] kobject_uevent_env+0xa52/0x101e [ 2285.398995] kobject_uevent+0x1f/0x24 [ 2285.402806] lo_ioctl+0x1385/0x1d60 [ 2285.406451] ? lo_rw_aio+0x1ef0/0x1ef0 [ 2285.410352] blkdev_ioctl+0x98e/0x21b0 [ 2285.414250] ? blkpg_ioctl+0xc10/0xc10 [ 2285.418144] ? lock_downgrade+0x900/0x900 [ 2285.422300] ? check_preemption_disabled+0x48/0x280 [ 2285.427327] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2285.432266] ? kasan_check_read+0x11/0x20 [ 2285.436421] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2285.441703] ? rcu_softirq_qs+0x20/0x20 [ 2285.445703] ? __fget+0x4d1/0x740 [ 2285.449177] ? ksys_dup3+0x680/0x680 [ 2285.452910] block_ioctl+0xee/0x130 [ 2285.456549] ? blkdev_fallocate+0x400/0x400 [ 2285.460883] do_vfs_ioctl+0x1de/0x1790 [ 2285.464787] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 2285.470340] ? ioctl_preallocate+0x300/0x300 [ 2285.474767] ? __fget_light+0x2e9/0x430 [ 2285.478756] ? fget_raw+0x20/0x20 [ 2285.482220] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2285.487249] ? kmem_cache_free+0x24f/0x290 [ 2285.491497] ? putname+0xf7/0x130 [ 2285.494976] ? do_syscall_64+0x9a/0x820 [ 2285.498973] ? do_syscall_64+0x9a/0x820 [ 2285.502959] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2285.507551] ? security_file_ioctl+0x94/0xc0 [ 2285.511984] ksys_ioctl+0xa9/0xd0 [ 2285.515452] __x64_sys_ioctl+0x73/0xb0 [ 2285.519360] do_syscall_64+0x1b9/0x820 [ 2285.523256] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2285.528636] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2285.533577] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2285.538440] ? trace_hardirqs_on_caller+0x310/0x310 [ 2285.543479] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2285.548520] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2285.553557] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2285.558419] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2285.563614] RIP: 0033:0x4574e7 00:25:34 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000140)={{{@in=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}}}, &(0x7f0000000000)=0xe8) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @remote}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = geteuid() ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x6a) ioprio_get$uid(0x3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r2, r0, 0x0, 0x462c) 00:25:34 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0x8000}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) [ 2285.566832] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2285.585751] RSP: 002b:00007f004a854a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2285.593508] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004574e7 [ 2285.600843] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2285.608123] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2285.615404] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2285.622689] R13: 0000000000000000 R14: 00000000004d9b98 R15: 0000000000000003 00:25:34 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0x5421, &(0x7f0000000200)) [ 2285.675747] FAT-fs (loop1): bogus number of reserved sectors [ 2285.706742] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2285.755283] FAT-fs (loop1): Can't find a valid FAT filesystem 00:25:34 executing program 1 (fault-call:0 fault-nth:22): syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:25:34 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:25:34 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0x8000}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) 00:25:34 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x3f000000) 00:25:34 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nfc_llcp(r0, &(0x7f00000003c0)={&(0x7f0000000140)={0x27, 0x0, 0x2, 0x5, 0x1, 0x2, "7b3b98e444d673769ab59b4644dcd01d558362b997d582660001a8aee41535bdef187a7f61a3221a62b52e1063ccfa417308bf9acea75039fe351475af095c", 0x8}, 0x60, &(0x7f00000000c0)=[{&(0x7f0000000000)="e1bdfa48c63690eec12e1db6715a0a0a8eadd9", 0x13}, {&(0x7f00000001c0)="08308c880dbb8506a53228d266dc2f7399ffdf50c472078e1fb7b6af874cf659f4c3a351ec96873ea40aa1285f795a070aa9250f3b0c4cda6a65e86cd303c9f928c837aab50efb0e1336e09095194f924a2aa05cf679cf91865533c251cd6947e08b5ef7269b8f94df4523402d588ca3657ba65043eb0037dabcbff0ba379e199e6ed6a7758905bd9979991923445d3a4e1fdada64c13715430eccaec9e9ab41c6bad4765c416cad217bff9251f9e261c096b9e66c06eea43759f61b23180d229c4b6ccf974fad906d60f780bddc39d2191f67ae405952c62381", 0xda}], 0x2, &(0x7f00000002c0)={0xf8, 0x105, 0x72, "e6beea303b6ffd45b3ff9d735a532be01060f70fc31471adb4dd73ceae028f543e71ef2bb58de2114a57322a336392bcdd025f8af1380a02e2553a82041932b9100faf5c019dcb42533bbaafb9a53d12af906c10c2e5cc4d4f4899dfd7925d92edf75d7b8c39edbd146e383e9fdae71702af7754574dd20ad3fe5cd88138f200e41c4747ddcfe474ecf8173bb810206b6522f84568a1c1298938fe7bb7cf81cfec9f35b9d619eea1a73bfbd702d999614e734e315f05c0d6c13b71b26f5a407bbfca6b189354de7322c50dc3102b297fb90cc6a533bba6164e8fe869ae19f3e8f49b"}, 0xf8, 0x40000}, 0x40) sendfile(r1, r0, 0x0, 0x462c) 00:25:34 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0x40049409, &(0x7f0000000200)) 00:25:34 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f75746500000000000000000300", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:25:34 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0x8000}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) [ 2285.875807] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2285.934717] FAULT_INJECTION: forcing a failure. [ 2285.934717] name failslab, interval 1, probability 0, space 0, times 0 [ 2285.976041] CPU: 0 PID: 10013 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2285.983455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2285.992841] Call Trace: [ 2285.995480] dump_stack+0x244/0x39d [ 2285.999163] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2286.004367] ? lo_ioctl+0xe6/0x1d60 [ 2286.008033] should_fail.cold.4+0xa/0x17 [ 2286.012141] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2286.017305] ? blkpg_ioctl+0xc10/0xc10 [ 2286.021225] ? lock_downgrade+0x900/0x900 [ 2286.025384] ? check_preemption_disabled+0x48/0x280 [ 2286.030415] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2286.035356] ? kasan_check_read+0x11/0x20 [ 2286.039520] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2286.044823] ? find_held_lock+0x36/0x1c0 [ 2286.048916] ? perf_trace_sched_process_exec+0x860/0x860 [ 2286.054380] ? block_ioctl+0xee/0x130 [ 2286.058199] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2286.063757] __should_failslab+0x124/0x180 [ 2286.068013] should_failslab+0x9/0x14 [ 2286.071825] kmem_cache_alloc+0x2be/0x730 [ 2286.075989] ? fget_raw+0x20/0x20 [ 2286.079479] getname_flags+0xd0/0x590 [ 2286.083295] do_mkdirat+0xc5/0x310 [ 2286.086850] ? __ia32_sys_mknod+0xb0/0xb0 [ 2286.091013] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2286.096393] ? trace_hardirqs_off_caller+0x310/0x310 [ 2286.101503] ? ksys_ioctl+0x81/0xd0 [ 2286.105665] __x64_sys_mkdir+0x5c/0x80 [ 2286.109563] do_syscall_64+0x1b9/0x820 [ 2286.113458] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2286.118834] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2286.123792] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2286.128653] ? trace_hardirqs_on_caller+0x310/0x310 [ 2286.133691] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2286.138762] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2286.143813] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2286.148671] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2286.153865] RIP: 0033:0x456a97 [ 2286.157066] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00:25:34 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f00000000c0)={&(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}) fremovexattr(r2, &(0x7f00000001c0)=@random={'os2.', 'md5sum]\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000140)={0x0}) ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f0000000180)={r3, 0x1}) sendfile(r1, r0, 0x0, 0x462c) 00:25:34 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0x5460, &(0x7f0000000200)) [ 2286.175987] RSP: 002b:00007f004a854a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2286.183709] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000456a97 [ 2286.191001] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 2286.198276] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2286.205546] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2286.212819] R13: 0000000000000000 R14: 00000000004d9b98 R15: 0000000000000003 00:25:34 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}], 0x8001, 0x6, 0xf, 0x1, 0x6}}}) 00:25:34 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f75746500000000007fffffff00", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030700000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000000000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000000000000892f0700636f6e6e6c6162656c0000000000000000000000000000000000000000000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000000000000007000000070000000a0000000434f4e4e5345434d41524bff6eef1d192516e43f9a305e46692c00000000000000000000000000000000000000000008"]}, 0x2a8) [ 2286.259106] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2286.374681] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:25:35 executing program 1 (fault-call:0 fault-nth:23): syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:25:35 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x462c) 00:25:35 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc0585609, &(0x7f0000000200)) 00:25:35 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f757465000000000100", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:25:35 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}], 0x0, 0x6, 0xf, 0x1, 0x6}}}) 00:25:35 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x17000000) 00:25:35 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f75746500008800", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:25:35 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}], 0x0, 0x0, 0xf, 0x1, 0x6}}}) [ 2286.531512] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:25:35 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0x4020940d, &(0x7f0000000200)) 00:25:35 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x10000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_S_AUDIO(r0, 0x40345622, &(0x7f0000000000)={0x100000, "09c8c545fac14b5b60edbc34d849ba347d45a4d3ddad9df34080209cd2f6cf29", 0x3, 0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x462c) 00:25:35 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0x5450, &(0x7f0000000200)) 00:25:35 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}], 0x0, 0x0, 0x0, 0x1, 0x6}}}) [ 2286.668123] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2286.679494] FAULT_INJECTION: forcing a failure. [ 2286.679494] name failslab, interval 1, probability 0, space 0, times 0 [ 2286.708786] CPU: 1 PID: 10061 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2286.716207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2286.716215] Call Trace: [ 2286.716243] dump_stack+0x244/0x39d [ 2286.716267] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2286.716283] ? lo_ioctl+0xe6/0x1d60 [ 2286.716314] should_fail.cold.4+0xa/0x17 [ 2286.716338] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2286.749915] ? blkpg_ioctl+0xc10/0xc10 [ 2286.753820] ? lock_downgrade+0x900/0x900 [ 2286.758013] ? check_preemption_disabled+0x48/0x280 [ 2286.763058] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2286.763075] ? kasan_check_read+0x11/0x20 [ 2286.763093] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2286.777495] ? find_held_lock+0x36/0x1c0 [ 2286.781594] ? perf_trace_sched_process_exec+0x860/0x860 [ 2286.787058] ? block_ioctl+0xee/0x130 [ 2286.790889] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2286.796447] __should_failslab+0x124/0x180 [ 2286.800703] should_failslab+0x9/0x14 [ 2286.804545] kmem_cache_alloc+0x2be/0x730 [ 2286.808712] ? fget_raw+0x20/0x20 [ 2286.808748] getname_flags+0xd0/0x590 [ 2286.808767] do_mkdirat+0xc5/0x310 [ 2286.819585] ? __ia32_sys_mknod+0xb0/0xb0 [ 2286.823754] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2286.829129] ? trace_hardirqs_off_caller+0x310/0x310 [ 2286.829145] ? ksys_ioctl+0x81/0xd0 [ 2286.829180] __x64_sys_mkdir+0x5c/0x80 [ 2286.841784] do_syscall_64+0x1b9/0x820 [ 2286.845688] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2286.851078] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2286.856040] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2286.860900] ? trace_hardirqs_on_caller+0x310/0x310 [ 2286.865930] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2286.870960] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2286.876010] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2286.880877] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2286.886116] RIP: 0033:0x456a97 [ 2286.889322] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2286.908275] RSP: 002b:00007f004a854a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2286.915990] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000456a97 [ 2286.923267] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 2286.930574] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2286.937863] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2286.945141] R13: 0000000000000000 R14: 00000000004d9b98 R15: 0000000000000003 00:25:35 executing program 1 (fault-call:0 fault-nth:24): syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:25:35 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}], 0x0, 0x0, 0x0, 0x0, 0x6}}}) 00:25:35 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x80ffff) 00:25:35 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f75746500000500", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:25:35 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x2}) 00:25:35 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000000000)=0x1, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x89, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_G_TUNER(r0, 0xc054561d, &(0x7f0000000140)={0xc000000000000000, "d10115fd2d6960be2653ae2304eaabbabd5ffe2f06d28c47497cca3638ad9a1a", 0x3, 0x4, 0x7f, 0x1, 0x1, 0x6, 0x80000000, 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x462c) 00:25:35 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f757465001100", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:25:35 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x462c) [ 2287.082055] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2287.120089] FAULT_INJECTION: forcing a failure. [ 2287.120089] name failslab, interval 1, probability 0, space 0, times 0 00:25:35 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) [ 2287.166687] CPU: 1 PID: 10083 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2287.174087] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2287.174094] Call Trace: [ 2287.174122] dump_stack+0x244/0x39d [ 2287.174149] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2287.174176] ? print_usage_bug+0xc0/0xc0 [ 2287.199151] should_fail.cold.4+0xa/0x17 [ 2287.199174] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2287.199193] ? walk_component+0x3fe/0x2590 [ 2287.199210] ? zap_class+0x640/0x640 [ 2287.199237] ? zap_class+0x640/0x640 [ 2287.199253] ? mark_held_locks+0x130/0x130 [ 2287.199274] ? path_parentat.isra.41+0x20/0x160 [ 2287.208434] ? find_held_lock+0x36/0x1c0 [ 2287.208456] ? __lock_is_held+0xb5/0x140 [ 2287.208494] ? perf_trace_sched_process_exec+0x860/0x860 [ 2287.208520] __should_failslab+0x124/0x180 [ 2287.216504] should_failslab+0x9/0x14 [ 2287.216521] kmem_cache_alloc+0x2be/0x730 [ 2287.216547] __d_alloc+0xc8/0xb90 [ 2287.216569] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 2287.263396] ? d_alloc_parallel+0x1f40/0x1f40 [ 2287.267905] ? d_lookup+0x255/0x300 [ 2287.271571] ? d_lookup+0x255/0x300 [ 2287.275212] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2287.279813] ? lookup_dcache+0x22/0x140 [ 2287.283807] ? trace_hardirqs_off_caller+0x310/0x310 [ 2287.288941] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2287.293978] d_alloc+0x96/0x380 [ 2287.297268] ? __d_lookup+0x9e0/0x9e0 [ 2287.297286] ? __d_alloc+0xb90/0xb90 [ 2287.297315] __lookup_hash+0xd9/0x190 [ 2287.297349] filename_create+0x1e5/0x5b0 [ 2287.297381] ? kern_path_mountpoint+0x40/0x40 [ 2287.297418] ? fget_raw+0x20/0x20 [ 2287.305284] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2287.305303] ? getname_flags+0x26e/0x590 [ 2287.305324] do_mkdirat+0xda/0x310 [ 2287.305344] ? __ia32_sys_mknod+0xb0/0xb0 [ 2287.305364] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2287.343788] ? trace_hardirqs_off_caller+0x310/0x310 [ 2287.348907] ? ksys_ioctl+0x81/0xd0 [ 2287.352548] __x64_sys_mkdir+0x5c/0x80 [ 2287.356454] do_syscall_64+0x1b9/0x820 [ 2287.360379] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2287.365764] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2287.370710] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2287.375579] ? trace_hardirqs_on_caller+0x310/0x310 [ 2287.380640] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2287.385713] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2287.390765] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2287.395646] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2287.400861] RIP: 0033:0x456a97 00:25:36 executing program 2 (fault-call:2 fault-nth:0): r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) [ 2287.404082] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2287.422995] RSP: 002b:00007f004a854a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2287.430713] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000456a97 [ 2287.438004] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 2287.445282] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2287.452559] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2287.459839] R13: 0000000000000000 R14: 00000000004d9b98 R15: 0000000000000003 00:25:36 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x200000000000000}) [ 2287.510629] FAULT_INJECTION: forcing a failure. [ 2287.510629] name failslab, interval 1, probability 0, space 0, times 0 [ 2287.527824] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2287.543481] CPU: 1 PID: 10095 Comm: syz-executor2 Not tainted 4.20.0-rc6+ #371 [ 2287.550879] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2287.560238] Call Trace: [ 2287.560268] dump_stack+0x244/0x39d [ 2287.560294] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2287.560316] ? __lock_acquire+0x62f/0x4c20 [ 2287.560344] ? zap_class+0x640/0x640 [ 2287.579689] should_fail.cold.4+0xa/0x17 [ 2287.583775] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2287.583795] ? print_usage_bug+0xc0/0xc0 [ 2287.583839] ? find_held_lock+0x36/0x1c0 [ 2287.597073] ? perf_trace_sched_process_exec+0x860/0x860 [ 2287.597091] ? mark_held_locks+0x130/0x130 [ 2287.597110] ? __lock_acquire+0x62f/0x4c20 [ 2287.597130] __should_failslab+0x124/0x180 [ 2287.606809] should_failslab+0x9/0x14 [ 2287.606827] kmem_cache_alloc_node_trace+0x270/0x740 [ 2287.606842] ? zap_class+0x640/0x640 [ 2287.606869] __kmalloc_node+0x3c/0x70 [ 2287.606895] kvmalloc_node+0x65/0xf0 [ 2287.615353] video_usercopy+0x35c/0x1760 [ 2287.624237] ? v4l_s_fmt+0x990/0x990 [ 2287.624257] ? _parse_integer+0x180/0x180 [ 2287.624277] ? v4l_enumstd+0x70/0x70 [ 2287.624305] ? find_held_lock+0x36/0x1c0 [ 2287.655275] ? __fget+0x4aa/0x740 [ 2287.658755] ? lock_downgrade+0x900/0x900 [ 2287.662926] ? check_preemption_disabled+0x48/0x280 [ 2287.667963] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2287.672906] ? kasan_check_read+0x11/0x20 [ 2287.677068] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2287.682359] ? rcu_softirq_qs+0x20/0x20 [ 2287.686361] ? __fget+0x4d1/0x740 [ 2287.689832] ? ksys_dup3+0x680/0x680 [ 2287.693584] ? video_usercopy+0x1760/0x1760 [ 2287.697915] video_ioctl2+0x2c/0x33 [ 2287.701556] v4l2_ioctl+0x154/0x1b0 [ 2287.705197] ? video_devdata+0xa0/0xa0 [ 2287.709098] do_vfs_ioctl+0x1de/0x1790 [ 2287.713006] ? __lock_is_held+0xb5/0x140 [ 2287.717087] ? ioctl_preallocate+0x300/0x300 [ 2287.721530] ? __fget_light+0x2e9/0x430 [ 2287.725521] ? fget_raw+0x20/0x20 [ 2287.728993] ? __sb_end_write+0xd9/0x110 [ 2287.733086] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2287.738654] ? fput+0x130/0x1a0 [ 2287.741947] ? do_syscall_64+0x9a/0x820 [ 2287.745942] ? do_syscall_64+0x9a/0x820 [ 2287.749930] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2287.754531] ? security_file_ioctl+0x94/0xc0 [ 2287.758958] ksys_ioctl+0xa9/0xd0 [ 2287.762428] __x64_sys_ioctl+0x73/0xb0 [ 2287.766337] do_syscall_64+0x1b9/0x820 [ 2287.770234] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2287.775649] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2287.780602] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2287.785497] ? trace_hardirqs_on_caller+0x310/0x310 [ 2287.790530] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2287.795584] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2287.800621] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2287.805490] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2287.810690] RIP: 0033:0x457679 [ 2287.813905] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2287.832817] RSP: 002b:00007f3c6611fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2287.840534] RAX: ffffffffffffffda RBX: 00007f3c6611fc90 RCX: 0000000000457679 [ 2287.847812] RDX: 0000000020000000 RSI: 00000000c100565c RDI: 0000000000000003 [ 2287.855091] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 00:25:36 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x1c00) 00:25:36 executing program 1 (fault-call:0 fault-nth:25): syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:25:36 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getpeername$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000200)=r3) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400009) sendfile(r1, r2, 0x0, 0x5) [ 2287.862370] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3c661206d4 [ 2287.869651] R13: 00000000004c1adc R14: 00000000004d36d0 R15: 0000000000000004 00:25:36 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x2000000}) 00:25:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f75746500000000000000000600", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030700000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000000000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000000000000892f0700636f6e6e6c6162656c0000000000000000000000000000000000000000000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000000000000007000000070000000a0000000434f4e4e5345434d41524bff6eef1d192516e43f9a305e46692c00000000000000000000000000000000000000000008"]}, 0x2a8) 00:25:36 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x100, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(r0, 0x400442c9, &(0x7f00000000c0)={0x5, @local}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) clock_adjtime(0x3, &(0x7f0000000200)={0x20, 0x6, 0x100000000, 0x9, 0x7, 0x800, 0x2, 0xff, 0x5d2, 0x1, 0x7, 0x3, 0x100000000, 0x5, 0x9, 0x1ff, 0x2, 0x2, 0x4, 0x1, 0xfff, 0x0, 0xffffffff, 0x7, 0x7, 0xec}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x1) sendfile(r2, r1, 0x0, 0x462c) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f00000001c0)={0x4, 0x8, 0xfa00, {r3, 0xffffffff}}, 0x10) [ 2287.975859] FAULT_INJECTION: forcing a failure. [ 2287.975859] name failslab, interval 1, probability 0, space 0, times 0 [ 2288.013088] CPU: 1 PID: 10107 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2288.020509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2288.029872] Call Trace: [ 2288.032480] dump_stack+0x244/0x39d [ 2288.036174] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2288.041390] ? print_usage_bug+0xc0/0xc0 [ 2288.045468] ? find_held_lock+0x36/0x1c0 [ 2288.049570] should_fail.cold.4+0xa/0x17 [ 2288.053650] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2288.058801] ? mark_held_locks+0x130/0x130 [ 2288.063053] ? zap_class+0x640/0x640 [ 2288.066786] ? print_usage_bug+0xc0/0xc0 [ 2288.070862] ? lock_unpin_lock+0x4a0/0x4a0 00:25:36 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RVERSION(r0, &(0x7f0000000000)={0x15, 0x65, 0xffff, 0x3, 0x8, '9P2000.L'}, 0x15) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x462c) [ 2288.075117] ? __lock_is_held+0xb5/0x140 [ 2288.079200] ? zap_class+0x640/0x640 [ 2288.082937] ? perf_trace_sched_process_exec+0x860/0x860 [ 2288.088418] ? check_preemption_disabled+0x48/0x280 [ 2288.093479] __should_failslab+0x124/0x180 [ 2288.097757] should_failslab+0x9/0x14 [ 2288.101590] kmem_cache_alloc+0x2be/0x730 [ 2288.106001] ? ratelimit_state_init+0xb0/0xb0 [ 2288.106021] ext4_alloc_inode+0xc7/0x880 [ 2288.106040] ? ratelimit_state_init+0xb0/0xb0 [ 2288.106067] ? __lock_acquire+0x62f/0x4c20 [ 2288.106086] ? perf_trace_sched_process_exec+0x860/0x860 [ 2288.106101] ? __lock_is_held+0xb5/0x140 [ 2288.106126] ? mark_held_locks+0x130/0x130 [ 2288.114671] ? zap_class+0x640/0x640 [ 2288.114692] ? __getblk_gfp+0x11b/0xd50 [ 2288.114713] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2288.114743] ? ratelimit_state_init+0xb0/0xb0 [ 2288.114765] alloc_inode+0x63/0x190 [ 2288.158607] new_inode_pseudo+0x71/0x1a0 [ 2288.162687] ? prune_icache_sb+0x1c0/0x1c0 [ 2288.166957] new_inode+0x1c/0x40 [ 2288.170338] __ext4_new_inode+0x4cd/0x65a0 00:25:36 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000000c0)) r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x7fff, 0x4200) shutdown(r0, 0x1) getsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f00000002c0)={0x8, 0xa3, 0x6, 0xfffffffffffffffc}) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000200)) connect$tipc(r0, &(0x7f00000001c0)=@name={0x1e, 0x2, 0x3, {{0x40}, 0x1}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00'}, 0x30) r2 = syz_open_procfs(r1, &(0x7f0000000000)="6e65742c7dfb446a43f4d341b04c2f697005007300") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r3, r2, 0x0, 0x462c) [ 2288.174637] ? ext4_free_inode+0x1a10/0x1a10 [ 2288.179066] ? find_held_lock+0x36/0x1c0 [ 2288.183155] ? is_bpf_text_address+0xac/0x170 [ 2288.187667] ? lock_downgrade+0x900/0x900 [ 2288.191829] ? check_preemption_disabled+0x48/0x280 [ 2288.196860] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2288.201801] ? kasan_check_read+0x11/0x20 [ 2288.205964] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2288.205981] ? rcu_softirq_qs+0x20/0x20 [ 2288.205996] ? rcu_softirq_qs+0x20/0x20 [ 2288.206011] ? unwind_dump+0x190/0x190 [ 2288.206037] ? is_bpf_text_address+0xd3/0x170 [ 2288.206056] ? kernel_text_address+0x79/0xf0 [ 2288.206073] ? __kernel_text_address+0xd/0x40 [ 2288.206092] ? unwind_get_return_address+0x61/0xa0 [ 2288.223184] ? __save_stack_trace+0x8d/0xf0 [ 2288.223218] ? save_stack+0xa9/0xd0 [ 2288.223236] ? save_stack+0x43/0xd0 [ 2288.223252] ? __kasan_slab_free+0x102/0x150 [ 2288.223268] ? kasan_slab_free+0xe/0x10 [ 2288.223283] ? kmem_cache_free+0x83/0x290 [ 2288.223302] ? print_usage_bug+0xc0/0xc0 [ 2288.270291] ? __x64_sys_mkdir+0x5c/0x80 00:25:36 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x462c) [ 2288.274367] ? do_syscall_64+0x1b9/0x820 [ 2288.278442] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2288.283836] ? trace_hardirqs_off+0xb8/0x310 [ 2288.288262] ? kasan_check_read+0x11/0x20 [ 2288.292426] ? do_raw_spin_unlock+0xa7/0x330 [ 2288.296851] ? trace_hardirqs_on+0x310/0x310 [ 2288.296870] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2288.296886] ? __dquot_initialize+0x629/0xdd0 [ 2288.296912] ? dquot_get_next_dqblk+0x180/0x180 [ 2288.296930] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 2288.296945] ? common_perm+0x1f6/0x7b0 [ 2288.296974] ext4_mkdir+0x2e1/0xe60 [ 2288.311429] ? ext4_init_dot_dotdot+0x510/0x510 [ 2288.311450] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2288.338756] ? security_inode_permission+0xd2/0x100 [ 2288.343798] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2288.349350] ? security_inode_mkdir+0xe8/0x120 [ 2288.353950] vfs_mkdir+0x42e/0x6b0 [ 2288.357525] do_mkdirat+0x27a/0x310 [ 2288.361172] ? __ia32_sys_mknod+0xb0/0xb0 [ 2288.365333] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2288.370749] ? trace_hardirqs_off_caller+0x310/0x310 00:25:37 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$KVM_GET_NESTED_STATE(r0, 0xc080aebe, &(0x7f0000000200)={0x0, 0x0, 0x2080}) write$9p(r0, &(0x7f00000000c0)="3a07f4d54c9eba00f80527cb2daac397f33203993b48b9b274bdc73d4e12129cad48fd948b713dd267c37d", 0x2b) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) fsetxattr$trusted_overlay_upper(r2, &(0x7f0000000000)='trusted.overlay.upper\x00', &(0x7f0000000140)={0x0, 0xfb, 0x87, 0x4, 0x1f, "7d5babee6fb714162912092fdd3c2667", "a177184b2b9dfaa0a5d29c571c9f01fb3374fb1295163bece0cbe519209b1235745fa42c70bcf0a09a5e3e6185a8523580eb37b4b91ccc65f69368b70ebb5a71e785ef611605debc88c7aec750866bf7b6f64efd7a4d9e1d0b7e2c86751f55384cc8c75e4a5584c723179e71c166d8f45821"}, 0x87, 0x0) write$P9_RATTACH(r1, &(0x7f0000002340)={0x14, 0x69, 0x1, {0x88, 0x0, 0x2}}, 0x14) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000022c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000002280)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000002300)={0x4, 0x8, 0xfa00, {r4, 0x7fffffff}}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r0) sendfile(r1, r0, 0x0, 0x462c) [ 2288.375866] ? ksys_ioctl+0x81/0xd0 [ 2288.379515] __x64_sys_mkdir+0x5c/0x80 [ 2288.383425] do_syscall_64+0x1b9/0x820 [ 2288.387341] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2288.392733] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2288.392751] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2288.392770] ? trace_hardirqs_on_caller+0x310/0x310 [ 2288.392788] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2288.392806] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2288.392827] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2288.412754] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2288.412767] RIP: 0033:0x456a97 [ 2288.412785] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2288.412794] RSP: 002b:00007f004a854a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2288.412810] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000456a97 [ 2288.412820] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 00:25:37 executing program 2 (fault-call:2 fault-nth:1): r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:25:37 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f00000004c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020}, 0xc, &(0x7f0000000480)={&(0x7f0000000140)={0x314, r3, 0x10, 0x70bd29, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x9c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4f4d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1e90}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_LINK={0x74, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3302}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x40f3}]}, @TIPC_NLA_SOCK={0x34, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1bedd2e1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x200}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_NET={0x68, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffffffa}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x101}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x772}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4c}]}, @TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xee6}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x80000001}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_BEARER={0xec, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast2}}, {0x14, 0x2, @in={0x2, 0x4e23, @multicast2}}}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @rand_addr=0x6}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x664bc96, @mcast1, 0x8f53}}}}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffffff52}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xea}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7fff}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8673}]}]}, 0x314}, 0x1, 0x0, 0x0, 0x4}, 0x4004) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x462c) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x4, 0x478, 0x0, 0x148, 0x258, 0x148, 0x0, 0x3a8, 0x3a8, 0x3a8, 0x3a8, 0x3a8, 0x4, &(0x7f0000000500), {[{{@ipv6={@loopback, @local, [0xffffff00, 0x0, 0xffffff00], [0xff000000, 0xff, 0x0, 0xffffff00], 'ip6gre0\x00', 'bpq0\x00', {0xff}, {0xff}, 0x0, 0x1, 0x2, 0x20}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@eui64={0x28, 'eui64\x00'}, @common=@srh={0x30, 'srh\x00', 0x0, {0x3c, 0xaa1, 0x100000000, 0x100000000, 0x100, 0x400}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x325, 0x80}}}, {{@ipv6={@mcast1, @loopback, [0xff000000, 0x0, 0xff000000], [0x0, 0xffffff00, 0xffffffff, 0xffffffff], 'dummy0\x00', 'erspan0\x00', {0xff}, {}, 0x77, 0x401, 0x3, 0x4}, 0x0, 0xc8, 0x110}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@loopback, 'ipddp0\x00'}}}, {{@uncond, 0x0, 0x128, 0x150, 0x0, {}, [@common=@unspec=@connmark={0x30, 'connmark\x00', 0x1, {0xcd2, 0xa9, 0x1}}, @common=@srh={0x30, 'srh\x00', 0x0, {0x33, 0x4, 0x4, 0x8, 0x1, 0x800, 0x40}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4d8) [ 2288.412829] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2288.412843] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2288.486801] R13: 0000000000000000 R14: 00000000004d9b98 R15: 0000000000000003 [ 2288.520734] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:25:37 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x0, {0x2}}) 00:25:37 executing program 1 (fault-call:0 fault-nth:26): syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:25:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f757465000000001100", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:25:37 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x600) 00:25:37 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:25:37 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x0, {0x200000000000000}}) 00:25:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f75746500001100", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:25:37 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x0, {0x2000000}}) [ 2288.799107] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2288.825355] FAULT_INJECTION: forcing a failure. [ 2288.825355] name failslab, interval 1, probability 0, space 0, times 0 00:25:37 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0x40049409, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) [ 2288.917249] CPU: 1 PID: 10148 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2288.924766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2288.926751] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2288.934130] Call Trace: [ 2288.934158] dump_stack+0x244/0x39d [ 2288.934185] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2288.934207] ? print_usage_bug+0xc0/0xc0 [ 2288.934230] ? find_held_lock+0x36/0x1c0 [ 2288.944963] should_fail.cold.4+0xa/0x17 00:25:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f75746500000000000000000500", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 2288.944985] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2288.945000] ? __lock_acquire+0x62f/0x4c20 [ 2288.945022] ? add_to_page_cache_lru+0xdb0/0xdb0 [ 2288.961954] ? mark_held_locks+0x130/0x130 [ 2288.984327] ? zap_class+0x640/0x640 [ 2288.984343] ? zap_class+0x640/0x640 [ 2288.984364] ? print_usage_bug+0xc0/0xc0 [ 2288.984384] ? lock_unpin_lock+0x4a0/0x4a0 [ 2289.000089] ? __lock_is_held+0xb5/0x140 [ 2289.000171] ? __dwc3_gadget_kick_transfer+0xc38/0x12d0 [ 2289.000202] ? perf_trace_sched_process_exec+0x860/0x860 [ 2289.009638] ? __find_get_block+0xba8/0xf20 [ 2289.019401] ? __find_get_block+0xba8/0xf20 [ 2289.023767] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2289.028366] __should_failslab+0x124/0x180 [ 2289.032641] should_failslab+0x9/0x14 [ 2289.036460] kmem_cache_alloc+0x2be/0x730 [ 2289.040640] ? ratelimit_state_init+0xb0/0xb0 [ 2289.045156] ext4_alloc_inode+0xc7/0x880 [ 2289.049236] ? ratelimit_state_init+0xb0/0xb0 [ 2289.053764] ? __lock_acquire+0x62f/0x4c20 [ 2289.058023] ? perf_trace_sched_process_exec+0x860/0x860 [ 2289.063499] ? __lock_is_held+0xb5/0x140 [ 2289.067585] ? mark_held_locks+0x130/0x130 [ 2289.071834] ? zap_class+0x640/0x640 [ 2289.075566] ? __getblk_gfp+0x11b/0xd50 [ 2289.079560] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2289.085113] ? ratelimit_state_init+0xb0/0xb0 [ 2289.089626] alloc_inode+0x63/0x190 [ 2289.093271] new_inode_pseudo+0x71/0x1a0 [ 2289.097341] ? prune_icache_sb+0x1c0/0x1c0 [ 2289.101599] new_inode+0x1c/0x40 [ 2289.104980] __ext4_new_inode+0x4cd/0x65a0 [ 2289.109252] ? ext4_free_inode+0x1a10/0x1a10 [ 2289.113673] ? find_held_lock+0x36/0x1c0 [ 2289.117810] ? is_bpf_text_address+0xac/0x170 [ 2289.122321] ? lock_downgrade+0x900/0x900 [ 2289.126501] ? check_preemption_disabled+0x48/0x280 [ 2289.131537] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2289.136478] ? kasan_check_read+0x11/0x20 [ 2289.140651] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2289.145947] ? rcu_softirq_qs+0x20/0x20 [ 2289.149934] ? rcu_softirq_qs+0x20/0x20 [ 2289.153919] ? unwind_dump+0x190/0x190 [ 2289.157851] ? is_bpf_text_address+0xd3/0x170 [ 2289.162365] ? kernel_text_address+0x79/0xf0 [ 2289.166793] ? __kernel_text_address+0xd/0x40 [ 2289.171300] ? unwind_get_return_address+0x61/0xa0 [ 2289.176248] ? __save_stack_trace+0x8d/0xf0 [ 2289.180610] ? save_stack+0xa9/0xd0 [ 2289.184303] ? save_stack+0x43/0xd0 [ 2289.187944] ? __kasan_slab_free+0x102/0x150 [ 2289.192363] ? kasan_slab_free+0xe/0x10 [ 2289.196350] ? kmem_cache_free+0x83/0x290 [ 2289.200518] ? print_usage_bug+0xc0/0xc0 [ 2289.204630] ? __x64_sys_mkdir+0x5c/0x80 [ 2289.208719] ? do_syscall_64+0x1b9/0x820 [ 2289.212810] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2289.218190] ? trace_hardirqs_off+0xb8/0x310 [ 2289.222612] ? kasan_check_read+0x11/0x20 [ 2289.226809] ? do_raw_spin_unlock+0xa7/0x330 [ 2289.231234] ? trace_hardirqs_on+0x310/0x310 [ 2289.235668] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2289.241240] ? __dquot_initialize+0x629/0xdd0 [ 2289.245769] ? dquot_get_next_dqblk+0x180/0x180 [ 2289.250474] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 2289.255450] ? common_perm+0x1f6/0x7b0 [ 2289.259404] ext4_mkdir+0x2e1/0xe60 [ 2289.263074] ? ext4_init_dot_dotdot+0x510/0x510 [ 2289.267798] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2289.273348] ? security_inode_permission+0xd2/0x100 [ 2289.278379] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2289.283983] ? security_inode_mkdir+0xe8/0x120 [ 2289.288585] vfs_mkdir+0x42e/0x6b0 [ 2289.292150] do_mkdirat+0x27a/0x310 [ 2289.295794] ? __ia32_sys_mknod+0xb0/0xb0 [ 2289.299956] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2289.305424] ? trace_hardirqs_off_caller+0x310/0x310 [ 2289.310538] ? ksys_ioctl+0x81/0xd0 [ 2289.314182] __x64_sys_mkdir+0x5c/0x80 [ 2289.318107] do_syscall_64+0x1b9/0x820 [ 2289.322006] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2289.327391] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2289.332337] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2289.337193] ? trace_hardirqs_on_caller+0x310/0x310 [ 2289.342221] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2289.347277] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2289.352322] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2289.357185] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2289.362399] RIP: 0033:0x456a97 [ 2289.365620] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2289.384531] RSP: 002b:00007f004a854a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2289.392246] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000456a97 [ 2289.399522] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 2289.406797] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 00:25:38 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x18) [ 2289.414080] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2289.421366] R13: 0000000000000000 R14: 00000000004d9b98 R15: 0000000000000003 00:25:39 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0x5450, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:25:39 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x0, {0x0, 0x2000000}}) 00:25:39 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0xc0000) 00:25:39 executing program 1 (fault-call:0 fault-nth:27): syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:25:39 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x462c) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x1) [ 2290.428970] FAULT_INJECTION: forcing a failure. [ 2290.428970] name failslab, interval 1, probability 0, space 0, times 0 [ 2290.440409] CPU: 1 PID: 10174 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2290.447787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2290.457148] Call Trace: [ 2290.459762] dump_stack+0x244/0x39d [ 2290.463426] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2290.468647] should_fail.cold.4+0xa/0x17 [ 2290.472738] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2290.477864] ? mark_held_locks+0x130/0x130 [ 2290.482120] ? find_held_lock+0x36/0x1c0 [ 2290.486207] ? is_bpf_text_address+0xac/0x170 [ 2290.490714] ? lock_downgrade+0x900/0x900 [ 2290.494882] ? check_preemption_disabled+0x48/0x280 [ 2290.499938] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2290.504885] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2290.510189] ? rcu_softirq_qs+0x20/0x20 [ 2290.514168] ? rcu_softirq_qs+0x20/0x20 [ 2290.518166] ? unwind_dump+0x190/0x190 [ 2290.522066] ? zap_class+0x640/0x640 [ 2290.525790] __should_failslab+0x124/0x180 [ 2290.530038] should_failslab+0x9/0x14 [ 2290.533844] kmem_cache_alloc+0x47/0x730 [ 2290.537925] ? __es_tree_search.isra.12+0x1ba/0x220 [ 2290.542942] ? find_held_lock+0x36/0x1c0 [ 2290.547013] __es_insert_extent+0x30c/0x1120 [ 2290.551433] ? ext4_es_free_extent+0x790/0x790 [ 2290.556022] ? kasan_check_read+0x11/0x20 [ 2290.560175] ? do_raw_write_lock+0x14f/0x310 [ 2290.564591] ? do_raw_read_unlock+0x70/0x70 [ 2290.568918] ? __lock_is_held+0xb5/0x140 [ 2290.572997] ext4_es_insert_extent+0x357/0xbd0 [ 2290.577639] ? ext4_es_scan_clu+0x50/0x50 [ 2290.581800] ? __lock_is_held+0xb5/0x140 [ 2290.585898] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2290.590942] ext4_ext_put_gap_in_cache+0x15f/0x1f0 [ 2290.595877] ? ext4_rereserve_cluster+0x240/0x240 [ 2290.600736] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2290.606302] ext4_ext_map_blocks+0x1da1/0x48f0 [ 2290.610889] ? kasan_check_write+0x14/0x20 [ 2290.615142] ? ext4_ext_release+0x10/0x10 [ 2290.619317] ? zap_class+0x640/0x640 [ 2290.623039] ? zap_class+0x640/0x640 [ 2290.626766] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2290.632347] ? check_preemption_disabled+0x48/0x280 [ 2290.637388] ? lock_acquire+0x1ed/0x520 [ 2290.641364] ? ext4_map_blocks+0x487/0x1b50 [ 2290.645710] ? lock_release+0xa00/0xa00 [ 2290.649695] ? perf_trace_sched_process_exec+0x860/0x860 [ 2290.655154] ? ext4_es_cache_extent+0x6a0/0x6a0 [ 2290.659831] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2290.664765] ? kasan_check_read+0x11/0x20 [ 2290.668916] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2290.674209] ? down_read+0x8d/0x120 [ 2290.677841] ? ext4_map_blocks+0x487/0x1b50 [ 2290.682166] ? __down_interruptible+0x700/0x700 [ 2290.686846] ? kernel_text_address+0x79/0xf0 [ 2290.691295] ext4_map_blocks+0xe2d/0x1b50 [ 2290.695463] ? __save_stack_trace+0x8d/0xf0 [ 2290.699811] ? ext4_issue_zeroout+0x190/0x190 [ 2290.704324] ? save_stack+0x43/0xd0 [ 2290.707955] ? __kasan_slab_free+0x102/0x150 [ 2290.712386] ? kasan_slab_free+0xe/0x10 [ 2290.716368] ? kmem_cache_free+0x83/0x290 [ 2290.720528] ext4_getblk+0x10e/0x630 [ 2290.724251] ? ext4_iomap_begin+0x1390/0x1390 [ 2290.728761] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2290.734316] ? __dquot_initialize+0x629/0xdd0 [ 2290.738835] ext4_bread+0x95/0x2b0 [ 2290.742381] ? ext4_getblk+0x630/0x630 [ 2290.746299] ? dquot_get_next_dqblk+0x180/0x180 [ 2290.750997] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 2290.755936] ? common_perm+0x1f6/0x7b0 [ 2290.759838] ext4_append+0x14e/0x370 [ 2290.763562] ext4_mkdir+0x532/0xe60 [ 2290.767230] ? ext4_init_dot_dotdot+0x510/0x510 [ 2290.771912] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2290.777457] ? security_inode_permission+0xd2/0x100 [ 2290.782490] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2290.788030] ? security_inode_mkdir+0xe8/0x120 [ 2290.792623] vfs_mkdir+0x42e/0x6b0 [ 2290.796192] do_mkdirat+0x27a/0x310 [ 2290.799828] ? __ia32_sys_mknod+0xb0/0xb0 [ 2290.803982] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2290.809352] ? trace_hardirqs_off_caller+0x310/0x310 [ 2290.814461] ? ksys_ioctl+0x81/0xd0 [ 2290.818101] __x64_sys_mkdir+0x5c/0x80 [ 2290.821999] do_syscall_64+0x1b9/0x820 [ 2290.825890] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2290.831263] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2290.836214] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2290.841067] ? trace_hardirqs_on_caller+0x310/0x310 [ 2290.846089] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2290.851117] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2290.856143] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2290.860997] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2290.866194] RIP: 0033:0x456a97 [ 2290.869393] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2290.888301] RSP: 002b:00007f004a854a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2290.896015] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000456a97 [ 2290.903292] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 2290.910561] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2290.917830] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2290.925100] R13: 0000000000000000 R14: 00000000004d9b98 R15: 0000000000000003 [ 2290.963138] FAT-fs (loop1): bogus number of reserved sectors 00:25:39 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x0, {0x0, 0x2}}) [ 2291.008965] FAT-fs (loop1): Can't find a valid FAT filesystem 00:25:39 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc0285629, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:25:39 executing program 1 (fault-call:0 fault-nth:28): syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:25:39 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x0, {0x0, 0x200000000000000}}) 00:25:39 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc1005667, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) [ 2291.278499] FAULT_INJECTION: forcing a failure. [ 2291.278499] name failslab, interval 1, probability 0, space 0, times 0 [ 2291.353129] CPU: 1 PID: 10188 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2291.360537] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2291.369928] Call Trace: [ 2291.372535] dump_stack+0x244/0x39d [ 2291.376183] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2291.381388] ? rcu_softirq_qs+0x20/0x20 [ 2291.385386] should_fail.cold.4+0xa/0x17 [ 2291.389472] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2291.394594] ? kernel_text_address+0x79/0xf0 [ 2291.399014] ? __kernel_text_address+0xd/0x40 [ 2291.400150] IPVS: ftp: loaded support on port[0] = 21 [ 2291.403529] ? __save_stack_trace+0x8d/0xf0 [ 2291.403548] ? zap_class+0x640/0x640 [ 2291.403574] ? save_stack+0xa9/0xd0 [ 2291.420458] ? __lock_is_held+0xb5/0x140 [ 2291.424539] ? print_usage_bug+0xc0/0xc0 [ 2291.428636] ? trace_hardirqs_off+0xb8/0x310 [ 2291.433060] ? trace_hardirqs_on+0x310/0x310 [ 2291.437501] ? perf_trace_sched_process_exec+0x860/0x860 [ 2291.442970] ? __lock_acquire+0x62f/0x4c20 [ 2291.447229] __should_failslab+0x124/0x180 [ 2291.451543] should_failslab+0x9/0x14 [ 2291.455401] __kmalloc+0x2e0/0x760 [ 2291.459001] ? ext4_find_extent+0x757/0x9b0 [ 2291.463357] ext4_find_extent+0x757/0x9b0 [ 2291.467594] ext4_ext_map_blocks+0x291/0x48f0 [ 2291.472113] ? kasan_check_write+0x14/0x20 [ 2291.476371] ? ext4_ext_release+0x10/0x10 [ 2291.480578] ? zap_class+0x640/0x640 [ 2291.484318] ? zap_class+0x640/0x640 [ 2291.488045] ? zap_class+0x640/0x640 [ 2291.491803] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2291.497380] ? check_preemption_disabled+0x48/0x280 [ 2291.502457] ? lock_acquire+0x1ed/0x520 [ 2291.506443] ? ext4_map_blocks+0x88f/0x1b50 [ 2291.510814] ? lock_release+0xa00/0xa00 [ 2291.514817] ? perf_trace_sched_process_exec+0x860/0x860 [ 2291.520307] ? ext4_es_cache_extent+0x6a0/0x6a0 [ 2291.524990] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2291.529931] ? kasan_check_read+0x11/0x20 [ 2291.534088] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2291.539387] ? down_write+0x8a/0x130 [ 2291.543110] ? ext4_map_blocks+0x88f/0x1b50 [ 2291.547446] ? down_read+0x120/0x120 [ 2291.551176] ? kernel_text_address+0x79/0xf0 [ 2291.555607] ext4_map_blocks+0x8f7/0x1b50 [ 2291.559776] ? __save_stack_trace+0x8d/0xf0 [ 2291.564120] ? ext4_issue_zeroout+0x190/0x190 [ 2291.568638] ? save_stack+0x43/0xd0 [ 2291.572282] ? __kasan_slab_free+0x102/0x150 [ 2291.576704] ? kasan_slab_free+0xe/0x10 [ 2291.580693] ? kmem_cache_free+0x83/0x290 [ 2291.584869] ext4_getblk+0x10e/0x630 [ 2291.588609] ? ext4_iomap_begin+0x1390/0x1390 [ 2291.593122] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2291.598670] ? __dquot_initialize+0x629/0xdd0 [ 2291.603184] ext4_bread+0x95/0x2b0 [ 2291.606748] ? ext4_getblk+0x630/0x630 [ 2291.610643] ? dquot_get_next_dqblk+0x180/0x180 [ 2291.615330] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 2291.620272] ? common_perm+0x1f6/0x7b0 [ 2291.624182] ext4_append+0x14e/0x370 [ 2291.627915] ext4_mkdir+0x532/0xe60 [ 2291.631596] ? ext4_init_dot_dotdot+0x510/0x510 [ 2291.636282] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2291.641842] ? security_inode_permission+0xd2/0x100 [ 2291.646888] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2291.652458] ? security_inode_mkdir+0xe8/0x120 [ 2291.657065] vfs_mkdir+0x42e/0x6b0 [ 2291.660628] do_mkdirat+0x27a/0x310 [ 2291.664273] ? __ia32_sys_mknod+0xb0/0xb0 [ 2291.668433] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2291.673826] ? trace_hardirqs_off_caller+0x310/0x310 [ 2291.678970] ? ksys_ioctl+0x81/0xd0 [ 2291.682612] __x64_sys_mkdir+0x5c/0x80 [ 2291.686522] do_syscall_64+0x1b9/0x820 [ 2291.690425] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2291.695818] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2291.700765] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2291.705624] ? trace_hardirqs_on_caller+0x310/0x310 [ 2291.710654] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2291.715686] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2291.720780] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2291.725650] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2291.730906] RIP: 0033:0x456a97 [ 2291.734112] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2291.753022] RSP: 002b:00007f004a854a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2291.760750] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000456a97 [ 2291.768035] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 2291.775314] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2291.782601] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2291.789875] R13: 0000000000000000 R14: 00000000004d9b98 R15: 0000000000000003 00:25:40 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:25:40 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x0, {0x0, 0x0, 0x2000000}}) 00:25:40 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc0045878, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:25:40 executing program 1 (fault-call:0 fault-nth:29): syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:25:40 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0xf00) [ 2292.151187] FAULT_INJECTION: forcing a failure. [ 2292.151187] name failslab, interval 1, probability 0, space 0, times 0 00:25:40 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc058565d, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) [ 2292.213430] CPU: 1 PID: 10204 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2292.220880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2292.230250] Call Trace: [ 2292.232861] dump_stack+0x244/0x39d [ 2292.237028] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2292.242239] ? rcu_softirq_qs+0x20/0x20 [ 2292.246235] should_fail.cold.4+0xa/0x17 [ 2292.250318] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2292.255435] ? kernel_text_address+0x79/0xf0 [ 2292.259859] ? __kernel_text_address+0xd/0x40 [ 2292.264373] ? __save_stack_trace+0x8d/0xf0 [ 2292.268710] ? zap_class+0x640/0x640 [ 2292.272464] ? save_stack+0xa9/0xd0 [ 2292.276207] ? __lock_is_held+0xb5/0x140 [ 2292.280287] ? print_usage_bug+0xc0/0xc0 [ 2292.284364] ? trace_hardirqs_off+0xb8/0x310 [ 2292.288786] ? trace_hardirqs_on+0x310/0x310 [ 2292.293208] ? perf_trace_sched_process_exec+0x860/0x860 [ 2292.298678] ? __lock_acquire+0x62f/0x4c20 [ 2292.302936] __should_failslab+0x124/0x180 [ 2292.307190] should_failslab+0x9/0x14 [ 2292.311003] __kmalloc+0x2e0/0x760 [ 2292.314561] ? ext4_find_extent+0x757/0x9b0 [ 2292.318908] ext4_find_extent+0x757/0x9b0 [ 2292.323086] ext4_ext_map_blocks+0x291/0x48f0 [ 2292.327597] ? kasan_check_write+0x14/0x20 [ 2292.331864] ? ext4_ext_release+0x10/0x10 [ 2292.336035] ? zap_class+0x640/0x640 [ 2292.339774] ? zap_class+0x640/0x640 [ 2292.343505] ? zap_class+0x640/0x640 [ 2292.347230] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2292.352802] ? check_preemption_disabled+0x48/0x280 [ 2292.357876] ? lock_acquire+0x1ed/0x520 [ 2292.361883] ? ext4_map_blocks+0x88f/0x1b50 [ 2292.366220] ? lock_release+0xa00/0xa00 [ 2292.370215] ? perf_trace_sched_process_exec+0x860/0x860 [ 2292.375686] ? ext4_es_cache_extent+0x6a0/0x6a0 [ 2292.380369] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2292.385313] ? kasan_check_read+0x11/0x20 [ 2292.389479] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2292.394806] ? down_write+0x8a/0x130 [ 2292.398533] ? ext4_map_blocks+0x88f/0x1b50 [ 2292.402873] ? down_read+0x120/0x120 [ 2292.406601] ? kernel_text_address+0x79/0xf0 [ 2292.411026] ext4_map_blocks+0x8f7/0x1b50 [ 2292.415312] ? __save_stack_trace+0x8d/0xf0 [ 2292.419664] ? ext4_issue_zeroout+0x190/0x190 [ 2292.424184] ? save_stack+0x43/0xd0 [ 2292.427823] ? __kasan_slab_free+0x102/0x150 [ 2292.432241] ? kasan_slab_free+0xe/0x10 [ 2292.436227] ? kmem_cache_free+0x83/0x290 [ 2292.440395] ext4_getblk+0x10e/0x630 [ 2292.444126] ? ext4_iomap_begin+0x1390/0x1390 [ 2292.448633] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2292.454207] ? __dquot_initialize+0x629/0xdd0 [ 2292.458743] ext4_bread+0x95/0x2b0 [ 2292.462308] ? ext4_getblk+0x630/0x630 [ 2292.466209] ? dquot_get_next_dqblk+0x180/0x180 [ 2292.470891] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 2292.475831] ? common_perm+0x1f6/0x7b0 [ 2292.479747] ext4_append+0x14e/0x370 [ 2292.483502] ext4_mkdir+0x532/0xe60 [ 2292.487170] ? ext4_init_dot_dotdot+0x510/0x510 [ 2292.491856] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2292.497411] ? security_inode_permission+0xd2/0x100 [ 2292.502447] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2292.508001] ? security_inode_mkdir+0xe8/0x120 [ 2292.512656] vfs_mkdir+0x42e/0x6b0 [ 2292.516213] do_mkdirat+0x27a/0x310 [ 2292.519856] ? __ia32_sys_mknod+0xb0/0xb0 [ 2292.524020] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2292.529403] ? trace_hardirqs_off_caller+0x310/0x310 [ 2292.534533] ? ksys_ioctl+0x81/0xd0 [ 2292.538179] __x64_sys_mkdir+0x5c/0x80 [ 2292.542113] do_syscall_64+0x1b9/0x820 [ 2292.546014] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2292.551407] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2292.551423] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2292.551446] ? trace_hardirqs_on_caller+0x310/0x310 [ 2292.561247] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2292.561279] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2292.561299] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2292.581192] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2292.586391] RIP: 0033:0x456a97 [ 2292.589595] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2292.608520] RSP: 002b:00007f004a854a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2292.616251] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000456a97 [ 2292.623553] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 2292.630849] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2292.638128] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2292.645408] R13: 0000000000000000 R14: 00000000004d9b98 R15: 0000000000000003 [ 2292.678097] IPVS: ftp: loaded support on port[0] = 21 [ 2294.806395] device bridge_slave_1 left promiscuous mode [ 2294.811979] bridge0: port 2(bridge_slave_1) entered disabled state [ 2294.886933] device bridge_slave_0 left promiscuous mode [ 2294.892522] bridge0: port 1(bridge_slave_0) entered disabled state [ 2299.042061] team0 (unregistering): Port device team_slave_1 removed [ 2299.057349] team0 (unregistering): Port device team_slave_0 removed [ 2299.070483] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2299.132162] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2299.254333] bond0 (unregistering): Released all slaves [ 2300.177763] bridge0: port 1(bridge_slave_0) entered blocking state [ 2300.184249] bridge0: port 1(bridge_slave_0) entered disabled state [ 2300.206971] device bridge_slave_0 entered promiscuous mode [ 2300.306020] bridge0: port 2(bridge_slave_1) entered blocking state [ 2300.312537] bridge0: port 2(bridge_slave_1) entered disabled state [ 2300.326818] device bridge_slave_1 entered promiscuous mode [ 2300.350888] bridge0: port 1(bridge_slave_0) entered blocking state [ 2300.365817] bridge0: port 1(bridge_slave_0) entered disabled state [ 2300.373265] device bridge_slave_0 entered promiscuous mode [ 2300.436132] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2300.482992] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2300.509925] bridge0: port 2(bridge_slave_1) entered blocking state [ 2300.516570] bridge0: port 2(bridge_slave_1) entered disabled state [ 2300.524056] device bridge_slave_1 entered promiscuous mode [ 2300.667726] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2300.675986] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2300.737076] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2300.746955] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2301.099208] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2301.119467] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2301.137221] team0: Port device team_slave_0 added [ 2301.216094] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2301.257419] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2301.264987] team0: Port device team_slave_1 added [ 2301.398070] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2301.454617] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2301.463138] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2301.516137] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2301.523023] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2301.538356] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2301.624332] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2301.636695] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2301.656465] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2301.705169] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2301.736398] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2301.753289] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2301.841120] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2301.848810] team0: Port device team_slave_0 added [ 2301.985406] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2302.006603] team0: Port device team_slave_1 added [ 2302.075757] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2302.207179] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2302.283440] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2302.290876] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2302.303003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2302.381846] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2302.389367] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2302.406458] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2302.748368] bridge0: port 2(bridge_slave_1) entered blocking state [ 2302.754921] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2302.761711] bridge0: port 1(bridge_slave_0) entered blocking state [ 2302.768150] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2302.777757] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2302.836586] device bridge_slave_1 left promiscuous mode [ 2302.842149] bridge0: port 2(bridge_slave_1) entered disabled state [ 2302.917023] device bridge_slave_0 left promiscuous mode [ 2302.922541] bridge0: port 1(bridge_slave_0) entered disabled state [ 2303.008792] team0 (unregistering): Port device team_slave_1 removed [ 2303.021703] team0 (unregistering): Port device team_slave_0 removed [ 2303.038369] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2303.082962] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2303.202480] bond0 (unregistering): Released all slaves [ 2303.485985] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2303.746095] bridge0: port 2(bridge_slave_1) entered blocking state [ 2303.752543] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2303.759274] bridge0: port 1(bridge_slave_0) entered blocking state [ 2303.765699] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2303.799889] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2304.525734] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2307.010378] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2307.278671] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2307.589166] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2307.614976] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2307.621753] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2307.638137] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2307.857484] 8021q: adding VLAN 0 to HW filter on device team0 [ 2307.927791] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2308.196461] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2308.202659] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2308.217172] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2308.411795] 8021q: adding VLAN 0 to HW filter on device team0 00:25:58 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rpc\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x462c) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000000c0)={'team0\x00'}) ioctl$SIOCGETNODEID(r0, 0x89e1, &(0x7f0000000000)={0x4}) 00:25:58 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x0, {0x0, 0x0, 0x2}}) 00:25:58 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc0189436, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:25:58 executing program 1 (fault-call:0 fault-nth:30): syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:25:58 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x1900) [ 2309.713297] FAULT_INJECTION: forcing a failure. [ 2309.713297] name failslab, interval 1, probability 0, space 0, times 0 [ 2309.724809] CPU: 1 PID: 10719 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2309.732210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2309.741565] Call Trace: [ 2309.744199] dump_stack+0x244/0x39d [ 2309.747846] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2309.753068] should_fail.cold.4+0xa/0x17 [ 2309.757137] ? kasan_slab_free+0xe/0x10 [ 2309.761121] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2309.766234] ? ext4_mkdir+0x532/0xe60 [ 2309.770052] ? mark_held_locks+0x130/0x130 [ 2309.774290] ? trace_hardirqs_on+0x310/0x310 [ 2309.778707] ? ext4_es_delayed_clu+0x37e/0x420 [ 2309.783297] ? zap_class+0x640/0x640 [ 2309.787037] ? mark_held_locks+0xc7/0x130 [ 2309.791197] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2309.796743] ? check_preemption_disabled+0x48/0x280 [ 2309.801793] ? __lock_is_held+0xb5/0x140 [ 2309.805868] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2309.811421] ? ext4_ext_map_blocks+0xeeb/0x48f0 [ 2309.816098] __should_failslab+0x124/0x180 [ 2309.820344] should_failslab+0x9/0x14 [ 2309.824149] kmem_cache_alloc+0x47/0x730 [ 2309.828220] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2309.833240] ? ext4_es_can_be_merged+0x23d/0x2a0 [ 2309.838034] ? __es_tree_search.isra.12+0x1ba/0x220 [ 2309.843059] __es_insert_extent+0x30c/0x1120 [ 2309.847478] ? ext4_es_free_extent+0x790/0x790 [ 2309.852095] ? do_raw_write_lock+0x14f/0x310 [ 2309.856514] ? do_raw_read_unlock+0x70/0x70 [ 2309.860839] ? __lock_is_held+0xb5/0x140 [ 2309.864930] ext4_es_insert_extent+0x357/0xbd0 [ 2309.869543] ? ext4_es_scan_clu+0x50/0x50 [ 2309.873702] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2309.879010] ? down_write+0x8a/0x130 [ 2309.882728] ? ext4_map_blocks+0x88f/0x1b50 [ 2309.887064] ? down_read+0x120/0x120 [ 2309.890800] ? kernel_text_address+0x79/0xf0 [ 2309.895221] ext4_map_blocks+0xb0c/0x1b50 [ 2309.899392] ? __save_stack_trace+0x8d/0xf0 [ 2309.903729] ? ext4_issue_zeroout+0x190/0x190 [ 2309.908242] ? save_stack+0x43/0xd0 [ 2309.911877] ? __kasan_slab_free+0x102/0x150 [ 2309.916294] ? kasan_slab_free+0xe/0x10 [ 2309.920301] ? kmem_cache_free+0x83/0x290 [ 2309.924460] ext4_getblk+0x10e/0x630 [ 2309.928188] ? ext4_iomap_begin+0x1390/0x1390 [ 2309.932692] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2309.938232] ? __dquot_initialize+0x629/0xdd0 [ 2309.942739] ext4_bread+0x95/0x2b0 [ 2309.946331] ? ext4_getblk+0x630/0x630 [ 2309.950221] ? dquot_get_next_dqblk+0x180/0x180 [ 2309.954914] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 2309.959864] ? common_perm+0x1f6/0x7b0 [ 2309.963772] ext4_append+0x14e/0x370 [ 2309.967500] ext4_mkdir+0x532/0xe60 [ 2309.971146] ? ext4_init_dot_dotdot+0x510/0x510 [ 2309.975827] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2309.981367] ? security_inode_permission+0xd2/0x100 [ 2309.986393] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2309.991932] ? security_inode_mkdir+0xe8/0x120 [ 2309.996549] vfs_mkdir+0x42e/0x6b0 [ 2310.000130] do_mkdirat+0x27a/0x310 [ 2310.003773] ? __ia32_sys_mknod+0xb0/0xb0 [ 2310.007941] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2310.013309] ? trace_hardirqs_off_caller+0x310/0x310 [ 2310.018433] ? ksys_ioctl+0x81/0xd0 [ 2310.022087] __x64_sys_mkdir+0x5c/0x80 [ 2310.025997] do_syscall_64+0x1b9/0x820 [ 2310.029903] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2310.035270] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2310.040237] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2310.045119] ? trace_hardirqs_on_caller+0x310/0x310 [ 2310.050141] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2310.055164] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2310.060193] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2310.065062] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2310.070268] RIP: 0033:0x456a97 [ 2310.073484] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2310.092441] RSP: 002b:00007f004a854a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2310.100156] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000456a97 [ 2310.107675] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 00:25:58 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x0, {0x0, 0x0, 0x200000000000000}}) [ 2310.114942] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2310.122212] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2310.129484] R13: 0000000000000000 R14: 00000000004d9b98 R15: 0000000000000003 [ 2310.144854] FAT-fs (loop1): bogus number of reserved sectors [ 2310.151274] FAT-fs (loop1): Can't find a valid FAT filesystem 00:25:59 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:25:59 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0x5452, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:25:59 executing program 1 (fault-call:0 fault-nth:31): syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:25:59 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffff9c, 0x0, 0x5, &(0x7f0000000000)=')GPL\x00'}, 0x30) r1 = syz_open_procfs(r0, &(0x7f0000000240)='attr/sockcreate\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x10000000400200) sendfile(r2, r1, 0x0, 0x462c) 00:25:59 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x0, {0x0, 0x0, 0x0, 0x2}}) 00:25:59 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0xc000000000000) [ 2310.496641] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2310.558376] FAULT_INJECTION: forcing a failure. [ 2310.558376] name failslab, interval 1, probability 0, space 0, times 0 00:25:59 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x8c, r3, 0x8, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0x2c, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x21}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x700000000000000}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xe6}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3ff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3f}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x8010}, 0x20000000) sendfile(r1, r0, 0x0, 0x462c) 00:25:59 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f757465000000008800", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 2310.599616] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2310.602587] CPU: 1 PID: 10753 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2310.615174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2310.624542] Call Trace: [ 2310.627154] dump_stack+0x244/0x39d [ 2310.630804] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2310.636018] ? __kernel_text_address+0xd/0x40 [ 2310.640555] ? unwind_get_return_address+0x61/0xa0 [ 2310.645517] should_fail.cold.4+0xa/0x17 00:25:59 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x462c) [ 2310.649602] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2310.654729] ? save_stack+0x43/0xd0 [ 2310.658386] ? kasan_kmalloc+0xc7/0xe0 [ 2310.662285] ? __kmalloc_track_caller+0x157/0x760 [ 2310.667139] ? memdup_user+0x2c/0xa0 [ 2310.670871] ? do_syscall_64+0x1b9/0x820 [ 2310.674942] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2310.678640] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2310.680327] ? find_held_lock+0x36/0x1c0 [ 2310.680353] ? wacom_wac_irq+0x99b8/0x9fb0 00:25:59 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f75746500000600", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 2310.680381] ? perf_trace_sched_process_exec+0x860/0x860 [ 2310.702291] ? lock_release+0xa00/0xa00 [ 2310.706285] ? perf_trace_sched_process_exec+0x860/0x860 [ 2310.711769] __should_failslab+0x124/0x180 [ 2310.716021] should_failslab+0x9/0x14 [ 2310.719868] __kmalloc_track_caller+0x2d1/0x760 [ 2310.724557] ? strncpy_from_user+0x5a0/0x5a0 [ 2310.728996] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2310.734579] ? strndup_user+0x77/0xd0 [ 2310.738399] memdup_user+0x2c/0xa0 [ 2310.741960] strndup_user+0x77/0xd0 [ 2310.745633] ksys_mount+0x73/0x140 00:25:59 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc201}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xa18, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_SET_FILE_RW_HINT(r4, 0x40e, &(0x7f0000000000)=0x2) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x462c) 00:25:59 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00 \x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 2310.749190] __x64_sys_mount+0xbe/0x150 [ 2310.753182] do_syscall_64+0x1b9/0x820 [ 2310.756989] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2310.757088] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2310.770602] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2310.775550] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2310.780459] ? trace_hardirqs_on_caller+0x310/0x310 [ 2310.785494] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2310.790540] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2310.795580] ? trace_hardirqs_off_thunk+0x1a/0x1c 00:25:59 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc0205649, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) [ 2310.800447] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2310.805652] RIP: 0033:0x45a0ea [ 2310.808857] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2310.827783] RSP: 002b:00007f004a854a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2310.827798] RAX: ffffffffffffffda RBX: 00007f004a854b30 RCX: 000000000045a0ea [ 2310.827808] RDX: 00007f004a854ad0 RSI: 00000000200000c0 RDI: 00007f004a854af0 00:25:59 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x0, {0x0, 0x0, 0x0, 0x200000000000000}}) [ 2310.827818] RBP: 00000000200000c0 R08: 00007f004a854b30 R09: 00007f004a854ad0 [ 2310.827827] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2310.827836] R13: 0000000000000000 R14: 00000000004d9b98 R15: 0000000000000003 [ 2310.865130] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:25:59 executing program 1 (fault-call:0 fault-nth:32): syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:25:59 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00`\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030700000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000000000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000000000000892f0700636f6e6e6c6162656c0000000000000000000000000000000000000000000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000000000000007000000070000000a0000000434f4e4e5345434d41524bff6eef1d192516e43f9a305e46692c00000000000000000000000000000000000000000008"]}, 0x2a8) 00:25:59 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0x5460, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) [ 2311.026791] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2311.038622] FAULT_INJECTION: forcing a failure. [ 2311.038622] name failslab, interval 1, probability 0, space 0, times 0 [ 2311.051244] CPU: 0 PID: 10800 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2311.058625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2311.067986] Call Trace: [ 2311.070618] dump_stack+0x244/0x39d [ 2311.074274] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2311.079494] should_fail.cold.4+0xa/0x17 [ 2311.083579] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2311.088698] ? find_held_lock+0x36/0x1c0 [ 2311.092793] ? mntput_no_expire+0x1ba/0xc00 [ 2311.097135] ? lock_downgrade+0x900/0x900 [ 2311.101299] ? check_preemption_disabled+0x48/0x280 [ 2311.101327] ? find_held_lock+0x36/0x1c0 [ 2311.101363] ? perf_trace_sched_process_exec+0x860/0x860 [ 2311.110443] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2311.110463] ? check_preemption_disabled+0x48/0x280 [ 2311.110480] ? tracing_start_sched_switch.cold.0+0x78/0x78 [ 2311.110500] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2311.137659] __should_failslab+0x124/0x180 [ 2311.141921] should_failslab+0x9/0x14 [ 2311.145741] __kmalloc_track_caller+0x2d1/0x760 [ 2311.150458] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2311.155847] ? strncpy_from_user+0x5a0/0x5a0 [ 2311.160273] ? strndup_user+0x77/0xd0 [ 2311.164089] memdup_user+0x2c/0xa0 [ 2311.164109] strndup_user+0x77/0xd0 [ 2311.171291] ksys_mount+0x3c/0x140 [ 2311.174850] __x64_sys_mount+0xbe/0x150 [ 2311.178841] do_syscall_64+0x1b9/0x820 [ 2311.178857] ? __kprobes_text_end+0x4eac8/0x4eac8 [ 2311.178878] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2311.192549] ? trace_hardirqs_on_caller+0x310/0x310 [ 2311.197601] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2311.202634] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2311.207670] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2311.212537] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2311.217742] RIP: 0033:0x45a0ea [ 2311.220962] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2311.239884] RSP: 002b:00007f004a854a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2311.247612] RAX: ffffffffffffffda RBX: 00007f004a854b30 RCX: 000000000045a0ea [ 2311.254893] RDX: 00007f004a854ad0 RSI: 00000000200000c0 RDI: 00007f004a854af0 [ 2311.262172] RBP: 00000000200000c0 R08: 00007f004a854b30 R09: 00007f004a854ad0 [ 2311.269469] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2311.269483] R13: 0000000000000000 R14: 00000000004d9b98 R15: 0000000000000003 00:26:00 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x600000000000000) 00:26:00 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x0, {0x0, 0x0, 0x0, 0x2000000}}) 00:26:00 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc0585611, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f757465000600", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:26:00 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000000000)=0x101) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x462c) 00:26:00 executing program 1 (fault-call:0 fault-nth:33): syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) [ 2311.434686] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:00 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x0, {}, {0x200000000000000}}) 00:26:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00`\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:26:00 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0x5451, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) [ 2311.476106] FAULT_INJECTION: forcing a failure. [ 2311.476106] name failslab, interval 1, probability 0, space 0, times 0 [ 2311.509997] CPU: 0 PID: 10821 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2311.517432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2311.526823] Call Trace: [ 2311.529483] dump_stack+0x244/0x39d [ 2311.533156] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2311.538372] ? __kernel_text_address+0xd/0x40 [ 2311.542880] ? unwind_get_return_address+0x61/0xa0 [ 2311.542904] should_fail.cold.4+0xa/0x17 [ 2311.542925] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2311.551938] ? save_stack+0x43/0xd0 [ 2311.551955] ? kasan_kmalloc+0xc7/0xe0 [ 2311.551970] ? __kmalloc_track_caller+0x157/0x760 [ 2311.551990] ? memdup_user+0x2c/0xa0 [ 2311.573212] ? do_syscall_64+0x1b9/0x820 [ 2311.577291] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2311.582693] ? find_held_lock+0x36/0x1c0 [ 2311.586820] ? perf_trace_sched_process_exec+0x860/0x860 [ 2311.592292] ? lock_release+0xa00/0xa00 [ 2311.596279] ? perf_trace_sched_process_exec+0x860/0x860 [ 2311.601797] __should_failslab+0x124/0x180 [ 2311.606064] should_failslab+0x9/0x14 [ 2311.609884] __kmalloc_track_caller+0x2d1/0x760 [ 2311.614598] ? strncpy_from_user+0x5a0/0x5a0 [ 2311.619051] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2311.624610] ? strndup_user+0x77/0xd0 [ 2311.628457] memdup_user+0x2c/0xa0 [ 2311.632029] strndup_user+0x77/0xd0 [ 2311.635680] ksys_mount+0x73/0x140 [ 2311.639241] __x64_sys_mount+0xbe/0x150 [ 2311.643254] do_syscall_64+0x1b9/0x820 [ 2311.647172] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2311.652549] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2311.657496] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2311.662368] ? trace_hardirqs_on_caller+0x310/0x310 [ 2311.667466] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2311.672507] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2311.677562] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2311.682461] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2311.687664] RIP: 0033:0x45a0ea [ 2311.690874] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2311.709796] RSP: 002b:00007f004a854a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2311.717547] RAX: ffffffffffffffda RBX: 00007f004a854b30 RCX: 000000000045a0ea 00:26:00 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x462c) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000000)) [ 2311.724853] RDX: 00007f004a854ad0 RSI: 00000000200000c0 RDI: 00007f004a854af0 [ 2311.732150] RBP: 00000000200000c0 R08: 00007f004a854b30 R09: 00007f004a854ad0 [ 2311.739438] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2311.746739] R13: 0000000000000000 R14: 00000000004d9b98 R15: 0000000000000003 00:26:00 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc020660b, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:00 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x0, {}, {0x2000000}}) [ 2311.795558] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:00 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x1600000000000000) 00:26:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f75746500000000000000001100", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030700000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000000000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000000000000892f0700636f6e6e6c6162656c0000000000000000000000000000000000000000000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000000000000007000000070000000a0000000434f4e4e5345434d41524bff6eef1d192516e43f9a305e46692c00000000000000000000000000000000000000000008"]}, 0x2a8) 00:26:00 executing program 4: r0 = gettid() syz_open_procfs(r0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x101200) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 00:26:00 executing program 1 (fault-call:0 fault-nth:34): syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:26:00 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x0, {}, {0x2}}) 00:26:00 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc0045878, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00?\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:26:00 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xa, &(0x7f0000000080)='net/ip_vs\x00', 0xffffffffffffffff}, 0x30) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, &(0x7f00000001c0)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000280)={0x15, 0x110, 0xfa00, {r5, 0x1, 0x0, 0x0, 0x0, @in6={0xa, 0x4e21, 0x7, @loopback, 0x9}, @in={0x2, 0x4e23, @broadcast}}}, 0x118) setsockopt$bt_BT_CHANNEL_POLICY(r3, 0x112, 0xa, &(0x7f0000000000)=0x5, 0x4) sendfile(r2, r1, 0x0, 0x462c) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000040)=0x8, 0x4) [ 2311.968220] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2311.998226] FAULT_INJECTION: forcing a failure. [ 2311.998226] name failslab, interval 1, probability 0, space 0, times 0 00:26:00 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc0285628, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) [ 2312.054009] CPU: 1 PID: 10861 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2312.061416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2312.070782] Call Trace: [ 2312.070813] dump_stack+0x244/0x39d [ 2312.070837] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2312.070858] ? __kernel_text_address+0xd/0x40 [ 2312.070875] ? unwind_get_return_address+0x61/0xa0 [ 2312.070903] should_fail.cold.4+0xa/0x17 [ 2312.070928] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2312.070956] ? kasan_kmalloc+0xc7/0xe0 [ 2312.105270] ? __kmalloc_track_caller+0x157/0x760 [ 2312.110127] ? memdup_user+0x2c/0xa0 [ 2312.113881] ? zap_class+0x640/0x640 [ 2312.117616] ? do_syscall_64+0x1b9/0x820 [ 2312.121713] ? find_held_lock+0x36/0x1c0 [ 2312.125878] ? fl_change+0x1738/0x7240 [ 2312.129812] ? perf_trace_sched_process_exec+0x860/0x860 [ 2312.135281] ? lock_release+0xa00/0xa00 [ 2312.139266] ? perf_trace_sched_process_exec+0x860/0x860 [ 2312.144735] ? usercopy_warn+0x110/0x110 [ 2312.148824] __should_failslab+0x124/0x180 [ 2312.153075] should_failslab+0x9/0x14 [ 2312.156896] kmem_cache_alloc_trace+0x2d7/0x750 [ 2312.161591] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2312.167144] ? _copy_from_user+0xdf/0x150 [ 2312.167168] copy_mount_options+0x5f/0x430 [ 2312.167186] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2312.167207] ksys_mount+0xd0/0x140 [ 2312.167224] __x64_sys_mount+0xbe/0x150 [ 2312.167245] do_syscall_64+0x1b9/0x820 [ 2312.167265] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2312.175647] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2312.175665] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2312.175686] ? trace_hardirqs_on_caller+0x310/0x310 [ 2312.175703] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2312.175719] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2312.175741] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2312.175773] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2312.232979] RIP: 0033:0x45a0ea 00:26:00 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0x2, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:00 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x0, {}, {0x0, 0x2000000}}) [ 2312.236584] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2312.255492] RSP: 002b:00007f004a854a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2312.263222] RAX: ffffffffffffffda RBX: 00007f004a854b30 RCX: 000000000045a0ea [ 2312.270503] RDX: 00007f004a854ad0 RSI: 00000000200000c0 RDI: 00007f004a854af0 [ 2312.277793] RBP: 00000000200000c0 R08: 00007f004a854b30 R09: 00007f004a854ad0 [ 2312.285072] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2312.292373] R13: 0000000000000000 R14: 00000000004d9b98 R15: 0000000000000003 00:26:01 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x0, {}, {0x0, 0x2}}) [ 2312.338530] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:01 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00 \x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030700000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000000000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000000000000892f0700636f6e6e6c6162656c0000000000000000000000000000000000000000000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000000000000007000000070000000a0000000434f4e4e5345434d41524bff6eef1d192516e43f9a305e46692c00000000000000000000000000000000000000000008"]}, 0x2a8) 00:26:01 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x462c) ioctl$RTC_UIE_ON(r0, 0x7003) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000000)) 00:26:01 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0x5421, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) [ 2312.465253] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:01 executing program 1 (fault-call:0 fault-nth:35): syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:26:01 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x1d) 00:26:01 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x0, {}, {0x0, 0x200000000000000}}) 00:26:01 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\a\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030700000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000000000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000000000000892f0700636f6e6e6c6162656c0000000000000000000000000000000000000000000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000000000000007000000070000000a0000000434f4e4e5345434d41524bff6eef1d192516e43f9a305e46692c00000000000000000000000000000000000000000008"]}, 0x2a8) 00:26:01 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc0585609, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:01 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000180)={{{@in, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000280)=0xe8) mount$9p_virtio(&(0x7f0000000000)='net/ip_vs\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x10000, &(0x7f00000002c0)={'trans=virtio,', {[{@version_9p2000='version=9p2000'}, {@cache_none='cache=none'}, {@posixacl='posixacl'}, {@posixacl='posixacl'}, {@cache_mmap='cache=mmap'}, {@privport='privport'}, {@msize={'msize', 0x3d, 0x1ff}}, {@cache_mmap='cache=mmap'}], [{@fowner_gt={'fowner>', r1}}, {@appraise='appraise'}]}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2001, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r2, r0, 0x0, 0x462c) [ 2312.658467] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:01 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x462c) readv(r2, &(0x7f00000022c0)=[{&(0x7f0000000000)=""/35, 0x23}, {&(0x7f00000000c0)=""/62, 0x3e}, {&(0x7f0000000140)=""/4096, 0x1000}, {&(0x7f0000001140)=""/177, 0xb1}, {&(0x7f0000001200)=""/4096, 0x1000}, {&(0x7f0000002200)=""/90, 0x5a}, {&(0x7f0000002280)=""/7, 0x7}], 0x7) 00:26:01 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x0, {}, {0x0, 0x0, 0x2}}) 00:26:01 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc0205647, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:01 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x1000000000000000) [ 2312.708244] FAULT_INJECTION: forcing a failure. [ 2312.708244] name failslab, interval 1, probability 0, space 0, times 0 [ 2312.727861] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2312.795664] CPU: 0 PID: 10912 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2312.803076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2312.812439] Call Trace: [ 2312.815086] dump_stack+0x244/0x39d [ 2312.818769] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2312.824000] should_fail.cold.4+0xa/0x17 [ 2312.828102] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2312.833240] ? find_held_lock+0x36/0x1c0 [ 2312.837332] ? find_held_lock+0x36/0x1c0 [ 2312.841411] ? nvme_free_iod+0x328/0x610 [ 2312.845507] ? perf_trace_sched_process_exec+0x860/0x860 [ 2312.850973] ? kfree+0x1f8/0x230 [ 2312.854386] ? ida_alloc_range+0x953/0xc70 [ 2312.858639] __should_failslab+0x124/0x180 [ 2312.862910] should_failslab+0x9/0x14 [ 2312.866733] __kmalloc_track_caller+0x2d1/0x760 [ 2312.871440] ? kstrdup_const+0x66/0x80 [ 2312.875354] kstrdup+0x39/0x70 [ 2312.878564] kstrdup_const+0x66/0x80 [ 2312.879998] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2312.882294] alloc_vfsmnt+0x186/0x990 [ 2312.882313] ? m_stop+0x20/0x20 [ 2312.882335] ? zap_class+0x640/0x640 [ 2312.882355] ? rcu_pm_notify+0xc0/0xc0 [ 2312.882377] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2312.882399] ? refcount_sub_and_test_checked+0x203/0x310 [ 2312.897623] ? find_held_lock+0x36/0x1c0 [ 2312.910758] ? __get_fs_type+0x97/0xc0 [ 2312.910779] ? lock_downgrade+0x900/0x900 [ 2312.910801] ? lock_release+0xa00/0xa00 [ 2312.910822] ? apparmor_cred_transfer+0x590/0x590 [ 2312.910845] vfs_kern_mount.part.35+0x90/0x4f0 [ 2312.910864] ? may_umount+0xb0/0xb0 00:26:01 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f757465000200", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:26:01 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0x4020940d, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) [ 2312.941790] ? _raw_read_unlock+0x2c/0x50 [ 2312.941809] ? __get_fs_type+0x97/0xc0 [ 2312.941834] do_mount+0x581/0x31f0 [ 2312.941854] ? check_preemption_disabled+0x48/0x280 [ 2312.941880] ? copy_mount_string+0x40/0x40 [ 2312.949668] ? copy_mount_options+0x5f/0x430 [ 2312.949688] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2312.949707] ? kmem_cache_alloc_trace+0x353/0x750 [ 2312.949729] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2312.949745] ? _copy_from_user+0xdf/0x150 [ 2312.949775] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2312.957237] ? copy_mount_options+0x315/0x430 [ 2312.970879] ksys_mount+0x12d/0x140 [ 2312.970902] __x64_sys_mount+0xbe/0x150 [ 2312.970922] do_syscall_64+0x1b9/0x820 [ 2312.986320] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2312.986343] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2312.986359] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2312.986378] ? trace_hardirqs_on_caller+0x310/0x310 [ 2312.986394] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2312.986412] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2312.986434] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2312.986458] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2312.986469] RIP: 0033:0x45a0ea [ 2312.986487] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2312.986495] RSP: 002b:00007f004a854a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2312.996205] RAX: ffffffffffffffda RBX: 00007f004a854b30 RCX: 000000000045a0ea [ 2312.996217] RDX: 00007f004a854ad0 RSI: 00000000200000c0 RDI: 00007f004a854af0 [ 2312.996227] RBP: 00000000200000c0 R08: 00007f004a854b30 R09: 00007f004a854ad0 [ 2312.996237] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2312.996246] R13: 0000000000000000 R14: 00000000004d9b98 R15: 0000000000000003 00:26:01 executing program 1 (fault-call:0 fault-nth:36): syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:26:01 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f75746500000000000000008800", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030700000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000000000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000000000000892f0700636f6e6e6c6162656c0000000000000000000000000000000000000000000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000000000000007000000070000000a0000000434f4e4e5345434d41524bff6eef1d192516e43f9a305e46692c00000000000000000000000000000000000000000008"]}, 0x2a8) 00:26:01 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc058560f, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:01 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x0, {}, {0x0, 0x0, 0x200000000000000}}) 00:26:01 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x2000000) [ 2313.242188] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2313.286465] FAULT_INJECTION: forcing a failure. [ 2313.286465] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2313.298333] CPU: 0 PID: 10947 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2313.305706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2313.305714] Call Trace: [ 2313.305741] dump_stack+0x244/0x39d [ 2313.305779] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2313.305813] should_fail.cold.4+0xa/0x17 [ 2313.321407] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2313.335795] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2313.341361] ? check_preemption_disabled+0x48/0x280 [ 2313.341397] ? mark_held_locks+0x130/0x130 [ 2313.350678] ? pick_next_task_fair+0xa05/0x1b30 [ 2313.355389] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2313.360447] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2313.366005] ? zap_class+0x640/0x640 [ 2313.369808] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2313.375355] ? __perf_event_task_sched_in+0x2a9/0xb60 [ 2313.380574] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2313.386139] ? should_fail+0x22d/0xd01 [ 2313.390039] ? find_held_lock+0x36/0x1c0 [ 2313.394119] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2313.399244] __alloc_pages_nodemask+0x366/0xea0 [ 2313.403922] ? _raw_spin_unlock_irq+0x27/0x80 [ 2313.408429] ? _raw_spin_unlock_irq+0x27/0x80 [ 2313.412960] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 2313.418031] ? trace_hardirqs_on+0xbd/0x310 [ 2313.422436] ? finish_task_switch+0x1f4/0x910 [ 2313.426993] ? find_held_lock+0x36/0x1c0 [ 2313.431101] ? trace_hardirqs_off+0xb8/0x310 [ 2313.435537] cache_grow_begin+0xa5/0x8c0 [ 2313.439631] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2313.445199] ? check_preemption_disabled+0x48/0x280 [ 2313.450249] kmem_cache_alloc+0x66b/0x730 [ 2313.454429] ? __sched_text_start+0x8/0x8 [ 2313.458607] getname_flags+0xd0/0x590 [ 2313.462430] user_path_at_empty+0x2d/0x50 [ 2313.466636] do_mount+0x177/0x31f0 [ 2313.470203] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 2313.475670] ? retint_kernel+0x1b/0x2d [ 2313.479581] ? trace_hardirqs_on+0x310/0x310 [ 2313.484019] ? copy_mount_string+0x40/0x40 [ 2313.488281] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2313.493067] ? retint_kernel+0x2d/0x2d [ 2313.496979] ? copy_mount_options+0x239/0x430 [ 2313.501499] ? copy_mount_options+0x247/0x430 [ 2313.506048] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2313.511608] ? copy_mount_options+0x315/0x430 [ 2313.516141] ksys_mount+0x12d/0x140 [ 2313.519790] __x64_sys_mount+0xbe/0x150 [ 2313.523791] do_syscall_64+0x1b9/0x820 [ 2313.527692] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2313.533073] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2313.538019] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2313.542883] ? trace_hardirqs_on_caller+0x310/0x310 [ 2313.547917] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2313.552952] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2313.557992] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2313.562871] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2313.568073] RIP: 0033:0x45a0ea 00:26:01 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f75746500000000000000000200", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 2313.571280] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2313.590201] RSP: 002b:00007f004a854a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2313.597928] RAX: ffffffffffffffda RBX: 00007f004a854b30 RCX: 000000000045a0ea [ 2313.605214] RDX: 00007f004a854ad0 RSI: 00000000200000c0 RDI: 00007f004a854af0 [ 2313.612507] RBP: 00000000200000c0 R08: 00007f004a854b30 R09: 00007f004a854ad0 [ 2313.619807] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2313.627089] R13: 0000000000000000 R14: 00000000004d9b98 R15: 0000000000000003 [ 2313.637701] FAT-fs (loop1): bogus number of reserved sectors [ 2313.643648] FAT-fs (loop1): Can't find a valid FAT filesystem 00:26:02 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000540)=ANY=[@ANYRES32=0x0, @ANYBLOB="fd000000d3cb2147750e8bfc31c5a9c8e8cd0e9b0a658a61ac1c5d1ab785e483fdff811047e406be2128e728d729585727146c04a32056f5b978a97a05161c510acc55856a26a5a2785486a3cae32c7a0e337a4df522f149e461d73f6f21f0f75f33306a8b3967a5c7cb5265435ef88398eee3a437b062335e4f4b1fcbba5def0128d47ea5f04fb853ba5f152727971db3016ad8efb1c257f1c38ef875681e48ce8620567bc64dbd05e880ffd6ede586ecebe24b4deb5f786b6c236862ef4818759338039fb27d83e760e7db2bc94ddf582c64e2b6967c2f1be285417d8d3a024876a123a9e779b027cbd6084b9d55f07677003c146303d4d5424c15c834fa6a0c6ab65d026ea01a69fff89f20ff6336c0de8cf55a9b62137dc54be6367a693e0f863f98e1d74566fc94eb995909e224d61bd7cc0d5ab53fa05294b12c1006c0f60f2093212e044571fbabf21b9d77b77aa122b7aa3e5a175104402cf4b3f9f0408fcf990925f9801e565ba3f4a1ea39c2baaf2aedbc0446120faf3c1e7a44a25ac1f7fae6ec608836ae37be50b08a951e58699756251299bddbdd407f0f5e0238d92bffc99204e6f2d962e5856f7d5c8a14c0ef058676b67b4d4240"], &(0x7f0000000000)=0x105) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={r1, 0x9, 0xe9}, &(0x7f0000000280)=0xc) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f00000002c0)={0x6, 0x8, 0x1, 'queue1\x00', 0x7}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r2, r0, 0x0, 0x462c) 00:26:02 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x0, {}, {0x0, 0x0, 0x2000000}}) 00:26:02 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x100000000000000, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:02 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00`\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030700000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000000000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000000000000892f0700636f6e6e6c6162656c0000000000000000000000000000000000000000000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000000000000007000000070000000a0000000434f4e4e5345434d41524bff6eef1d192516e43f9a305e46692c00000000000000000000000000000000000000000008"]}, 0x2a8) [ 2313.682333] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:02 executing program 1 (fault-call:0 fault-nth:37): syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:26:02 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x1000000, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:02 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x0, {}, {0x0, 0x0, 0x0, 0x2}}) [ 2313.791064] FAULT_INJECTION: forcing a failure. [ 2313.791064] name failslab, interval 1, probability 0, space 0, times 0 [ 2313.836001] CPU: 1 PID: 10965 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2313.843423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2313.845909] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2313.852803] Call Trace: [ 2313.852834] dump_stack+0x244/0x39d [ 2313.852858] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2313.852892] should_fail.cold.4+0xa/0x17 [ 2313.852916] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2313.881656] ? is_bpf_text_address+0xac/0x170 [ 2313.886178] ? lock_downgrade+0x900/0x900 [ 2313.890350] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2313.895305] ? kasan_check_read+0x11/0x20 [ 2313.899481] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2313.904796] ? rcu_softirq_qs+0x20/0x20 [ 2313.908801] ? rcu_softirq_qs+0x20/0x20 [ 2313.912812] ? unwind_dump+0x190/0x190 [ 2313.916728] ? find_held_lock+0x36/0x1c0 [ 2313.920840] ? perf_trace_sched_process_exec+0x860/0x860 [ 2313.926320] __should_failslab+0x124/0x180 [ 2313.929419] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2313.930574] should_failslab+0x9/0x14 [ 2313.930592] kmem_cache_alloc+0x2be/0x730 [ 2313.930612] ? find_held_lock+0x36/0x1c0 [ 2313.930637] getname_flags+0xd0/0x590 [ 2313.930656] user_path_at_empty+0x2d/0x50 [ 2313.958780] do_mount+0x177/0x31f0 [ 2313.962351] ? check_preemption_disabled+0x48/0x280 [ 2313.967405] ? copy_mount_string+0x40/0x40 [ 2313.971676] ? rcu_pm_notify+0xc0/0xc0 [ 2313.975602] ? copy_mount_options+0x5f/0x430 [ 2313.980045] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2313.980358] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2313.985093] ? kmem_cache_alloc_trace+0x353/0x750 [ 2313.985116] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2313.985138] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2313.985155] ? copy_mount_options+0x315/0x430 [ 2313.985186] ksys_mount+0x12d/0x140 [ 2314.017410] __x64_sys_mount+0xbe/0x150 [ 2314.021410] do_syscall_64+0x1b9/0x820 [ 2314.025323] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2314.030713] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2314.035677] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2314.036428] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2314.040548] ? trace_hardirqs_on_caller+0x310/0x310 [ 2314.040569] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2314.040588] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2314.040610] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2314.040633] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2314.073853] RIP: 0033:0x45a0ea 00:26:02 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00?\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:26:02 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f75746500000300", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:26:02 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\a\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 2314.077057] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2314.077067] RSP: 002b:00007f004a854a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2314.077083] RAX: ffffffffffffffda RBX: 00007f004a854b30 RCX: 000000000045a0ea [ 2314.077101] RDX: 00007f004a854ad0 RSI: 00000000200000c0 RDI: 00007f004a854af0 [ 2314.111555] RBP: 00000000200000c0 R08: 00007f004a854b30 R09: 00007f004a854ad0 [ 2314.111563] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2314.111572] R13: 0000000000000000 R14: 00000000004d9b98 R15: 0000000000000003 00:26:02 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x1500) 00:26:02 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\a\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:26:02 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x0, {}, {0x0, 0x0, 0x0, 0x200000000000000}}) 00:26:02 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendfile(0xffffffffffffffff, r0, 0x0, 0x462d) 00:26:02 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x2000000, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:02 executing program 1 (fault-call:0 fault-nth:38): syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:26:02 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x2040, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r3, 0x4008ae48, &(0x7f00000000c0)=0x10000) sendfile(r1, r0, 0x0, 0x462c) setsockopt$netlink_NETLINK_PKTINFO(r2, 0x10e, 0x3, &(0x7f0000000140)=0x9, 0x4) 00:26:02 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f757465007fffffff00", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030700000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000000000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000000000000892f0700636f6e6e6c6162656c0000000000000000000000000000000000000000000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000000000000007000000070000000a0000000434f4e4e5345434d41524bff6eef1d192516e43f9a305e46692c00000000000000000000000000000000000000000008"]}, 0x2a8) 00:26:02 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0xfecaedfe, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:03 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x0, {}, {0x0, 0x0, 0x0, 0x2000000}}) [ 2314.280541] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2314.308476] FAULT_INJECTION: forcing a failure. [ 2314.308476] name failslab, interval 1, probability 0, space 0, times 0 [ 2314.365381] CPU: 1 PID: 11010 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2314.372804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2314.382223] Call Trace: [ 2314.384832] dump_stack+0x244/0x39d [ 2314.388488] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2314.393722] should_fail.cold.4+0xa/0x17 [ 2314.397824] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2314.402983] ? find_held_lock+0x36/0x1c0 [ 2314.407085] ? find_held_lock+0x36/0x1c0 [ 2314.411213] ? perf_trace_sched_process_exec+0x860/0x860 [ 2314.411233] ? kfree+0x1f8/0x230 [ 2314.420047] ? ida_alloc_range+0x953/0xc70 [ 2314.424306] __should_failslab+0x124/0x180 [ 2314.428170] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2314.428615] should_failslab+0x9/0x14 [ 2314.440558] __kmalloc_track_caller+0x2d1/0x760 [ 2314.445257] ? kstrdup_const+0x66/0x80 [ 2314.445280] kstrdup+0x39/0x70 [ 2314.452358] kstrdup_const+0x66/0x80 [ 2314.456088] alloc_vfsmnt+0x186/0x990 [ 2314.459900] ? m_stop+0x20/0x20 [ 2314.463201] ? zap_class+0x640/0x640 [ 2314.466936] ? rcu_pm_notify+0xc0/0xc0 [ 2314.470848] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2314.476402] ? refcount_sub_and_test_checked+0x203/0x310 [ 2314.481881] ? find_held_lock+0x36/0x1c0 [ 2314.485969] ? __get_fs_type+0x97/0xc0 [ 2314.489870] ? lock_downgrade+0x900/0x900 [ 2314.494033] ? lock_release+0xa00/0xa00 [ 2314.498023] ? apparmor_cred_transfer+0x590/0x590 [ 2314.502894] vfs_kern_mount.part.35+0x90/0x4f0 [ 2314.507497] ? may_umount+0xb0/0xb0 [ 2314.511144] ? _raw_read_unlock+0x2c/0x50 [ 2314.515309] ? __get_fs_type+0x97/0xc0 [ 2314.519215] do_mount+0x581/0x31f0 [ 2314.522799] ? check_preemption_disabled+0x48/0x280 [ 2314.527843] ? copy_mount_string+0x40/0x40 [ 2314.532111] ? copy_mount_options+0x5f/0x430 [ 2314.536545] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2314.539711] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2314.541579] ? kmem_cache_alloc_trace+0x353/0x750 [ 2314.541601] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2314.541617] ? _copy_from_user+0xdf/0x150 [ 2314.541638] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2314.569834] ? copy_mount_options+0x315/0x430 [ 2314.574347] ksys_mount+0x12d/0x140 [ 2314.577988] __x64_sys_mount+0xbe/0x150 [ 2314.581981] do_syscall_64+0x1b9/0x820 [ 2314.585885] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2314.591290] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2314.596234] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2314.596255] ? trace_hardirqs_on_caller+0x310/0x310 [ 2314.596273] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2314.596291] ? prepare_exit_to_usermode+0x291/0x3b0 00:26:03 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000001400)={0x0, {0x2, 0x4e22, @local}, {0x2, 0x4e20, @loopback}, {0x2, 0x4e22, @loopback}, 0x11, 0x0, 0x0, 0x0, 0x5f, &(0x7f0000000080)='teql0\x00', 0xa9b, 0x3, 0xfffffffffffffffd}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0xfffffffffffffffa, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000001380)=[{&(0x7f0000000140)="f4e83af752b6b9e275f1ccf6addd0514fdb54f52f02cd55fdeb92b7d108c6450505e2e1fe20683ace0c8f3353085ee506e13489cad0a6ff6b6513a2766cf256295edf311f3c6690f00424ce5ea2d33204fe088e851bacc3f38a623287d5b0349c013ed7bd7e770b314fadc96e89bb5bc332f261191ff113c04e088ee49805925be4940c43da1cc71cf1a993dc804ee74767b5f8b8e4fc413651d362232aecfde47", 0xa1}, {&(0x7f0000000200)="b005a01e3e38c86c529be97e476055fa86eef1069f2941fef3053b1a7f011edbbe550bc394a0461a8da71cda2a72459d6b644a012ec7dffc98b114c6206371fd22023ef16643486144591478d716a3801ec34158d54f4fa0bf251300b200614c222113908965c501fbf562c319ac62db190961f73d8d42d037d9d2b90deef5de218936fb595fd882d8b480053b8a21e8ce0cf440b127db03e56ca46994106e0994a7f15b573e88e95f2520d5ec2a0b4b7a8a1d8e219a0028c22bad437f5119611350835f441f99fc8b63d472c71d9d023cf5cfc43e2be293fe18b34d3e821f2b9707b58c8947c16b28cacaf92d70c49cc12a39abcf6ded52ddb1502e4ae14831f7e6ac3f6d40bc39f9188d2b35462ab9e8ded81c6d9a1e1bab6cab6fbddf412c3feceb86f138834be0188770f7406ae965e30f5e28d7ff3e9e4abf96cb14e62b62862a4738edc4ceedea3edc234cb18310a0548ab919b3660b5fcb186e3e2743be3d055d3e87bfb59c1cbf0d1f55ccbee6a462501ca861bde029e67ce2a2abc282fae1331ec17cbc2cf30bdc8858e902c2768d65c6f5584a60d72258d2a0d1171dcc2c03effe5250ead418e4d4d012fcfbf52d12af5d8e8a3185c715bd27225e02346c927fee90ad06c83faaf8cea3098ee9b06219709daa89efb425d1f53c8008bfa2b08d31601219ec682161861ecd3607fe6cdec46f273b4d2d5fe62081b8622a3a39ee1c52d88010d1a00fd2ca9aebc426e4e690683995fc624e3f23c101a15892ec174a3007b76029de9fe3f0d22b5129f0667927cdcc3a3d46ba3805a88a3155df78c215c8438cbe35112a9f757a279990656e10f77dbdc9865f11a96289b1bf92c382850602f5dd1278c339ae32af43a4878086b3bbd7373e0e3d318a14f168f7f162c3ef64fd0410ef283f1726ccfc10fbfdbd156e41b92c40fa550b050168f3a90e579da47550f96f7620f0db5e2402533e9f1175fed5cbe4361c351e0f86b777755e89809349e0c120023b67632caa1fc1bec887d8814d98eeadc593c5e409c1f1f3765e0af4efaff2dd0b8cfc0053d76934457fbd56fd32cf90b375286255ab66aece4d5b231a8af26bfc427fb95cd3ee4514032d5351f22934deea6f246a04808df39d696f296cdc25fdf7701dd117f9dd2e1f6bae6760bf0f88dae1deb33727e44f9796336ab77fd4c6d2c4dd254c6614f27993bb09175a5c975c266706d121a80a0f0ae8ffcc8aca914062cd2d2ce29e3073ad649af1baf0799b1d3634dd0acb66cc43482f7f7927966e245090cef0a161392493cf25d653a29d511434febfcbabffad1edd78f27e66ab598c210c5d7562fd6f8dbe3896bade2de0bc638a13f33b2e350bf420b0f403da805fa25fd9323fb366102b836de3853649964a6b9c7eebbb93b509a682f16f3c202baaff1a3c534d8162c78f800afbd7b800ef5229b91f1a98a12ace45cc8ca8a23a12b239f1df541470e141ac506d30af12394a649c4bdc43d74c1f9632c3c79bd13ddaa12b16e3518e401fa85d2ebd9920aa02780cf61b878c0fed7f8c468fd94ebc78a64f209dc4f61a8a383737f10cfecb419f3e95034b34cbdbe1f4485c820b4d973a5b3d07725928228e8c6bead34ee4775ce955919c8b047ee28d1bcac50e9cae05d798a10a8902678422b2c8c404c853e4b8e4eef859a5fac54bcdc937e27aa30fb64868c8337eee225407176beb4fa392637757da8206817145ec8e718543e310c6ae1366731a32513b08f54277510523c9973cb776ff54c2840952325a924728b1ec2d74bff604fc8df671a413d4b956b7e1c89d7ad23eb071e55afcbb542df13b2f1def638660eb7aea9b2f59b28810c372739ef5320244e8b8d15c5932fa092c24245d91703acc5cc688aba4932fce178920d7413d33fdb4e92bbdedf81437be8bb47185bfdf7e32016ef22ef92327759c7bc0de810cf63479b7ab68d1b986b342c2569c26f410bfdfb780ec0fce242ef9a6769bc505488c83dc08a466de558b08c13f03ecc48e6a67fda97946c393546f2fd47440823c4bf476a5e9502f67d63278a9017000575ca8f4313db39b4c19c65351c70008b9b4956ae598183141c3d625bc7573c171eae00ac4a5634eaf7693f15c95f3945ae8a92c45d34642a78402bbd0879bd5a765215b6767585213d4b1994b5138e88263394ffdc620312eb9b450565bb368f88f9fc6165f4567212d6a6428e4833654ee556bfbd1b98cbb4f76d883ca789fe5c91e0268a6c5ce79f4e8b7d96737f22b3c98e6b356a4ad6c21650a839ed1be3df88ca22cac3f22cd56d924559c5304ab0bdba4a904e1321506cab1eca1202d5c646529c9e4b33656d290869aa3bbbd27d3867a89bec7b1f93a114b34b6ba6e62774a1dfdb2a7dfea4ba7904d4ff16b51d4fa404b65f1ec13b3f23425eeff79b9743d0174702bf06dfcd97dac74dd51f49fb82aff7ed5edf7892038ac79ea8e94259e68b9ca0f741a975473b1c1f4564e8db5a6196154682647179d7b5efd77b60cb06e300d262afa8b73fb1576816121752e583de10b68085c3c79ccca405a3d8a7ba43b4c6ab295a6108fd25ddd25aee51e104c5a43552ed041d0d84317d5725de397e34cd7dc55528c2d4f831e3b23ef1c515cfaeeee8065225c77d06b338021ae3dfa870ffa654dea028555dc82302352895d80da315efd73c887dbfc3e7f96a60afe5c8cf2f5877968a71fa364161435c183fbdfbc637af6ed170bdd8819ed5b321f1ced96c8835be88c72eab7224ba2070af5c6df9d760018150d2e709d5343ec6f45891862b02fb212a7fbf6ae332be86a462ab1a3b0bf3019d369ed11d45739170f4dfa1bf02f96d4717e331b1801a70d1fa86400235894769d8582c1b58b5e1f5f24e7bd9576ec11bce139c2ab825557813c8e012d031cfd8576d9bdc9696096f17d5781cfaf8d41cdd2f90ed2f4603c537eac766ccccd05461e4f108ef0e3b6b0a9f2cbc1c29d66cbd771bd1c8a286a2a8e7e61580d5db4eb59c5a0454a83b9b54c02c231ff6eaeafb9ee96ba71ab041ab93db41a9e415e39bed511cfea68e8a2e7fc5ec8619cad0a12512dd401a2dcb7e848416c60fd3220bf892e35169d6848ca58b14b31d0554efe08c5b2d30e88c3ca5ab82d8ede875e3127b0aeeecfb449189435769a56b46911da7b79f7ecf150789e1f2c611b5433d5575a135df4cd1d7d8084343659d3d59090c1984ee0f7dfc046352c3c644d8fdfe0aa6535ff59b4ff93b0a7b3a6e36809d657bbf6d7c4104c389aafc99cdb11359aadffacf7c68271aa8bdbaab091dad76b7876f469de6cdf74e0a2075c072c5b671fad3bad2b4cc89944cbdf7d8ef99c6dddc53509440a19cf39e35e3dfc63438e7e6d8abb369154890ad45322d4364c7a3acf9e8865c41d555efeabcc38ef09f678115eadf86ecd4ee4c4a9709f3c5e6cba30df37c32cf715cc9f993ae0c5e084af116ce4eeb3943d9ace99af80505be3784a86739757364abdd3a8a8a1c1817e2a73efce9697be30a7a230133464e0614b02374c4f8f7a7691a93f2131b1a791702283f5487e426e269994093bf897eb6c8fd4e0f0acd9e0fa7b224d65b05ea97d1cca6efde57589c99015c9d73747022c4d6d3ff520949d09b0c0c9b312d8a7299aa8651c4d29aee8ca62dc43d607e3ced9e8173ef034155a4a0bc483fac8e93fd0b00b782b66fa651039dcce855f777f215448cdd3b1c9bc9c5f561a137c5d236824546869f1d665afd070fadd9d053901c3e23d731f56b70ef150a84a0f0a44a42f347ae21c9f240e8cec990ae918c86c729b00761a43bbb091afb7be8b6efbab1395e76c1ec3d68e3dff05b8369da13939d70e7d32f596a82c4e9bd916fc28c3ce3f29e459f97bbd4157585aaf18389b1ef3e94fd5724a45e48f4cf239f230366b20ef368bd93ff346ed2c4403d56571c45fad31c684da8696c729fa81c620832c3d29bb048b2c2c4b779c63b9235c512b5332c83f2db7576f9c27085ff7b01b1c22880db5c914a4067532c5ec5320208799b694ec48da4ae5b70f182e62f72bcdb534bb71b94991a4df99148b89818eb0a7eb39729b27a174866bad660addb420aefdcc666170704343bf23ead319193fe865b4a18c862f4bac8130774b05e6f88965af1eaa3161be822b80b68881380d0ea05957fc422c6b9319f57208c604199de8c9105e0e9b2e20a9542b683330b457a0013c57a734cc39634946b50b2bf5706863073dcae9cb0084e75451cbc74c33044739b8f7268979466150272a97481762b69eba37f4b684cbaa5ef422106d2e4ce74b5779d82d26b20dc9b2e6d156b313416f61537336161784ddfa10a7f6c4945f05c25ed4d5ec391de1e3974c1fc2ebf1f8e7d0e86ba301076aabfae8676bb20383467354c63826da565c75a316d018f80313e26f5321afa7049af1cb0bbe610e9b6b346cde0990f7be08a64cfdae8d60c33b2b3d6a4cbeb2af93574bf315cf916970123039f75597ca136ec17f5c368f638956e80c8f8389144624eefd367a9ac579f53d25427df369f5583144863a0754bd0d7b083919786cf1291b4ce7719992cdfb6ef1483325b24ed157841dc092d7a10778a4c616004e7fb6ce0d32e488babe4bbb3a744b93f299f5fafcc61520e75ec6841322842f7a19949c32498e7cfa596bc9a36e435719599f35a6559b6aaa22e6b6d833dee9aa6aec20a96531463705097fc2d2f02e8006bddee720a8ee59817fa02b2d46e8361a7fb6400811c064422db577b8953af99be2650956a23edcc339b941f27d29afbcce3a03c302de7ddd9978367c1b316d241d1e0934796699c7987fe37a6c491b1a5ad19f2f76cd8e7a939ada92541eaa60ae746d7c23845b7e1519a66bbc42ebeb34f65a36f123d73ed33ca01ba7b1eb0b71f2a332f2eb530e0a9a1dbf57087ceb8409d930c0aca27c5e820274e7808349a649c94ab3d8fa033d3fb1b16c1ef9cb681040ead2621e5ed1522426f68e4c5466ae5772e20232ec20093e65f4011b73d203089d1f6d1d298b31172d17f637401dae391a139edb09f499e94cc26ec04c8a548c4656d7c25257b2ef3b7c259eb695e19011c8388302efd58046b9457f4ccd0911ec67e2a650a8091a718f971060b2c8cda2bfb07b9b36e3394363f42f1bab5094563dee96569b67e0f4ff46dc958d24ed17047140d051d08f4e01f92c7ecc14e29e947f29f89c6d6c1c984e2db2667a938a206eb55e62ff3edb99bfc9a44916e02080a7cbcfd2db52cc45129e618e4bc6732ff436baae265d4fc3ab4bddd77db005408e57877be9a3adb71511223781b7669183e8ceb9c9cec0279714db949a5f99dc1d480d33773607483732688de86d777936eb7547dde1a7b00bd4704263e5d20da77b2829464cbc585df774a4178a43a4732a2ba4946b31a684e8615c6a95abb4a56bd677e6e11d7275bd91a40f724dd82e79c9cafc79063ccba55584a314749983f7cfbd2949cbdaacde7546c9d0270d4e416dd4bc2b9ea109b0a4fce4115b1eb90ae665da527c9b7c4ecf5151a530c1e8107c0c739abfdeaab1c8b537891e5e3c77495013a27f7d82ffe95cb4348b8ced00a998c79ab305cf69ac68a783a54b84b1e214dab7d316935aab09526d825e5d6a058913cecff6f5ce6c9b920ec851acd2d032e5a3798130d069fbe0b22a6cda56ef075e6410f6d2306bf4d7b12e341ffd7b68935b23ded1f7c24f0217821d389b5d27d9e3f2493422675ee71f5e9a5174bfb2e7f989599c164563e695", 0x1000}, {&(0x7f0000001200)="b686c24605a3c5d5487b7d7d474aef46ef89ada60952b129cd8eab25b54983afa8a91529974e3b6b4126a2e5f945aff78d4b1cef227095881f0b04dc16f677cc6f17d8fc8f3dcdf51fb0794f66ef942b77cd9eece94395d94acd5236ff25faf9", 0x60}, {&(0x7f0000001280)="4e2614eb5bc8d824de98fc08833b672ffcaf17e47d6047aa46485257e13e661fd15a5cc5fccecdf36ea09c6e323ea9b2b3392a4b152f1b7436494256c620e7c64d1e1ac745af05fb9ea8ab70f4b3056c6908cd16d38b5c9189a9133a917d24a1c133a472adae9d7dde7e46a996d3f25d737bfd5f248597e68861d19ce97e60", 0x7f}, {&(0x7f0000001300)="f5e2a87540d92f23972ae8076e3979a62805e896b1b2255a4e53d10b22e61037bc35a479edc213ecd66614e7317066f3bcb9d6f880fd34e4d8cdd714a9537b6730e9c50462280abe9167ccbcdc204b30e0866dd3ce0f0f5c727b9b6dd428fe97d37b69f9626fe9ae239df3f4985e25", 0x6f}], 0x5) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SG_SET_TIMEOUT(r0, 0x2201, &(0x7f0000000000)=0x5) 00:26:03 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f757465000000000400", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 2314.596312] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2314.596333] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2314.606185] RIP: 0033:0x45a0ea [ 2314.606203] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2314.606212] RSP: 002b:00007f004a854a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2314.606227] RAX: ffffffffffffffda RBX: 00007f004a854b30 RCX: 000000000045a0ea [ 2314.606237] RDX: 00007f004a854ad0 RSI: 00000000200000c0 RDI: 00007f004a854af0 [ 2314.606252] RBP: 00000000200000c0 R08: 00007f004a854b30 R09: 00007f004a854ad0 [ 2314.621131] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2314.621146] R13: 0000000000000000 R14: 00000000004d9b98 R15: 0000000000000003 00:26:03 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x480) 00:26:03 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) userfaultfd(0x800) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x462c) 00:26:03 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f757465000400", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:26:03 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x0, {}, {}, {0x2000000}}) 00:26:03 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x2, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:03 executing program 1 (fault-call:0 fault-nth:39): syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) [ 2314.802783] FAULT_INJECTION: forcing a failure. [ 2314.802783] name failslab, interval 1, probability 0, space 0, times 0 [ 2314.807226] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:03 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f757465008800", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:26:03 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x0, {}, {}, {0x2}}) [ 2314.888053] CPU: 1 PID: 11043 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2314.895490] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2314.904862] Call Trace: [ 2314.907475] dump_stack+0x244/0x39d [ 2314.911132] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2314.916356] should_fail.cold.4+0xa/0x17 [ 2314.920439] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2314.925597] ? find_held_lock+0x36/0x1c0 [ 2314.929689] ? find_held_lock+0x36/0x1c0 [ 2314.934875] ? perf_trace_intel_memory_cxsr+0x818/0x870 [ 2314.940273] ? perf_trace_sched_process_exec+0x860/0x860 [ 2314.945738] ? kfree+0x1f8/0x230 [ 2314.945854] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2314.949135] ? ida_alloc_range+0x953/0xc70 [ 2314.949158] __should_failslab+0x124/0x180 [ 2314.949179] should_failslab+0x9/0x14 [ 2314.949196] __kmalloc_track_caller+0x2d1/0x760 [ 2314.949218] ? kstrdup_const+0x66/0x80 [ 2314.965824] kstrdup+0x39/0x70 [ 2314.965843] kstrdup_const+0x66/0x80 [ 2314.965869] alloc_vfsmnt+0x186/0x990 [ 2314.988896] ? m_stop+0x20/0x20 [ 2314.992195] ? zap_class+0x640/0x640 [ 2314.992217] ? rcu_pm_notify+0xc0/0xc0 [ 2314.992240] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2315.005366] ? refcount_sub_and_test_checked+0x203/0x310 [ 2315.010843] ? find_held_lock+0x36/0x1c0 [ 2315.014923] ? __get_fs_type+0x97/0xc0 [ 2315.014943] ? lock_downgrade+0x900/0x900 [ 2315.014963] ? lock_release+0xa00/0xa00 [ 2315.014987] ? apparmor_cred_transfer+0x590/0x590 [ 2315.023024] vfs_kern_mount.part.35+0x90/0x4f0 [ 2315.023045] ? may_umount+0xb0/0xb0 [ 2315.023060] ? _raw_read_unlock+0x2c/0x50 [ 2315.023076] ? __get_fs_type+0x97/0xc0 [ 2315.023097] do_mount+0x581/0x31f0 [ 2315.040086] ? check_preemption_disabled+0x48/0x280 [ 2315.040112] ? copy_mount_string+0x40/0x40 [ 2315.040140] ? copy_mount_options+0x5f/0x430 [ 2315.048162] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2315.048181] ? kmem_cache_alloc_trace+0x353/0x750 [ 2315.048202] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2315.048217] ? _copy_from_user+0xdf/0x150 [ 2315.048237] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2315.090471] ? copy_mount_options+0x315/0x430 [ 2315.094986] ksys_mount+0x12d/0x140 [ 2315.098632] __x64_sys_mount+0xbe/0x150 [ 2315.102631] do_syscall_64+0x1b9/0x820 [ 2315.106538] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2315.111923] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2315.116869] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2315.121730] ? trace_hardirqs_on_caller+0x310/0x310 [ 2315.126779] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2315.131825] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2315.136856] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2315.141720] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2315.146965] RIP: 0033:0x45a0ea [ 2315.150178] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2315.169114] RSP: 002b:00007f004a854a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2315.176836] RAX: ffffffffffffffda RBX: 00007f004a854b30 RCX: 000000000045a0ea 00:26:03 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f75746500000000000000000100", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030700000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000000000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000000000000892f0700636f6e6e6c6162656c0000000000000000000000000000000000000000000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000000000000007000000070000000a0000000434f4e4e5345434d41524bff6eef1d192516e43f9a305e46692c00000000000000000000000000000000000000000008"]}, 0x2a8) 00:26:03 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0xfeedcafe, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:03 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') ioctl$KVM_S390_UCAS_UNMAP(r0, 0x4018ae51, &(0x7f0000000040)={0x3, 0x1, 0xffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r2, 0x100, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x757}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x8000) fchdir(r0) sendfile(r1, r0, 0x0, 0x462c) socket$pptp(0x18, 0x1, 0x2) [ 2315.184114] RDX: 00007f004a854ad0 RSI: 00000000200000c0 RDI: 00007f004a854af0 [ 2315.191411] RBP: 00000000200000c0 R08: 00007f004a854b30 R09: 00007f004a854ad0 [ 2315.198701] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2315.205980] R13: 0000000000000000 R14: 00000000004d9b98 R15: 0000000000000003 00:26:03 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 2315.234604] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:03 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0xb00000000000000) 00:26:03 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x0, {}, {}, {0x200000000000000}}) 00:26:03 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x200000000000000, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:04 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0xfecaedfe00000000, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:04 executing program 1 (fault-call:0 fault-nth:40): syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:26:04 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x462c) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f0000000000)) 00:26:04 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x0, {}, {}, {0x0, 0x2}}) 00:26:04 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f757465000000000500", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 2315.421980] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2315.469349] FAULT_INJECTION: forcing a failure. [ 2315.469349] name failslab, interval 1, probability 0, space 0, times 0 [ 2315.508577] CPU: 1 PID: 11085 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2315.515971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2315.525332] Call Trace: [ 2315.525374] dump_stack+0x244/0x39d [ 2315.525404] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2315.536858] ? __lock_acquire+0x62f/0x4c20 [ 2315.541098] ? blkdev_get+0x5ed/0xb50 [ 2315.541125] should_fail.cold.4+0xa/0x17 [ 2315.541144] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2315.554113] ? mark_held_locks+0x130/0x130 [ 2315.558370] ? zap_class+0x640/0x640 [ 2315.562098] ? zap_class+0x640/0x640 [ 2315.565845] ? find_held_lock+0x36/0x1c0 [ 2315.565868] ? __lock_is_held+0xb5/0x140 [ 2315.565900] ? perf_trace_sched_process_exec+0x860/0x860 [ 2315.565921] ? sget_userns+0x190/0xed0 [ 2315.574037] __should_failslab+0x124/0x180 [ 2315.574058] should_failslab+0x9/0x14 [ 2315.574075] kmem_cache_alloc_trace+0x2d7/0x750 [ 2315.574104] sget_userns+0x1b6/0xed0 [ 2315.599851] ? kill_litter_super+0x60/0x60 [ 2315.604108] ? ns_test_super+0x50/0x50 [ 2315.608017] ? grab_super+0x400/0x400 [ 2315.611850] ? do_raw_spin_trylock+0x270/0x270 [ 2315.616457] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2315.622010] ? apparmor_capable+0x355/0x6c0 [ 2315.626350] ? apparmor_cred_transfer+0x590/0x590 [ 2315.631210] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2315.636861] ? cap_capable+0x1f9/0x260 [ 2315.640788] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2315.646373] ? security_capable+0x99/0xc0 [ 2315.650548] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2315.656102] ? ns_capable_common+0x13f/0x170 [ 2315.660546] ? kill_litter_super+0x60/0x60 [ 2315.664800] sget+0x10b/0x150 [ 2315.667960] ? ns_test_super+0x50/0x50 [ 2315.671867] mount_bdev+0x111/0x3e0 [ 2315.675544] ? msdos_mount+0x40/0x40 [ 2315.679273] msdos_mount+0x34/0x40 [ 2315.682832] mount_fs+0xae/0x31d [ 2315.686221] vfs_kern_mount.part.35+0xdc/0x4f0 [ 2315.690825] ? may_umount+0xb0/0xb0 [ 2315.694494] ? _raw_read_unlock+0x2c/0x50 [ 2315.698687] ? __get_fs_type+0x97/0xc0 [ 2315.702592] do_mount+0x581/0x31f0 [ 2315.706159] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 2315.711618] ? retint_kernel+0x1b/0x2d [ 2315.715533] ? copy_mount_string+0x40/0x40 [ 2315.719842] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2315.724617] ? retint_kernel+0x2d/0x2d [ 2315.728549] ? copy_mount_options+0x257/0x430 [ 2315.733093] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2315.738641] ? copy_mount_options+0x315/0x430 [ 2315.743158] ksys_mount+0x12d/0x140 [ 2315.746805] __x64_sys_mount+0xbe/0x150 [ 2315.750799] do_syscall_64+0x1b9/0x820 [ 2315.754704] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2315.760105] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2315.765049] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2315.769905] ? trace_hardirqs_on_caller+0x310/0x310 [ 2315.774939] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2315.779998] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2315.785032] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2315.789897] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2315.795099] RIP: 0033:0x45a0ea [ 2315.798307] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2315.817215] RSP: 002b:00007f004a854a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2315.824939] RAX: ffffffffffffffda RBX: 00007f004a854b30 RCX: 000000000045a0ea [ 2315.832221] RDX: 00007f004a854ad0 RSI: 00000000200000c0 RDI: 00007f004a854af0 [ 2315.839533] RBP: 00000000200000c0 R08: 00007f004a854b30 R09: 00007f004a854ad0 [ 2315.846819] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2315.854112] R13: 0000000000000000 R14: 00000000004d9b98 R15: 0000000000000003 00:26:04 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f757465000000000200", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:26:04 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4) ioctl$KVM_GET_SREGS(r0, 0x8138ae83, &(0x7f0000000180)) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f00000000c0)={0x4, &(0x7f0000000000)=[{0x0}, {}, {}, {}]}) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, &(0x7f0000000140)={r2, 0x1}) sendfile(r1, r0, 0x0, 0x462c) 00:26:04 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0xffffff1f, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) [ 2315.885913] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:04 executing program 1 (fault-call:0 fault-nth:41): syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:26:04 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x10000000) 00:26:04 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x0, {}, {}, {0x0, 0x200000000000000}}) 00:26:04 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000240)="e7ee84ae61630cd1d60f14802874b980ff02752bce24aca480ee7621628489d7b7c5d271635d5d2c4462ab5a8757117cc2c8cf12412ff2ddbd95e97f727034db28806b85ea1cd3208155b5643e1b26e71b5965fc9b7e299a4596bdf834f08b7e993020503031935e3615d899df9faf545676d58df5688d5a94026e6404c0702453") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x462c) mq_getsetattr(r0, &(0x7f0000000000)={0x5, 0x100000000, 0xc2f6, 0xff, 0xa7, 0x3, 0x1, 0x5}, &(0x7f00000000c0)) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f0000000140)=0x8) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r0, 0x800442d3, &(0x7f0000000180)={0x0, 0xc2e4d36, 0x10001, @remote, 'bond_slave_1\x00'}) [ 2316.022158] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2316.055441] FAULT_INJECTION: forcing a failure. [ 2316.055441] name failslab, interval 1, probability 0, space 0, times 0 00:26:04 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f757465000000000300", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 2316.090827] CPU: 0 PID: 11117 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2316.098232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2316.108046] Call Trace: [ 2316.110649] dump_stack+0x244/0x39d [ 2316.114319] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2316.119523] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 2316.125110] should_fail.cold.4+0xa/0x17 [ 2316.129191] ? should_fail+0x22d/0xd01 [ 2316.133090] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2316.138197] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2316.143319] ? pcpu_alloc+0x190/0x15e0 [ 2316.147214] ? zap_class+0x640/0x640 [ 2316.150967] ? find_held_lock+0x36/0x1c0 [ 2316.155057] ? perf_trace_sched_process_exec+0x860/0x860 [ 2316.160524] __should_failslab+0x124/0x180 [ 2316.164789] should_failslab+0x9/0x14 [ 2316.168599] kmem_cache_alloc+0x2be/0x730 [ 2316.172764] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 2316.177804] ? m_stop+0x20/0x20 [ 2316.181094] getname_kernel+0x54/0x370 [ 2316.184989] kern_path+0x1e/0x40 [ 2316.188379] lookup_bdev+0x10c/0x250 [ 2316.192096] ? blkdev_open+0x280/0x280 [ 2316.196042] ? find_held_lock+0x36/0x1c0 [ 2316.200124] blkdev_get_by_path+0x1f/0xe0 [ 2316.204312] mount_bdev+0x5d/0x3e0 [ 2316.207925] ? msdos_mount+0x40/0x40 [ 2316.211649] msdos_mount+0x34/0x40 [ 2316.215198] mount_fs+0xae/0x31d [ 2316.218577] vfs_kern_mount.part.35+0xdc/0x4f0 [ 2316.223169] ? may_umount+0xb0/0xb0 [ 2316.226800] ? _raw_read_unlock+0x2c/0x50 [ 2316.230955] ? __get_fs_type+0x97/0xc0 [ 2316.234852] do_mount+0x581/0x31f0 [ 2316.238685] ? check_preemption_disabled+0x48/0x280 [ 2316.243713] ? copy_mount_string+0x40/0x40 [ 2316.247962] ? copy_mount_options+0x5f/0x430 [ 2316.252375] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2316.257413] ? kmem_cache_alloc_trace+0x353/0x750 [ 2316.262263] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2316.267826] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2316.273368] ? copy_mount_options+0x315/0x430 [ 2316.277891] ksys_mount+0x12d/0x140 [ 2316.281540] __x64_sys_mount+0xbe/0x150 [ 2316.285555] do_syscall_64+0x1b9/0x820 [ 2316.289470] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2316.294853] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2316.299790] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2316.304640] ? trace_hardirqs_on_caller+0x310/0x310 [ 2316.309667] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2316.314726] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2316.319784] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2316.324637] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2316.329831] RIP: 0033:0x45a0ea [ 2316.333033] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2316.351937] RSP: 002b:00007f004a854a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2316.359648] RAX: ffffffffffffffda RBX: 00007f004a854b30 RCX: 000000000045a0ea [ 2316.366919] RDX: 00007f004a854ad0 RSI: 00000000200000c0 RDI: 00007f004a854af0 [ 2316.374236] RBP: 00000000200000c0 R08: 00007f004a854b30 R09: 00007f004a854ad0 [ 2316.381507] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 00:26:05 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x0, {}, {}, {0x0, 0x2000000}}) [ 2316.388785] R13: 0000000000000000 R14: 00000000004d9b98 R15: 0000000000000003 00:26:05 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendfile(r0, 0xffffffffffffffff, 0x0, 0x462c) 00:26:05 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x300, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:05 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_G_EDID(r0, 0xc0285628, &(0x7f0000000080)={0x0, 0x8, 0x3, [], &(0x7f0000000040)=0x6}) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)) 00:26:05 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f757465000000000600", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030700000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000000000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000000000000892f0700636f6e6e6c6162656c0000000000000000000000000000000000000000000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000000000000007000000070000000a0000000434f4e4e5345434d41524bff6eef1d192516e43f9a305e46692c00000000000000000000000000000000000000000008"]}, 0x2a8) [ 2316.480327] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:05 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_S390_VCPU_FAULT(r0, 0x4008ae52, &(0x7f0000000040)=0x5) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000000)={0x6, 0x0, 0x80000001}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x462c) 00:26:05 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x10, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:05 executing program 1 (fault-call:0 fault-nth:42): syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) [ 2316.627008] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:05 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x1b00000000000000) 00:26:05 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000000040)=0x401) 00:26:05 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f7574650000000000000000008800", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:26:05 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) lstat(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000016c0)=0x0, &(0x7f0000001700), &(0x7f0000001740)) sendmsg$unix(r0, &(0x7f00000017c0)={&(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001580)=[{&(0x7f00000001c0)="efa8e520fdf8a9ab12e358e03898f2eba586a4e768136123714d270ceac50062f624da1a47828740ec556efea6f43dbc57f0912ef068598a8d9e9fdf02be91a266d74dcd0866009f312dbc43f5b5a9360bcb4bb363f36aa7fa4b18b7dc9f4846bd78e86a0d1acbb9abcac3a35e4ee7ae8d8de4845a15be93beb06b97a1bcec7e3fdfe6ade3394a1d6f9c261f125e747e67499c5a040634700e73dfe90a4f0d0ea61846d2f54916f07dca26b1cbad0982dca8a7a05a", 0xb5}, {&(0x7f0000000280)="30c4266f7a2f2c3d7a596932324149a5ef977e6fd4f1ed27a918eb02185cc43de8858130911fb7abe5c98325a4ccd361588a022d0d80fbba756d86b42483c709a7efd1ff0b6fd3023c799c041a8708f25781d4375f8ce678415267454cd1e0d66127424619168890c293568c87253d7f31d527375272a1", 0x77}, {&(0x7f0000000300)="b3f215e61327479949ad8921e78c949464e420105b7bfd249a842525463d26da4e835fe8bf4de1fc65fe9313f19c598173e60d5e7d3f076bf44a9d978d1d6efcf032ae0c55fab51266662fb19ba3967c1293e6bd219069cdc4ebc016756d7e4155127b07e5ef9d5e13488196e74c362d1b0ebe616461b4701e3a7062608ad06ee75913253cf4ad13b3a6243ce2e5aa5d142c8a769049f9857a8bae96551458d4bf65ceb16be4eb855576a4c57c6cc1da383b334af02273fd5d1b0f30ce0b025c9e111a0c592df65af96631cdf11f0d9c106478d335cf4cd683be1dfa67db1826", 0xe0}, {&(0x7f0000000400)="62a6e7dbbb70f93854d19af03485618bd912618dc2290f1ce921e85b1bcd2cd9d0e5527fc90be53056b560b0ae7b3d9a7823d9d0f2b95383d83287c51b70eb9df18029d16b76c469f2db36e60bfb4b7b0993d1303adc9d9785ff9722fd69dbf96e81ee8d2f77df0f9efa8342491638b4354d424f23100c5b6c6ef29427ab03fb3f48ae2e09adc7aa52b8dc44cc0f5d787ca7161c5aa108fe2bccf21782e07e0128085eaccc27fbd9b9a81e02b9d9f473dfdee8bf71b612f40ceb6f738fe26e42490a4ef9641d1c489a1595f43f81a29e18cedb8012a467d51943e4b55d353c4268ba", 0xe2}, {&(0x7f0000000500)="e7686a1d3f7423492e945a31fdd7f71c0cc5133b50cdc8b43c6a21a14b65947346feed4937e1348159db5d2c08967e592b44eb267c7bb2db369dbe5016fae70ff2bb2fd39506b1df4072f8ac313ddd82f619", 0x52}, {&(0x7f0000000580)="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", 0x1000}], 0x6, &(0x7f0000001780)=[@cred={0x20, 0x1, 0x2, r3, r4, r5}, @rights={0x20, 0x1, 0x1, [r2, r1, r2, r2]}], 0x40, 0x840}, 0x20000001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x80000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x462c) 00:26:05 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0xffffff1f, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:05 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f7574650000000000000000000300", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030700000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000000000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000000000000892f0700636f6e6e6c6162656c0000000000000000000000000000000000000000000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000000000000007000000070000000a0000000434f4e4e5345434d41524bff6eef1d192516e43f9a305e46692c00000000000000000000000000000000000000000008"]}, 0x2a8) [ 2316.808899] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:05 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000000)=""/53, &(0x7f00000000c0)=0x35) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x462c) 00:26:05 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x300, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:05 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x0, {}, {}, {0x100}}) [ 2316.939026] FAULT_INJECTION: forcing a failure. [ 2316.939026] name failslab, interval 1, probability 0, space 0, times 0 [ 2316.964993] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2316.981428] CPU: 1 PID: 11156 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2316.989340] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2316.998701] Call Trace: [ 2317.001315] dump_stack+0x244/0x39d [ 2317.004969] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2317.010191] should_fail.cold.4+0xa/0x17 [ 2317.014275] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2317.019406] ? zap_class+0x640/0x640 [ 2317.023129] ? save_stack+0xa9/0xd0 [ 2317.026776] ? save_stack+0x43/0xd0 [ 2317.030416] ? kasan_kmalloc+0xc7/0xe0 [ 2317.034342] ? __kmalloc+0x15b/0x760 [ 2317.038075] ? find_held_lock+0x36/0x1c0 [ 2317.042163] ? __lock_is_held+0xb5/0x140 [ 2317.046240] ? pcie_aspm_exit_link_state+0x78/0x800 [ 2317.051284] ? perf_trace_sched_process_exec+0x860/0x860 [ 2317.056748] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2317.062310] ? check_preemption_disabled+0x48/0x280 [ 2317.067349] __should_failslab+0x124/0x180 [ 2317.071601] should_failslab+0x9/0x14 [ 2317.075418] kmem_cache_alloc_node_trace+0x270/0x740 [ 2317.080551] __kmalloc_node+0x3c/0x70 [ 2317.084377] kvmalloc_node+0x65/0xf0 [ 2317.088106] __list_lru_init+0x5d9/0x840 [ 2317.092183] ? list_lru_destroy+0x500/0x500 [ 2317.096529] ? up_write+0x7b/0x220 [ 2317.100079] ? down_write_nested+0x130/0x130 [ 2317.104498] ? down_read+0x120/0x120 [ 2317.108269] ? init_wait_entry+0x1c0/0x1c0 [ 2317.112522] ? prealloc_shrinker+0x172/0x340 [ 2317.116959] sget_userns+0x975/0xed0 [ 2317.120687] ? kill_litter_super+0x60/0x60 [ 2317.124945] ? ns_test_super+0x50/0x50 [ 2317.128846] ? grab_super+0x400/0x400 [ 2317.132671] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2317.138227] ? apparmor_capable+0x355/0x6c0 [ 2317.142569] ? apparmor_cred_transfer+0x590/0x590 [ 2317.147430] ? cap_capable+0x1f9/0x260 [ 2317.151337] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2317.156889] ? security_capable+0x99/0xc0 [ 2317.161059] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2317.166620] ? ns_capable_common+0x13f/0x170 [ 2317.171060] ? kill_litter_super+0x60/0x60 [ 2317.175327] sget+0x10b/0x150 [ 2317.178445] ? ns_test_super+0x50/0x50 [ 2317.182357] mount_bdev+0x111/0x3e0 [ 2317.185998] ? msdos_mount+0x40/0x40 [ 2317.189733] msdos_mount+0x34/0x40 [ 2317.193301] mount_fs+0xae/0x31d [ 2317.196686] vfs_kern_mount.part.35+0xdc/0x4f0 [ 2317.201283] ? may_umount+0xb0/0xb0 [ 2317.204921] ? _raw_read_unlock+0x2c/0x50 [ 2317.209079] ? __get_fs_type+0x97/0xc0 [ 2317.212987] do_mount+0x581/0x31f0 [ 2317.216549] ? check_preemption_disabled+0x48/0x280 [ 2317.221591] ? copy_mount_string+0x40/0x40 [ 2317.225853] ? copy_mount_options+0x5f/0x430 [ 2317.230275] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2317.235308] ? kmem_cache_alloc_trace+0x353/0x750 [ 2317.240668] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2317.246219] ? _copy_from_user+0xdf/0x150 [ 2317.250389] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2317.255945] ? copy_mount_options+0x315/0x430 [ 2317.260512] ksys_mount+0x12d/0x140 [ 2317.264169] __x64_sys_mount+0xbe/0x150 [ 2317.268161] do_syscall_64+0x1b9/0x820 [ 2317.272062] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2317.277452] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2317.282397] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2317.287258] ? trace_hardirqs_on_caller+0x310/0x310 [ 2317.292290] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2317.297326] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2317.302363] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2317.307223] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2317.312420] RIP: 0033:0x45a0ea [ 2317.315628] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 00:26:06 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400202) sendfile(0xffffffffffffffff, r0, 0x0, 0x462c) 00:26:06 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f75746500000000000100", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030700000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000000000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000000000000892f0700636f6e6e6c6162656c0000000000000000000000000000000000000000000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000000000000007000000070000000a0000000434f4e4e5345434d41524bff6eef1d192516e43f9a305e46692c00000000000000000000000000000000000000000008"]}, 0x2a8) [ 2317.334563] RSP: 002b:00007f004a854a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2317.342280] RAX: ffffffffffffffda RBX: 00007f004a854b30 RCX: 000000000045a0ea [ 2317.349577] RDX: 00007f004a854ad0 RSI: 00000000200000c0 RDI: 00007f004a854af0 [ 2317.356858] RBP: 00000000200000c0 R08: 00007f004a854b30 R09: 00007f004a854ad0 [ 2317.364131] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2317.371428] R13: 0000000000000000 R14: 00000000004d9b98 R15: 0000000000000003 [ 2317.471464] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:06 executing program 1 (fault-call:0 fault-nth:43): syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:26:06 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000140)={0x0, 0x58, "4eb6cb7daef3b78285363bdce033b1b53d3ed63be2692e51722e37e0e24f2715c1050cff65593556a062e9e4a297063cd3e28e2cf494d43a9494fc236bac5f62660925eb9770166e268d5de4902b786ae36c4bc5c2602c5a"}, &(0x7f0000000000)=0x60) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f00000000c0)={r2, 0xb759}, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x462c) 00:26:06 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x10, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:06 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x10000) syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x42, 0x80000) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)) 00:26:06 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00`\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030700000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000000000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000000000000892f0700636f6e6e6c6162656c0000000000000000000000000000000000000000000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000000000000007000000070000000a0000000434f4e4e5345434d41524bff6eef1d192516e43f9a305e46692c00000000000000000000000000000000000000000008"]}, 0x2a8) 00:26:06 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x1300000000000000) [ 2317.620823] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:06 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:06 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x20000) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)) 00:26:06 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') read(r0, &(0x7f0000000000)=""/25, 0x19) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x462c) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x3) [ 2317.665250] FAULT_INJECTION: forcing a failure. [ 2317.665250] name failslab, interval 1, probability 0, space 0, times 0 [ 2317.712799] CPU: 0 PID: 11214 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2317.720205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2317.729569] Call Trace: [ 2317.732185] dump_stack+0x244/0x39d [ 2317.735841] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2317.741058] ? __kernel_text_address+0xd/0x40 [ 2317.745570] ? unwind_get_return_address+0x61/0xa0 [ 2317.750523] should_fail.cold.4+0xa/0x17 [ 2317.754610] ? fault_create_debugfs_attr+0x1f0/0x1f0 00:26:06 executing program 0: ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f0000000200)) [ 2317.759737] ? save_stack+0x43/0xd0 [ 2317.763387] ? kasan_kmalloc+0xc7/0xe0 [ 2317.767291] ? kmem_cache_alloc_trace+0x152/0x750 [ 2317.772148] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 2317.777349] ? __list_lru_init+0x4d6/0x840 [ 2317.781629] ? zap_class+0x640/0x640 [ 2317.785351] ? msdos_mount+0x34/0x40 [ 2317.789074] ? mount_fs+0xae/0x31d [ 2317.792624] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 2317.797394] ? do_mount+0x581/0x31f0 [ 2317.801125] ? ksys_mount+0x12d/0x140 [ 2317.804941] ? __x64_sys_mount+0xbe/0x150 [ 2317.809130] ? do_syscall_64+0x1b9/0x820 00:26:06 executing program 4: gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000040)='n`_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r2, r1, 0x0, 0x462c) [ 2317.813215] ? find_held_lock+0x36/0x1c0 [ 2317.817294] ? __lock_is_held+0xb5/0x140 [ 2317.821388] ? perf_trace_sched_process_exec+0x860/0x860 [ 2317.826885] __should_failslab+0x124/0x180 [ 2317.831145] should_failslab+0x9/0x14 [ 2317.834994] kmem_cache_alloc_trace+0x2d7/0x750 [ 2317.839716] ? __kmalloc_node+0x3c/0x70 [ 2317.843718] ? __kmalloc_node+0x3c/0x70 [ 2317.843738] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2317.843771] __memcg_init_list_lru_node+0x185/0x2d0 [ 2317.843828] ? kvfree_rcu+0x20/0x20 [ 2317.861496] ? __kmalloc_node+0x50/0x70 [ 2317.865493] __list_lru_init+0x4d6/0x840 [ 2317.869588] ? list_lru_destroy+0x500/0x500 [ 2317.873935] ? up_write+0x7b/0x220 [ 2317.877497] ? down_write_nested+0x130/0x130 [ 2317.881938] ? down_read+0x120/0x120 [ 2317.885672] ? init_wait_entry+0x1c0/0x1c0 [ 2317.889932] ? prealloc_shrinker+0x172/0x340 [ 2317.894379] sget_userns+0x975/0xed0 [ 2317.898128] ? kill_litter_super+0x60/0x60 [ 2317.902378] ? ns_test_super+0x50/0x50 [ 2317.906284] ? grab_super+0x400/0x400 00:26:06 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x462c) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f00000000c0)=0xe8) sendto$packet(r0, &(0x7f0000000000)="844bf26c5ed2a8a0b0551524", 0xc, 0x80, &(0x7f0000000240)={0x11, 0x0, r3, 0x1, 0x100, 0x6, @local}, 0x14) [ 2317.910129] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2317.915682] ? apparmor_capable+0x355/0x6c0 [ 2317.920046] ? apparmor_cred_transfer+0x590/0x590 [ 2317.924922] ? cap_capable+0x1f9/0x260 [ 2317.924947] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2317.924963] ? security_capable+0x99/0xc0 [ 2317.924989] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2317.938566] ? ns_capable_common+0x13f/0x170 [ 2317.938600] ? kill_litter_super+0x60/0x60 [ 2317.938615] sget+0x10b/0x150 [ 2317.938631] ? ns_test_super+0x50/0x50 [ 2317.938667] mount_bdev+0x111/0x3e0 [ 2317.938698] ? msdos_mount+0x40/0x40 [ 2317.938720] msdos_mount+0x34/0x40 [ 2317.938738] mount_fs+0xae/0x31d [ 2317.974208] vfs_kern_mount.part.35+0xdc/0x4f0 [ 2317.978808] ? may_umount+0xb0/0xb0 [ 2317.982443] ? _raw_read_unlock+0x2c/0x50 [ 2317.986603] ? __get_fs_type+0x97/0xc0 [ 2317.990502] do_mount+0x581/0x31f0 [ 2317.994066] ? check_preemption_disabled+0x48/0x280 [ 2317.999143] ? copy_mount_string+0x40/0x40 [ 2318.003413] ? copy_mount_options+0x5f/0x430 [ 2318.007828] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2318.012850] ? kmem_cache_alloc_trace+0x353/0x750 [ 2318.017713] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2318.023254] ? _copy_from_user+0xdf/0x150 [ 2318.027412] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2318.032955] ? copy_mount_options+0x315/0x430 [ 2318.037462] ksys_mount+0x12d/0x140 [ 2318.041113] __x64_sys_mount+0xbe/0x150 [ 2318.045101] do_syscall_64+0x1b9/0x820 [ 2318.048992] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2318.054387] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2318.059321] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2318.064170] ? trace_hardirqs_on_caller+0x310/0x310 [ 2318.069195] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2318.074219] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2318.079248] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2318.084104] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2318.089297] RIP: 0033:0x45a0ea [ 2318.092509] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2318.111938] RSP: 002b:00007f004a854a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2318.119645] RAX: ffffffffffffffda RBX: 00007f004a854b30 RCX: 000000000045a0ea [ 2318.126930] RDX: 00007f004a854ad0 RSI: 00000000200000c0 RDI: 00007f004a854af0 [ 2318.134201] RBP: 00000000200000c0 R08: 00007f004a854b30 R09: 00007f004a854ad0 [ 2318.141490] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2318.148766] R13: 0000000000000000 R14: 00000000004d9b98 R15: 0000000000000003 00:26:06 executing program 1 (fault-call:0 fault-nth:44): syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:26:06 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f75746500000000000600", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:26:06 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x462c) syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x2f, 0x119100) 00:26:06 executing program 0: r0 = syz_open_dev$video(&(0x7f00000001c0)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x8001, 0x0) ioctl$KVM_GET_PIT(r1, 0xc048ae65, &(0x7f00000000c0)) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000000)=0xfffffffffffffffa) 00:26:06 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x400000000000000) 00:26:06 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:07 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x194, r3, 0x800, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0x134, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @broadcast}}, {0x14, 0x2, @in={0x2, 0x4e22, @rand_addr=0x3}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x100, @empty, 0xf420}}, {0x14, 0x2, @in={0x2, 0x4e23, @remote}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'syz_tun\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1000}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'vcan0\x00'}}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8b51}]}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}]}, @TIPC_NLA_BEARER_PROP={0x54, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}]}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1ff}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xc8b1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}]}]}, 0x194}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_GET_NR_MMU_PAGES(r0, 0xae45, 0x1) sendfile(r1, r0, 0x0, 0x462c) [ 2318.338488] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2318.366681] FAULT_INJECTION: forcing a failure. [ 2318.366681] name failslab, interval 1, probability 0, space 0, times 0 [ 2318.418865] CPU: 1 PID: 11245 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2318.426278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2318.435639] Call Trace: [ 2318.438247] dump_stack+0x244/0x39d [ 2318.441903] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2318.447143] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2318.452702] should_fail.cold.4+0xa/0x17 [ 2318.456789] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2318.461922] ? zap_class+0x640/0x640 [ 2318.465649] ? zap_class+0x640/0x640 [ 2318.469374] ? radix_tree_iter_tag_clear+0x90/0x90 [ 2318.474321] ? find_held_lock+0x36/0x1c0 [ 2318.478420] ? __lock_is_held+0xb5/0x140 [ 2318.482505] ? fuse_read_forget.isra.25+0x6f8/0xda0 [ 2318.487552] ? perf_trace_sched_process_exec+0x860/0x860 [ 2318.493012] ? perf_trace_sched_process_exec+0x860/0x860 [ 2318.498490] __should_failslab+0x124/0x180 [ 2318.502746] should_failslab+0x9/0x14 [ 2318.502772] __kmalloc+0x2e0/0x760 [ 2318.502792] ? __list_lru_init+0x151/0x840 [ 2318.514387] __list_lru_init+0x151/0x840 [ 2318.518480] ? list_lru_destroy+0x500/0x500 [ 2318.518507] ? up_write+0x7b/0x220 [ 2318.526359] ? down_write_nested+0x130/0x130 [ 2318.530784] ? down_read+0x120/0x120 [ 2318.534542] ? init_wait_entry+0x1c0/0x1c0 [ 2318.538810] ? prealloc_shrinker+0x172/0x340 [ 2318.543244] sget_userns+0x975/0xed0 [ 2318.543261] ? kill_litter_super+0x60/0x60 [ 2318.543281] ? ns_test_super+0x50/0x50 [ 2318.555101] ? grab_super+0x400/0x400 [ 2318.555135] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2318.564481] ? apparmor_capable+0x355/0x6c0 [ 2318.568828] ? apparmor_cred_transfer+0x590/0x590 [ 2318.573692] ? cap_capable+0x1f9/0x260 [ 2318.577644] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2318.583187] ? security_capable+0x99/0xc0 [ 2318.587342] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2318.592896] ? ns_capable_common+0x13f/0x170 [ 2318.597316] ? kill_litter_super+0x60/0x60 [ 2318.601556] sget+0x10b/0x150 [ 2318.604681] ? ns_test_super+0x50/0x50 [ 2318.608594] mount_bdev+0x111/0x3e0 [ 2318.612228] ? msdos_mount+0x40/0x40 [ 2318.615954] msdos_mount+0x34/0x40 [ 2318.619499] mount_fs+0xae/0x31d [ 2318.622881] vfs_kern_mount.part.35+0xdc/0x4f0 [ 2318.627471] ? may_umount+0xb0/0xb0 [ 2318.631101] ? _raw_read_unlock+0x2c/0x50 [ 2318.635257] ? __get_fs_type+0x97/0xc0 [ 2318.639163] do_mount+0x581/0x31f0 [ 2318.642710] ? check_preemption_disabled+0x48/0x280 [ 2318.647769] ? copy_mount_string+0x40/0x40 [ 2318.652019] ? copy_mount_options+0x5f/0x430 [ 2318.656459] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2318.661485] ? kmem_cache_alloc_trace+0x353/0x750 [ 2318.666362] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2318.671904] ? _copy_from_user+0xdf/0x150 [ 2318.676064] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2318.681621] ? copy_mount_options+0x315/0x430 [ 2318.686124] ksys_mount+0x12d/0x140 [ 2318.689766] __x64_sys_mount+0xbe/0x150 [ 2318.693751] do_syscall_64+0x1b9/0x820 [ 2318.697652] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2318.703024] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2318.707990] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2318.712839] ? trace_hardirqs_on_caller+0x310/0x310 [ 2318.717861] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2318.722885] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2318.727908] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2318.732764] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2318.738653] RIP: 0033:0x45a0ea [ 2318.741854] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2318.760768] RSP: 002b:00007f004a854a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 00:26:07 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:07 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x100, 0x0) ioctl$VIDIOC_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f0000000080)={0x0, 0x0, [], @raw_data=[0xc62d, 0x5, 0x7, 0x2, 0xbd, 0x4, 0x4, 0x3, 0x3, 0x9ae3, 0x0, 0x8, 0x13, 0x0, 0x0, 0x6, 0x5, 0x2, 0x5, 0x5, 0x7, 0x4, 0x47, 0x7, 0x1, 0x0, 0xfff, 0x3, 0x5, 0x10000, 0x401, 0x80000001]}) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f0000000200)) [ 2318.768482] RAX: ffffffffffffffda RBX: 00007f004a854b30 RCX: 000000000045a0ea [ 2318.775766] RDX: 00007f004a854ad0 RSI: 00000000200000c0 RDI: 00007f004a854af0 [ 2318.783037] RBP: 00000000200000c0 R08: 00007f004a854b30 R09: 00007f004a854ad0 [ 2318.790308] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2318.797582] R13: 0000000000000000 R14: 00000000004d9b98 R15: 0000000000000003 00:26:07 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00`\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:26:07 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:07 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0xffff0000) 00:26:07 executing program 1 (fault-call:0 fault-nth:45): syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:26:07 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = getpid() sched_setparam(r2, &(0x7f0000000340)=0x200) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x462c) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000440)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x41000}, 0xc, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r4, @ANYBLOB="77342dbd7000fbdbdf250300000008000100000000006dbb39f61f9a6c381f094e431144bba8420804bc815b4262ff344e55070906dc1b31b0820c62b02846f4d8cc6700ca8463b3f476abb440c96754549d40b7b02f710606507da1b433afa8225f9211cd4a9b5cc326a7869529a925a99b8f9001a6e7c2e965388803b0efd005a9063928c1f033202c8f7f04739b7a140d06fd39be92b3ca2f097a8d39e07f7e204556390386b0db79ef9229bcfad8f993254f21"], 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x8000) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000300)={0xf6, &(0x7f0000000200)=""/246}) [ 2318.928591] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:07 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.stat\x00', 0x0, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f0000000100)={0x3, "daa3a07bde2801461191509ec31246306389744fb7662de86da9a7f6c4d4798d", 0x7, 0x1, 0xce, 0xfff, 0x4, 0x4, 0x0, 0x1}) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f0000000200)) ioctl$VIDIOC_QUERYSTD(r1, 0x8008563f, &(0x7f0000000040)=0x0) ioctl$VIDIOC_S_STD(r1, 0x40085618, &(0x7f0000000080)=r2) [ 2318.994273] FAULT_INJECTION: forcing a failure. [ 2318.994273] name failslab, interval 1, probability 0, space 0, times 0 [ 2319.030574] CPU: 1 PID: 11269 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2319.037979] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2319.047343] Call Trace: [ 2319.049957] dump_stack+0x244/0x39d [ 2319.053616] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2319.058841] should_fail.cold.4+0xa/0x17 [ 2319.062924] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2319.068058] ? zap_class+0x640/0x640 [ 2319.071796] ? save_stack+0xa9/0xd0 [ 2319.075441] ? save_stack+0x43/0xd0 [ 2319.079080] ? kasan_kmalloc+0xc7/0xe0 [ 2319.083005] ? __kmalloc+0x15b/0x760 [ 2319.086739] ? find_held_lock+0x36/0x1c0 [ 2319.090827] ? __lock_is_held+0xb5/0x140 [ 2319.094923] ? perf_trace_sched_process_exec+0x860/0x860 [ 2319.100387] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2319.105945] ? check_preemption_disabled+0x48/0x280 [ 2319.110993] __should_failslab+0x124/0x180 [ 2319.115254] should_failslab+0x9/0x14 [ 2319.119110] kmem_cache_alloc_node_trace+0x270/0x740 [ 2319.124251] __kmalloc_node+0x3c/0x70 [ 2319.128066] kvmalloc_node+0x65/0xf0 [ 2319.131812] __list_lru_init+0x5d9/0x840 [ 2319.135942] ? list_lru_destroy+0x500/0x500 [ 2319.140283] ? up_write+0x7b/0x220 [ 2319.143852] ? down_write_nested+0x130/0x130 [ 2319.148287] ? down_read+0x120/0x120 [ 2319.152021] ? init_wait_entry+0x1c0/0x1c0 [ 2319.156272] ? prealloc_shrinker+0x172/0x340 [ 2319.160709] sget_userns+0x975/0xed0 [ 2319.164451] ? kill_litter_super+0x60/0x60 [ 2319.168711] ? ns_test_super+0x50/0x50 [ 2319.172617] ? grab_super+0x400/0x400 [ 2319.176444] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2319.181997] ? apparmor_capable+0x355/0x6c0 [ 2319.186335] ? apparmor_cred_transfer+0x590/0x590 [ 2319.191207] ? cap_capable+0x1f9/0x260 [ 2319.195147] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2319.200710] ? security_capable+0x99/0xc0 [ 2319.204968] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2319.210523] ? ns_capable_common+0x13f/0x170 [ 2319.214957] ? kill_litter_super+0x60/0x60 [ 2319.219205] sget+0x10b/0x150 [ 2319.222329] ? ns_test_super+0x50/0x50 [ 2319.226256] mount_bdev+0x111/0x3e0 [ 2319.229896] ? msdos_mount+0x40/0x40 [ 2319.233630] msdos_mount+0x34/0x40 [ 2319.237635] mount_fs+0xae/0x31d [ 2319.241027] vfs_kern_mount.part.35+0xdc/0x4f0 [ 2319.245646] ? may_umount+0xb0/0xb0 [ 2319.249288] ? _raw_read_unlock+0x2c/0x50 [ 2319.253445] ? __get_fs_type+0x97/0xc0 [ 2319.257351] do_mount+0x581/0x31f0 [ 2319.260906] ? retint_kernel+0x1b/0x2d [ 2319.264835] ? trace_hardirqs_on+0x310/0x310 [ 2319.269260] ? copy_mount_string+0x40/0x40 [ 2319.273511] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2319.278296] ? retint_kernel+0x2d/0x2d [ 2319.282209] ? copy_mount_options+0x228/0x430 [ 2319.286720] ? copy_mount_options+0x239/0x430 [ 2319.291245] ? __sanitizer_cov_trace_pc+0x26/0x50 00:26:07 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:07 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') ioctl$VIDIOC_S_EDID(r0, 0xc0285629, &(0x7f00000000c0)={0x0, 0x5, 0x9, [], &(0x7f0000000000)=0x2}) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000140)={{0x5e, @local, 0x4e23, 0x0, 'sed\x00', 0x8, 0x1, 0x42}, {@multicast2, 0x4e24, 0x0, 0x5, 0x8, 0xc9d9}}, 0x44) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$nl_crypto(0x10, 0x3, 0x15) sendfile(r1, r0, 0x0, 0x462c) 00:26:07 executing program 4: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x2af, 0x400) ioctl$DRM_IOCTL_GET_MAGIC(r0, 0x80046402, &(0x7f00000000c0)=0x5) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r2, r1, 0x0, 0x462c) 00:26:07 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:07 executing program 4: syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x9) 00:26:07 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) [ 2319.296101] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2319.301652] ? copy_mount_options+0x315/0x430 [ 2319.306191] ksys_mount+0x12d/0x140 [ 2319.309849] __x64_sys_mount+0xbe/0x150 [ 2319.313847] do_syscall_64+0x1b9/0x820 [ 2319.317751] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2319.323176] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2319.328134] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2319.332996] ? trace_hardirqs_on_caller+0x310/0x310 [ 2319.338029] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2319.343062] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2319.348103] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2319.352962] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2319.358158] RIP: 0033:0x45a0ea [ 2319.361358] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2319.380284] RSP: 002b:00007f004a854a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2319.387996] RAX: ffffffffffffffda RBX: 00007f004a854b30 RCX: 000000000045a0ea 00:26:08 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\a\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:26:08 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x462c) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f00000000c0)={0x5, 0x6, 0xffff, 0xffffffffffffffb6, 0x5}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x200, 0x0) [ 2319.395268] RDX: 00007f004a854ad0 RSI: 00000000200000c0 RDI: 00007f004a854af0 [ 2319.402560] RBP: 00000000200000c0 R08: 00007f004a854b30 R09: 00007f004a854ad0 [ 2319.409832] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2319.417116] R13: 0000000000000000 R14: 00000000004d9b98 R15: 0000000000000003 00:26:08 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x500) 00:26:08 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:08 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x80) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@known='trusted.overlay.impure\x00', &(0x7f0000000180)=""/51, 0x33) bind$nfc_llcp(r0, &(0x7f0000000080)={0x27, 0x1, 0x0, 0x7, 0x200, 0xbce1, "2952704aae49b56e25a389400703ddc89a034944aefe5a9965adb2b6f143b9f052718c5960eccc93e674285c68b279c161664ffbc6ff8906d14e6a270b4de8"}, 0x60) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f0000000200)={0x0, {0x100, 0x51}}) 00:26:08 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)) fcntl$getown(0xffffffffffffffff, 0x9) r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f00000000c0)="186535554ec71deab2ea") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r2, r1, 0x0, 0x462c) 00:26:08 executing program 1 (fault-call:0 fault-nth:46): syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:26:08 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x7, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a067fffffff81004e220000000058000b4824ca945f64009400050028925aa8000000000000008000f0fffeffe809000000fff5dd0000001000010009040800410500000000fcff", 0x58}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r2, r1, 0x0, 0x462c) [ 2319.653705] FAULT_INJECTION: forcing a failure. [ 2319.653705] name failslab, interval 1, probability 0, space 0, times 0 [ 2319.714342] CPU: 0 PID: 11313 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2319.721747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2319.721755] Call Trace: [ 2319.721793] dump_stack+0x244/0x39d [ 2319.721820] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2319.737376] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2319.737403] should_fail.cold.4+0xa/0x17 [ 2319.737425] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2319.737443] ? kernel_text_address+0x79/0xf0 [ 2319.737494] ? unwind_get_return_address+0x61/0xa0 [ 2319.757129] ? __save_stack_trace+0x8d/0xf0 [ 2319.757147] ? zap_class+0x640/0x640 [ 2319.757173] ? find_held_lock+0x36/0x1c0 [ 2319.778588] ? __lock_is_held+0xb5/0x140 [ 2319.778620] ? perf_trace_sched_process_exec+0x860/0x860 [ 2319.788120] ? check_preemption_disabled+0x48/0x280 [ 2319.793157] __should_failslab+0x124/0x180 [ 2319.797406] should_failslab+0x9/0x14 [ 2319.801226] kmem_cache_alloc_trace+0x2d7/0x750 [ 2319.805905] ? __kmalloc_node+0x3c/0x70 [ 2319.809890] ? __kmalloc_node+0x3c/0x70 [ 2319.813897] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2319.818944] __memcg_init_list_lru_node+0x185/0x2d0 [ 2319.823979] ? kvfree_rcu+0x20/0x20 [ 2319.827640] ? __kmalloc_node+0x50/0x70 [ 2319.831635] __list_lru_init+0x4d6/0x840 [ 2319.835715] ? list_lru_destroy+0x500/0x500 [ 2319.840057] ? up_write+0x7b/0x220 [ 2319.843612] ? down_write_nested+0x130/0x130 [ 2319.848067] ? down_read+0x120/0x120 [ 2319.851834] ? init_wait_entry+0x1c0/0x1c0 [ 2319.856105] ? prealloc_shrinker+0x172/0x340 [ 2319.860548] sget_userns+0x975/0xed0 [ 2319.864284] ? kill_litter_super+0x60/0x60 [ 2319.868529] ? ns_test_super+0x50/0x50 [ 2319.872441] ? grab_super+0x400/0x400 [ 2319.876279] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2319.881825] ? apparmor_capable+0x355/0x6c0 [ 2319.886158] ? apparmor_cred_transfer+0x590/0x590 [ 2319.891015] ? cap_capable+0x1f9/0x260 [ 2319.894927] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2319.900478] ? security_capable+0x99/0xc0 [ 2319.904646] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2319.910196] ? ns_capable_common+0x13f/0x170 [ 2319.914627] ? kill_litter_super+0x60/0x60 [ 2319.918876] sget+0x10b/0x150 [ 2319.922000] ? ns_test_super+0x50/0x50 [ 2319.925909] mount_bdev+0x111/0x3e0 [ 2319.929558] ? msdos_mount+0x40/0x40 [ 2319.933319] msdos_mount+0x34/0x40 [ 2319.936874] mount_fs+0xae/0x31d [ 2319.940259] vfs_kern_mount.part.35+0xdc/0x4f0 [ 2319.944855] ? may_umount+0xb0/0xb0 [ 2319.948510] ? _raw_read_unlock+0x2c/0x50 [ 2319.952666] ? __get_fs_type+0x97/0xc0 [ 2319.956636] do_mount+0x581/0x31f0 [ 2319.960209] ? check_preemption_disabled+0x48/0x280 [ 2319.965249] ? copy_mount_string+0x40/0x40 [ 2319.969510] ? copy_mount_options+0x5f/0x430 [ 2319.973934] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2319.978964] ? kmem_cache_alloc_trace+0x353/0x750 [ 2319.983828] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2319.989382] ? _copy_from_user+0xdf/0x150 [ 2319.993543] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2319.999091] ? copy_mount_options+0x315/0x430 [ 2320.003605] ksys_mount+0x12d/0x140 [ 2320.007252] __x64_sys_mount+0xbe/0x150 [ 2320.011259] do_syscall_64+0x1b9/0x820 [ 2320.015155] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2320.020532] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2320.025472] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2320.030327] ? trace_hardirqs_on_caller+0x310/0x310 [ 2320.035355] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2320.040404] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2320.045436] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2320.050299] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2320.050314] RIP: 0033:0x45a0ea [ 2320.050330] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2320.050344] RSP: 002b:00007f004a854a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2320.058734] RAX: ffffffffffffffda RBX: 00007f004a854b30 RCX: 000000000045a0ea [ 2320.092614] RDX: 00007f004a854ad0 RSI: 00000000200000c0 RDI: 00007f004a854af0 [ 2320.099921] RBP: 00000000200000c0 R08: 00007f004a854b30 R09: 00007f004a854ad0 [ 2320.107702] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 00:26:08 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0xc, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:08 executing program 0: ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f0000000200)={0x4, {0x0, 0x3a}}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x200000, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000180)={{0xa, 0x4e21, 0xa00000000000000, @dev={0xfe, 0x80, [], 0x17}, 0x2}, {0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x12}, 0x3}, 0x7, [0x80000000, 0x3, 0x0, 0x16d5, 0x1fffe00000, 0x1d, 0x8, 0x3]}, 0x5c) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x101402, 0x0) write$P9_RREAD(r1, &(0x7f0000000080)={0xa7, 0x75, 0x1, {0x9c, "e0695b1c1903ed750927205df9a9b78741a4dba6ef509d093d2c322d25602368c5c8451b7405a53e144f6c7cd7bf7e11ccc4ea5185afd42bde8750cdc2ed5a147923388b8793189d24f7437108674f35b95e07a14519c9c37e259b847301c0077c43068dda06012d71982ab0f43303d4f79cb5ae83c70196d4ccbe179b1a2db8448fdd04ef929f39361643bb339fa7ab5bb51534cf5aa3bd9742c1a6"}}, 0xa7) [ 2320.114979] R13: 0000000000000000 R14: 00000000004d9b98 R15: 0000000000000003 00:26:08 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0xd, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:09 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f75746500000600", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:26:09 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x5, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:09 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)={0x0, 0x0}) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) read(r1, &(0x7f0000000040)=""/14, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r2, r1, 0x0, 0x462c) 00:26:09 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x1a00000000000000) 00:26:09 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0x2, 0x2) r1 = syz_open_dev$audion(&(0x7f0000000380)='/dev/audio#\x00', 0x0, 0x200000) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f00000000c0)=0x7) ioctl$VIDIOC_G_OUTPUT(r0, 0x8004562e, &(0x7f0000000100)) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000000)=0x39, 0x4) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000080)=0x3) syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0xee20, 0x440) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000200)={0x4, &(0x7f00000001c0)=[{}, {0x0}, {}, {}]}) ioctl$DRM_IOCTL_DMA(r1, 0xc0406429, &(0x7f0000000340)={r2, 0x6, &(0x7f0000000240)=[0x7fff, 0x40, 0xfffffffffffffffd, 0x8, 0x2, 0x400], &(0x7f0000000280)=[0x7, 0x5a2, 0xa7, 0x3d6], 0x10, 0x9, 0x760a, &(0x7f00000002c0)=[0x22ed, 0x300f3813, 0x0, 0xffffffffffffffff, 0x3, 0x6, 0x1000, 0xff, 0x5000000000000], &(0x7f0000000300)=[0x400]}) 00:26:09 executing program 1 (fault-call:0 fault-nth:47): syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) [ 2320.762481] FAULT_INJECTION: forcing a failure. [ 2320.762481] name failslab, interval 1, probability 0, space 0, times 0 [ 2320.785706] CPU: 0 PID: 11346 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2320.793105] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2320.802467] Call Trace: [ 2320.805080] dump_stack+0x244/0x39d [ 2320.808744] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2320.813968] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2320.819528] should_fail.cold.4+0xa/0x17 [ 2320.823613] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2320.828735] ? zap_class+0x640/0x640 [ 2320.832471] ? zap_class+0x640/0x640 [ 2320.836215] ? radix_tree_iter_tag_clear+0x90/0x90 [ 2320.841193] ? find_held_lock+0x36/0x1c0 [ 2320.841215] ? __lock_is_held+0xb5/0x140 [ 2320.841243] ? perf_trace_sched_process_exec+0x860/0x860 [ 2320.854802] ? perf_trace_sched_process_exec+0x860/0x860 [ 2320.860278] __should_failslab+0x124/0x180 [ 2320.860299] should_failslab+0x9/0x14 [ 2320.860318] __kmalloc+0x2e0/0x760 [ 2320.871895] ? __list_lru_init+0x151/0x840 [ 2320.876182] __list_lru_init+0x151/0x840 [ 2320.880260] ? list_lru_destroy+0x500/0x500 [ 2320.884597] ? up_write+0x7b/0x220 [ 2320.888151] ? down_write_nested+0x130/0x130 [ 2320.892572] ? down_read+0x120/0x120 [ 2320.896322] ? init_wait_entry+0x1c0/0x1c0 [ 2320.900571] ? prealloc_shrinker+0x172/0x340 [ 2320.905004] sget_userns+0x975/0xed0 [ 2320.905027] ? kill_litter_super+0x60/0x60 [ 2320.905048] ? ns_test_super+0x50/0x50 [ 2320.913035] ? grab_super+0x400/0x400 [ 2320.913065] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2320.913084] ? apparmor_capable+0x355/0x6c0 [ 2320.930627] ? apparmor_cred_transfer+0x590/0x590 [ 2320.935536] ? cap_capable+0x1f9/0x260 [ 2320.939448] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2320.940646] IPVS: ftp: loaded support on port[0] = 21 [ 2320.944998] ? security_capable+0x99/0xc0 [ 2320.945026] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2320.945049] ? ns_capable_common+0x13f/0x170 [ 2320.959940] ? kill_litter_super+0x60/0x60 [ 2320.959957] sget+0x10b/0x150 [ 2320.959974] ? ns_test_super+0x50/0x50 [ 2320.960013] mount_bdev+0x111/0x3e0 [ 2320.960036] ? msdos_mount+0x40/0x40 [ 2320.960054] msdos_mount+0x34/0x40 [ 2320.960070] mount_fs+0xae/0x31d [ 2320.960098] vfs_kern_mount.part.35+0xdc/0x4f0 [ 2320.960129] ? may_umount+0xb0/0xb0 [ 2320.960142] ? _raw_read_unlock+0x2c/0x50 [ 2320.960162] ? __get_fs_type+0x97/0xc0 [ 2320.960188] do_mount+0x581/0x31f0 [ 2320.990416] ? check_preemption_disabled+0x48/0x280 [ 2320.990442] ? copy_mount_string+0x40/0x40 [ 2320.990469] ? copy_mount_options+0x5f/0x430 [ 2320.998719] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2320.998737] ? kmem_cache_alloc_trace+0x353/0x750 [ 2320.998768] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2320.998792] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2320.998811] ? copy_mount_options+0x315/0x430 [ 2321.010370] ksys_mount+0x12d/0x140 [ 2321.010392] __x64_sys_mount+0xbe/0x150 [ 2321.010412] do_syscall_64+0x1b9/0x820 00:26:09 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$TUNSETOWNER(r0, 0x400454cc, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x462c) 00:26:09 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x3, 0x200000) write$P9_RFLUSH(r1, &(0x7f0000000100)={0x7, 0x6d, 0x2}, 0x7) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000080), &(0x7f00000000c0)=0xb) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)) 00:26:09 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x9, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) [ 2321.019643] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2321.019662] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2321.019676] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2321.019696] ? trace_hardirqs_on_caller+0x310/0x310 [ 2321.033975] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2321.045035] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2321.045077] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2321.053208] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2321.053222] RIP: 0033:0x45a0ea [ 2321.053240] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2321.061080] RSP: 002b:00007f004a854a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2321.061095] RAX: ffffffffffffffda RBX: 00007f004a854b30 RCX: 000000000045a0ea [ 2321.061105] RDX: 00007f004a854ad0 RSI: 00000000200000c0 RDI: 00007f004a854af0 [ 2321.061122] RBP: 00000000200000c0 R08: 00007f004a854b30 R09: 00007f004a854ad0 [ 2321.071430] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 00:26:09 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x8, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) [ 2321.071439] R13: 0000000000000000 R14: 00000000004d9b98 R15: 0000000000000003 00:26:09 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_ENUMOUTPUT(r0, 0xc0485630, &(0x7f0000000080)={0x0, "316bba62637278d820b95556085a74b8284311befb013f750146e7a23f80eb1c", 0x3, 0x5, 0x2df2, 0x1000000, 0x8}) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)) 00:26:09 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x10000000000000) [ 2321.566364] device bridge_slave_1 left promiscuous mode [ 2321.571930] bridge0: port 2(bridge_slave_1) entered disabled state [ 2321.626838] device bridge_slave_0 left promiscuous mode [ 2321.632343] bridge0: port 1(bridge_slave_0) entered disabled state [ 2321.734770] team0 (unregistering): Port device team_slave_1 removed [ 2321.749804] team0 (unregistering): Port device team_slave_0 removed [ 2321.764824] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2321.812924] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2321.922189] bond0 (unregistering): Released all slaves [ 2322.867673] bridge0: port 1(bridge_slave_0) entered blocking state [ 2322.874169] bridge0: port 1(bridge_slave_0) entered disabled state [ 2322.887633] device bridge_slave_0 entered promiscuous mode [ 2322.985546] bridge0: port 2(bridge_slave_1) entered blocking state [ 2323.002128] bridge0: port 2(bridge_slave_1) entered disabled state [ 2323.017696] device bridge_slave_1 entered promiscuous mode [ 2323.134354] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2323.254416] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2323.486359] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2323.537069] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2323.950376] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2323.958324] team0: Port device team_slave_0 added [ 2324.014895] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2324.022527] team0: Port device team_slave_1 added [ 2324.134800] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2324.155747] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2324.173064] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2324.217013] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2324.223925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2324.235507] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2324.275876] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2324.283085] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2324.294933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2324.384776] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2324.406106] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2324.416397] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2324.941791] bridge0: port 2(bridge_slave_1) entered blocking state [ 2324.948255] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2324.954965] bridge0: port 1(bridge_slave_0) entered blocking state [ 2324.961491] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2324.970148] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2325.055797] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2326.826609] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2327.001161] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2327.174334] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2327.180715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2327.197747] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2327.363827] 8021q: adding VLAN 0 to HW filter on device team0 00:26:17 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030700000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000000000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000000000000892f0700636f6e6e6c6162656c0000000000000000000000000000000000000000000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000000000000007000000070000000a0000000434f4e4e5345434d41524bff6eef1d192516e43f9a305e46692c00000000000000000000000000000000000000000008"]}, 0x2a8) 00:26:17 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x3, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:17 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x100, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f0000000000)={r2, 0x0, 0xffffffffffffffc0, 0x559f, 0x3f}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000300)="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") ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000001c0)={0x100, "917ceaff18f5225118ea5fb1394092aed059bb2b7f134fa40f116d617a8d05ce", 0x7, 0x94, 0x80000001, 0x5, 0x4, 0x3, 0x7, 0x7}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r3, 0x4058534c, &(0x7f0000000280)={0x42bd, 0xe9, 0x2, 0xfffffffffffffffa, 0x20, 0x7f}) ioctl$KDGETLED(r1, 0x4b31, &(0x7f0000000240)) sendfile(r2, r0, 0x0, 0x462c) 00:26:17 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={r1, 0x0, 0x8}, 0xc) 00:26:17 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x8004000000000000) 00:26:17 executing program 1 (fault-call:0 fault-nth:48): syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) [ 2328.410379] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2328.471966] FAULT_INJECTION: forcing a failure. [ 2328.471966] name failslab, interval 1, probability 0, space 0, times 0 [ 2328.495741] CPU: 1 PID: 11636 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2328.503174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2328.512549] Call Trace: [ 2328.515171] dump_stack+0x244/0x39d [ 2328.518831] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2328.524042] ? __kernel_text_address+0xd/0x40 [ 2328.528593] ? unwind_get_return_address+0x61/0xa0 [ 2328.533558] should_fail.cold.4+0xa/0x17 [ 2328.537643] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2328.542784] ? save_stack+0x43/0xd0 [ 2328.546430] ? kasan_kmalloc+0xc7/0xe0 [ 2328.550336] ? kmem_cache_alloc_trace+0x152/0x750 [ 2328.555195] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 2328.560402] ? __list_lru_init+0x4d6/0x840 [ 2328.564660] ? zap_class+0x640/0x640 [ 2328.568389] ? msdos_mount+0x34/0x40 [ 2328.572116] ? mount_fs+0xae/0x31d [ 2328.575671] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 2328.580444] ? do_mount+0x581/0x31f0 [ 2328.584170] ? ksys_mount+0x12d/0x140 [ 2328.587986] ? __x64_sys_mount+0xbe/0x150 [ 2328.592147] ? do_syscall_64+0x1b9/0x820 [ 2328.596224] ? find_held_lock+0x36/0x1c0 [ 2328.600310] ? __lock_is_held+0xb5/0x140 [ 2328.604413] ? perf_trace_sched_process_exec+0x860/0x860 [ 2328.609907] __should_failslab+0x124/0x180 [ 2328.614169] should_failslab+0x9/0x14 [ 2328.617989] kmem_cache_alloc_trace+0x2d7/0x750 [ 2328.622678] ? __kmalloc_node+0x3c/0x70 [ 2328.626670] ? __kmalloc_node+0x3c/0x70 [ 2328.630665] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2328.635708] __memcg_init_list_lru_node+0x185/0x2d0 [ 2328.640747] ? kvfree_rcu+0x20/0x20 [ 2328.644412] ? __kmalloc_node+0x50/0x70 [ 2328.648409] __list_lru_init+0x4d6/0x840 [ 2328.652494] ? list_lru_destroy+0x500/0x500 [ 2328.656842] ? up_write+0x7b/0x220 [ 2328.660398] ? down_write_nested+0x130/0x130 [ 2328.664819] ? down_read+0x120/0x120 [ 2328.668553] ? init_wait_entry+0x1c0/0x1c0 [ 2328.672805] ? prealloc_shrinker+0x172/0x340 [ 2328.677236] sget_userns+0x975/0xed0 [ 2328.680974] ? kill_litter_super+0x60/0x60 [ 2328.685228] ? ns_test_super+0x50/0x50 [ 2328.689129] ? grab_super+0x400/0x400 [ 2328.692959] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2328.698516] ? apparmor_capable+0x355/0x6c0 [ 2328.702866] ? apparmor_cred_transfer+0x590/0x590 [ 2328.707726] ? cap_capable+0x1f9/0x260 [ 2328.711635] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2328.717190] ? security_capable+0x99/0xc0 [ 2328.721367] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2328.726924] ? ns_capable_common+0x13f/0x170 [ 2328.731354] ? kill_litter_super+0x60/0x60 [ 2328.735603] sget+0x10b/0x150 [ 2328.738727] ? ns_test_super+0x50/0x50 [ 2328.742633] mount_bdev+0x111/0x3e0 [ 2328.746282] ? msdos_mount+0x40/0x40 [ 2328.750020] msdos_mount+0x34/0x40 [ 2328.753583] mount_fs+0xae/0x31d [ 2328.756969] vfs_kern_mount.part.35+0xdc/0x4f0 [ 2328.761580] ? may_umount+0xb0/0xb0 [ 2328.765221] ? _raw_read_unlock+0x2c/0x50 [ 2328.769383] ? __get_fs_type+0x97/0xc0 [ 2328.773291] do_mount+0x581/0x31f0 [ 2328.776851] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 2328.782373] ? retint_kernel+0x1b/0x2d [ 2328.786289] ? copy_mount_string+0x40/0x40 [ 2328.790553] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2328.795334] ? retint_kernel+0x2d/0x2d [ 2328.799248] ? copy_mount_options+0x239/0x430 [ 2328.803757] ? copy_mount_options+0x24d/0x430 [ 2328.808278] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2328.813833] ? copy_mount_options+0x315/0x430 [ 2328.818373] ksys_mount+0x12d/0x140 [ 2328.822030] __x64_sys_mount+0xbe/0x150 [ 2328.826072] do_syscall_64+0x1b9/0x820 [ 2328.829969] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2328.835359] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2328.840305] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2328.845171] ? trace_hardirqs_on_caller+0x310/0x310 [ 2328.850210] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2328.855247] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2328.860286] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2328.865151] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2328.870350] RIP: 0033:0x45a0ea [ 2328.873554] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2328.892473] RSP: 002b:00007f004a854a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2328.900200] RAX: ffffffffffffffda RBX: 00007f004a854b30 RCX: 000000000045a0ea [ 2328.907481] RDX: 00007f004a854ad0 RSI: 00000000200000c0 RDI: 00007f004a854af0 [ 2328.914773] RBP: 00000000200000c0 R08: 00007f004a854b30 R09: 00007f004a854ad0 00:26:17 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) r1 = add_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)="d0eb927997431fa6a0882abad72603828774603dd4b44acb662cc5d2291811a00ca2a5292b6571e2072d10521d1f02a888d5c259adfbc7883ad19c251f2f4f9f16a93f5576cda1", 0x47, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000001c0)="5cedcfb3fa93b25dfb327a80282a3c82c61f87", 0x13) r2 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x9, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r2, &(0x7f0000000080)={0x2, 0x2}, 0x2) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)) 00:26:17 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x4, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:17 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x45, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x462c) [ 2328.922061] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2328.929361] R13: 0000000000000000 R14: 00000000004d9b98 R15: 0000000000000003 00:26:17 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00 \x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 2329.008933] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:17 executing program 1 (fault-call:0 fault-nth:49): syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:26:17 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080), 0x2, 0x1009}}, 0x20) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000180)=0xc) sched_getparam(r1, &(0x7f00000001c0)) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)) ioctl$VIDIOC_QUERYCAP(r0, 0x80685600, &(0x7f0000000100)) 00:26:17 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0xc000000) 00:26:17 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0xb, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:17 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) fsetxattr$trusted_overlay_upper(r2, &(0x7f0000000000)='trusted.overlay.upper\x00', &(0x7f0000000140)={0x0, 0xfb, 0x109, 0x1, 0x800, "3c87068aa86807f78f9a29b114f58268", "a9fe9e4b858e44206552e6c260c766223ef4a5b17c43bd2813ae972f089362deb7ffce02b1c9e40b733b995e0e5d77672dc5b571d65fbfcaec60c304e5d8dd7d1928193dab44dbcd1102975c9129a1de59135ffb253b306edcb561f3c8415dabcf0bc4e7f3a943f4db0700f783a3f30c416f48a34ec476db738243e25944bd1fa98526c53741a3e9a05240cf6c55c05a8ecbba7f774d92ccdc0e73edfad846ee3d73d6180ca670a0d358da01b6d6b299f1ac87dc7b6dea9af21122709b310bfb7629a73e6a11123d1616186c61a29b616d5bf5650a88452c645cbedfce0349b7a6f72d56a56b195bfdabe8e971be53c68db3f55d"}, 0x109, 0x3) sendfile(r1, r0, 0x0, 0x462c) 00:26:17 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x100, 0x0) ioctl$KDSETMODE(r1, 0x4b3a, 0x81) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)) 00:26:17 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f7574650000001100", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 2329.254385] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:18 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x6, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:18 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x462c) 00:26:18 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x22800, 0x0) ioctl$BLKFLSBUF(r1, 0x1261, &(0x7f0000000080)=0x2) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)) 00:26:18 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x200000000000000) 00:26:18 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00?\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 2329.447043] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2329.574330] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2329.597267] FAULT_INJECTION: forcing a failure. [ 2329.597267] name failslab, interval 1, probability 0, space 0, times 0 [ 2329.615563] CPU: 0 PID: 11692 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2329.622965] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2329.632334] Call Trace: [ 2329.632368] dump_stack+0x244/0x39d [ 2329.632391] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2329.632411] ? __kernel_text_address+0xd/0x40 [ 2329.632430] ? unwind_get_return_address+0x61/0xa0 [ 2329.632456] should_fail.cold.4+0xa/0x17 [ 2329.632484] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2329.662438] ? save_stack+0x43/0xd0 [ 2329.666072] ? kasan_kmalloc+0xc7/0xe0 [ 2329.669966] ? kmem_cache_alloc_trace+0x152/0x750 [ 2329.674817] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 2329.680011] ? __list_lru_init+0x4d6/0x840 [ 2329.684291] ? zap_class+0x640/0x640 [ 2329.688034] ? msdos_mount+0x34/0x40 [ 2329.691752] ? mount_fs+0xae/0x31d [ 2329.695314] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 2329.700079] ? do_mount+0x581/0x31f0 [ 2329.703802] ? ksys_mount+0x12d/0x140 [ 2329.707612] ? __x64_sys_mount+0xbe/0x150 [ 2329.711811] ? do_syscall_64+0x1b9/0x820 [ 2329.715890] ? find_held_lock+0x36/0x1c0 [ 2329.719999] ? __lock_is_held+0xb5/0x140 [ 2329.724088] ? perf_trace_sched_process_exec+0x860/0x860 [ 2329.729553] __should_failslab+0x124/0x180 [ 2329.733800] should_failslab+0x9/0x14 [ 2329.737608] kmem_cache_alloc_trace+0x2d7/0x750 [ 2329.742283] ? __kmalloc_node+0x3c/0x70 [ 2329.746260] ? __kmalloc_node+0x3c/0x70 [ 2329.750241] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2329.755293] __memcg_init_list_lru_node+0x185/0x2d0 [ 2329.760317] ? kvfree_rcu+0x20/0x20 [ 2329.763950] ? __kmalloc_node+0x50/0x70 [ 2329.767935] __list_lru_init+0x4d6/0x840 [ 2329.772023] ? list_lru_destroy+0x500/0x500 [ 2329.776388] ? up_write+0x7b/0x220 [ 2329.779937] ? down_write_nested+0x130/0x130 [ 2329.784350] ? down_read+0x120/0x120 [ 2329.788073] ? init_wait_entry+0x1c0/0x1c0 [ 2329.792315] ? prealloc_shrinker+0x172/0x340 [ 2329.796745] sget_userns+0x975/0xed0 [ 2329.800491] ? kill_litter_super+0x60/0x60 [ 2329.804740] ? ns_test_super+0x50/0x50 [ 2329.808647] ? grab_super+0x400/0x400 [ 2329.812484] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2329.818049] ? apparmor_capable+0x355/0x6c0 [ 2329.822399] ? apparmor_cred_transfer+0x590/0x590 [ 2329.827259] ? cap_capable+0x1f9/0x260 [ 2329.831164] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2329.836714] ? security_capable+0x99/0xc0 [ 2329.840877] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2329.846427] ? ns_capable_common+0x13f/0x170 [ 2329.850844] ? kill_litter_super+0x60/0x60 [ 2329.855088] sget+0x10b/0x150 [ 2329.858211] ? ns_test_super+0x50/0x50 [ 2329.862110] mount_bdev+0x111/0x3e0 [ 2329.865746] ? msdos_mount+0x40/0x40 [ 2329.869479] msdos_mount+0x34/0x40 [ 2329.873026] mount_fs+0xae/0x31d [ 2329.876417] vfs_kern_mount.part.35+0xdc/0x4f0 [ 2329.881014] ? may_umount+0xb0/0xb0 [ 2329.884653] ? _raw_read_unlock+0x3f/0x50 [ 2329.888813] ? __get_fs_type+0x97/0xc0 [ 2329.892714] do_mount+0x581/0x31f0 [ 2329.896275] ? check_preemption_disabled+0x48/0x280 [ 2329.901323] ? copy_mount_string+0x40/0x40 [ 2329.905582] ? copy_mount_options+0x5f/0x430 [ 2329.910010] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2329.915075] ? kmem_cache_alloc_trace+0x353/0x750 [ 2329.919931] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2329.925480] ? _copy_from_user+0xdf/0x150 [ 2329.929643] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2329.935201] ? copy_mount_options+0x315/0x430 [ 2329.939718] ksys_mount+0x12d/0x140 [ 2329.943370] __x64_sys_mount+0xbe/0x150 [ 2329.947362] do_syscall_64+0x1b9/0x820 [ 2329.951264] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2329.956667] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2329.961637] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2329.966500] ? trace_hardirqs_on_caller+0x310/0x310 [ 2329.971549] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2329.976596] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2329.981657] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2329.986531] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2329.991740] RIP: 0033:0x45a0ea [ 2329.994954] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2330.013875] RSP: 002b:00007f004a854a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2330.021603] RAX: ffffffffffffffda RBX: 00007f004a854b30 RCX: 000000000045a0ea [ 2330.028888] RDX: 00007f004a854ad0 RSI: 00000000200000c0 RDI: 00007f004a854af0 [ 2330.036172] RBP: 00000000200000c0 R08: 00007f004a854b30 R09: 00007f004a854ad0 [ 2330.043462] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2330.050746] R13: 0000000000000000 R14: 00000000004d9b98 R15: 0000000000000003 00:26:18 executing program 1 (fault-call:0 fault-nth:50): syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:26:18 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f0000000040)) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)) 00:26:18 executing program 4: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000000000000000000002000000000000000000000000000000000000000000000000000000070000000000000000000000000000000000000000000000"]) getpid() r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x248380, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000004c0)={0x0, 0x8}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r1, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000001c0)) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000340)="6e444d33a51e9f2d9e9fd1be89f123ce", 0x10) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)={@dev}, &(0x7f0000000540)=0x14) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={"0000000000000000000000000200", 0x5002}) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000000)=0x80000001) sendmsg$nl_route(r4, &(0x7f0000000500)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xfffffffffffffffe}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) write$P9_RXATTRCREATE(r5, &(0x7f0000000140)={0x383}, 0x7) write$P9_RSETATTR(r5, &(0x7f0000000040)={0x7}, 0x7) sendfile(r2, r5, &(0x7f0000d83ff8), 0x800000000024) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000640)={0x0, 0xfffffffffffffffc, 0x95, 0x800, @buffer={0x0, 0x32, &(0x7f0000000400)=""/50}, &(0x7f0000000580)="1a8398440e9ab4fd959769ce2c79a87d07fd2f52897bab32ef8c0ed2dd3a720d1a3e68e0096be9f38fd4b38554e0a50d8c4d799be488da76f5366836629808b0a912c66e3c9981ea6449a6c67d4ab9f9daa7ece80c2faf48732c7fa95fbb387a1c2ef3324d23fef6343021c143b375fbd9071fb0e79f92d535fe8d6b7ed9f80d2f3393f76e793d5653920a37d0c4009e0afd31d799", &(0x7f0000000700)=""/191, 0x100, 0x10001, 0x2, &(0x7f0000000440)}) creat(&(0x7f0000000200)='./bus\x00', 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x50, &(0x7f00000000c0)}, 0x10) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') socketpair$unix(0x1, 0x9, 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 00:26:18 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f7574650000000000007fffffff00", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:26:18 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0xa, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:18 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x1c) 00:26:18 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:18 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f75746500000000000300", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030700000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000000000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000000000000892f0700636f6e6e6c6162656c0000000000000000000000000000000000000000000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000000000000007000000070000000a0000000434f4e4e5345434d41524bff6eef1d192516e43f9a305e46692c00000000000000000000000000000000000000000008"]}, 0x2a8) 00:26:18 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f00000000c0), 0x4) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f0000000040)={0x0, {0x0, 0xfffffffffffffffe}}) [ 2330.222309] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2330.244979] FAULT_INJECTION: forcing a failure. [ 2330.244979] name failslab, interval 1, probability 0, space 0, times 0 [ 2330.318218] CPU: 1 PID: 11721 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2330.325647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2330.335024] Call Trace: [ 2330.337644] dump_stack+0x244/0x39d [ 2330.341307] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2330.346523] ? __kernel_text_address+0xd/0x40 [ 2330.351051] ? unwind_get_return_address+0x61/0xa0 [ 2330.356005] should_fail.cold.4+0xa/0x17 [ 2330.360099] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2330.365244] ? save_stack+0x43/0xd0 [ 2330.368889] ? kasan_kmalloc+0xc7/0xe0 [ 2330.372813] ? kmem_cache_alloc_trace+0x152/0x750 [ 2330.377679] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 2330.382901] ? __list_lru_init+0x4d6/0x840 [ 2330.387162] ? zap_class+0x640/0x640 [ 2330.387534] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2330.390893] ? msdos_mount+0x34/0x40 [ 2330.390905] ? mount_fs+0xae/0x31d [ 2330.390931] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 2330.390945] ? do_mount+0x581/0x31f0 [ 2330.390959] ? ksys_mount+0x12d/0x140 [ 2330.390978] ? __x64_sys_mount+0xbe/0x150 [ 2330.421145] ? do_syscall_64+0x1b9/0x820 [ 2330.425270] ? find_held_lock+0x36/0x1c0 [ 2330.429360] ? __lock_is_held+0xb5/0x140 [ 2330.433457] ? perf_trace_sched_process_exec+0x860/0x860 [ 2330.438971] __should_failslab+0x124/0x180 [ 2330.443238] should_failslab+0x9/0x14 [ 2330.447058] kmem_cache_alloc_trace+0x2d7/0x750 [ 2330.451745] ? __kmalloc_node+0x3c/0x70 [ 2330.455787] ? __kmalloc_node+0x3c/0x70 [ 2330.459799] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2330.462739] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2330.464838] __memcg_init_list_lru_node+0x185/0x2d0 [ 2330.464858] ? kvfree_rcu+0x20/0x20 [ 2330.464877] ? __kmalloc_node+0x50/0x70 [ 2330.464897] __list_lru_init+0x4d6/0x840 [ 2330.488080] ? list_lru_destroy+0x500/0x500 [ 2330.492426] ? up_write+0x7b/0x220 [ 2330.495988] ? down_write_nested+0x130/0x130 [ 2330.500413] ? down_read+0x120/0x120 [ 2330.504153] ? init_wait_entry+0x1c0/0x1c0 [ 2330.508407] ? prealloc_shrinker+0x172/0x340 [ 2330.512854] sget_userns+0x975/0xed0 [ 2330.516599] ? kill_litter_super+0x60/0x60 [ 2330.520861] ? ns_test_super+0x50/0x50 [ 2330.524778] ? grab_super+0x400/0x400 [ 2330.528617] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2330.534185] ? apparmor_capable+0x355/0x6c0 [ 2330.538552] ? apparmor_cred_transfer+0x590/0x590 [ 2330.543420] ? cap_capable+0x1f9/0x260 [ 2330.547334] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2330.552897] ? security_capable+0x99/0xc0 [ 2330.557078] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2330.562658] ? ns_capable_common+0x13f/0x170 [ 2330.567104] ? kill_litter_super+0x60/0x60 [ 2330.571369] sget+0x10b/0x150 [ 2330.574498] ? ns_test_super+0x50/0x50 [ 2330.578421] mount_bdev+0x111/0x3e0 [ 2330.582080] ? msdos_mount+0x40/0x40 [ 2330.585825] msdos_mount+0x34/0x40 [ 2330.589388] mount_fs+0xae/0x31d [ 2330.592798] vfs_kern_mount.part.35+0xdc/0x4f0 [ 2330.597406] ? may_umount+0xb0/0xb0 [ 2330.601048] ? _raw_read_unlock+0x2c/0x50 [ 2330.605216] ? __get_fs_type+0x97/0xc0 [ 2330.609129] do_mount+0x581/0x31f0 [ 2330.612686] ? check_preemption_disabled+0x48/0x280 [ 2330.617738] ? copy_mount_string+0x40/0x40 [ 2330.622026] ? copy_mount_options+0x5f/0x430 [ 2330.626457] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2330.631496] ? kmem_cache_alloc_trace+0x353/0x750 [ 2330.636377] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2330.641931] ? _copy_from_user+0xdf/0x150 [ 2330.646103] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2330.651662] ? copy_mount_options+0x315/0x430 [ 2330.656178] ksys_mount+0x12d/0x140 [ 2330.659836] __x64_sys_mount+0xbe/0x150 [ 2330.663861] do_syscall_64+0x1b9/0x820 [ 2330.667777] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2330.673164] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2330.678117] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2330.682984] ? trace_hardirqs_on_caller+0x310/0x310 [ 2330.688022] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2330.693066] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2330.698110] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2330.702981] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2330.708188] RIP: 0033:0x45a0ea [ 2330.711398] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2330.730315] RSP: 002b:00007f004a854a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2330.738051] RAX: ffffffffffffffda RBX: 00007f004a854b30 RCX: 000000000045a0ea [ 2330.745350] RDX: 00007f004a854ad0 RSI: 00000000200000c0 RDI: 00007f004a854af0 [ 2330.752671] RBP: 00000000200000c0 R08: 00007f004a854b30 R09: 00007f004a854ad0 [ 2330.759961] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2330.767254] R13: 0000000000000000 R14: 00000000004d9b98 R15: 0000000000000003 00:26:19 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:19 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@local, @in=@remote}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000180)=0xe8) [ 2330.841091] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:19 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:19 executing program 1 (fault-call:0 fault-nth:51): syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) [ 2330.943899] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2331.020558] FAULT_INJECTION: forcing a failure. [ 2331.020558] name failslab, interval 1, probability 0, space 0, times 0 [ 2331.058288] CPU: 1 PID: 11752 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2331.065708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2331.075088] Call Trace: [ 2331.077722] dump_stack+0x244/0x39d [ 2331.081415] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2331.086644] ? __kernel_text_address+0xd/0x40 [ 2331.091164] ? unwind_get_return_address+0x61/0xa0 [ 2331.096123] should_fail.cold.4+0xa/0x17 [ 2331.100213] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2331.105370] ? save_stack+0x43/0xd0 [ 2331.109015] ? kasan_kmalloc+0xc7/0xe0 [ 2331.112924] ? kmem_cache_alloc_trace+0x152/0x750 [ 2331.117799] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 2331.123010] ? __list_lru_init+0x4d6/0x840 [ 2331.127263] ? zap_class+0x640/0x640 [ 2331.130999] ? msdos_mount+0x34/0x40 [ 2331.131013] ? mount_fs+0xae/0x31d [ 2331.131034] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 2331.138313] ? do_mount+0x581/0x31f0 [ 2331.138326] ? ksys_mount+0x12d/0x140 [ 2331.138340] ? __x64_sys_mount+0xbe/0x150 [ 2331.138354] ? do_syscall_64+0x1b9/0x820 [ 2331.138375] ? find_held_lock+0x36/0x1c0 [ 2331.138398] ? __lock_is_held+0xb5/0x140 [ 2331.154816] ? perf_trace_sched_process_exec+0x860/0x860 [ 2331.172462] __should_failslab+0x124/0x180 [ 2331.176726] should_failslab+0x9/0x14 [ 2331.180536] kmem_cache_alloc_trace+0x2d7/0x750 [ 2331.185197] ? __kmalloc_node+0x3c/0x70 [ 2331.189284] ? __kmalloc_node+0x3c/0x70 [ 2331.193250] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2331.198262] __memcg_init_list_lru_node+0x185/0x2d0 [ 2331.203275] ? kvfree_rcu+0x20/0x20 [ 2331.206895] ? __kmalloc_node+0x50/0x70 [ 2331.210867] __list_lru_init+0x4d6/0x840 [ 2331.214922] ? list_lru_destroy+0x500/0x500 [ 2331.219238] ? up_write+0x7b/0x220 [ 2331.222766] ? down_write_nested+0x130/0x130 [ 2331.227171] ? down_read+0x120/0x120 [ 2331.230889] ? init_wait_entry+0x1c0/0x1c0 [ 2331.235117] ? prealloc_shrinker+0x172/0x340 [ 2331.239524] sget_userns+0x975/0xed0 [ 2331.243247] ? kill_litter_super+0x60/0x60 [ 2331.247480] ? ns_test_super+0x50/0x50 [ 2331.251360] ? grab_super+0x400/0x400 [ 2331.255171] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2331.260707] ? apparmor_capable+0x355/0x6c0 [ 2331.265025] ? apparmor_cred_transfer+0x590/0x590 [ 2331.269875] ? cap_capable+0x1f9/0x260 [ 2331.273765] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2331.279310] ? security_capable+0x99/0xc0 [ 2331.283460] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2331.288997] ? ns_capable_common+0x13f/0x170 [ 2331.293405] ? kill_litter_super+0x60/0x60 [ 2331.297637] sget+0x10b/0x150 [ 2331.300739] ? ns_test_super+0x50/0x50 [ 2331.304625] mount_bdev+0x111/0x3e0 [ 2331.308250] ? msdos_mount+0x40/0x40 [ 2331.311960] msdos_mount+0x34/0x40 [ 2331.315498] mount_fs+0xae/0x31d [ 2331.318862] vfs_kern_mount.part.35+0xdc/0x4f0 [ 2331.323455] ? may_umount+0xb0/0xb0 [ 2331.327091] ? _raw_read_unlock+0x2c/0x50 [ 2331.331234] ? __get_fs_type+0x97/0xc0 [ 2331.335120] do_mount+0x581/0x31f0 [ 2331.338657] ? check_preemption_disabled+0x48/0x280 [ 2331.343681] ? copy_mount_string+0x40/0x40 [ 2331.347928] ? copy_mount_options+0x5f/0x430 [ 2331.352352] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2331.357364] ? kmem_cache_alloc_trace+0x353/0x750 [ 2331.362205] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2331.367753] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2331.373307] ? copy_mount_options+0x315/0x430 [ 2331.377803] ksys_mount+0x12d/0x140 [ 2331.381424] __x64_sys_mount+0xbe/0x150 [ 2331.385389] do_syscall_64+0x1b9/0x820 [ 2331.389269] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2331.394628] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2331.399551] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2331.404390] ? trace_hardirqs_on_caller+0x310/0x310 [ 2331.409399] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2331.414405] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2331.419420] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2331.424259] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2331.429437] RIP: 0033:0x45a0ea [ 2331.432619] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2331.451518] RSP: 002b:00007f004a854a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2331.459228] RAX: ffffffffffffffda RBX: 00007f004a854b30 RCX: 000000000045a0ea 00:26:20 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x8000000000500e, 0x0) 00:26:20 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:20 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)) ioctl$VIDIOC_DBG_G_CHIP_INFO(r0, 0xc0c85666, &(0x7f0000000040)={{0x2, @name="dea29c477b8d97cfc82e8a4d62d8879bfbda874ee66b4a4e6b806e6690bfcf18"}, "9565d4036b61e56dc87de2586ae9be10233a5bc1342b6e225b1afc2d4698fa4d", 0x1}) 00:26:20 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0xe) 00:26:20 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\a\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 2331.466490] RDX: 00007f004a854ad0 RSI: 00000000200000c0 RDI: 00007f004a854af0 [ 2331.473752] RBP: 00000000200000c0 R08: 00007f004a854b30 R09: 00007f004a854ad0 [ 2331.481022] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2331.488283] R13: 0000000000000000 R14: 00000000004d9b98 R15: 0000000000000003 00:26:20 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:20 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f7574650000000000000000000200", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 2331.557054] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:20 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0xee1c, 0x200000) ioctl$VIDIOC_TRY_DECODER_CMD(r0, 0xc0485661, &(0x7f0000000080)={0x0, 0x1, @start={0x7}}) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)) 00:26:20 executing program 4: 00:26:20 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:20 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0xd000000) [ 2331.730102] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:20 executing program 1 (fault-call:0 fault-nth:52): syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:26:20 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f75746500000000001100", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:26:20 executing program 4: 00:26:20 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:20 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0xee1e, 0x1fffd) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000040)={0x4, 0x2, "9677603a7e693d91ee1ccedeea5bb31abe1b13ade0fd3e1b", {0x2}, 0xffffffffffffffd7}) 00:26:20 executing program 4: 00:26:20 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x54, 0x7ff, {"11394c4b6476a2591db1120027f3dfa2a3127872523849cd89ba2e7040d6ce35891763ef1e6ec6a7796a44d2d46139682a8d4290adf61661dce955"}}, {0x0, "9a20b00a9f83f0ef76d5f034a9347fda4d12ce60043aeca3b51e00d2327393bb851c456ad8d3894e4a7d901c99b3707d"}}, &(0x7f0000000400)=""/51, 0x86, 0x33}, 0x20) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000140)) r2 = open(&(0x7f0000000040)='./file0\x00', 0x28201, 0xa) getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, &(0x7f0000000080)=""/91, &(0x7f0000000100)=0x5b) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000240)={'mangle\x00', 0xd5, "defed1f5d883bcc4c4ae548b2da3cbc61abb6f65f541e74369f4c12f3df5e6383fb6064bf6f71cb06a41089228477869f3181bc65942ef8410795367db2c9ff1e7d47c1e2cf6fe368145cc765329cc49f4e6abf6c01d1b045c5664fecfc09f69795eda1c00b66e7d61c02ba744c8dca0ed258e619c033eaf5f2edd5b558632327f90d172858c9fcd80dd4dfc02b300da94e878ffccab722edaaa073922acd1cbf1bca1af65ed05b2764fb7fa6e7197cb69be672592966ca93977df68b46af2eee1b2b4ec5152bbdc7167418f4eb7c58d00f48e24ca"}, &(0x7f00000001c0)=0xf9) [ 2331.940727] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:20 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:20 executing program 4: 00:26:20 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f75746500000000008800", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030700000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000000000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000000000000892f0700636f6e6e6c6162656c0000000000000000000000000000000000000000000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000000000000007000000070000000a0000000434f4e4e5345434d41524bff6eef1d192516e43f9a305e46692c00000000000000000000000000000000000000000008"]}, 0x2a8) 00:26:20 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0xa) [ 2332.059983] FAULT_INJECTION: forcing a failure. [ 2332.059983] name failslab, interval 1, probability 0, space 0, times 0 00:26:20 executing program 4: [ 2332.212049] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2332.259994] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2332.284096] CPU: 1 PID: 11804 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 2332.291511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2332.300889] Call Trace: [ 2332.300921] dump_stack+0x244/0x39d [ 2332.300946] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2332.300968] ? __kernel_text_address+0xd/0x40 [ 2332.300987] ? unwind_get_return_address+0x61/0xa0 [ 2332.301012] should_fail.cold.4+0xa/0x17 [ 2332.301035] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2332.307258] ? save_stack+0x43/0xd0 [ 2332.307273] ? kasan_kmalloc+0xc7/0xe0 [ 2332.307289] ? kmem_cache_alloc_trace+0x152/0x750 [ 2332.307304] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 2332.307315] ? __list_lru_init+0x4d6/0x840 [ 2332.307332] ? zap_class+0x640/0x640 [ 2332.307348] ? msdos_mount+0x34/0x40 [ 2332.307365] ? mount_fs+0xae/0x31d [ 2332.363835] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 2332.368613] ? do_mount+0x581/0x31f0 [ 2332.372350] ? ksys_mount+0x12d/0x140 [ 2332.376171] ? __x64_sys_mount+0xbe/0x150 [ 2332.380340] ? do_syscall_64+0x1b9/0x820 [ 2332.384432] ? find_held_lock+0x36/0x1c0 [ 2332.388518] ? __lock_is_held+0xb5/0x140 [ 2332.392622] ? perf_trace_sched_process_exec+0x860/0x860 [ 2332.398109] __should_failslab+0x124/0x180 [ 2332.402366] should_failslab+0x9/0x14 [ 2332.406193] kmem_cache_alloc_trace+0x2d7/0x750 [ 2332.410888] ? __kmalloc_node+0x3c/0x70 [ 2332.414883] ? __kmalloc_node+0x3c/0x70 [ 2332.418910] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2332.423950] __memcg_init_list_lru_node+0x185/0x2d0 [ 2332.428985] ? kvfree_rcu+0x20/0x20 [ 2332.432631] ? __kmalloc_node+0x50/0x70 [ 2332.436626] __list_lru_init+0x4d6/0x840 [ 2332.440704] ? list_lru_destroy+0x500/0x500 [ 2332.445043] ? up_write+0x7b/0x220 [ 2332.448603] ? down_write_nested+0x130/0x130 [ 2332.453026] ? down_read+0x120/0x120 [ 2332.456762] ? init_wait_entry+0x1c0/0x1c0 [ 2332.461020] ? prealloc_shrinker+0x172/0x340 [ 2332.465466] sget_userns+0x975/0xed0 [ 2332.469203] ? kill_litter_super+0x60/0x60 [ 2332.473459] ? ns_test_super+0x50/0x50 [ 2332.477362] ? grab_super+0x400/0x400 [ 2332.481190] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2332.486744] ? apparmor_capable+0x355/0x6c0 [ 2332.491097] ? apparmor_cred_transfer+0x590/0x590 [ 2332.495959] ? cap_capable+0x1f9/0x260 [ 2332.499875] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2332.505428] ? security_capable+0x99/0xc0 [ 2332.509616] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2332.515174] ? ns_capable_common+0x13f/0x170 [ 2332.519627] ? kill_litter_super+0x60/0x60 [ 2332.523883] sget+0x10b/0x150 [ 2332.527006] ? ns_test_super+0x50/0x50 [ 2332.530921] mount_bdev+0x111/0x3e0 [ 2332.534572] ? msdos_mount+0x40/0x40 [ 2332.538308] msdos_mount+0x34/0x40 [ 2332.541868] mount_fs+0xae/0x31d [ 2332.545260] vfs_kern_mount.part.35+0xdc/0x4f0 [ 2332.549864] ? may_umount+0xb0/0xb0 [ 2332.553509] ? _raw_read_unlock+0x2c/0x50 [ 2332.557676] ? __get_fs_type+0x97/0xc0 [ 2332.561586] do_mount+0x581/0x31f0 [ 2332.565139] ? check_preemption_disabled+0x48/0x280 [ 2332.570182] ? copy_mount_string+0x40/0x40 [ 2332.574448] ? copy_mount_options+0x5f/0x430 [ 2332.578882] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2332.583930] ? kmem_cache_alloc_trace+0x353/0x750 [ 2332.588809] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2332.594386] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2332.599954] ? copy_mount_options+0x315/0x430 [ 2332.604480] ksys_mount+0x12d/0x140 [ 2332.608134] __x64_sys_mount+0xbe/0x150 [ 2332.612141] do_syscall_64+0x1b9/0x820 [ 2332.616048] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2332.621440] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2332.626389] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2332.631257] ? trace_hardirqs_on_caller+0x310/0x310 [ 2332.636294] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2332.641339] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2332.646386] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2332.651261] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2332.656467] RIP: 0033:0x45a0ea [ 2332.659674] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2332.678595] RSP: 002b:00007f004a854a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2332.686315] RAX: ffffffffffffffda RBX: 00007f004a854b30 RCX: 000000000045a0ea [ 2332.693600] RDX: 00007f004a854ad0 RSI: 00000000200000c0 RDI: 00007f004a854af0 [ 2332.700885] RBP: 00000000200000c0 R08: 00007f004a854b30 R09: 00007f004a854ad0 [ 2332.708165] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2332.715450] R13: 0000000000000000 R14: 00000000004d9b98 R15: 0000000000000003 00:26:21 executing program 1: syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:26:21 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x2000000, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:21 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)) ioctl$VIDIOC_QUERYCAP(r0, 0x80685600, &(0x7f0000000040)) 00:26:21 executing program 4: 00:26:21 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00 \x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:26:21 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x100000000000000) 00:26:21 executing program 4: 00:26:21 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) r1 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0xfffffffffffffff9, 0xc200) bind$bt_rfcomm(r1, &(0x7f0000000100)={0x1f, {0x9, 0x6, 0x5, 0xffffffffffffee12, 0x3ff, 0x5}, 0x8}, 0xa) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x63, 0x200) ioctl$EVIOCSKEYCODE_V2(r2, 0x40284504, &(0x7f0000000080)={0xfffffffffffffffa, 0x10, 0x5, 0x3f, "9b2a20d03ef40e780c5dc617bddae5f36f4bef726ee20eb162a593ea158d04bc"}) 00:26:21 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0xfecaedfe, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) [ 2332.909221] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:21 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030700000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000000000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000000000000892f0700636f6e6e6c6162656c0000000000000000000000000000000000000000000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000000000000007000000070000000a0000000434f4e4e5345434d41524bff6eef1d192516e43f9a305e46692c00000000000000000000000000000000000000000008"]}, 0x2a8) 00:26:21 executing program 4: [ 2332.959993] FAT-fs (loop1): bogus number of reserved sectors [ 2332.996204] FAT-fs (loop1): Can't find a valid FAT filesystem 00:26:21 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f75746500000000000500", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030700000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000000000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000000000000892f0700636f6e6e6c6162656c0000000000000000000000000000000000000000000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000000000000007000000070000000a0000000434f4e4e5345434d41524bff6eef1d192516e43f9a305e46692c00000000000000000000000000000000000000000008"]}, 0x2a8) [ 2333.069919] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:21 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x300000000000000) 00:26:21 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x400, 0x0) fcntl$setpipe(r0, 0x407, 0x81) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f0000000200)) 00:26:21 executing program 1: syz_mount_image$msdos(&(0x7f0000000080)='lsdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:26:21 executing program 4: 00:26:21 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x2, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:21 executing program 4: [ 2333.242114] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:21 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KVM_REINJECT_CONTROL(r1, 0xae71, &(0x7f0000000140)) 00:26:21 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f75746500000300", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030700000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000000000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000000000000892f0700636f6e6e6c6162656c0000000000000000000000000000000000000000000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000000000000007000000070000000a0000000434f4e4e5345434d41524bff6eef1d192516e43f9a305e46692c00000000000000000000000000000000000000000008"]}, 0x2a8) 00:26:21 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0xfeedcafe, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:22 executing program 4: 00:26:22 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000040)) 00:26:22 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f75746500000400", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 2333.449874] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:22 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0xf000000) 00:26:22 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x100000000000000, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:22 executing program 1: syz_mount_image$msdos(&(0x7f0000000080)='\nsdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:26:22 executing program 4: 00:26:22 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) r1 = shmget$private(0x0, 0x4000, 0xc00, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_LOCK(r1, 0xb) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x0, {}, {}, {0x2}}) 00:26:22 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00`\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:26:22 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x200000000000000, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:22 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x4000000, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000180)={0x1, @raw_data="9bca4f134d8b0a064e563631725ccb22433480e2b45114a1050a8587ca3f51f9a1258c463962f464b0fa67759b3a201b4f670d226baeb49358c0bb72df6b928e9729a0555104c3d089c40b396cf2a0e7093c32a83542da4ec881506dd2291161dc0515aa6f2b2cd2643b7eaafc5f9e37ed22dcb622f48f8ef9e6ddb68c12235bb7192e741f877733d30091bf8a4c1173cbbfefdb071b5c0e0d0e823016e4e1982edbc30be99ccc173069ae4aa64dddf1844434033a17f674228aeb4bc1add333aade3fe3829e85bd"}) 00:26:22 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0xee1e, 0x1000) r1 = dup(r0) ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x4c09, 0x1f) syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x4040) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)) 00:26:22 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f7574650000000000000000000500", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 2333.710635] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:22 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0xfecaedfe00000000, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:22 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x8000000) 00:26:22 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000005000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 00:26:22 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x443, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f0000000080)={{0x0, 0x0, 0x1aa7, 0x3, 0x1}, 0x0, 0x9e4d, 'id0\x00', 'timer1\x00', 0x0, 0x0, 0x1, 0x6, 0x4}) ioctl$void(r0, 0xc0045c79) [ 2333.854455] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:22 executing program 1: syz_mount_image$msdos(&(0x7f0000000080)='%sdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:26:22 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x1000000, 0x0, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:22 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f7574650000000000000000000400", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030700000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000000000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000000000000892f0700636f6e6e6c6162656c0000000000000000000000000000000000000000000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000000000000007000000070000000a0000000434f4e4e5345434d41524bff6eef1d192516e43f9a305e46692c00000000000000000000000000000000000000000008"]}, 0x2a8) [ 2333.961895] Unknown ioctl -1057467389 [ 2333.996412] Unknown ioctl -1057467389 00:26:22 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x200000000000000, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:22 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) creat(0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 00:26:22 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x0, {}, {}, {0x0, 0xfffffffffffffffd}}) ioctl$VIDIOC_G_JPEGCOMP(r0, 0x808c563d, &(0x7f0000000040)) 00:26:22 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f7574650000000000000000000600", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 2334.020975] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:22 executing program 1: syz_mount_image$msdos(&(0x7f0000000080)='mXdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:26:22 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x1400000000000000) 00:26:22 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)) 00:26:22 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0xfecaedfe00000000, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:22 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00?\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:26:22 executing program 4: set_thread_area(0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x5) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) [ 2334.219027] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:22 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80000, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x82, "6afc2239d54ef9a476ea26d8e244c2c12a5b4bde04cc3d8b39fca8a1b529213d21b67e5cc9a30835409cd37f545c0acc005ac446cb1c6dd4faf3522dc7f46c2472674104af48cb96fca7ce54ee700fcfa14e9a7f3e24d5bed606c821b0ac384d093494f3ed1a09f3ece3ecc338e047f7d452188d18fda1ce7c5abfa2cda7480054cd"}, &(0x7f0000000140)=0xa6) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)) 00:26:23 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:26:23 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x100000000000000, 0x0, 0x0, 0x0, [{0x3}]}}}) [ 2334.356590] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:23 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x3f00) 00:26:23 executing program 1: syz_mount_image$msdos(&(0x7f0000000080)='modos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:26:23 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f0000000200)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1, 0x0, 0x0, 0x0, 0x9}}) 00:26:23 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x400100006, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)) 00:26:23 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\a\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:26:23 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0xfecaedfe, 0x0, 0x0, 0x0, [{0x3}]}}}) [ 2334.491039] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) open(0x0, 0x0, 0x0) 00:26:23 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f75746500000200", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030700000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000000000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000000000000892f0700636f6e6e6c6162656c0000000000000000000000000000000000000000000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000000000000007000000070000000a0000000434f4e4e5345434d41524bff6eef1d192516e43f9a305e46692c00000000000000000000000000000000000000000008"]}, 0x2a8) 00:26:23 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x9, 0xffffffffffffffff) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x3cf, 0x10001) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000140)={0xf000, 0x8000}) symlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00') getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000700)={0x0, 0x9, 0x800, 0x5, 0x7ff, 0x2, 0x63e, 0x7, {0x0, @in6={{0xa, 0x4e22, 0x2, @loopback, 0x1f}}, 0x5, 0x8001, 0xfffffffeffffffff, 0x3, 0x9}}, &(0x7f0000000240)=0xb0) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000600)={r2, 0xffffffffffff0001, 0x4, 0x5}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@local, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f00000005c0)=0xe8) ioctl$TUNSETOWNER(r1, 0x400454cc, r3) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r4, 0x628, 0x70bd2c, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x1) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000000)=0x1) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f0000000100)={0x200, 0x8}) ioctl$VIDIOC_S_AUDOUT(r1, 0x40345632, &(0x7f0000000480)={0x37f, "57096892050024cb000000005cd9c296e9c4dc7b065b89d41c7f9dbe5500", 0x3, 0x1}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/mixer\x00', 0x111100, 0x0) ioctl$VIDIOC_G_STD(r1, 0x80085617, &(0x7f0000000340)=0x0) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000680)={0x2, 0x0, [{0x21, 0x4, 0x0, 0x0, @msi={0x3785, 0x7, 0xffffffff80000000}}, {0x9, 0x2, 0x0, 0x0, @adapter={0x6, 0x1, 0xffff, 0xfb9d, 0x3feb}}]}) ioctl$VIDIOC_S_STD(r0, 0x40085618, &(0x7f0000000380)=r5) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000003c0)={@mcast1}, &(0x7f0000000400)=0x14) [ 2334.634737] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:23 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x1000000, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:23 executing program 1: syz_mount_image$msdos(&(0x7f0000000080)='m#dos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:26:23 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x500000000000000) 00:26:23 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f75746500000500", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030700000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000000000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000000000000892f0700636f6e6e6c6162656c0000000000000000000000000000000000000000000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000000000000007000000070000000a0000000434f4e4e5345434d41524bff6eef1d192516e43f9a305e46692c00000000000000000000000000000000000000000008"]}, 0x2a8) [ 2334.756484] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:23 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x2000000, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:23 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee20, 0x1ffe) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x400000, 0x0) ioctl$BLKBSZSET(r1, 0x40081271, &(0x7f0000000100)=0x1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x121100, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r2, 0x0, 0x41, &(0x7f0000000340)={'filter\x00', 0x60, "8040a5e87b202ea626aedb909422ed351ed4176707cfd536b38f31d5c5069b5e30e1c2ef351d00c67faa0f6d9c46fecab8dd6f5a51b9db2f280107c2898724001e312e8a1603fe67100d03249fc9405427d2cc4a06c707a2d9ec51e87692d91b"}, &(0x7f0000000400)=0x84) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='system.advise\x00') ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x0, {0x0, 0x9, 0x80, 0x9ceb}}) openat$dsp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dsp\x00', 0x80000, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x4000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000001c0)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f0000000280)={0x10, 0xffffffffffffffb0, 0xfa00, {&(0x7f0000000300), 0x2, {0xa, 0x4e23, 0x5, @ipv4={[], [], @broadcast}, 0x7}, r4}}, 0x38) 00:26:23 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) 00:26:23 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f75746500001100", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 2334.932135] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:23 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x2, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:23 executing program 1: syz_mount_image$msdos(&(0x7f0000000080)='mpdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:26:23 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f75746500008800", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030700000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000000000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000000000000892f0700636f6e6e6c6162656c0000000000000000000000000000000000000000000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000000000000007000000070000000a0000000434f4e4e5345434d41524bff6eef1d192516e43f9a305e46692c00000000000000000000000000000000000000000008"]}, 0x2a8) [ 2335.029691] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:23 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$FS_IOC_GETFSLABEL(r0, 0x5452, &(0x7f0000000280)) 00:26:23 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)) msgget(0x3, 0x403) 00:26:23 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x14) 00:26:23 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0xfeedcafe, 0x0, 0x0, 0x0, [{0x3}]}}}) 00:26:23 executing program 4: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x8955, &(0x7f0000000000)=0x2) [ 2335.201083] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:23 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f75746500000000000200", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:26:23 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x111601, 0x22) ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f0000000080)=0x10010) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)) 00:26:23 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x100000000000000, 0x0, 0x0, [{0x3}]}}}) 00:26:24 executing program 1: syz_mount_image$msdos(&(0x7f0000000080)='m+dos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:26:24 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f0000000040)={0x3, "329dc729ce3e16d528674464daa5e1980d95d10f11d3d4fae2b04554cf65c61c", 0x128, 0x8000, 0x5, 0x4, 0x3}) 00:26:24 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f7574650000000600", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:26:24 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x7) [ 2335.407240] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:24 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_GET_PIT(0xffffffffffffffff, 0xc048ae65, 0x0) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, &(0x7f0000000140)={0x1b5}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:26:24 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x200000000000000, 0x0, 0x0, [{0x3}]}}}) 00:26:24 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0xee1e, 0x400) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000100)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x80020, &(0x7f00000003c0)={'trans=unix,', {[{@version_L='version=9p2000.L'}, {@privport='privport'}, {@uname={'uname', 0x3d, "6e6f646576254076626f786e6574312e776c616e3170707031657468316e6f6465762a73656c66776c616e31267365637572697479a62470707031"}}, {@access_uid={'access', 0x3d, r1}}, {@version_9p2000='version=9p2000'}, {@version_9p2000='version=9p2000'}], [{@dont_measure='dont_measure'}, {@fsname={'fsname', 0x3d, '/dev/video#\x00'}}, {@fowner_eq={'fowner', 0x3d, r2}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'keyring*'}}, {@dont_appraise='dont_appraise'}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@pcr={'pcr', 0x3d, 0xd}}]}}) r3 = syz_open_dev$vcsn(&(0x7f0000000540)='/dev/vcs#\x00', 0x5, 0x8002) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev}}, {{@in6=@remote}}}, &(0x7f0000000680)=0xe8) r4 = fcntl$getown(r0, 0x9) sched_getparam(r4, &(0x7f0000000500)) 00:26:24 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f7574650000000300", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 2335.566750] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:24 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0xfecaedfe00000000, 0x0, 0x0, [{0x3}]}}}) 00:26:24 executing program 1: syz_mount_image$msdos(&(0x7f0000000080)='m-dos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:26:24 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x0, 0x14000) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)) 00:26:24 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x800000000000000) [ 2335.739559] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:24 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0xee1e, 0xfffffffffffffffd) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)) 00:26:24 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f7574650000000500", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:26:24 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x1000000, 0x0, 0x0, [{0x3}]}}}) 00:26:24 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000040)={0x400, 0x5, 0x4, 0x2, {0x77359400}, {0x0, 0xc, 0x0, 0x7, 0x9, 0x313b, "07c97526"}, 0x3, 0x0, @userptr=0x481, 0x4}) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)) [ 2335.977606] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:24 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_GET_PIT(0xffffffffffffffff, 0xc048ae65, 0x0) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, &(0x7f0000000140)={0x1b5}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:26:24 executing program 1: syz_mount_image$msdos(&(0x7f0000000080)='m0dos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:26:24 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f7574650000000000000000000100", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:26:24 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x2000000, 0x0, 0x0, [{0x3}]}}}) 00:26:24 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1, 0x80004) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)) 00:26:24 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x11000000) 00:26:24 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video0\x00', 0x2, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x8000, 0x90002) setsockopt$inet6_udp_int(r1, 0x11, 0x65, &(0x7f0000000240)=0x1, 0x4) ioctl$RTC_PLL_SET(r1, 0x40207012, &(0x7f00000000c0)={0x81, 0x3, 0x0, 0xa9, 0x0, 0x9, 0x8001}) ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f0000000100)=""/211) r2 = syz_open_dev$mice(&(0x7f0000000340)='/dev/input/mice\x00', 0x0, 0x80) ioctl$EVIOCGABS0(r2, 0x80184540, &(0x7f0000000380)=""/137) [ 2336.216127] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:24 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0xfecaedfe, 0x0, 0x0, [{0x3}]}}}) 00:26:24 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f7574650000000000000000001100", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:26:25 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x2, 0x0, 0x0, [{0x3}]}}}) 00:26:25 executing program 1: syz_mount_image$msdos(&(0x7f0000000080)='m\ndos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:26:25 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000240)) rt_sigaction(0x3b, &(0x7f00000000c0)={&(0x7f0000000040)="8f29b8956205c461797e56f7f20f1cd1317b00f2440f0fcbb0c462b18e58092e400f01d5c48205acba47000000470f01d566440f383b8a476f3bde", {0x6dc9}, 0x40000004, &(0x7f0000000080)="c4631d7e3e0bc40181f49124b265cd440f558ef047e73a0f1910660f55d6660f383507c422d19194760000002042f9c443454b680b090fe5ea"}, &(0x7f0000000180)={&(0x7f0000000100)="c442199ad244dec83e2e0fd861f56666470f38050f8f097c81d4ec410f0fe1a0c40265b6c30fa357fe4b0f7e3a", {}, 0x0, &(0x7f0000000140)="430ffbedc481fdd7c4c441f9177800c4613972f66f65400fc0d942d9f9c4e179da6e05d1f167660f5adec4a1f82b01"}, 0x8, &(0x7f00000001c0)) [ 2336.471210] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:25 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_GET_PIT(0xffffffffffffffff, 0xc048ae65, 0x0) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, &(0x7f0000000140)={0x1b5}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:26:25 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:26:25 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0xffffffffffffffff) 00:26:25 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0xfeedcafe, 0x0, 0x0, [{0x3}]}}}) 00:26:25 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x1) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x406, r1) 00:26:25 executing program 1: syz_mount_image$msdos(&(0x7f0000000080)='mddos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:26:25 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f75746500007fffffff00", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 2337.131687] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:25 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x0, {0x2, 0xffffffffffffffff}, {0x10000000, 0x0, 0x5}, {0xfffffffffffffffc, 0x3}}) 00:26:25 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x1000000, 0x0, [{0x3}]}}}) 00:26:25 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f75746500000000000400", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030700000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000000000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000000000000892f0700636f6e6e6c6162656c0000000000000000000000000000000000000000000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000000000000007000000070000000a0000000434f4e4e5345434d41524bff6eef1d192516e43f9a305e46692c00000000000000000000000000000000000000000008"]}, 0x2a8) [ 2337.262554] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:25 executing program 0: pread64(0xffffffffffffffff, &(0x7f0000000040)=""/86, 0xffffffffffffffdb, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) inotify_add_watch(r1, &(0x7f00000000c0)='./file0\x00', 0x2000810) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f0000000100)={0x0, {0x7, 0x0, 0xfffffffffffffffd}}) 00:26:26 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x13) [ 2337.515115] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:26 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_GET_PIT(0xffffffffffffffff, 0xc048ae65, 0x0) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, &(0x7f0000000140)={0x1b5}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:26:26 executing program 1: syz_mount_image$msdos(&(0x7f0000000080)='mxdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:26:26 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x2000000, 0x0, [{0x3}]}}}) 00:26:26 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x7, 0xfffe) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)) 00:26:26 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f7574650000008800", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:26:26 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x1200000000000000) 00:26:26 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000240)={0x1000, {{0x2, 0x4e23, @rand_addr=0xfff}}, 0x0, 0x6, [{{0x2, 0x4e20, @loopback}}, {{0x2, 0x4e23, @multicast2}}, {{0x2, 0x4e24, @empty}}, {{0x2, 0x4e24, @local}}, {{0x2, 0x4e22}}, {{0x2, 0x4e22, @multicast1}}]}, 0x390) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)) [ 2338.071712] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:26 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0xfecaedfe, 0x0, [{0x3}]}}}) 00:26:26 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0xf00000000000000) 00:26:26 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00?\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:26:26 executing program 0: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0xee1e, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x2000, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000080)={0x0, 0x8}, 0x2) dup(r0) 00:26:26 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x2, 0x0, [{0x3}]}}}) [ 2338.300827] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:27 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f0000000200)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000280)=0x1) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000380)={0x0, 0x2000000229, 0x0, 0x0, 0x4}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) 00:26:27 executing program 1: syz_mount_image$msdos(&(0x7f0000000080)='m.dos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:26:27 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f7574650000000200", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:26:27 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0xffff000000000000) 00:26:27 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x7, 0x4000) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [{0x20, '/dev/video#\x00'}, {0x20, 'bdev'}], 0xa, "3d008668bdaae2d27d18ba81459ae91122b2f03fd233833f64c6edda370fdbf46c354da71f5cfcc7967aec37a7fa1df2bbeaa136d310dfbdf50dbb53d21f15d2d68786d8e7339aac9c7a501539929a122fe459acc9075a50c1c77e2d7b625a65e2f97fb36472387ec39c0ce7957f85cd34a09014f98367b18117ad19f89ea4e2d8ecc055291cbbea4aa94dae9f28"}, 0xab) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f0000000200)) 00:26:27 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0xfeedcafe, 0x0, [{0x3}]}}}) 00:26:27 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f7574650000000500", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 2339.023440] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:27 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)) lsetxattr$security_smack_transmute(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0xfffffffffffffd9c, 0x5) r1 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x9, 0x141000) connect$llc(r1, &(0x7f0000000140)={0x1a, 0x30f, 0xfffffffffffffffe, 0x7, 0x3, 0x9, @dev={[], 0x1b}}, 0x10) connect$bt_rfcomm(r1, &(0x7f0000000180)={0x1f, {0x2, 0xfffffffffffff36f, 0x5, 0x38000, 0x2, 0x5}, 0x2}, 0xa) 00:26:27 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x1700000000000000) 00:26:27 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x100000000000000, 0x0, [{0x3}]}}}) 00:26:27 executing program 4: syz_open_dev$usb(0x0, 0x40, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="d8000000000200000d72c6306c8267f2a1d98b22d37157909c87ba46a97225b6ca5910d8b97f311525b00ef210"], 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000540)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 2339.143463] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:27 executing program 1: syz_mount_image$msdos(&(0x7f0000000080)='mcdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:26:27 executing program 0: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x80, 0x0) fcntl$getflags(r0, 0x3) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f0000000200)) 00:26:27 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f7574650000000600", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:26:27 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000080)='{', 0x1) 00:26:27 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x200000000000000, 0x0, [{0x3}]}}}) 00:26:27 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x3af94e66, 0x2000) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000000c0)=0x6c9) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f0000000040)={0x0, {}, {0x2}, {0x0, 0x100000001}}) 00:26:28 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x6000000) [ 2339.338017] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:28 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) shutdown(r0, 0x0) 00:26:28 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0xfecaedfe00000000, 0x0, [{0x3}]}}}) 00:26:28 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f757465000000000000000000000300", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:26:28 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x2000) r2 = geteuid() r3 = getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@multicast1, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in=@dev}}, &(0x7f00000027c0)=0xe8) setsockopt$inet6_buf(r1, 0x29, 0xff, &(0x7f0000002980)="c8d79ba8c206ba60835a72f59f0bc6b02645e6b02d8bf828755de7eff030742c", 0x20) r5 = getpgid(0xffffffffffffffff) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000003a40)=0xa, 0x4) r6 = getpgid(0xffffffffffffffff) r7 = getuid() r8 = gettid() r9 = getpgrp(0x0) ptrace$poke(0x5, r5, &(0x7f00000029c0), 0x3ff) r10 = getpgid(0x0) ioctl$ASHMEM_GET_PROT_MASK(r1, 0x7706, &(0x7f0000002940)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000006d00)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000006e00)=0xe8) r12 = getegid() sendmsg$netlink(r1, &(0x7f0000006f00)={&(0x7f00000000c0)=@proc={0x10, 0x0, 0x25dfdbfc, 0x20}, 0xc, &(0x7f0000006c40)=[{&(0x7f0000000100)={0x14c, 0x39, 0x100000000800, 0x70bd26, 0x25dfdbff, "", [@typed={0x8, 0x5, @ipv4=@empty}, @typed={0x14, 0x33, @ipv6=@local}, @typed={0xc, 0x10, @u64=0x10f7}, @generic="51fc79c76209c32108e3d20c8012fac1d9bcfee42fc746928768086caf0349cfebfec13f824d16c79ebf78c82e5e0f30fd0d77f70e0586c190736c8c78", @generic="4ba8ca4a927db2cef556c5bed224197958ab39b313735de79db05bcaa6446f8c1dc091b94d747b37d8e8de98a80a377a4dc5d21c6f4b5f7bd56044acb3e37c4ec770c013e63cbb7b1fd3fac0f2638bd3650d7c885ac60b95a9f8383ba518e323d0d01cbc90ccaf1a837c1bf9b2959bb1bad98cd8", @generic="385aea120e9b89add99bb98ff75811df06f5bf0ef8d431667fc29d4ac1718b7143bf9c85c24912a3533924fb4f2d777bc08df8aa916677fa2e6fa41f2d6ccb21286ae247e6a1182a6b104c7065c7992a00c810c0", @typed={0x8, 0x95, @u32=0xfffffffffffffff7}, @typed={0x4, 0x77}]}, 0x14c}, {&(0x7f0000000280)={0x11ac, 0x24, 0x20, 0x70bd2a, 0x25dfdbfc, "", [@typed={0xc, 0x4a, @u64=0x4}, @nested={0x1188, 0x7, [@generic="432cf5e516e51bf6f74017e88348d5b0372cdbd412698073253404daa8ddee0880bb41e0428d57ba9ed9bab075f231b18ec8e916322268c6", @generic="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", @typed={0x8, 0x38, @uid=r2}, @generic="63f64548a16c3837bf886e1898d6a77c76e18af0433ea2d3b686829f1ac13db6fb80de03c02d9b30b6d5e5de9403d70d48af188e5ce0131b9c96d0d93690fd83b7449c516808fd3e77a2d960b0f6f1a0e3f766c66f1cf20ca11529b3e9", @typed={0x8, 0x54, @fd=r0}, @generic="b6562f3e1bd8555302e0f5da0f82cd917a2a4c11cb6a10d98612bc5abe0ec025e5434ab3e90c12d472deddc7c7665bea70880fcca47ec1417542ea4c77e20516ef932ec1948ac7bc5a4261da4ddc0111c9255c22780d4303766e89cb9a64bbcc212915d7923b3ba88fcce0bdf0de8b3373c3bd074e5e7fa81bea517ca927a86dd21b3159912761247ffb40a0528aa8a752444f59355ec34e85e68353ff9c843036c9391b1bb141cfe88735b3cd000b2060bfe0d8605e2be09675bba7d4b879069489d4bd2597533cb7e578e870", @typed={0x8, 0xc, @pid=r3}, @typed={0x8, 0x5b, @u32=0xffff}]}, @nested={0x8, 0xc, [@typed={0x4, 0x79}]}]}, 0x11ac}, {&(0x7f0000001440)={0x1254, 0x1b, 0x220, 0x70bd2a, 0x25dfdbfd, "", [@nested={0x1178, 0x17, [@generic="26a79f3fd4fc691839fab2680e75a0d4318478d43312af98d7d24313a5e4f4c382fd43863145871cf49b955122cf97566386b62cffaab43c405885271d6389c1640375d01157239ae9ec5db2ab4f4875eb7c25a64007d36742b2de23d2b969bfd63d20", @typed={0x8, 0x69, @ipv4=@multicast1}, @typed={0x8, 0x3c, @ipv4=@multicast2}, @typed={0x8, 0x92, @u32}, @generic="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", @typed={0x8, 0x80000000, @fd=r0}, @generic="1bff119627b9764d691cd02bdd6d96d3f432d352a489a1c5636aadba1956ebd63fbfb082e92305eaf9012a1c128df06b0abcf968fcef84f48d2543fb5303aa91e5b6fb0e86476b5b577c3b76490c459d3fe472dcd08352cb49b71a3139ba8197f5a042e1aabe9c3e1c14ae0530cbd9117785395fc5db3479ec04920987a52f9402e86a2441b017adf9d8bee63b3f1988706b8f9df50e0bae1c8e4c96faec60a9310dc1317fe6e7b46bf6b3d7e971d9ea26da0862deceaac5ad9ef489d216d5d326b4f193f3c394f23e05a486d9418424e2ec50302f50b4", @typed={0x4, 0x65}, @generic="1a0a476c537597228d5fcb58fcf8b7390a1dff44"]}, @generic="bcd46bc5fd897926fafa4917933f799607de484ff9909d354c16db3ab3d14cb8d19df6da478548436abb94599c641407e2477e9acc32907416bdbdaea8fc3f0f2272d7cc74f7792bc69e1322b15281cda7d19befe7141715a1cb9e91e45eb0e2d42211dfcd121a0342cde7153eccf3f1ba0f188d8d0972907b7412de6761a289e40f46eb5cd620b4bfdd7a35bc1e102db9fe10aea8e283cc75264ef2c533784ce3b05c8942bd570100a7565332fb0d08e7ae7bd663aa1b6ed33ab668b9a0fd51d631e677cd48e10362"]}, 0x1254}, {&(0x7f0000007f80)={0x18fc, 0x3b, 0x0, 0x70bd25, 0x25dfdbfd, "", [@nested={0x127c, 0x54, [@typed={0x8, 0x82, @fd=r0}, @generic="4ff04de8f8db002d1e9c3943ac55bbc3357c2de842d1aa961463f89e1ef329c093ddb8f0c6a6f31c5bf1f6c67c25880bd670f80549694fc1f36752f1", @typed={0x68, 0x6e, @str='selinuxeth1[eth1securitytrustedsecurityvboxnet1vboxnet1cpusetsecurityposix_acl_accessppp0\'@em0user\x00'}, @generic="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", @generic="7204fd12bd0a5f5bc8ad392968866d0f92c51f18d6134bff3e4c52d1ce36f529de17adddf75bb159357d32ee15f6fc25ae48d8ecd490e44bc048568c94f80b1fc94f4f0cb0602b87613d857079e2341131fc0962375d71b3cbfef8f50765c15077e6ea91e6738c7b5dad82a82d9fec80eba6d74f70", @generic="e3192dcce6330f4b0b51e24cea531804662b601c0c63fb666a55d24df637b38e3be511770052cc69b41474605a68d335e08eca9ff1099d7d856a100192874e587c9d6af72438dd9e02df30f0499c537edfc52725f4240e2b1be82acd7fff580b55f13fedd1992a9b41ed4073200a456eda83cc660a92b70c3467460d62ef7a60b8a8e03074a11acb1759dfa663c7490e05f0ef7fc831ffba783b837019728b9c5720f8227f6722129ec092", @generic="4bd9bed414400affd8e2bc812d47b1df09143d6f91993c0af2ee1c660ebe8dd19e5ab19233fee2b8def31a7e4c91f54e0f28386d110bdf187c4402a9339f0763b05541d82bd34f841b2d9e0266050a9f966a587322d2bb194cae1db48f1e0f77d239ced4af5335cfb4239ea142f103ea1abaa933cc97424f9cc6bbc1e5d84a029635da57e67336db74c4513a0e19843c", @typed={0x14, 0x2c, @ipv6}, @typed={0x8, 0x90, @uid=r4}]}, @generic="5c32148402c3bb07847515b87b05ac14759745d21ae482932889b4f94b91a1f670728ac8c5c8031c54772160596164d7eccaf47158629a0f0e35732164137801b6db77a278", @generic="fbaadacfb19d42f9517b30334ed528be56a44a495680681c56957527d28e6ee960ddebe2edc7982e310a4c", @generic="1e0c4f2d50f71791099b55aad8d5719679924d270e0921c20ab25362eea293aaf90a44adf9444ce05e60bbf9cce88b6237c8b73efbf6f6a163aef3c393812560434c41ee7d73eeaef3512f727cf82ea4457a7760cdc3c5241d36bcb56134d24dedd9f72bebab3bccf58c11b83c16823aeb0eb26606e497ef1b6bced88f8d771a76296ec1b33d28705c9568ea32aad840c931803211f5228159d3f8ea6efa957ac30dd4ed2a2a2cdb5f14e8aa78d49cb9d68b31a50e1f094d232845c9ef2732bded3cfaf37a009149aa002b6aaaba987d57bf1d3a515b4b31927759c13069e16527755697ecc8", @generic="4d3fc055b3ffb4dfba7663d9b19063e35797b74d1e0802020f042cf445c2942a6078400f3d0c31ae500c0aa58c7b87aa7b27f201f8ce9415e1b560c5ce9c0b4a9afe2d20c3b6d4b4f9e2266a7a7294923e69cf363c79249e41bba65a6204b42e354d4d7525b52343fc2b3408fcbf7fa4416157aae90a3a835ef7bc6377f7642b80e712f63a5fa69c71f424caee1240d694237b10af3854f6045a6084bb74b6fe933e08a7633ccb4f45de91605580197447b022936676708318cd47edd2", @generic="5c6a2ec5c5e009b09e81983f643846609cf451aa0a920b7fbba67066aecaab8651d5b9133cb7281c63e4e6389e73d49990cdaae2cd7766022366be8a85bee777efa96e45332c9c6dabea6b4f67cdbc3833e485927098824807442a5c2542315a53ca217f13e60c1f5786258d4da7266c162a6db168a0a741bd857f2b0aa0f38960579e957a4eaac0118c902f776cde059c162e606e98df930b9e2c70c0fbdab0e8d3def709cbe80eff1ea68948299ce35f3f9a6a270bd330932a7b2c208dc81bf9ec392d1c8083cdd18506c5", @nested={0x2e4, 0x39, [@generic="1eee6916ce70a0928ef0639c12701dad4356567a5cd765f156d189ccc4801791345b044e03736ba3b92c1bc20abcebfa799b0bb3f7f9328812cc629712cde2a7ca6d447a302ed3715430672c457e193122ad55fe9de517542a64468b562d528a259723610ed069017bff54bb0d4197835577b3ad0718bb6fda1869dbadefaa429914967c432dd121de5d592f296e0e7aad534a6672665a9f1db949b2d0d4491a4a00261e9752269781d52749e6f8675ff7d6db773b336be321880777df751f16a87958409b2a2b445c6ce260237899096e77de0024de32479f20fcff0ccef712", @generic="4bdd54fd5b9f4fd77659ba233c9dd008a8a8384443ecee32fbb0956582314bd4628f849c15ac04996b5f985292068969dbaa61ae0a62c42cddc1b0b2d8549eb95b2f8a0cb23fcbf73ff0087d42c53d58c4cea8b5ccfb631625fd8e1ae2b7dc1303182379199b0906c13daf3fd7cc945c56bb07c2f7ed65e0a0813c827492a668c9b49b79555dd1c88356a673301c85eda47a83171a240e66cb2b915a65cb434a8fa8d375259d9fdd49e55d8e2cdad879cfc3a4c9c5728868ec3aa92ab4ea13011411f8b7305830f500dbed372d00839e99f230e2f34264a29fafe91bcd1d825c9a5fb323155167bc34134d20", @generic="e125fdd45e10c9eedc7ae36c80dd34cb9c20327e32fc691f33e30c2c257e38b9609371496a27c850b7781e9a77a9bcc9daa89c31989ce2816880a570a7f21261c241419520b3430d72324af2a3f0bf774a64b65b4981e859cef8c5cfb0d07fdde7e2f812ea4c4ca9f30212209ba7bef25ee58deaa1a106288096a9ca5fa0e87c604c052fa25def5094ea1aee8f5ec536aa2ac75c9951e75002f2109eeac6cae820c5a0198dcf27e69e8c036d37a88c21d4f017e627d0463fd17187178cd401d7f64188da5c87f1ff37f017c705599a1f53aafd96161ef6dab5ae6a53db4c613f119efa284de1949fbc4c2d2d785cc524e4ad695c325df396", @typed={0x8, 0x2d, @fd=r0}, @typed={0x14, 0x8d, @ipv6=@mcast2}]}, @generic="2552cef63c6d231e06e9f1e72d317e310f868d1e4fb5b2d104b755466f7e5ed8f8e598e1ecfcf09a9d7085f96f80984016db0714ba25eaf848f5c586506b6ba15e6c6dd97d1f256e96abe4fb12679d776e43e9a3e9a2e559dac6bce1dce36b29c436f56d899b24204cbd365d3977c69a061dd12d", @generic="14222cd41d6eff959d5ad3255144bc9ea65f8c07af23a58c98d072585fa561c257d7662b73908d8773e848c6df6066ab09833e1f153f3d5223"]}, 0x18fc}, {&(0x7f0000002a00)=ANY=[@ANYBLOB="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"], 0x1014}, {&(0x7f0000004140)=ANY=[@ANYBLOB="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", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00'], 0x1dc}, {&(0x7f0000004340)={0x240c, 0x28, 0x0, 0x70bd25, 0x25dfdbfd, "", [@typed={0x8, 0x62, @fd=r0}, @generic="8982496b4e4b1218169a63df57ab94dec3b7e07fa631272fcf9b593caef87a871bfc0ccb8b5c10", @typed={0x8, 0x5a, @pid=r6}, @typed={0xc, 0x5f, @u64=0x50395f04}, @typed={0x8, 0x81, @uid=r7}, @nested={0x2378, 0x11, [@typed={0x4, 0xa}, @generic="12f5b58f638709f53bff0192cbc1d6e3b19ee9bc9b2640511b83f58245467186cd703e964ed7713966adbf13deb9b5be779915f7963ce5e232495bb392751815d5c45e316dba5c3140350b02dc704e1b6e93ae1017c99d2f8e4c985fc871fe13c6beeb8ec6bc60e01f3e4e069ee6dad5c2124f256bf2a4bf819eb3cad8f6a93987f21f46e2dc9ebf8824d60ab094", @generic="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", @typed={0x8, 0x21, @fd=r0}, @typed={0xfc, 0x28, @binary="1170a8e187e73324d4aee3e07aaed8a9b6c2c131d4a6bf8387d56a38131f1bfddfd9978e3f688816b36de64f9af7423d2e7c3b8ff0c52c7b053fc1d075fc2207e3a83ed29086894c01f61bd84a2277c6835b066f345d8cd34bb9524d63e09d67044681dea0d057e396ab283e0046fdb79a25ef68fca40c0c268c78eef30f763b732df16801f494320928286e3e26acb407aa0d475b9442cc86617d82b0d747c6328e3ba138306846c2cd90e056b7b44cecd2b4ca459cac26419301208d72198221389227602b797c24346a279ca3a850e172e9cd9306f3574b943ffcb5fe94f272db33718573af2f2828e2963380118fbe1b48571d697802"}, @generic="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", @generic="c77fb7baf0766b0e579291520970c332cd157be25e6a0d099ee9a32ddbb4f0a24bb8f255009866604ce5c251cffa982a7fd8447545d70882cbf64dc573ed8e635a28cf367898fb87b60022530a9cc4e26c7faef1968d69878ec664a7d759ccaae2bb22968f48e7ef10587f2decb40fd04125efe79bff1fc7d3e71325da05be77f888efd0fbcdda8fe2cc73e02a1a5a339b1704ff7bad87d4916efa44b0b7075c820adfc93ac07f717f7bb46913a1d37ec7b7344e5e7583c3f3484bc001ec07c28eddc88511ff83d34bffb1e9de4997eec43e43c8efb5ba61e4366f45dffeacadad8d7890bd1f416fd9d0bf39694d8169717cd3", @generic="f74d812a825efaee32433148444ddf0dad6c32f2dc17cbc53f004a81e8efc1570da32d8619b33337b335fe15b1cca1d701b60d153697cc5148fbaba555bfe3a6861e829b59f2c7b64cc640002c22b87c41e80de68304f64cfed4835c50514ac7c86e32439cc4d9d5b1a3ed92a6f9cfb8ce947768c5ded772dda1d386ac2fc5fcd089e9c792d4abc9a64919064bb4f1b0d7ad157f73ac4c3e8acb2240c4fff1446df82c8b55cb4fd15310978afa9145114fca5d7f4ab529d26a876bfa725ff2f8c5d14ab731f14435d3681ee5b290bd2ae23ed53e83c00ac6ec3f44dbd85c2a59f488965a3764ed2673"]}, @generic="9353dae308c81d34cbfb1bc9efa5d443f09b34c856e3908830bcabb29f9d848bef91deb6c2b5f9a524cd250f53082892ca371eb5021a332c"]}, 0x240c}, {&(0x7f0000006780)={0x230, 0x38, 0x10, 0x70bd2c, 0x25dfdbff, "", [@nested={0xe4, 0xd, [@typed={0x4, 0x1b}, @typed={0xc, 0x6c, @str='proc#\x00'}, @generic="b5d61f01c496a6359c077eb869740564ddc26c7d1a96a092c815285ac5dbadc82c5c1d6eac1862cf43f426215e7c908bf932a2a36245e79adba2e4f4f2773d97edcc24f94edf606713b4c08f457b911fae98dd91c127210ef57c4d428e9002a7dae8d629cae51da65305158d0ecd4d8fdcf1b525e8645ec5c93de4c833acd42904e9d7550a3a617f48590e8879370f0162b8993718787bb2222671afb40d2a5cb439d55e44f2445d7e316754b8d94e066279b6fe446626b92dd2e2e6f018dc36a1884e1ae41689b5", @typed={0x8, 0xf, @u32=0x9}]}, @nested={0x13c, 0x46, [@generic="da483bde882e69d48ac70ddd4fccd9394e865ac5288a90c5b3d0e93233ef9ce7650cc17bb8847596adc4da89473c2ad898d55804a61a78c9dde8d205946a3615dc6593cf81b4b263f2dac4c1ceaf85be544f4adfb8c89edf181b0935264e80350dcde23f8826663c3399af26414543c104605bff679513b83518b7a252353f4b4aed430f46569ffe93ec9750d4efbe55fe7864d19dbb9e90e74c9c1f1cd9c2befd668907359995b09c4f95", @generic="329d1897fd1563aad58a33d358f099830a7d20502d151881cda24d1daa926b221300222285848c9036367931e74f4c07489678e8a04ff4820470eca56d16bdbf4c42352b2a1fa8514803af284388d035a3f83d7bd5001a627fbd1c3b648784adce1973302ccc66b8eb1486296591683e5db8ef113c536a4d57b6d507d911c4fd27ba9c6826f4a863f0b1bc8127"]}]}, 0x230}, {&(0x7f00000069c0)={0x10, 0x20, 0x0, 0x70bd2d, 0x25dfdbfb}, 0x10}, {&(0x7f0000006a00)={0x204, 0x3c, 0x100, 0x70bd2d, 0x25dfdbff, "", [@nested={0x170, 0x27, [@typed={0x10, 0x46, @str='/dev/video#\x00'}, @generic="c129dcf631c7a915f116b09c86815b95d27db61d6dd4db72be7d996a4eb830082c6a7a802f8b3f3489529ccaca8ae4bbf664420b3c9ee793e73614142a2cb82dbed73fa3dc97c96bed20fc24bbda0bf8af4e71addc8a7e47745e", @generic="736a9ec63758e0ca3a2a8a354a699376471f03802ae3b2c74c0837cc020844a45bf5150c1893dd32e043ad133b91d72acdad058a1059fc4993b790ba49428c641b69c73a98d07310e3a7e9bf02ddd95e5c25b641d8beeca584d01ac936fc0a6e883d80cef3036db34a81b1d6be3e2e00861dbfa63169c07bc0133bfb8ad20c639a255d75dca048420d704c39a520160bec4bd24c0e13ebbbaff0fca63f8c311ee1d0df26773bc7193128432cda42dc170abcdbdb75db40e80c8b6ae3a19b6ff0d5cc3a4e9b1c963689de10990dfece771b9b709153d0b6", @typed={0x8, 0x36, @pid=r8}, @typed={0x8, 0x6c, @pid=r9}, @generic="3fdcde5223333fdd956aed029529269e634e21d9523efc71d35f"]}, @generic="1acf8aafc37c07ac0e4534662bff6de69aa4f9d04f0c8565f5890b2d8ee6352a4f8ad619364e92fa4c5332921b468f767b7a07ddc192d9054cbbb8bbbc9c4160b650bda77e4f200f8a87455e9221c29bcec859ebfed9f547ea5d3e9b3172c18aeeae0836838c57a231b3e9265e1d7e46a525a5a43ae78afb75d679c7", @typed={0x8, 0x6a, @fd=r0}]}, 0x204}], 0xa, &(0x7f0000002800)=ANY=[@ANYBLOB="20000000000000000100000002000000b65ea9f764ec5b057c2a3d47b3cc3bcb43acbc59a908029cacf55853ec8923067a03b0b36905fdd0af9fca05971ba7963840fe985a20ab23ddd44cc7ff1ce4fb3eb0ece60565a450be8b581df52c8501aec195ebec1040bfcc25bfa494e96f55212893c0894c1fa786ca290e11f2a739db000000000000000000000000000000", @ANYRES32=r10, @ANYRES32=r11, @ANYRES32=r12, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x40000}, 0x4000840) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000040)={0xfffffffffffffff9, {0x0, 0x7, 0x400, 0x8000000000002}, {0x0, 0x80000001, 0x0, 0xfffffffffffffffc}, {0x200}}) 00:26:28 executing program 1: syz_mount_image$msdos(&(0x7f0000000080)='m%dos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:26:28 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000000)={0x79}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) 00:26:28 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x200000000000000, [{0x3}]}}}) [ 2339.568702] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:28 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f7574650000007fffffff00", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:26:28 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0xe000000) 00:26:28 executing program 0: rt_sigpending(&(0x7f00000004c0), 0xfffffd6a) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)) io_setup(0x0, &(0x7f0000000080)=0x0) r2 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x1, 0x2) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x10000, 0x0) io_submit(r1, 0x3, &(0x7f0000000440)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x5, r0, &(0x7f00000000c0)="baf05d02dddb262bbfd7446eb7e19f4ca16fc2a8ed7e724a736568b88ee3b0962b3e1ccf3dceee9805f6209f5b8cbea1112c018c62b8c150f63e151ca2cdd5aae003a400398506065e2cf0a812df041b4eeebf3e3963c6c102d2a2312cb5b9884a1478f1d7752c829dcb71c40f77f4e8ac7212842d0ab69a06986379", 0x7c, 0x8, 0x0, 0x2, r2}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x6, r0, &(0x7f0000000240)="a8d184dd959b84753f233ced5eeeb978d560c4ddad5c4e150e26d3f6bcabe4bce9089264ac09c301c6db00fe66e27b0787147994f4e14b67e4a5887d3868a87b533dec00b15b61fa5dc4a0cd4f5cea3cc3874b67770087d7ee270ab4da0d4e7caf77420c862ad7d5918bab8cd7ff8282b0594a8e7bc2d8931fd12d3ac59f28b79cc79b842c0592621c724f4b9d35d1f46aca55139460dbd472f1e80b08129b545ea028a2f839b3f964188ab06833c401aaa71b19737d7475e59bbfa7cfbe4704f686105335bdd96816eddb2235a277aee8d807d67c7344e1670aa576d924ed", 0xdf, 0x25, 0x0, 0x2, r3}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0xf, 0x2, r0, &(0x7f0000000380)="b09264c3bf9de712874faa8d43a2a653b98dba7e7e7708ffeb159231902bd175146bfd7c6f1b7dec072b8575e15faa89e1ba5eea3deefc261f3f441b263118113080a5aec58f6a436d602c05f2d2175f0fa6f613f534729b7b53fcd497a938368750daacccc931ff883d80e1fd", 0x6d, 0x10001, 0x0, 0x1}]) 00:26:28 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000000)={0x79}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) 00:26:28 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0xfecaedfe00000000, [{0x3}]}}}) [ 2339.716647] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:28 executing program 1: syz_mount_image$msdos(&(0x7f0000000080)='midos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:26:28 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/userio\x00', 0x202000, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)) 00:26:28 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f757465000000000000000000000500", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030700000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000000000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000000000000892f0700636f6e6e6c6162656c0000000000000000000000000000000000000000000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000000000000007000000070000000a0000000434f4e4e5345434d41524bff6eef1d192516e43f9a305e46692c00000000000000000000000000000000000000000008"]}, 0x2a8) 00:26:28 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x1000000, [{0x3}]}}}) 00:26:28 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000000)={0x79}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) 00:26:28 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0xee1e, 0x40020000) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000002}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r2, 0x300, 0x70bd27, 0x25dfdbff, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x851}, 0x1) 00:26:28 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0xfffffdfd) 00:26:28 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000000)={0x79}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) 00:26:28 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x2000000, [{0x3}]}}}) 00:26:28 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x101, 0x800000000000) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)) 00:26:28 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x4080, 0x0) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f00000000c0)={0x6, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}]}) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)) 00:26:28 executing program 0: syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x40, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80000) getsockname$unix(r0, &(0x7f0000000200)=@abs, &(0x7f0000000080)=0x6e) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x40, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000100)="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") setsockopt$TIPC_MCAST_BROADCAST(r1, 0x10f, 0x85) 00:26:29 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)={0x0, {0x0, 0x2}, {0x0, 0x0, 0x10000000}, {0x0, 0x800000000000}}) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x1, 0x2000) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000180)={0x54, 0x0, &(0x7f0000000100)=[@release={0x40046306, 0x3}, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, &(0x7f0000000080), &(0x7f00000000c0)=[0x30, 0x28, 0x0, 0x58, 0x40, 0x78, 0x18, 0x78]}}, @increfs={0x40046304, 0x3}], 0x9c, 0x0, &(0x7f0000000240)="5eccadeb4fd03376ce4fd21377aa3474757c8c8ece167a934ffd69ce0a72effdf86e1d082eeeadfd124c8c4faa7f581e265f54a13532c30251a5e42ab6eb48278239448d8dbf2648ff69976fb9afde9b43085e0f61d9e456863844b512be0299c1437459ddf25309b37dc987ede24b7742449ea63f32aa6658df4d782e82e16cdac2f767f27e3fce0baae1733197738c18f32a4360437ee15ed40704"}) 00:26:29 executing program 1: syz_mount_image$msdos(&(0x7f0000000080)='m*dos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:26:29 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f757465000000000000000000008800", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:26:29 executing program 1: syz_mount_image$msdos(&(0x7f0000000080)='mldos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:26:29 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) 00:26:29 executing program 0: openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x200, 0x0) sysfs$2(0x2, 0x9, &(0x7f0000000000)=""/4) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f0000000200)) 00:26:29 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0xfecaedfe, [{0x3}]}}}) 00:26:29 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0xec0f00) 00:26:29 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x2, [{0x3}]}}}) 00:26:29 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0xfffffffffffffffe, 0x14000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0xb1, r1, 0x10, 0x70bd2c, 0x25dfdbff, {{}, 0x0, 0x4, 0x0, {0x0, 0x11, 0x8}}, ["", "", "", "", "", "", ""]}, 0x17}, 0x1, 0x0, 0x0, 0x10}, 0x10) r2 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000240)={0x0, {}, {0x0, 0x0, 0x3}, {0x0, 0x100000000}}) 00:26:29 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) 00:26:29 executing program 1: syz_mount_image$msdos(&(0x7f0000000080)='mudos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:26:29 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)) syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0xffffffff, 0x4280) 00:26:29 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) [ 2341.211323] IPVS: ftp: loaded support on port[0] = 21 [ 2341.297468] device bridge_slave_1 left promiscuous mode [ 2341.303049] bridge0: port 2(bridge_slave_1) entered disabled state [ 2341.358102] device bridge_slave_0 left promiscuous mode [ 2341.363752] bridge0: port 1(bridge_slave_0) entered disabled state [ 2341.452515] team0 (unregistering): Port device team_slave_1 removed [ 2341.467966] team0 (unregistering): Port device team_slave_0 removed [ 2341.483361] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2341.542135] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2341.645508] bond0 (unregistering): Released all slaves [ 2342.678094] bridge0: port 1(bridge_slave_0) entered blocking state [ 2342.684625] bridge0: port 1(bridge_slave_0) entered disabled state [ 2342.693077] device bridge_slave_0 entered promiscuous mode [ 2342.742649] bridge0: port 2(bridge_slave_1) entered blocking state [ 2342.755762] bridge0: port 2(bridge_slave_1) entered disabled state [ 2342.775744] device bridge_slave_1 entered promiscuous mode [ 2342.894215] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2342.995419] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2343.357199] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2343.418182] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2343.661650] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2343.669296] team0: Port device team_slave_0 added [ 2343.714696] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2343.722398] team0: Port device team_slave_1 added [ 2343.836988] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2343.844003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2343.856508] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2343.912496] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2343.919595] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2343.937162] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2343.980733] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2343.988115] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2343.999879] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2344.040132] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2344.047526] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2344.059239] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2344.555230] bridge0: port 2(bridge_slave_1) entered blocking state [ 2344.561731] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2344.568516] bridge0: port 1(bridge_slave_0) entered blocking state [ 2344.574947] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2344.583631] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2344.845973] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2346.406597] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2346.582098] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2346.752556] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2346.758927] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2346.776130] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2346.939204] 8021q: adding VLAN 0 to HW filter on device team0 00:26:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f757465000000000000000000000100", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:26:36 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0xfeedcafe, [{0x3}]}}}) 00:26:36 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0xe803) 00:26:36 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000040)) 00:26:36 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000000)={0x79}) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) 00:26:36 executing program 1: syz_mount_image$msdos(&(0x7f0000000080)='ms/os\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) [ 2347.966621] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:36 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x100000000000000, [{0x3}]}}}) 00:26:36 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f0000000ac0)={0x0, 0x0, [], @bt={0x1, 0x101, 0x1f, 0x1, 0xffffffffffffff48, 0x8, 0x10, 0x7}}) lstat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket$inet6(0xa, 0x0, 0x10000) ioctl$sock_inet6_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000040)) r4 = getegid() r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='pids.current\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000001240)=0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000002900)=0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000002940)=0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000002980)=0x0) sendmmsg$unix(r5, &(0x7f0000002a80)=[{&(0x7f0000000a00)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000001180)=[{&(0x7f0000000b80)="97402ee45064c5d8afa6efa1d87df15ee6d8974b9b4623f4bdbe2ed3f85cec78db2425cb5d7a35b2de2ba0b6b233169c962a1cf3f2977bfe9c22bb06e47fd52e9cfa56e57b28567f464da5babbc502d14f89b6e061920fe165d6594218eb4232103dc5c890509c6b3344e6ecb56de9401efbf0eae3fdb77ad5813ceb00d967b0ffd83422530eee61f206317bf85c8c97c5a2bbbde0fc0fd8523049cd94ea8eca4bebe36e99409d9ac88093b3db6ca5a64fbfa7754db1480955095c2b4d5aa559c8ced366d8b114253da32b8932447b0be57d2a66c1907b3738edb99f4524935ab731983d049975d699305fb48e2e", 0xee}, {&(0x7f0000000c80)="5ca0eb44e14c672be2e286be275f86e803d6027efe524c1caac4eac725a01ca440b2a9989e63d24e9f2102c7256aa580b96f368b4355c98d48aa7134df17c42c78a2713bacca953a418264c110a27f", 0x4f}, {&(0x7f00000000c0)="0299dc5715059dfce0c333833f9c9dbffc495aef871390812e90ecc1f8a8a61d0ba71ee9f81b67445a52136255ba8a", 0x2f}, {&(0x7f0000000d00)="6fefb43cfb4f20ab8b02c2c27b63ab6bd8e5c8430e92cdb78c922396fff50cfbb908cdb73b2f28de7bde2ad7d33ff5fd416820dd145e6f6a92ae102da1356b8a0f771bb4e972a9ddbd49777d0ee8eb17ee6dad3b81d17648df3bebf42749910246026b8e3d65b50deab43ba055a65341890b21ea15ec1f121a3ef35a821bd1b93a36dea742b544bca5a08fa2a215a396015fb3f808b6443eb260d1d39fe464", 0x9f}, {&(0x7f0000000a80)="c351fd6a4624170853ca9069d26c1799a43a55e41f", 0x15}, {&(0x7f0000000dc0)="517eea6e098e42c6376c1799dc4fb8329dddfe1d68cf0ac9f7f9952444e88d67bd79d557315cba4d1ef46f28c9e940211b7fcb8110610e339e2d03325aac824aa8d140f2b951cb13a7b6493b3db73e8c3e7ae056371bd521cedfdcb10253c12898ecdf6e5543e6d682eafe14774c8dba2f1eede5703452384f1a5df5eaede04d2eb38db3a0870d23cdf73657775aadc5be4ef369c5bb277aaa609bd62717c7fe68726df8cce8cf68432f786dd250af903bc428499ca0f1a8f571c0b85e119a8279dd5b12865050625e5234e28009a0e589de3df1b41256d4fe5f3af691b1614cf04e4a186254de0ab5bc5534049ee40c289fa705bc", 0xf5}, {&(0x7f0000000ec0)="53667d879d8a9f22eed1f4f72a63e84ed191f4f52a44c403ad83172873a204185f67cbcb280a69a281f97eea62491b71f4d9dc1be26c471450c14fd7d530ae076ac8b859efef895cc55c31741aaec4e0813e4f06f98016", 0x57}, {&(0x7f0000000f40)="40767efca694a0ef61bb6f1cce03b8b61d5291e4e66b5b0f62407313f54017741ce107319afcdc20e7dfd8aad0cc56ccdee92ecb24d94ce09c8b86d6afd8f5d5d1985bbf70063e353c91aa8bbd027f4929940935abdcb6a6afbb81b2198ac1e3d619", 0x62}, {&(0x7f0000000fc0)="98ac51c146255ee3d3273bb9354555a9bf6031a1e996daf0c4594c1c5010c8b8713f73b1a34c13b7b1132a13a97bc4897289e8d1e4d44ffbd9c9fe37363050c28b46378dcc7ce4dad00050e938080319cde690cc3395873edac344774838b46e0939e67e13074482b75e309ee9e2add9e3c0a21d1087cdabf844240e218063a9ce6afc90215a94cc19e8efa5b425064572586832fe7d06f7dd2656c504e03247681bd7236f37a27568a5b6d04905c0c2de01b7893d0b284f6ce0b7d385219baddd65f034a728017bb3b9edcb4e3e", 0xce}, {&(0x7f00000010c0)="f14b48b1c918cbec4c224eee4b3cfec3075012f638082157aa36c78ae926d217bd88707948e917fb7c609f60afde5679bb9358b20f43dbb277a0512c5c4a7b5183ab663893b31813f214202a6a988ef8dabd278bd777271e78e700bdd81eeb856876cb28fef9d876ff0694d964a23f34d224bff9fb9c4d634c36f7031f00b805bbbea55f1d2b741695299986d9f9ab0f3fa6492b442f0ab8b81e56fe988916cd5c6dc8fe1da7290b969c2153fb3882d742fb98afc2e9199b", 0xb8}], 0xa, &(0x7f0000001280)=[@cred={0x20, 0x1, 0x2, r6, r1, r4}, @rights={0x20, 0x1, 0x1, [r3, r3, r0, r3]}], 0x40, 0x8004}, {&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000002880)=[{&(0x7f0000001340)="410c17137016cb7409c5a17eeccaea80a9a438a0537491487e96689d0f1d800257560b764f2fecb9eaad468690bb72071e43df9617ecd0b299b231459549b2891ed3cbc50484f2279381595ef74757726b8a3ee263806fdfd0fe4ff58f71dbd97649ad62864f1df3497f5c7c492429baa40875b3bbfc58bf289a9d0e0f7ef5da82e041ac15260e4622505ba8ee9865577c04cabe01ff9b514f5fdfdc82b80b41e090df0535f36304d46f67c650fa56410d111512d4593c", 0xb7}, {&(0x7f0000001400)="9d1785ab0bc013df6cfebdc3e39a7fc56dc238eab496188cad799a0fa145a2c8fd65e5554429a5098457c7f7ec2a266386a4d6d2ba007823d39235b404548aa6c0f1c5ec99", 0x45}, {&(0x7f0000001480)="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", 0x1000}, {&(0x7f0000002480)="2aad91b84863a315db88386508dd26babac8768dfe9612d9f099a27b254be94c755a18ebef632bfbe1c0dd7590fa9565abd3e8dc6db6ed7c8ca587779aad116374daa8ad1cabbc824bd64929cdc41adf44a906bb6fe4d7f28ebda22a1d931c97165facd01cb4e0cb415ec25dd8cb18e91381d28e33d6b8c43496d643d6ca11256d67ff6bfae717c1b4dfd271b93bfb37bc3ce6", 0x93}, {&(0x7f0000002540)="8ed3283e4cf270334c8a96ca2a93429a2f29e4c1827a5932371c14aecef9367133d0ee6f31c094f72e03f527229bd4cdbc6e89f8ced96c39a2a0b100be07fbb639b2ee9263c5c6a38d8e1fa951d783b3c37b8148e8a3f25b99a02e17cb6eb55457e19565d385eb", 0x67}, {&(0x7f00000025c0)="105ce0aba3b9cb77725bb3f1687f62c1ca9f56bd07eada984805d3c247aa5c78b3d678a795631891752729175783e6841630587699e4db6cb90a65196d9d4cdfbb1c33c6ef968f6b978d274105bc3a9c1f9001c90e512a3873d93dec34bf72c3890f3fb40c98d8013f0e44926d53802956ba0ea510f2abd1c9a74873943c95d075c7a181c464a83a89483b9f77092d6ef860315c544f9c4b30af23777a43741fd7fef473f37548eb2e812473f238f77decc8ff", 0xb3}, {&(0x7f0000002680)="9e663cb441d4fb039c48321d56ae4596d2df63ce29bf08010f457f3cc414f82a030b61480e795db3a6bb3c6786433bb94b2820e9f6e9e09a8147c01b8acd6f0875b7fd612adea724c8e9f7f448341d859966a368b865e9b4668d013a93c30bf80ea6d624e14d50c7634bad0d9b03060be70bd8e84d522e98e7950eb7b67f1ec778c00c6d19243e4d30aa7b10c50dfb548d23fe935249936108cbaed069b31ce8f260fe68ed5406eb50654ab148492db26605c1ab3f46c95b792c8b009d3e4b1f72c89be18a6add569ff5836fa5fd", 0xce}, {&(0x7f0000002780)="8d92a61dd86d29a241a35ea30e38b1e134df11c0d64d896ca249a10e4e0711d2e82279d8f13c9522b8c9ddb96457cb68d7a8d0ab41070ecf0ddd98991be5439adfc5fe111a9f14ecb0c905ab8984fe5b06753a12ff891a277dad7ea8befb10ebb7ea34bac8b458eb62f822e194abc98d73666cdb661d2c251712eaaecd689f3259787fdc8310df41dc97c6ee7ea5515587d6d5284d5c18b85bb524d56890c866989fa4fd4d86f268144b6c1496ba3fbed69e3bae13f5bc26063f5f8f3a33e243f908f5110c80d7ed5fc2467f7a6152362288d2193de7aa1518288f7b0c6ce85f64bbb25955d468ac1b04a16e4f34", 0xee}], 0x8, &(0x7f00000029c0)=[@cred={0x20, 0x1, 0x2, r7, r1, r4}, @cred={0x20, 0x1, 0x2, r8, r1, r2}, @rights={0x20, 0x1, 0x1, [r3, r3, r0]}, @rights={0x38, 0x1, 0x1, [r0, r3, r3, r3, r3, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r9, r1, r2}], 0xb8, 0x20000001}], 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in6=@ipv4={[], [], @dev}, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000000940)=0xe8) syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x5, 0x9, &(0x7f0000000680)=[{&(0x7f0000000180)="fa3b677bf424608d63b5c53876794a3aa4ce841501ade168fe4feacea803d511668ba2e2ebcb18", 0x27, 0x1ff}, {&(0x7f0000000240)="dcd660e95e964736f9cc0d55f54e8725062ece6717d4e904a0d3eaf4d148db6495cd0c55266b12707b03343a65f4b818687b7421d1a3a56f2d9aa8644de05a25d4e1cb", 0x43, 0x2}, {&(0x7f00000001c0)="3c905dbf108e787e8ecb12771f5ebeb6670f9bcbb2320a31752bd27e5914614dbc", 0x21, 0x1}, {&(0x7f00000002c0)="0cb94d71952587a877af6d4419c070ee906af606aca248bc6551998b6dfc63aa3a7cbf3778b69f42900c45fa98d4dd3b42d879575cfa19f9983b4b88ccfe86b122dca11eb365b4df16159ab9d0c140ab7b0705b7cea9f798f5e8b3de4b9f1e4a6125164e905b5ffb37396bae1f8fb000b32544f41cb775118b42b34c105fe49ffe4cc933f079165fcb1d85357d8077b47bfdc639649e2d56898aa7def4f8ff19b909a7ad8e11b26c532de1786498d697daca466cf3113c18231c3fa1563a2ffbef", 0xc1, 0x7}, {&(0x7f00000003c0)="c7e1893e168ea98b63a6792ee74daf935fb8ba13f3a998dbf4eaa38eac683f656c24bfa379c62e5db5f6da531f8b563448e2df557f0c0dc7e454254fcf1ae95834cf1f37eb772d8df6d89062db45ad7ed96c5dad602e0becfa9e5213d9d4f4fb86e39f79a8e69d4bb0933629ded8753a", 0x70, 0x5}, {&(0x7f0000000440)="77f8cf1fe38c18d3979225f8b12fb01a78d937dc9cb9138b1b0e357fae48caad415b9254831cbc82f92547e103b975dbd1fcf1c5459b226cca411e0747115dccdc04d37e6ac0c1f8ac909336fd727a8806446289f2e3bf9f93d7c0e38cbe61f9e875", 0x62, 0x40}, {&(0x7f00000004c0)="f408f05c3766d5f4d08b5bdc7c63129d51bf9f5ed33e13cfefa6f957c7025199968adbfa09b411f1cdd4ee0aa2e33f70e55f4f7c194c6e4f7192ce9f4dcdec76d2c457cf80f9c55380eac5a5344cbb627246c880f5fcc5cdcac357bf5e4029192abab915d9191c0bbf38bf4b1d1e929ac3d75053f2a1afc87b36d209e055e2264db7d23510d78a96f095851cf5318be4a2af0720642b17c20a56879d8edd49ee2294ae9d4dd7a2cb4d78f8ed658f5c86b0f723c972273126a872c241bb02ca", 0xbf, 0x400000000}, {&(0x7f0000000580)="9800256478e74abfd34fff1d20164ebc293efc3b65fcd68618a01bef990eb57e2bdb65daba91e8dc1c02fcf82baae3e5803c57979fb6a8717ab44dfe0d75f07a12254decb322d3969e40a70fa6988beb43", 0x51}, {&(0x7f0000000600)="4f505f876357c30b5e6f69524505e6a6e9c09a0700da25bd4e04696e00c4a563dfc731944a3488d631fcf5d7579355c7bd57e839026d010ffb7712887a9ddad7de9f17d0c70b39bed594d8825c68bb80f4e811c9381090cb8bb8bbe5001cd8d966fadf564828f66283829d3f0e9d3a40", 0x70, 0x800000000000}], 0x2000004, &(0x7f0000000980)={[{@gid={'gid', 0x3d, r2}}, {@gid={'gid', 0x3d, r4}}, {@uid={'uid', 0x3d, r10}}, {@errors_continue='errors=continue'}], [{@subj_type={'subj_type', 0x3d, '/dev/video#\x00'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) 00:26:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 2348.090930] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:36 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000000)={0x79}) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) 00:26:36 executing program 1: syz_mount_image$msdos(&(0x7f0000000080)='mseos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={[{@fat=@nfs='nfs'}]}) 00:26:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f7574650000000000008800", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 2348.187894] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 00:26:36 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xee1e, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000200)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x8000, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xa4, r2, 0xb00, 0x70bd2a, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1d34}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}]}, @IPVS_CMD_ATTR_SERVICE={0x50, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x9}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x22}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3f}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0x4}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000000}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x800}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x87}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x40}, 0x0) 00:26:36 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0082ab00000000000025"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x1e00) 00:26:36 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x404, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x1, 0x4, {0x2, @win={{}, 0x0, 0xca800, 0x0, 0x0, 0x0}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x1, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0xca800}]}}}) 00:26:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)='\\-vboxnet0^wlan0u)\'/\'(trusted\x00', 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0), 0x0) r1 = socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000940)={{}, {}, [], {}, [{}, {0x8, 0x2}, {0x8, 0x4}]}, 0x3c, 0x0) symlink(0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={"62726f7574650000000000001100", 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 00:26:37 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000000)={0x79}) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) [ 2348.400167] WARNING: CPU: 1 PID: 12810 at drivers/dma-buf/dma-buf.c:992 dma_buf_vunmap+0x1bb/0x220 [ 2348.409814] Kernel panic - not syncing: panic_on_warn set ... [ 2348.415722] CPU: 1 PID: 12810 Comm: syz-executor2 Not tainted 4.20.0-rc6+ #371 [ 2348.423094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2348.432331] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 2348.432463] Call Trace: [ 2348.443238] dump_stack+0x244/0x39d [ 2348.446886] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2348.452191] panic+0x2ad/0x55c [ 2348.455405] ? add_taint.cold.5+0x16/0x16 [ 2348.459607] ? __warn.cold.8+0x5/0x45 [ 2348.463440] ? __warn+0xe8/0x1d0 [ 2348.466830] ? dma_buf_vunmap+0x1bb/0x220 [ 2348.470994] __warn.cold.8+0x20/0x45 [ 2348.474720] ? rcu_softirq_qs+0x20/0x20 [ 2348.478714] ? dma_buf_vunmap+0x1bb/0x220 [ 2348.482881] report_bug+0x254/0x2d0 [ 2348.486531] do_error_trap+0x11b/0x200 [ 2348.490452] do_invalid_op+0x36/0x40 [ 2348.494185] ? dma_buf_vunmap+0x1bb/0x220 [ 2348.498354] invalid_op+0x14/0x20 [ 2348.501830] RIP: 0010:dma_buf_vunmap+0x1bb/0x220 [ 2348.506603] Code: 00 00 00 00 e8 c6 8c 1c fd 4c 89 f7 e8 de 21 77 03 e8 b9 8c 1c fd 48 83 c4 08 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 a5 8c 1c fd <0f> 0b eb e3 e8 9c 8c 1c fd 0f 0b e8 95 8c 1c fd 0f 0b e8 8e 8c 1c [ 2348.514450] kobject: 'loop4' (0000000051ff102f): kobject_uevent_env [ 2348.525528] RSP: 0018:ffff8881d7d57900 EFLAGS: 00010293 [ 2348.525542] RAX: ffff8881c2d7e6c0 RBX: 0000000000000000 RCX: ffffffff85587660 [ 2348.525555] RDX: 0000000000000000 RSI: ffffffff8462f7cb RDI: 0000000000000000 [ 2348.525564] RBP: ffff8881d7d57930 R08: ffff8881c2d7e6c0 R09: ffffed1039628d9e [ 2348.525573] R10: ffff8881d7d57a88 R11: ffff8881cb146cf7 R12: ffffc90009dfe000 [ 2348.525582] R13: ffff8881b9aef200 R14: ffff8881b9aef268 R15: ffff8881d1d78580 [ 2348.525615] ? __vb2_plane_dmabuf_put.isra.5+0xc0/0x310 [ 2348.525630] ? dma_buf_vunmap+0x1bb/0x220 [ 2348.525653] vb2_vmalloc_detach_dmabuf+0x5a/0x80 [ 2348.538111] kobject: 'loop4' (0000000051ff102f): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2348.544731] ? vb2_vmalloc_map_dmabuf+0x80/0x80 [ 2348.544748] __vb2_plane_dmabuf_put.isra.5+0x122/0x310 [ 2348.544768] __vb2_queue_free+0x7f3/0xa30 [ 2348.544798] ? trace_hardirqs_off_caller+0x310/0x310 [ 2348.544819] ? __vb2_plane_dmabuf_put.isra.5+0x310/0x310 [ 2348.621172] kobject: 'loop4' (0000000051ff102f): kobject_uevent_env [ 2348.622227] vb2_core_queue_release+0x62/0x80 [ 2348.622247] _vb2_fop_release+0x1d2/0x2b0 [ 2348.622266] vb2_fop_release+0x77/0xc0 [ 2348.633456] kobject: 'loop4' (0000000051ff102f): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2348.637327] vivid_fop_release+0x18e/0x440 [ 2348.637346] ? vivid_remove+0x460/0x460 [ 2348.637361] v4l2_release+0x224/0x3a0 [ 2348.637378] ? dev_debug_store+0x140/0x140 [ 2348.637394] __fput+0x385/0xa30 [ 2348.637419] ? get_max_files+0x20/0x20 [ 2348.674118] ? trace_hardirqs_on+0xbd/0x310 [ 2348.678460] ? kasan_check_read+0x11/0x20 [ 2348.682623] ? task_work_run+0x1af/0x2a0 [ 2348.686696] ? trace_hardirqs_off_caller+0x310/0x310 [ 2348.691823] ? filp_close+0x1cd/0x250 [ 2348.695646] ____fput+0x15/0x20 [ 2348.698942] task_work_run+0x1e8/0x2a0 [ 2348.702846] ? task_work_cancel+0x240/0x240 [ 2348.707187] ? copy_fd_bitmaps+0x210/0x210 [ 2348.711432] ? do_syscall_64+0x9a/0x820 [ 2348.715425] exit_to_usermode_loop+0x318/0x380 [ 2348.720029] ? __bpf_trace_sys_exit+0x30/0x30 [ 2348.724547] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2348.725364] kobject: 'loop4' (0000000051ff102f): kobject_uevent_env [ 2348.730109] do_syscall_64+0x6be/0x820 [ 2348.730125] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2348.730142] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2348.730157] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2348.730175] ? trace_hardirqs_on_caller+0x310/0x310 [ 2348.730194] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2348.742483] kobject: 'loop4' (0000000051ff102f): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2348.745852] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2348.745875] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2348.745897] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2348.745909] RIP: 0033:0x411131 [ 2348.745926] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 34 19 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2348.745939] RSP: 002b:00007ffd60874bf0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 2348.820013] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000411131 [ 2348.827303] RDX: 0000000000000001 RSI: 0000000000731380 RDI: 0000000000000003 [ 2348.830193] kobject: 'loop4' (0000000051ff102f): kobject_uevent_env [ 2348.834601] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 2348.834611] R10: 00007ffd60874b20 R11: 0000000000000293 R12: 0000000000000000 [ 2348.834619] R13: 0000000000000001 R14: 00000000000000e5 R15: 0000000000000002 [ 2348.842195] Kernel Offset: disabled [ 2348.867618] Rebooting in 86400 seconds..