4199295a945ec", 0xa2, 0x10000}], 0x0, 0x0) 14:42:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, 0x0, 0x0) 14:42:46 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x100, 0x880) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f00000001c0)={{0x0, 0x3, 0xd4, 0x3, 0x80000000}, 0xfa0, 0x5000000, 'id0\x00', 'timer0\x00', 0x0, 0xff, 0xa405, 0x2}) read$FUSE(r0, &(0x7f00000002c0), 0x1000) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000003ac0)={@loopback, @dev, 0x0}, &(0x7f0000003b00)=0xc) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000003b40)={@mcast2, 0x4, r2}) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:42:46 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39010020140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:42:46 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec", 0xa2, 0x10000}], 0x0, 0x0) 14:42:46 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$CAPI_INSTALLED(r0, 0x80024322) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") ioctl$KVM_GET_CLOCK(r0, 0x8030ae7c, &(0x7f0000000000)) 14:42:47 executing program 2: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000000c0)="75c481c6406f18402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:42:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec", 0xa2, 0x10000}], 0x0, 0x0) 14:42:47 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="00f0ff7f140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:42:47 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x3d, &(0x7f0000000040), 0x4) 14:42:47 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x4) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000001c0)="75c481c6125108402ae92cb898750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000450fd7ea660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c4f2d9f88dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb5c8ff2ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91b5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:42:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0", 0xbd, 0x10000}], 0x0, 0x0) 14:42:47 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="effdffff140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:42:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, 0x0, 0x0) 14:42:47 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="390000000f0081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:42:47 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x10000000000003, 0x480001) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x101800, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername$netlink(r0, &(0x7f0000000000), &(0x7f0000000040)=0xc) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:42:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0", 0xbd, 0x10000}], 0x0, 0x0) 14:42:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0", 0xbd, 0x10000}], 0x0, 0x0) 14:42:48 executing program 2: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000000c0)="75c481c6406f18402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:42:48 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000120081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:42:48 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115", 0xcb, 0x10000}], 0x0, 0x0) [ 320.095631][T17214] BTRFS: device fsid ecf6f2a2-2997-48ae-b81e-1b00920efd9a devid 5585 transid 16708671943451224836 /dev/loop3 [ 320.128743][T17214] BTRFS error (device loop3): unsupported checksum algorithm 22813 [ 320.137060][T17214] BTRFS error (device loop3): superblock checksum mismatch [ 320.147551][T17214] BTRFS error (device loop3): open_ctree failed 14:42:48 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f0000000040), 0x4) 14:42:48 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000130081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:42:48 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115", 0xcb, 0x10000}], 0x0, 0x0) 14:42:48 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39020000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) [ 320.427298][T17225] BTRFS error (device loop3): unsupported checksum algorithm 22813 [ 320.435865][T17225] BTRFS error (device loop3): superblock checksum mismatch [ 320.451022][T17225] BTRFS error (device loop3): open_ctree failed 14:42:48 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0", 0xbe, 0x10000}], 0x0, 0x0) 14:42:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 14:42:48 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video36\x00', 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ubi_ctrl\x00', 0xfffffffffffffffd, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r0, 0xc040564a, &(0x7f0000000000)={0x1, 0x0, 0x0, 0x9, 0x20, 0xfffffffffffffffb, 0x7ff, 0x5}) syz_execute_func(&(0x7f0000000400)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c035cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c14b2257c4e1fa2d6d118171a30b8a826e4fc481607716f7f79900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffc421cf11e1dcdcc4c3217e218ef2436f7c460f41b6020000009e9f9f4bc2e2") ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={r1, 0x6, 0xfffffffffffffffe, r1}) fchmodat(r1, &(0x7f00000000c0)='./file0\x00', 0x190) getdents64(r1, &(0x7f0000000100)=""/64, 0x40) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r1, 0xc0905664, &(0x7f00000001c0)={0x0, 0x0, [], @bt={0x4, 0x100, 0x0, 0x7f, 0x2887, 0x5, 0x1}}) 14:42:48 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39040000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) [ 320.660592][T17338] BTRFS: device fsid ecf6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 16708671943451224836 /dev/loop3 14:42:48 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0", 0xbe, 0x10000}], 0x0, 0x0) 14:42:48 executing program 2: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6406f18402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:42:48 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000c80)=@nat={'nat\x00', 0x19, 0x1, 0xab0, [0x200001c0, 0x0, 0x0, 0x200001f0, 0x20000220], 0x0, &(0x7f0000000000), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc}, {0x0, '\x00', 0x0, 0xfffffffffffffffc}, {0x0, '\x00', 0x0, 0x0, 0x1, [{{{0xb, 0x0, 0x9a00, 'ip6_vti0\x00', 'hwsim0\x00', 'veth0_to_team\x00', 'veth1_to_team\x00', @local, [0x0, 0x0, 0x0, 0xff, 0xff], @local, [0xff, 0xff, 0xff, 0xff], 0x978, 0x9e8, 0xa20, [@among={'among\x00', 0x8a0, {{0x1, 0x7f, 0x2, {[0x3, 0x419, 0x9040, 0x6, 0x3, 0x4, 0x0, 0x2, 0x6, 0x4, 0x9, 0x9, 0x1ff, 0x3, 0x9, 0x800, 0x200, 0xfffffffffffffffd, 0x401, 0x8000000, 0x8, 0x1c, 0x3, 0x1, 0x7fff, 0xfffffffffffffc5e, 0x101, 0xbda, 0xfffffffffffffffe, 0xa20, 0x3, 0x1, 0x6, 0x5, 0x7, 0x80000000, 0x7, 0x5, 0x8bd, 0x101, 0x3, 0x7ff, 0x100000000, 0xffffffff, 0x1, 0x0, 0x2, 0x7e, 0x80000000, 0xed8, 0xcd92, 0x2, 0x3, 0x0, 0x3f, 0x9, 0x3, 0x800, 0x1901, 0x1f, 0x2b, 0x80, 0x10000, 0x2746233c, 0x4, 0x400, 0x80, 0x5, 0x0, 0x8, 0x5, 0x80000001, 0x8000, 0x7fff, 0x800, 0x8, 0x0, 0x7, 0x9, 0x100000000, 0x1, 0x730, 0x10001, 0xfffffffffffffffc, 0x3, 0x80000000, 0x9, 0x3, 0x5, 0x2000400000, 0x7, 0x7, 0x8001, 0x8000, 0x800, 0x0, 0x200, 0x357, 0x8000, 0x808, 0x0, 0x9, 0x7b, 0x80000000, 0x5, 0x400, 0x100, 0xabf, 0xfffffffffffffffc, 0x2, 0x1, 0x3, 0xffffffffffffffff, 0x7, 0x7, 0x0, 0x100, 0x231, 0xffffffffffff2615, 0x1000, 0x3, 0xfffffffffffffffe, 0x6, 0x1, 0x3, 0x7, 0x4e5, 0x3951, 0xfffffffffffffffc, 0x81, 0xffff, 0x100000001, 0x8, 0x7fffffff, 0x8, 0x2, 0x1, 0xffffffff, 0xce, 0x4, 0x7fffffff, 0x8000, 0x16a, 0x5, 0x27, 0x3, 0x9, 0x100000000, 0x0, 0x8, 0xe65, 0x49, 0x1000, 0x7fff, 0x7fffffff, 0xa204, 0x8, 0x1000, 0x7, 0xffffffff, 0x7f, 0x3, 0x3, 0x7fffffff, 0x9, 0x401, 0x3, 0x400, 0x80000000, 0xc000000000000000, 0xffffffffffffffff, 0xffffffffffff8001, 0x5, 0xfe0, 0x9, 0x7fff, 0x6cc, 0xfffffffffffffffb, 0x401, 0x9, 0x4, 0x10001, 0x5, 0xfffffffffffffff8, 0x27f5, 0x9, 0x4d4f, 0x2, 0x85, 0x81, 0x3, 0xffffffffffff053c, 0x9, 0x1000, 0x4, 0x3f, 0xfffffffffffffff8, 0x2, 0x0, 0x2, 0x101, 0x5, 0x7, 0x2, 0x0, 0xffffffffffff4253, 0x1, 0x0, 0x6, 0x1, 0x10001, 0x5, 0x6, 0xfffffffffffffffb, 0xffff, 0xffffffffffffffff, 0x9, 0x9, 0x8fd0, 0x6, 0x1000, 0x34, 0x400, 0x0, 0xfffffffffffffff9, 0x3, 0x8, 0x1f, 0x0, 0x6, 0x0, 0x100000001, 0x1, 0x2, 0x100000000, 0x10001, 0x7, 0x1, 0x7, 0x1000, 0x9, 0x0, 0x1, 0x4e, 0xffffffffffffff23, 0x1ff, 0x9, 0x5, 0x1f9d, 0x800, 0x10000, 0x400, 0x7, 0x1, 0x2, 0xffffffff, 0x3], 0x1, [{[0x4, 0x6], @empty}]}, {[0x2, 0x8, 0x6, 0xe7a8, 0xa00, 0x5, 0xffffffffffffff5c, 0x0, 0x9, 0x0, 0x1, 0x4, 0x73, 0xafb5c72, 0x0, 0x1, 0x1000, 0x9, 0x100000000, 0x6, 0xffff, 0x91a, 0x0, 0xd2ea, 0x0, 0x7, 0x1000, 0x45, 0x1, 0x2, 0xba69, 0xffff, 0xa5c, 0x7, 0xbb30, 0x0, 0x7, 0x3f, 0x14, 0x0, 0x4, 0x9fe, 0x9, 0x9, 0x7, 0x3, 0x81, 0x10001, 0x81, 0x1, 0x0, 0x9, 0x2, 0x8, 0x1, 0x80000000, 0x1ff, 0x1000, 0xfff, 0x2, 0x8, 0x5, 0x3f, 0x400, 0x80, 0xfffffffffffffe00, 0x0, 0x9, 0x5, 0xf800000000000000, 0xffffffffffffff80, 0x7, 0x3ff, 0xfffffffffffffff7, 0xffffffffc3e75bab, 0xdf74, 0x3, 0x2, 0x7, 0x8, 0x5, 0xc0, 0x2, 0x0, 0x400, 0xeb, 0x693e, 0x0, 0x7, 0x0, 0x3, 0x2, 0x7ff, 0xe0aa, 0x3, 0x80, 0x9, 0x10000, 0x8, 0x100000001, 0xffff, 0x3, 0x1ff, 0x10001, 0x4, 0x9, 0x1, 0x2d, 0x0, 0x3, 0x3ff, 0x100, 0x8, 0x3ff, 0x400000000, 0x40, 0x7, 0x4, 0x1, 0x10000, 0xec, 0x400, 0x6, 0xce, 0x2, 0x7101, 0x5, 0x7, 0x1, 0x80000000000, 0xcd0, 0x80000001, 0x8001, 0x3ff, 0x80000000, 0x4, 0x6, 0x8000, 0xfffffffffffffbef, 0x511a, 0x401, 0x8, 0x5, 0xa8, 0x9, 0x1000, 0x8, 0x2, 0x5, 0x7, 0xf9d2, 0x5, 0x5, 0x89f3, 0xff, 0x80, 0x593, 0x8001, 0x100000000, 0x4, 0x8, 0x6, 0x3, 0x100000000, 0x1, 0x200, 0x34e, 0x6, 0x5, 0x5, 0x81, 0x7, 0x2, 0x9, 0x5, 0x1, 0x5, 0x9, 0x1, 0x80000000, 0xaf70, 0x100, 0x7ff, 0x1, 0x241, 0x7, 0x0, 0x7, 0x8001, 0x2, 0x2, 0x608b, 0x1, 0x14, 0x81, 0x9, 0x6, 0x6, 0xff, 0x1, 0x538f, 0x9, 0x0, 0x1ff, 0x2, 0x0, 0x3ff, 0x2, 0xb6, 0x6, 0x3ff, 0x6, 0x6, 0x3f, 0x3, 0xffffffff, 0xf4d, 0xa3f2, 0x3f, 0x3, 0x4, 0x1, 0x7ff, 0x1, 0x5, 0x80, 0x3ff, 0x3cb, 0x3, 0x9, 0xfb07, 0x1, 0x1000, 0x2da4, 0x8, 0x9, 0x9, 0x3, 0x5, 0x3, 0x7f, 0x621, 0x4, 0x100000000, 0xd19, 0x1, 0x8, 0xffffffff, 0x7, 0x200, 0x100, 0xcdf, 0x80, 0x3, 0x4, 0x2f4e9951, 0x2], 0xa, [{[0x2049, 0x401], @initdev={0xac, 0x1e, 0x1, 0x0}}, {[0x1ff, 0x80], @loopback}, {[0x20, 0x6], @empty}, {[0xff, 0xff], @rand_addr=0x2}, {[0x2, 0x9], @remote}, {[0xffff, 0x5], @broadcast}, {[0x8, 0x2c4000], @empty}, {[0xffffffffffffffc1, 0x2], @multicast1}, {[0x8, 0x4], @multicast1}, {[0x3, 0x2], @broadcast}]}}}}, @connbytes={'connbytes\x00', 0x18, {{0x6, 0x4a7e, 0x2, 0x3}}}]}, [@snat={'snat\x00', 0x10, {{@random="dfc55a16fcbd", 0xffffffffffffffff}}}, @snat={'snat\x00', 0x10, {{@random="75c738438df2", 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0x10, {{@remote, 0xffffffffffffffff}}}}]}]}, 0xb28) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:42:48 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="390a0000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:42:49 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0", 0xbe, 0x10000}], 0x0, 0x0) 14:42:49 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x41, &(0x7f0000000040), 0x4) 14:42:49 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d", 0xc5, 0x10000}], 0x0, 0x0) 14:42:49 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="390e0000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:42:49 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="390f0000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:42:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 14:42:49 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d", 0xc5, 0x10000}], 0x0, 0x0) 14:42:49 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39600000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:42:49 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d", 0xc5, 0x10000}], 0x0, 0x0) 14:42:49 executing program 2: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6406f18402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:42:49 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39f00000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:42:49 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 14:42:49 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000240)={0x16, 0xffffffffffffffc6, 0xfa00, {&(0x7f0000000000), 0x0, r1, 0x1c, 0x200000001, @in={0x2, 0x4e22, @local}}}, 0xa0) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:42:50 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x42, &(0x7f0000000040), 0x4) 14:42:50 executing program 2: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6406f18402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:42:50 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000240)={0x0, 0x9}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000002c0)={r1, @in={{0x2, 0x8001, @dev={0xac, 0x14, 0x14, 0x12}}}, 0x9, 0x7, 0x4, 0xffffffffffffd7ff, 0x82}, &(0x7f0000000380)=0x98) 14:42:50 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39580100140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:42:50 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 14:42:50 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000000500)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000240)={0x27c, r1, 0x38, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x80000000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}]}, @TIPC_NLA_LINK={0x90, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfb8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7e7c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xba}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffff8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5651}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}]}]}, @TIPC_NLA_NET={0x58, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x82e}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x10000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xd30}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xf684}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0xf4, 0x1, [@TIPC_NLA_BEARER_NAME={0x8, 0x1, @l2={'ib', 0x3a, '\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'ib', 0x3a, 'bridge_slave_0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x100000000, @rand_addr="98fc11250a48cb5093607a9e0c9e4726", 0x44ee}}, {0x14, 0x2, @in={0x2, 0x4e20, @local}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5b7}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x900000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}, @TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}]}, @TIPC_NLA_NODE={0x40, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x100000000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7f}]}]}, 0x27c}, 0x1, 0x0, 0x0, 0x40}, 0x4851) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") ioctl$SG_GET_NUM_WAITING(r2, 0x227d, &(0x7f0000000000)) 14:42:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 14:42:50 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000a00140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:42:50 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f00000001c0)) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f0000000000)) 14:42:50 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30", 0xc8, 0x10000}], 0x0, 0x0) 14:42:50 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000e00140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:42:50 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") fcntl$getownex(r0, 0x10, &(0x7f0000000000)) 14:42:50 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39c00e00140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:42:50 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000240)={0x0, 0x60, "1fa942894d2b0c46bd7f348818ba728f38a688f3bba0f248cbde4e8de4d95fe2c5dad280adebaf8dc520a99da2c362d0a140defb8a0249f859a690613a06447cde3c8915e7676cf16c76a5c08969a0ed88558e58d7cde3f3af354d32117d0ce2"}, &(0x7f00000002c0)=0x68) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000300)={r2, 0xce72, 0x9, 0x4}, 0x10) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x2, 0x80) write$P9_RWRITE(r1, &(0x7f0000000000)={0xb, 0x77, 0x2, 0xc468}, 0xb) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f00000001c0)={0x0, @aes256}) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCAX25DELUID(r1, 0x89e2, &(0x7f0000000400)={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, r3}) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:42:50 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 14:42:50 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x43, &(0x7f0000000040), 0x4) 14:42:50 executing program 2: openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6406f18402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:42:51 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000000)=0x7ba, &(0x7f00000001c0)=0x2) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") [ 322.949196][T18095] BTRFS: device fsid ecf6f2a2-2997-48ae-b81e-1b00920efd9a devid 209 transid 16708671943451224836 /dev/loop3 [ 323.015923][T18095] BTRFS error (device loop3): unsupported checksum algorithm 22813 [ 323.036599][T18095] BTRFS error (device loop3): superblock checksum mismatch [ 323.053916][T18095] BTRFS error (device loop3): open_ctree failed 14:42:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 14:42:51 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000f00140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:42:51 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 14:42:51 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39003f00140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) [ 323.260003][T18118] BTRFS error (device loop3): unsupported checksum algorithm 22813 [ 323.268615][T18118] BTRFS error (device loop3): superblock checksum mismatch [ 323.279057][T18118] BTRFS error (device loop3): open_ctree failed 14:42:51 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 14:42:51 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39015800140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) [ 323.447799][T18133] BTRFS error (device loop3): unsupported checksum algorithm 22813 [ 323.457598][T18133] BTRFS error (device loop3): superblock checksum mismatch [ 323.476954][T18133] BTRFS error (device loop3): open_ctree failed 14:42:51 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115", 0xcb}], 0x0, 0x0) 14:42:51 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040)=0x3f00, 0x4) 14:42:51 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39006000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:42:51 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115", 0xcb}], 0x0, 0x0) 14:42:51 executing program 2: openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6406f18402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:42:51 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r1, 0x4018aee1, &(0x7f0000000240)={0x0, 0x100000001, 0x5, &(0x7f0000000200)=0x75e2}) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x0) clone(0x2102001ff2, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:42:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 14:42:52 executing program 2: openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6406f18402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:42:52 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115", 0xcb}], 0x0, 0x0) 14:42:52 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="390ec000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:42:52 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="3900f000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:42:52 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 14:42:52 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="3901ff00140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) [ 324.333751][T18293] BTRFS error (device loop3): unsupported checksum algorithm 22813 [ 324.341957][T18293] BTRFS error (device loop3): superblock checksum mismatch [ 324.356072][T18293] BTRFS error (device loop3): open_ctree failed 14:42:52 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040)=0x4000, 0x4) 14:42:52 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 14:42:52 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000150081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:42:52 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000001ff0081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) [ 324.746441][T18307] BTRFS error (device loop3): unsupported checksum algorithm 22813 [ 324.754693][T18307] BTRFS error (device loop3): superblock checksum mismatch [ 324.765598][T18307] BTRFS error (device loop3): open_ctree failed 14:42:52 executing program 5: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f00000001c0)=0x7, 0x4) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000080)={0xf45a, 0x800, 0x7, 0x1, 0x0, 0x8}) 14:42:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 14:42:52 executing program 2: syz_open_dev$loop(0x0, 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6406f18402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:42:52 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 14:42:52 executing program 2: syz_open_dev$loop(0x0, 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6406f18402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:42:53 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000200140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:42:53 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f0000000000)) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") [ 325.094785][T18432] BTRFS error (device loop3): unsupported checksum algorithm 22813 [ 325.108756][T18432] BTRFS error (device loop3): superblock checksum mismatch [ 325.120745][T18432] BTRFS error (device loop3): open_ctree failed 14:42:53 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) [ 325.247914][T18553] BTRFS error (device loop3): unsupported checksum algorithm 22813 [ 325.261409][T18553] BTRFS error (device loop3): superblock checksum mismatch [ 325.271098][T18553] BTRFS error (device loop3): open_ctree failed 14:42:53 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040)=0x1000000, 0x4) 14:42:53 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000400140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:42:53 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) [ 325.557144][T18561] BTRFS error (device loop3): unsupported checksum algorithm 22813 [ 325.569144][T18561] BTRFS error (device loop3): superblock checksum mismatch [ 325.578412][T18561] BTRFS error (device loop3): open_ctree failed 14:42:53 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 14:42:53 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000a00140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) [ 325.701361][T18574] BTRFS error (device loop3): unsupported checksum algorithm 22813 [ 325.720849][T18574] BTRFS error (device loop3): superblock checksum mismatch [ 325.739976][T18574] BTRFS error (device loop3): open_ctree failed 14:42:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) 14:42:53 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 14:42:53 executing program 2: syz_open_dev$loop(0x0, 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6406f18402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:42:53 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000e00140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:42:53 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) [ 325.878734][T18585] BTRFS error (device loop3): unsupported checksum algorithm 22813 [ 325.893396][T18585] BTRFS error (device loop3): superblock checksum mismatch [ 325.910186][T18585] BTRFS error (device loop3): open_ctree failed 14:42:54 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$sock_bt_hci(r0, 0xc00448f7, &(0x7f0000000000)="f59304479c2d0d1e49425a037a0a68cd0be4aea37ab7aef2235fc8c8056bd7c14096d929d6fa0260a9564aca28dcf2") clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) writev(r0, &(0x7f0000001500)=[{&(0x7f00000002c0)="c24714b5df3c74af1fb5a8d58b15a4118ab1a757c1e7cc9a9a9041821176065d30c11fdba71045787006682f084c34fa69bfd3ae5a92332b16cd7bb3a2f15f650c443c1a753b05f410e8de4fa7e5958b35e9b1b7743b3c8ee2bd7d2df795b4e53d14ddfc9b384692f523183c2220c1dc600747915220c9a6994d621822dbb9853b314d3749f652059a9adcf189675108e3201fcabeabfaed08ff828fab6f7a72f01e44acace5df8fc19720c7e3d5ad67d8a3a7bcd650a7976d6649378a9c55239f2033b25d36e5de00ba10d149264e256f380c9cd4d5e05741f957edfc9b5d1bcbe0cd0cea96114a3816b4ecddeb218c028adc21af732c3c73428239551ef22b70bdbf2eeb230986b293f7667d2359907bcf293b903f51421fcf4c7168d2a7facb3e0502679f7a80ca7f83b923483e691e74c1955d1040971386eb36eb58f5a1f82bbad51b93ea6a195f177e025b6651f216d89cbb9fe29366cbbad77c786dc9a18e38c1188558e90222291b7f1b20f1f2b8fad65f5912f8286c5a3c7e45ba260b7604409292f53f1ec852d3b4e295b5b31b62518689cea68e2b3f023b51eb46d957290445f3a7e90b7f73108b4d12fceb0e94665add6e20a29f4755cda103310e130c664b6bdbc9e1a9979a3cd421719cd531ce8a4be504a6e3ec692e835848e1a9926fba30fe1f4f1a92eef299bb88d57875ea2dd3f153ba5bf9031cd37e26d39fb7ea3ff9b68640ed4ceb066003a1cfeb746d200f83d24fb8fece27beba33ba52c92c9b3a959b0d48ab3e31e1d925f736e8bd1828d5473c5db6de7a754484c962e7acacb21c1628e06564688d5f13729dc14f86ca799a6dcfa8eda5825a299907cbb7d82f4e01490ea046ed208af87a49e6f9a8e41ff27a43a53a91857851b31193a1e7a5d183fe919b6288b24024e5de245ed2c6bd0c0c997cf5c51348a2f9ef36d88c8b7ede8f6c7ae7e7d0dd20308a0e9d3f81818aa788ad6aa640325010c90a2f9fa1706443bbdb69768e7d643856a45f871511741743c2b975f5595da3e90c7ac5dc517f9e82d476d07f8c3b680174511bb41e071ed1aa3e5d6c0caca71a2522cf0d62b2ebda23ddd9c93a56c97b5b8d3ae79124ec8a24d7875c84a2c1029dd2a406ed838d608947f475e32a6cc6ee9e017c91d7956435a8d98ffda406c443d2542a730e5ef14a94c99b02470ea6839720d8ef8f58ab1aba835bb9d0d031cbad7390512b2e64352610ff13d5f8c3425cf62a716ed095800818951b5537804b4d982365e971fdfdc883d0ee97c675a7f1b2283ce50ae9c887bb7e53384fa0b440f2bd30d66b24177f512c653ab8d28cf1786e1fe4aa4944f65f559a7eae684c2722986b84add0a42c86c73225080b9f6a88b19a98d09df759af31b488da3c9637f17c542f3d6a16769c0aab0c79053a93049383dfabde840fc8bbc665939105b944c39e298692e2358b7069f7ba3b8180ff3e2d05523230f07eddfa496ad6e2a6f915b172ce832461aca9ce2077f3d0281e8a0a94677ac9b7ca4cbdc5d3ff36a8cfff9ce1f2285328429417d21d7caf71a5457d2d6a57f4666847c2d6e6c690c391d75e2f7da596201b87fc88bb459febbcf762a0e32c325de4ca32cd27c2efdd978cc57eb67cd3b2eaf1ba128b1f3e63766e6ba14728db783dc854b8f9ae2253a4ce3e65c66f4e30151a91c6d511ef3a0b6c589da61311bd01ab55fe4284896421c77068f34b8f3217ea4d15c79461f40c428be5c8520b36b2fe18e6379cac860f5a35982a6c007f0bef559a67ff9b68fdae8961c9b95fdb8ae4ada4fcafdec71f8272124c26c56ce0a5dbf6efa22f453bc64d45b234fd8976bec079c0c56b202170a270c02d9ca67ffb41329f0f3569bb0a8ac8b5903d9a570507710a846e95046f0aa8173bf09937568826c64850525ded06bab39c66b0944e40bfec429e7f7e07f868088d35ce2fa39e8c514154caab22fb4bb9a17c1e7d9f29be8a591844f2aa7bf0006d7427d2c8f49e941660f05a29635be3ec25ac41e796c1d7cff2928de97dc99291bda4143f0f635f7c45422c935e9611e02ad28cceea62f7a1be63cb5c988602dc3a21bc14804ec184e1808e923641fd7353a7c7323f849513e2fa18712cfde3c51b8f06a096de5bde8d5fae4c403f82f2f4bbfe5f27a53a1b408e262e85f485e038b107f01f657688a156353e671c5c911d24c17a248a5e3bc952dda74afa1556608350a8e4c984602ff3d2bb09730eb8874bd834841c6f364627e6103ac733cc07daa50212807745187229884fb5869b4bb854fdbc1bb8cc029515fb178d4d96d2f221fe46fbfb6ec39ebdab0d4a9a387eb3ab2aec086234e84de05c94c9cfde0228c84bbfa1b25b8136cffc3ee26ac9253f73908dc89dcbbe2ff0f60a55833614684159b9b33d864097d80b17e72187f725ecd615f529ef40d7198ac3db3ba80145598956a5a8978d7a5b2efc7cb335391eeceee2a810b162780d5411ecbed1263d998245cba4d376586983127325bf3e59575b598f8c7d31312eecb206afd12309d68f25fdb72a564bfa7ecc2c08979d3a5c5def61ea00edc21ea5a75a68ecc3340f0f90ec1fc030d594698d124d218c1282698e1b6531e73e4d075433df0e38933a2eceeb1c0b9f44d66f72038192a892be52a70f2f550c37f59c9b9cdc4b082b5e30f3acbee7123e5b6240c9c14a1f48b0e27706c0668ee50e601cce7837dffdafed5c8c18989ea3586a254a5a0d785a2ecfbcca2620f186a6d9a5551d5a625c96fcb65411ee1d1c1df7b1bdf2e9e7a9b68218a6f6db06bf9fd0731f75565527c98b6267377dbaebf915d67c7db7c67ee58348e1ffc0dc7f24d61efce9275d0be6e18d76be71a1bca170aff5d9e47d67252f431c9b96660442e64da405e364529967beb80cd2c05ec58c83c3e6d9a3b0d7c1f21d9e758e21a79204ce0842b9594fddacb1e6cc817b5554e7a4cebc948a664e9425ff01bb4946c06670d868b092b31847eaf9f290968b8e47d726d4ca36f262d309075c99c5725b64f8e4ba44b082deb81e97d0ac41755db9f72df970c9a683bb52e88739f0e5a65d561f22ce70f195abfc67ef5960a117d42a86ff82b832340accc35ebf84b49232581761e71d5c404f330f3e931b0ef68f2bf16813b75a52186e21138332173484fe53c4db09a7fc7d1314b979c36aac1b0e58f4090151b593c59c1fcb9a488edea55a80df8ec9a525fa3c80f7ab7b63b888c60e66d19c73aa2b417da191b3acc6322cee4cbfc0dee380a3db2e3f1059ce6e2bfd095028af5ce8a84ca9dae98868be6be81ffd392e679ab52bf0e94fa40eb7044161a5483186bd6248448fcf6641a575f4fa2d0cab1a38f9765a24cd58348c2f16c208ee0da7d4682b24be833d94f7a849dda0c618608b345ea894433e876d8f82f5a10e713fa21e8493cae71cb721e4f12d80d9376fda13195dce5972b9aa77ab3550d980b0102e4e2ea768f54bb338be92bde6012026d762a395f42696b3ebc0f4a66f03507f891b7588b7aa926b77f99472e84efed6563351df9557fd4649730d8ceb1f033e79a39f8824867a934538f2b9efae42ab5d3ac323046dd939b2d3da0e5d866f4c1b2e069d8520b8d6e2296afccd52c8bb195f99be886469b81b14980242d985da5ca99acd10837944c48125d2dc8b1793666238a3efbf04e676326605818210665a91ab15bf6da1f8de614d4787d6a8452e0305e6ff7f5c1a89f35c1f5d4fc8b5cf607b9d0b1afd3a6f94685b6fadc5b3a62989e94b06017bd14bf9b561b835ff00c27f4f27470d90b048dc447eba22266fa000e81fcfc186dd787c94cf6d5c6fdcce62a38fbfe39213283ee968216aaa03bee4ba35b0cd718803f58520ba0a2783712816f1591f7a6e2f7076842721e850365debe570a2c065e8c33bf5a3a0e65e8f243686f3ae1c6817e3fe21961c6a2ed20440a0f8b00193c8f024edf97b050a1cbf77b536c6f09a99f0364facba7e8bae491593154ca93ef6e1c54fe5c1e9ce9d92b1f20d63bd7df71d40ffc0ec9993d66d057a2b92d138ce8377887050b3b331fc8031ce645f6656c030aaa67c4de6513d267878f567064532e9bb3101e9c3cf95b992c6b28809d5b31dfd41d06b91fd9f8bf6d988293778e5910acc956d0050037371b4c56c63f04933e4c952ea2bf1accff436ff12d111ee24750577846fb32fd04e6074377bd7a68840e9a656e636f32ffcc34b13a9d5312cf610f5d3d5287d68f7caa775bb65a3bb9d80453f852b066b5579c6aefd63d07fe8c4ca406de30145089d9286b292689c72657eb3ffbb5d7da93f9e26c79e67bd7ed1a74ab95d7a6c36ecace9bf2685d6250d205368aeb2b49e4ceab2b08f40603a9f2c4399013701bf2681c3a3d368c9134dbb171d1f7d2708ef53ac318b84085f02fe653d335e918bf4bfd80a2a877225ca1caeee765401ee0a07173341641eb719f3977bedefc246314ed8907141ff3c84ec1a495c8d1d1dfc7fce9ca1d8f5f6821b2c152ccab00f701d4caa5c4ac11c2160fbd038f3f232769a3b9fcaf5cab5f42fad7bd6066b3d952ede731f5975fb1d4aa68874992f4fab7bfe2bd7f603d8089f75b762d3fe49fafdbba71131a1d9bcc49cfc5f12c96ef84578c1b41b0574d27f4601057b2db3630977f6d9a74f390bea39e16dcb2014c9246ffe2e27370acfd55a82625fed3d8dd1b14e0687d0dee97cab089e17af1d035d34ecb5aba6903035a4c590c5a30dbdc758e12106c4885b877c79f7ec1d7161e6e6ac660e5d6db4341aa74156031bb70bbcc41589a59f7b6d2c384173ff8a3cf553a0fa4e756ca1d026cbadee0a38b5fba2b12478b3cb71987e46c50283d793db8cce713690e5fd6dbbb8db0e802b81b9fcc5b9e2d8b5e21caf02823144dba241561a2ed3d3316dd4132dcdb925c097d6009160fba071324216feb9fc7fe333fd3423a60815a6fc070d751e2e2cf6013384d4def4f444a874307357edcad8d12335348ca33b6d6f29c4edffd2847d3365a9690ae8ffcec6bdaa37aed46f63b375db88e4fe1c55b18f59ed103e1a8089019f47a4b76721b025bb9175915cb189a07a8780337de1d4bc52d386060e79c478189a90714926d66fbad0cbfc1a1dd36bc4bcb2a0ee89539bf45f7a3cf5ba03e79879150380c3eb6834d505bf0043b9ddd35b2bd2087747c62789b3aeaaeb3626b57926d173838cf439d57d618c562367ac31f184b252f7b4317f7dc6c1a959577e5f373b4adea1158adb3503176f7f2eeb8749c242dbb44859e26114bd399b7a4b80a2a0f99e4d1bc38a81cea730c8ae0a42f57eb2b964cabd03ee7b43b1320b8da665a644999317506a033c4c2875cfd026acd4ea7760d5895d3d07fd3af61ece917f4dc05cce6bfafde1f205fa176e04735fd49df4fe7339813e1912059191e9fae25af93a9f5718ce87408ec5fb872c773da88f70c026dd1e6574db56af45488cb8210c39a671b8b1e54f7507bf3d3acdb596e51ca61c71c04cf8af7e264a629d6302daf9748c7d622a9b50bfde73e6c7a04d0d4f9845ea9635f2fc8d156a2bdae2fcb1f2f3f2cec6a163cbae486b136b25cc62a3b831bac99a216e4a1d7c49cd37b60d0dd9732e286b9a3823903f03e56e94a8fe13bbbccc31381ece7b3bf20011ef62be49e1819b56609efa2fee1a46cf170c9a6e74e670788b075d2c6a602ebaa84a2351e21083057153d68cbedaffddf68c41074ecf2b788467cde2729589088589cd930fd70b8e82e39f7c4c38fc65527e2e31e298", 0x1000}, {&(0x7f00000012c0)="b39cd1180065", 0x6}, {&(0x7f0000001300)="cf361472f27ebefd4502c6b48f02f801f542adcd36fcb3368ff9805b0a6c31ed38e4f199340c2f4cad7ae479d430f48f7c636a5eb88469cca96d68a644b5b565abd951531f95", 0x46}, {&(0x7f0000001380)="f301d3479c80588b89ce7a8da0451bdac07eba8a7e086ebe7554d6602891a3862e8ff2ac0d60de86ae45c655ccb0dd8f276106a4dc6ff33813730185c6b53e42b5e138fc6e254060a9ced3a96561553c0a28b819e8ee5894664791c28b327cd7ab4f", 0x62}, {&(0x7f0000001400)="1a66a984706b3449004bd521e5684117439b998fa84964d204e12ac4d89b52b26cfb41d783618d49c61aac2e0b1e113b27d52d579229052e8ff4e6fbcdfadf4c4b603e15edf138204cbc7f19c8cddb9d5ef0cb49f46c19965e377b4bdb5af5e320b9aa99f417616ec16f2f51906d1a364792940d9218d17249dcac5fc9a608de57a84d0d6d4ed73b096a42cb4876f822f1515de75d683faa8a64e41772db051953aa641f13d29239a7c0eef4ddfcb6a196bbf7e3a29d01ce2e0a1761ecf5f8320d782fe452723bd403e752cb761caacd1a9a84", 0xd3}], 0x5) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000001c0)={0x0, 0xffff}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x4}, &(0x7f0000000280)=0x8) 14:42:54 executing program 2: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6406f18402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") [ 326.031610][T18700] BTRFS error (device loop3): unsupported checksum algorithm 22813 [ 326.042228][T18700] BTRFS error (device loop3): superblock checksum mismatch [ 326.090943][T18700] BTRFS error (device loop3): open_ctree failed 14:42:54 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040)=0x3f000000, 0x4) 14:42:54 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000f00140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:42:54 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 14:42:54 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7f, 0x400000) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f00000001c0)={0x0, 0x2, 0x8, 0x3, 0x7, 0x1, 0x3, 0xa08, {0x0, @in={{0x2, 0x4e24, @rand_addr=0xff0}}, 0xc2, 0x8, 0x9, 0x0, 0x58}}, &(0x7f0000000280)=0xb0) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000002c0)={r1, 0x0, 0x8, 0x626}, &(0x7f0000000300)=0x10) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:42:54 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) readv(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/71, 0x47}], 0x1) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") [ 326.434236][T18820] BTRFS error (device loop3): unsupported checksum algorithm 22813 [ 326.455242][T18820] BTRFS error (device loop3): superblock checksum mismatch [ 326.464878][T18820] BTRFS error (device loop3): open_ctree failed 14:42:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) 14:42:54 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39006000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:42:54 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) [ 326.711416][T18840] BTRFS error (device loop3): unsupported checksum algorithm 22813 [ 326.722533][T18840] BTRFS error (device loop3): superblock checksum mismatch [ 326.733244][T18840] BTRFS error (device loop3): open_ctree failed 14:42:54 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="3900f000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:42:54 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 14:42:54 executing program 2: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6406f18402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") [ 326.879385][T18852] BTRFS error (device loop3): unsupported checksum algorithm 22813 [ 326.902435][T18852] BTRFS error (device loop3): superblock checksum mismatch [ 326.922436][T18852] BTRFS error (device loop3): open_ctree failed 14:42:55 executing program 2: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6406f18402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:42:55 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040)=0x40000000, 0x4) 14:42:55 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39005801140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:42:55 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 14:42:55 executing program 2: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6406f18402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:42:55 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x480040, 0x0) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x6, 0x101000) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000200)={0xc00, 0x0, {0xffffffffffffffff, 0x3, 0x2, 0x3, 0x8000}}) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x6, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000340)=0x0) fcntl$lock(r0, 0x27, &(0x7f0000000380)={0x1, 0x2, 0x8, 0x9, r3}) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) setsockopt$inet6_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000003c0), 0x4) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") setsockopt$inet6_tcp_buf(r1, 0x6, 0x1f, &(0x7f00000002c0)="1f7c1671eb250572a5e571a06d65eba8a3c809dbd82866615f1c1c56d3a88367b4d1435f90e0b26a7b6e61d5b3b445b1b10657580eee21348337d9f90bbba062a803bc74a3d6f647d92dfd01b2fac6ccd0389ac38304", 0x56) [ 327.287945][T18871] BTRFS error (device loop3): unsupported checksum algorithm 22813 [ 327.308001][T18871] BTRFS error (device loop3): superblock checksum mismatch [ 327.324356][T18871] BTRFS error (device loop3): open_ctree failed 14:42:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) 14:42:55 executing program 5: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x1) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000080)={0x2, 'bond_slave_1\x00', 0x5}, 0x18) 14:42:55 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 14:42:55 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="3900000a140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) [ 327.590887][T18998] BTRFS error (device loop3): unsupported checksum algorithm 22813 [ 327.599478][T18998] BTRFS error (device loop3): superblock checksum mismatch [ 327.608762][T18998] BTRFS error (device loop3): open_ctree failed 14:42:55 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x303000, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:42:55 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="3900000e140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:42:55 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) [ 327.804794][T19114] BTRFS error (device loop3): unsupported checksum algorithm 22813 [ 327.820770][T19114] BTRFS error (device loop3): superblock checksum mismatch [ 327.830726][T19114] BTRFS error (device loop3): open_ctree failed 14:42:56 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040)=0x100000000000000, 0x4) 14:42:56 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 14:42:56 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="3900c00e140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:42:56 executing program 2: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6406f18402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") [ 328.202701][T19127] BTRFS error (device loop3): unsupported checksum algorithm 22813 [ 328.217278][T19127] BTRFS error (device loop3): superblock checksum mismatch [ 328.227486][T19127] BTRFS error (device loop3): open_ctree failed 14:42:56 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="3900000f140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:42:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)}], 0x1}, 0x0) 14:42:56 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 14:42:56 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="3900003f140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:42:56 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x2000, 0x0) ioctl$sock_rose_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={'nr', 0x0}, 0x0, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffd000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/33) syz_execute_func(&(0x7f00000002c0)="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") [ 328.510595][T19146] BTRFS error (device loop3): unsupported checksum algorithm 22813 [ 328.533412][T19146] BTRFS error (device loop3): superblock checksum mismatch [ 328.543770][T19146] BTRFS error (device loop3): open_ctree failed 14:42:56 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 14:42:56 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000158140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) [ 328.707996][T19264] BTRFS error (device loop3): unsupported checksum algorithm 22813 [ 328.718421][T19264] BTRFS error (device loop3): superblock checksum mismatch [ 328.727091][T19264] BTRFS error (device loop3): open_ctree failed 14:42:56 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 14:42:56 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000060140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) [ 328.860348][T19274] BTRFS error (device loop3): unsupported checksum algorithm 22813 [ 328.886481][T19274] BTRFS error (device loop3): superblock checksum mismatch [ 328.900187][T19274] BTRFS error (device loop3): open_ctree failed 14:42:57 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040)=0x3f00000000000000, 0x4) 14:42:57 executing program 2: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6406f18402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:42:57 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 14:42:57 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000ec0140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:42:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)}], 0x1}, 0x0) 14:42:57 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 14:42:57 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="390000f0140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:42:57 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) fsetxattr$security_ima(r1, &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "4eaece28101d607a085c17fe0c4ad487f3c74eb1"}, 0x15, 0x2) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U-', 0x8001}, 0x28, 0x1) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:42:57 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 14:42:57 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="390001ff140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:42:57 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 14:42:57 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="390000000f0081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:42:57 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040)=0x4000000000000000, 0x4) 14:42:57 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 14:42:57 executing program 2: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(0x0) 14:42:57 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000120081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:42:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)}], 0x1}, 0x0) 14:42:58 executing program 2: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(0x0) 14:42:58 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 14:42:58 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x20002, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@timestamp, @sack_perm, @window={0x3, 0x5, 0x1}, @mss={0x2, 0x8}, @mss={0x2, 0x3}, @timestamp, @mss={0x2, 0x3}, @window={0x3, 0x7f, 0x1}], 0x8) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:42:58 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000130081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:42:58 executing program 2: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(0x0) 14:42:58 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:42:58 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) [ 330.639415][T19590] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 330.651957][T19590] BTRFS error (device loop2): superblock checksum mismatch [ 330.663610][T19590] BTRFS error (device loop2): open_ctree failed 14:42:58 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x3) 14:42:58 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:42:58 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000002140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:42:58 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) [ 330.915668][T19604] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 330.924180][T19604] BTRFS error (device loop2): superblock checksum mismatch [ 330.951446][T19604] BTRFS error (device loop2): open_ctree failed 14:42:59 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000004140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:42:59 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:42:59 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) [ 331.132200][T19627] BTRFS error (device loop0): unsupported checksum algorithm 22813 [ 331.153964][T19627] BTRFS error (device loop0): superblock checksum mismatch [ 331.206870][T19627] BTRFS error (device loop0): open_ctree failed 14:42:59 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x88002, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000200)={0x100000, &(0x7f00000001c0), 0x6, r1, 0x4}) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") fcntl$getown(r0, 0x9) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) 14:42:59 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 14:42:59 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) 14:42:59 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="3900000a140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:42:59 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) [ 331.433897][T19740] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 331.467472][T19740] BTRFS error (device loop2): superblock checksum mismatch [ 331.500317][T19740] BTRFS error (device loop2): open_ctree failed 14:42:59 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x0) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) socket$bt_bnep(0x1f, 0x3, 0x4) 14:42:59 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040)=0x3f000000, 0x4) 14:42:59 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) 14:42:59 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="3900000e140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:42:59 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) renameat(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") syz_open_dev$radio(&(0x7f0000000200)='/dev/radio#\x00', 0x1, 0x2) 14:42:59 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) [ 331.738476][T19866] BTRFS error (device loop2): unsupported checksum algorithm 22813 [ 331.747363][T19866] BTRFS error (device loop2): superblock checksum mismatch [ 331.758699][T19866] BTRFS error (device loop2): open_ctree failed 14:42:59 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="3900000f140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:42:59 executing program 2: syz_mount_image$btrfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 14:42:59 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) 14:42:59 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f0000000000)={0x0, 0x4}) ioctl$CAPI_GET_ERRCODE(r0, 0x80024321, &(0x7f0000000200)) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000001c0)={0xfed, 0x6, 0x100}) 14:43:00 executing program 2: syz_mount_image$btrfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 14:43:00 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000060140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:00 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x2, 0x40000) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0)={0x6d8b, 0x946f, 0x3, 0x3, 0x81, 0x7ff, 0x0, 0x1, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000140)={r2, 0x3, 0x6, 0x5}, 0x10) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000180)) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) ioctl$UI_DEV_CREATE(r1, 0x5501) 14:43:00 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 14:43:00 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) sendto(r0, &(0x7f0000000280)="08ddfc3c674d97f54b519c1f11aed14de9dc02c26cff44d116e22823fd53ca74f6da5f88799c0bfc4bd8a591b0519c84df9bedd9d3e26ce6d960cfbea1362d1579c520b91c3e1dd8eb4458ca58849d1190b4a372c462a5aeddba56b00628583c6f21e60bdce8e8bfe740e618391757dd75c67ff46e4f5fd3c3c27cc6eaa5963bf45affa1c3a8282b953b2817d40d14f1224b7a9ae09f3916a807ddd765b1ea6e9daf39dc1f4b739ac45f3a16ff936d50bf", 0xb1, 0xd0, &(0x7f0000000340)=@rc={0x1f, {0x9a5, 0x9, 0x80000000, 0x1, 0x7, 0x4}, 0xa3}, 0x80) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000240)=0x0) ptrace$cont(0xffffffffffffffff, r1, 0x3, 0x4) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', &(0x7f0000000200)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x3) 14:43:00 executing program 2: syz_mount_image$btrfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 14:43:00 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000150081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:00 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 14:43:00 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 14:43:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 14:43:00 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) 14:43:00 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 14:43:00 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000001ff0081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:00 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x400000, 0x0) write$cgroup_subtree(r0, &(0x7f00000001c0)={[{0x2d, 'cpu'}, {0x2d, 'cpu'}, {0x2b, 'memory'}]}, 0x12) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:43:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 14:43:00 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 14:43:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 14:43:01 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="390000000f0081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:01 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0", 0xbe, 0x10000}], 0x0, 0x0) 14:43:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 14:43:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 14:43:01 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000120081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:01 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0xa) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) 14:43:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:43:01 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115", 0xcb, 0x10000}], 0x0, 0x0) 14:43:01 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000130081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 14:43:01 executing program 5: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000080)) 14:43:01 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115", 0xcb, 0x10000}], 0x0, 0x0) 14:43:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 14:43:01 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000150081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:43:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0", 0xbd, 0x10000}], 0x0, 0x0) 14:43:02 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x4e0400, 0x0) getsockname$netlink(r0, &(0x7f0000000240), &(0x7f0000000200)=0x14f) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000280)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00', 0x2d, 0x81, 0x3, 0xb02, 0x3, 0xf8000000000, "48315ff85c2960c835d4942e3bbdc0df12d4144404be7d23bada26ce07cf03c30b0e7d78e2f84eb400c29497ff"}, 0x145) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f00000001c0)={0xc, 0x100000006a, 0x10001}) write$P9_RRENAMEAT(r0, &(0x7f0000000400)={0x7, 0x4b, 0x1}, 0x7) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:43:02 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) connect$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) fchdir(r0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) 14:43:02 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140281ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:02 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918", 0x65, 0x10000}], 0x0, 0x0) 14:43:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:43:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec", 0xa2, 0x10000}], 0x0, 0x0) 14:43:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd9", 0x6c, 0x10000}], 0x0, 0x0) 14:43:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) [ 334.678464][T20571] BTRFS: device fsid ecf6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 16708671943451224836 /dev/loop3 14:43:02 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140481ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:02 executing program 0: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6416f04402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:43:02 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918", 0x65, 0x10000}], 0x0, 0x0) 14:43:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) 14:43:03 executing program 5: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-monitor\x00', 0x80000, 0x0) ioctl$VT_WAITACTIVE(r0, 0x5607) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000380)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f484a4c2b0c10b7b57578171a30b8a826e4fc4816016f74999440faef6eb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:43:03 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@mcast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) ioctl$sock_ifreq(r0, 0x894a, &(0x7f00000002c0)={'sit0\x00', @ifru_addrs=@can={0x1d, r1}}) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0xff, 0x4) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vfio/vfio\x00', 0x301182, 0x0) ioctl$KDGKBDIACR(r2, 0x4b4a, &(0x7f0000000340)=""/156) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200883, 0x0) ioctl$KVM_SET_GSI_ROUTING(r3, 0x4008ae6a, &(0x7f0000000400)={0x1, 0x0, [{0x5, 0x1, 0x0, 0x0, @sint={0x4}}]}) getsockopt$inet6_tcp_int(r3, 0x6, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) 14:43:03 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140a81ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:03 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918", 0x65, 0x10000}], 0x0, 0x0) 14:43:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) 14:43:03 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/rpc\x00') ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f00000000c0)=""/111) r1 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r1}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4) 14:43:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 14:43:03 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f41", 0x98, 0x10000}], 0x0, 0x0) 14:43:03 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140e81ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:03 executing program 0: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6416f04402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:43:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 14:43:03 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f41", 0x98, 0x10000}], 0x0, 0x0) 14:43:03 executing program 5: rt_sigreturn() syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x100000001}, &(0x7f00000001c0)=0x8) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r0, 0x4010ae68, &(0x7f0000000300)={0x5000, 0x104000}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000200)={r1, 0xaf, "8f136b869987836f058753d677546616335863b27d87fd86708daa24bf9b6d581321922eb7fe5f8dddae99b5e857fbdeb7fd186d0e5d421b344a8eca41cc32a972e9c9d329e921a7f16fe37aa2dcf2d8fe2006c0baa81ba72055e3b0e55b4b1710dca3a9eecc06fb892f2633eb140e77ceb814e2b664451ed578bf8d2a5b110486fd570146a854389df9aa44408b246c5bdb2617866d429f52e578c411c500d071ff67cac4bfce7c62fa29aafd96f5"}, &(0x7f00000002c0)=0xb7) 14:43:03 executing program 0: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6416f04402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:43:03 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140f81ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:04 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918", 0x65, 0x10000}], 0x0, 0x0) 14:43:04 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f41", 0x98, 0x10000}], 0x0, 0x0) 14:43:04 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x38, &(0x7f0000000000)=[@in6={0xa, 0x4e20, 0x400, @local, 0x4}, @in6={0xa, 0x4e20, 0x80000000, @remote, 0x4}]}, &(0x7f0000000100)=0x10) r2 = syz_open_dev$usb(&(0x7f00000001c0)='/dev/bus/usb/00#/00#\x00', 0x7f, 0x10000) ioctl$KVM_S390_INTERRUPT_CPU(r2, 0x4010ae94, &(0x7f0000000200)={0x1f, 0x101, 0x1ff}) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000140)={r1, 0x7, 0x89}, &(0x7f0000000180)=0x8) 14:43:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 14:43:04 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000146081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:04 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000200)={0x2b, 0x0, 0x2, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000000)={0xafe2, r1, 0x10001, 0x1000}) ioctl$DRM_IOCTL_AGP_UNBIND(r0, 0x40106437, &(0x7f00000001c0)={r2, 0x9e45}) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") fcntl$getflags(r0, 0x0) 14:43:04 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f41", 0x98, 0x10000}], 0x0, 0x0) 14:43:04 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7", 0xb1, 0x10000}], 0x0, 0x0) 14:43:04 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x8, 0x408001) dup2(r0, r0) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f132626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:43:04 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f41", 0x98, 0x10000}], 0x0, 0x0) 14:43:04 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'\x00', {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x22}}}) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000000), &(0x7f00000000c0)=0x30) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000140)) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) 14:43:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 14:43:04 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="390000001401ffae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:04 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7", 0xb1, 0x10000}], 0x0, 0x0) 14:43:04 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918", 0x65, 0x10000}], 0x0, 0x0) 14:43:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 14:43:04 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae02002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:04 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7", 0xb1, 0x10000}], 0x0, 0x0) 14:43:04 executing program 0 (fault-call:8 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) [ 337.097117][T20971] FAULT_INJECTION: forcing a failure. [ 337.097117][T20971] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 337.115020][T20971] CPU: 0 PID: 20971 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96 [ 337.123191][T20971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 337.138829][T20971] Call Trace: [ 337.142132][T20971] dump_stack+0x172/0x1f0 [ 337.146463][T20971] should_fail.cold+0xa/0x15 [ 337.151055][T20971] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 337.156855][T20971] ? ip6_pol_route_lookup+0xae0/0xae0 [ 337.162239][T20971] should_fail_alloc_page+0x50/0x60 [ 337.167427][T20971] __alloc_pages_nodemask+0x1a1/0x8d0 [ 337.172775][T20971] ? __lock_acquire+0x548/0x3fb0 [ 337.177693][T20971] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 337.183394][T20971] ? ip6_dst_lookup_tail+0xa8a/0x1b30 [ 337.188743][T20971] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 337.196227][T20971] alloc_pages_current+0x107/0x210 [ 337.201330][T20971] ? ima_match_policy+0x9ef/0x13c0 [ 337.206433][T20971] skb_page_frag_refill+0x277/0x460 [ 337.211628][T20971] sk_page_frag_refill+0x55/0x1f0 [ 337.216637][T20971] __ip6_append_data.isra.0+0xdc1/0x3600 [ 337.222252][T20971] ? __lock_acquire+0x548/0x3fb0 [ 337.227168][T20971] ? rawv6_mh_filter_unregister+0x20/0x20 [ 337.232877][T20971] ? dst_output+0x180/0x180 [ 337.237358][T20971] ? mark_held_locks+0xa4/0xf0 [ 337.242115][T20971] ip6_append_data+0x1e5/0x320 [ 337.246859][T20971] ? rawv6_mh_filter_unregister+0x20/0x20 [ 337.252567][T20971] ? rawv6_mh_filter_unregister+0x20/0x20 [ 337.258269][T20971] rawv6_sendmsg+0x1467/0x35e0 [ 337.263031][T20971] ? rawv6_getsockopt+0x150/0x150 [ 337.268035][T20971] ? aa_profile_af_perm+0x320/0x320 [ 337.273220][T20971] ? _copy_from_user+0xdd/0x150 [ 337.278062][T20971] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 337.283763][T20971] ? rw_copy_check_uvector+0x2a6/0x330 [ 337.289208][T20971] ? ___might_sleep+0x163/0x280 [ 337.294037][T20971] ? __might_sleep+0x95/0x190 [ 337.298700][T20971] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 337.304223][T20971] inet_sendmsg+0x147/0x5d0 [ 337.308703][T20971] ? rawv6_getsockopt+0x150/0x150 [ 337.313704][T20971] ? inet_sendmsg+0x147/0x5d0 [ 337.318372][T20971] ? ipip_gro_receive+0x100/0x100 [ 337.323383][T20971] sock_sendmsg+0xdd/0x130 [ 337.327778][T20971] ___sys_sendmsg+0x806/0x930 [ 337.332454][T20971] ? copy_msghdr_from_user+0x430/0x430 [ 337.337909][T20971] ? kasan_check_read+0x11/0x20 [ 337.342748][T20971] ? __fget+0x381/0x550 [ 337.346882][T20971] ? ksys_dup3+0x3e0/0x3e0 [ 337.351281][T20971] ? __fget_light+0x1a9/0x230 [ 337.355942][T20971] ? __fdget+0x1b/0x20 [ 337.359988][T20971] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 337.366219][T20971] __sys_sendmsg+0x105/0x1d0 [ 337.370804][T20971] ? __ia32_sys_shutdown+0x80/0x80 [ 337.375891][T20971] ? fput_many+0x12c/0x1a0 [ 337.380294][T20971] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 337.385756][T20971] ? do_syscall_64+0x26/0x610 [ 337.390930][T20971] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 337.396988][T20971] ? do_syscall_64+0x26/0x610 [ 337.401652][T20971] __x64_sys_sendmsg+0x78/0xb0 [ 337.406393][T20971] do_syscall_64+0x103/0x610 [ 337.410986][T20971] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 337.416854][T20971] RIP: 0033:0x458da9 [ 337.420728][T20971] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 337.440317][T20971] RSP: 002b:00007fe111eaac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 337.448704][T20971] RAX: ffffffffffffffda RBX: 00007fe111eaac90 RCX: 0000000000458da9 [ 337.456652][T20971] RDX: 0000000000000000 RSI: 0000000020000a40 RDI: 0000000000000004 [ 337.464607][T20971] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 337.472567][T20971] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe111eab6d4 [ 337.480530][T20971] R13: 00000000004c5ff5 R14: 00000000004da7d8 R15: 0000000000000005 14:43:05 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x8000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") mlockall(0x1) r2 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000380)={{0x6, 0x7, 0x3, 0x3, '\x00', 0x1}, 0x6, 0x0, 0x7, r2, 0x5, 0x2, 'syz0\x00', &(0x7f0000000340)=['\x00', '#vmnet0\x00', '/dev/ubi_ctrl\x00', 'eth1\x00', 'syz1\x00'], 0x21, [], [0xff, 0xcd, 0x4, 0x2]}) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f00000001c0)={{0x6, 0x2, 0xfffffffffffffe00, 0x80, '\x00', 0x4}, 0x0, 0x10000030, 0x9, r2, 0x1, 0x1, 'syz1\x00', &(0x7f0000000000)=['/dev/ubi_ctrl\x00'], 0xe, [], [0x200, 0x0, 0x0, 0x3]}) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x4, 0x2, 0x2}) 14:43:05 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae04002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:05 executing program 0 (fault-call:8 fault-nth:1): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:05 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0", 0xbe, 0x10000}], 0x0, 0x0) 14:43:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918", 0x65, 0x10000}], 0x0, 0x0) 14:43:05 executing program 1: syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x800) r0 = socket$rxrpc(0x21, 0x2, 0x2) ioctl$sock_netdev_private(r0, 0x89f5, &(0x7f0000000000)="47ddf09e2377ccf7a604e6c35e32f5b090acf442e3fcc7b21184d3e8c3396a6008b43c7864d5d4e1a1871a7a") r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x0, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000140)) ppoll(&(0x7f00000000c0)=[{r0, 0xfffffffffffffffc}], 0x1, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) 14:43:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918", 0x65, 0x10000}], 0x0, 0x0) 14:43:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:05 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae0a002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:05 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000040), 0x2000000000000195, 0x0, 0x0, 0xffffffc7) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000000), 0x4) 14:43:05 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") ioctl$NBD_SET_TIMEOUT(r0, 0xab09, 0x100) 14:43:05 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0", 0xbe, 0x10000}], 0x0, 0x0) 14:43:06 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918", 0x65, 0x10000}], 0x0, 0x0) 14:43:06 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) r1 = semget$private(0x0, 0x4, 0x8) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f00000000c0)=""/229) 14:43:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x4, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:06 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae0e002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:06 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="2596386eca318f1fc307d0271c381e78aff9bc280553db930bc0dab17b29baa4eef9c6a03bd611de1b7ef2720e076ef80e", 0x31, 0x9}], 0x10000, &(0x7f0000000280)={[{@decompose='decompose'}, {@creator={'creator', 0x3d, "383b0811"}}], [{@appraise_type='appraise_type=imasig'}]}) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x30000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:43:06 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0", 0xbe, 0x10000}], 0x0, 0x0) 14:43:06 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f41", 0x98, 0x10000}], 0x0, 0x0) 14:43:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x7, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) [ 338.351281][T21354] hfsplus: unable to parse mount options 14:43:06 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae0f002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x9, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:06 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f41", 0x98, 0x10000}], 0x0, 0x0) 14:43:06 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x7e}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_mr_vif\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000300)) getresuid(0x0, 0x0, &(0x7f00000003c0)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000400)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0x2, 0x7ff, 0x3, 0x5, 0x548, 0x7fff, 0xf6, 0x9, 0x6, 0x4, 0x0, 0x5, 0x3, 0x7, 0x8]}, &(0x7f0000000000)=0x100) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000240)={r2, 0x81, 0x7f, 0x8, 0x0, 0x3f}, 0x14) 14:43:06 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xc4, 0x10000}], 0x0, 0x0) 14:43:06 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'veth1_to_hsr\x00', &(0x7f0000000000)=@ethtool_sset_info={0x37, 0x5, 0x6, [0x81, 0x6, 0x5]}}) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) move_pages(r1, 0x2, &(0x7f0000000140)=[&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil], &(0x7f0000000180)=[0x9, 0x7, 0x4, 0x8a], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6) 14:43:06 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae60002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0xa, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:06 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f41", 0x98, 0x10000}], 0x0, 0x0) 14:43:06 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) fcntl$setflags(r0, 0x2, 0x1) clone(0xa000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:43:06 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xc4, 0x10000}], 0x0, 0x0) 14:43:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0xe, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:07 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000000240)=0xe8) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x814, &(0x7f0000000300)={'trans=unix,', {[{@access_user='access=user'}, {@debug={'debug', 0x3d, 0x5}}, {@cache_fscache='cache=fscache'}, {@version_9p2000='version=9p2000'}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '[)self'}}, {@uname={'uname', 0x3d, ')'}}, {@access_any='access=any'}], [{@mask={'mask', 0x3d, 'MAY_READ'}}, {@fowner_eq={'fowner', 0x3d, r1}}, {@appraise='appraise'}, {@euid_gt={'euid>', r2}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}}) 14:43:07 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7", 0xb1, 0x10000}], 0x0, 0x0) 14:43:07 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081aef0002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:07 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x50000, 0x0) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:43:07 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xc4, 0x10000}], 0x0, 0x0) 14:43:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x60, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:07 executing program 1: r0 = accept$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000000)=0x6e) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x30, 0x6, {"9e51eb19c96c50d09c9cb779826d1ecbf3ac18bc9c2155"}}, {0x0, "51b04a908a74044d24a6cb7ffa9cdc73b779a666f5"}}, &(0x7f0000000280)=""/185, 0x47, 0xb9}, 0x20) getpeername$unix(r0, &(0x7f0000000140)=@abs, &(0x7f00000001c0)=0x6e) r1 = socket$rxrpc(0x21, 0x2, 0x2) r2 = syz_open_dev$admmidi(&(0x7f0000000380)='/dev/admmidi#\x00', 0x80000001, 0x100) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f00000003c0)={0xfffffffffffffffb}) ppoll(&(0x7f0000000080)=[{r1}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4) 14:43:07 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7", 0xb1, 0x10000}], 0x0, 0x0) 14:43:07 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae58012c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0xfc, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:07 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da", 0xc7, 0x10000}], 0x0, 0x0) 14:43:07 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7", 0xb1, 0x10000}], 0x0, 0x0) 14:43:07 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae000a2c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x1f4, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:07 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0", 0xbe, 0x10000}], 0x0, 0x0) 14:43:08 executing program 5: syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0xe2de, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000500)="75c481c612510840410f01c22cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300da45c0c0a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4260f5960210b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e6") 14:43:08 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da", 0xc7, 0x10000}], 0x0, 0x0) 14:43:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x3e8, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:08 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001440)={0x0, 0x0}, &(0x7f0000001480)=0xc) syz_mount_image$msdos(&(0x7f0000000140)='msdos\x00', &(0x7f0000000180)='./file0\x00', 0x3f, 0x5, &(0x7f00000013c0)=[{&(0x7f00000001c0)="b8a646457187210707b5d826e0505690fc404e50d1e8bd99e455d7b46cc63187afcdfd", 0x23, 0x8000}, {&(0x7f0000000200)="206264eb", 0x4, 0x3087}, {&(0x7f0000000240)="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", 0x1000, 0x49}, {&(0x7f0000001240)="055588d09c61148d4246c721c6496b77ecdcc6db641bc06632702d303d1681f52dad90a5bebda848fcd89c37286091410524b04243f53d4f91c3bbadc2294e0c64797053b3050749d17b19fb01d1f3587ae2e3157389d5f60e304d18219040f3523ba37b3bad4ea7fea1266402", 0x6d, 0xffffffff}, {&(0x7f00000012c0)="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", 0xfd, 0x1}], 0x10000, &(0x7f0000001540)=ANY=[@ANYBLOB="646f74732c646f74732c6e6f646f74732ca13b2af0c4166e6f646f7442ac410474737e98b43c562f846f646f74732c646f74732c663262bf4871fa5c8ceaa8677a814713", @ANYRESDEC=r2, @ANYBLOB=',dont_measure,\x00']) getpeername$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, &(0x7f0000000100)=0x10) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) r3 = dup(r0) ioctl$KDGKBTYPE(r3, 0x4b33, &(0x7f0000000000)) 14:43:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0", 0xbe, 0x10000}], 0x0, 0x0) 14:43:08 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae000e2c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:08 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000240)={'ah\x00'}, &(0x7f0000000280)=0x1e) ioctl$VT_DISALLOCATE(r0, 0x5608) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000001c0)) openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x20000, 0x0) 14:43:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x700, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:08 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da", 0xc7, 0x10000}], 0x0, 0x0) 14:43:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x900, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0", 0xbe, 0x10000}], 0x0, 0x0) 14:43:08 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x80080, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x2, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") ioctl$RFKILL_IOCTL_NOINPUT(r2, 0x5201) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000040)=r2) write$P9_RLERRORu(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="190000000701000c00376f6c916ac29259efd257480ecfb0990cb90000000000000000000000006355f1e45ad80a9757db4a300c354bd12ce5c9a6cf4a01b41abc13f39382d8d4427736388e8a9555a82e0a1c0bc01b45caf14c7ba52fc723089a3789a1df04f56ab353c2f70d575326035ac9890f2fc5cdc642ae9763307837bfd422979b24727fb6fdef05ad85586bb9d605151dcf6229f9fe12ec914a5044f9cdf70518b5d54e77179480288112f27600ad8b0dbed2ad7d7bb07fc5ca998f691fb7bb14b407df6976281fceb3cb306f85f3faa1b09f549824f7e862a177d35d1bde200726aab4954bbfa3b261ee1d2a765cae5e551be064c86a6d0a8079449d0e851961921844b63120a48ffbd91465eb00252f732c2252880458c669a4eaeb1bb2a3c3fb5939c655af9cc4abf3"], 0x19) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000280)={0x0, 0xfc, "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"}, &(0x7f0000000500)=0x104) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000540)={r3, 0xd, "e18f28e849052c46084efc4706"}, &(0x7f0000000580)=0x15) setsockopt$inet_dccp_buf(r2, 0x21, 0xe, &(0x7f00000001c0)=' XUN', 0x4) setsockopt$TIPC_MCAST_BROADCAST(r2, 0x10f, 0x85) sendfile(r2, r0, &(0x7f0000000240), 0x7fffffff) 14:43:08 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0xa) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) socket$rxrpc(0x21, 0x2, 0xa) 14:43:08 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081aec00e2c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0xa00, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:08 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3", 0xc9, 0x10000}], 0x0, 0x0) 14:43:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xc4, 0x10000}], 0x0, 0x0) 14:43:08 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x8, 0x620040) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:43:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0xe00, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:08 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae000f2c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:08 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3", 0xc9, 0x10000}], 0x0, 0x0) 14:43:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xc4, 0x10000}], 0x0, 0x0) 14:43:09 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0xfffffffffffffffe, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000002c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b570f1943068171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:43:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x6000, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:09 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3", 0xc9, 0x10000}], 0x0, 0x0) 14:43:09 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae003f2c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:09 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000180)='system_u:object_r:ping_exec_t:s0\x00', 0x21, 0x2) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xb6, 0x140) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f00000000c0)=""/86) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000040), 0x4) 14:43:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c7", 0xc4, 0x10000}], 0x0, 0x0) 14:43:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x80fe, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0xc0fe, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:09 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca}], 0x0, 0x0) 14:43:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da", 0xc7, 0x10000}], 0x0, 0x0) 14:43:09 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae01582c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0xe803, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:09 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x80000, 0x140) ioctl$VHOST_RESET_OWNER(r0, 0xaf02, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x283, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000200)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x50, r2, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e22}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_AF={0x8, 0x2, 0xa}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:43:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da", 0xc7, 0x10000}], 0x0, 0x0) 14:43:09 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca}], 0x0, 0x0) 14:43:09 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00602c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:10 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x4, 0x280) ioctl$TIOCGPTPEER(r1, 0x5441, 0x1ff) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) 14:43:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0xf401, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:10 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae0ec02c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:10 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da", 0xc7, 0x10000}], 0x0, 0x0) 14:43:10 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca}], 0x0, 0x0) 14:43:10 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3", 0xc9, 0x10000}], 0x0, 0x0) 14:43:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0xfc00, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:10 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00f02c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:10 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3", 0xc9, 0x10000}], 0x0, 0x0) 14:43:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0xfe80, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:10 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3", 0xc9, 0x10000}], 0x0, 0x0) 14:43:10 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae01ff2c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:11 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x3fffffff) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000180)='/dev/md0\x00', 0x800, 0x0) ioctl$BLKROGET(r1, 0x125e, &(0x7f00000001c0)) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x80000, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r2, 0x4008ae48, &(0x7f0000000100)=0x11f003) fadvise64(r2, 0x0, 0x7, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000140)={0x10201, 0x2, 0x4, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) 14:43:11 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000800)=0xe8) sendmmsg(r0, &(0x7f0000003a40)=[{{&(0x7f00000001c0)=@nfc={0x27, 0x0, 0x1, 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000240)="ed288cb4ed44abc3f8026b38c1296a588062daefa71e5bde1a494bcdb5d88d7fdb44b5314143ebf40b14b543296e8d493a120cf5df0840d2b7521b1e5ba18e22f5263f6d2134613fac29eabb0e3529d8f6b15b90f53cfc434af45fe659e1", 0x5e}, {&(0x7f00000002c0)="9a6999ebf6671cd31088c52f213a3c5c9e0a273d6e9008c5425e95179f3f7249e89e744d2aa61d40be62a3d59b8e971a4d1795a04681ddb88e061babf1fa06c7f2567922d3fc279a2ce928ab0765ab2e2df24e9546a6bbb6e32722bfe269cbb7aa4a3d6edac8a6a33375478ffd17f621fa2819a86f148fb098db3fbc3e64b9fd91f07f52334ee4a5fc72f142b691016d", 0x90}, {&(0x7f0000000380)="9cade95a2eca81e54a67adf21989326decaac35fe9c68575c2ec787bf3f8e1b63091c1cc2e7d4253fb8e455f0351750266a9cfaf7c3e458943c4748b85cc35b64a8898219b6b8fcfcb8004c360927f8359fadc854a0947c4cdc93e842fd6b668556b3a8e86b477e702142d885a20f0d502e83a93eb54afde3a1267753afd2fb83403d0c4a49604ce807b050b39300060f780", 0x92}, {&(0x7f0000000440)="0b447811f7172b7ab21aa5b3df255c55e4d3d5bafe95e742df1e9fd310ca33f584bcecfb07bb2d29e3d1349efcae0ab61fb656590d983b980fc93e3d28a03f4f18135ecc7de922b01286d4f8dd85a15bfca7592c1491f6b6f162aabd91f210d35e67b9038ef025b8a946a345ef5e0d30ff6f", 0x72}, {&(0x7f00000004c0)="f1b4f21d48fa6ebc08b5017d1ad5aec543a434af", 0x14}, {&(0x7f0000000500)="8b8090b01f7e6d29aabfd0ec024838ef324f9f7fb146396ddefff1508735ed16f3effa6280035a1c4b6b935bb327a8da2512c6e403fbbe39dcf2b979543d03d8bec9ca86d54ecfef59282cadbc8ba4ac012f3390f2ed39106d6daeea3510", 0x5e}], 0x6}, 0x1f}, {{&(0x7f0000000600)=@vsock={0x28, 0x0, 0x2710, @reserved}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000680)="f7dcd95ad92e3d0ec43f1d4525df693853288a8e2a9f1a9f190c52b9203cda15", 0x20}], 0x1}, 0x4}, {{&(0x7f0000000840)=@can={0x1d, r1}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="e6789449f5d9a33607adce306681adae2afd0bef330a4e87d4fe9efbc55fbda07df5baacab43ce8602f13f6eaa9fd97a13aafe94b7170f2269774216f8391a271aeae3c020e1e56bdd411478bf9928a0d9b71890fa4e7fedebb2263223c426660e6b40a1e1ca141bf0a704c100375bf10278d298fd834106872165d894f6d5724611ae4cd9957046c356c380409165e84526e7ce0c43abc22aae9b1eb2910b4b11bc68d51b258f72bc356dcd5db0d345e8c756cc70ff5f387640c30d449322c0652a2a52170fefa67af9944192476929a5af41d125d29cc97fd945bd9e32d152f869582349", 0xe5}], 0x1, &(0x7f0000000a00)=[{0xb8, 0x10f, 0x4, "f6386c32ac897472fc16633e6ad833a52836516349f84bb1c1fccbbd171f0d65617d9f8225d9032e871d05a372c526bf21143769e625f43ab323fa51aa32925a7b8ba1ef8b626e5a13bb73642f5bc6751b662bbe9ae944c165254ccc18f0718128821f582fab23a906e153c7d8ac866d56a13a400dd453e5c937c78e206b7f9323fc3658d22dbed9829914955e9f14f59168f751a7c9e44c777f72089465b8f05b02"}, {0x90, 0x109, 0x0, "82beab3a960b698b03bcbf8320b62e2cced10f7874bb7b38c11e6dc762ef850d4d0ef70db3c7c7471df8354d4f6930be70c4977cddb095bdaecb369881a00b5b269542276381a1fb4b790f9fa23da310437381a142519184d1056fadce77d74733977336380f63e65767bc2068d0c46b40758b3dea6dbb780b"}, {0xd0, 0x13f, 0x2, "6c66db468f319d65405e3b2189230662ce4fd2f480914a149d3e52173a8dfc764a2a66d19cb99b71945143b2f35117a770c87da7670bfdd6e9157178f8fc66b2d1773648d57486d6847845d5448f94a85184c4fc274bc0e9754dcfa87a265930b018f044b36ed9b2bef3251f0f60ca325b8e8e77ac23bb80a2d31b23452362bbacc9f81e12aa5f84f2ae9b64d982a9ab3647e851f0f5381de4b45c5d03d5395d6e66b18544a800fa858560c5ca5efebd6eb441c5b44536de8d"}], 0x218}, 0x80000001}, {{&(0x7f0000000c40)=@ethernet={0x306, @dev={[], 0x25}}, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000cc0)="5c55a14fbe925daa27ada961782be33c4535f807dd5cfd8edcd4e6b69f33612cde08ff6235f16814bfd288faf9f363db134b210e4096fc8c464b905892", 0x3d}], 0x1, &(0x7f0000003bc0)=ANY=[@ANYBLOB="180000000042978630554ce31f000000840000000000000092457c0ae2000000d8000000000000000c01000007000000c3016e73618ea53b74ed419acaa2a6fbeb9cc9686c933abf8718623767b5f49dd2ff943aee7ddabb9b9b45f899afafbb6a83ce5c757f16a759de1a6400eebf34dc94b3436b8c55740f344fcd241ee3baf8a48b9881da5b8f9c943da825f27453f0470bc18e1dbff7be31ccda94e9db71aed58f746d0f76715c74cb40e0ebb42f319413e0087b46e4e4bcf58bee7cb26c94424b35ed274a5919fd273990ef3b65308ac77a4ebea30b97c61493b7d65369fd7a5df07b6a2b27b0c8334dd9e3e8cb1728da1b00000000d8000000000000000001000008000000d5f9cc1b03ee9d91ea4ecd97df12a2fdd26d9ebe927a946f3639e16335a3189e8791c59ff8340835c268edfa02c7e6611e5489743f13f4e22a260fefb3f1fd6ebc02ec81e46a3f37cdcf1ac6b2d7ae5543adf97555e49a20453852b1d463d75d2572bde88c6cfb15350c0b5801dca433bb39d3c1cc511e2e6affa7f16e7c59b717294d3053dfdeaa3c280f0f81c9a011d61234d2a01454162942668d727e52199deb70b9a21883f8d7f3347d95b64520692e6b06572713396a36c23145e919108965db8861000000c80000000000000011010000000000800e8b1236c79ed9c365d46e15999ffa54b4345ec8ec3690726dd04e6a1cb9c32f1cb0d513a9b0a5d8cd5a2060ceace8aa36e6be05759740cced8e3b44eaa116858aa058cbd972a2df579e9403756c9e9e6d258cb1b881bfb5bb23c55fec83ee684cc58802d94672648b64b7ac8c60720d0fc8b5019f224f3a17222eec4bb17fda43a2b98bb445961d40cc3250b81aec6d28cba8f269b8c0ad6c66469247d1ef1da9b5ca4fb31e1e1f8fae6e90edd17526b7000000000000007000000000000000180100001f000000de7951053cdced4f9fc6406d4f779dfc501b9443b8d2fed19b0881e751e8c97ff0aae5070e3add8314be704edd0700d2928fd0c28d50f5d02498eed5b39c934f1190a14caaea08d0bd42703ca5b0b826c13eea0c64a00794c984b7c25f20b31ff5700248000000000000000301000007000000648f7f37f74dac0a8d5faba31e1eb44f3fb6952c0f8dd35e6617531855a0bb13d272f73975899237f6349a160e60ca2ab0b8000000000000"], 0x348}, 0x3ff}, {{0x0, 0x0, &(0x7f0000002200)=[{&(0x7f00000010c0)="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", 0x1000}, {&(0x7f00000020c0)="a7161e89e73aa5344773454e9c292dc4e1573ce690264dac9295a33c0f852dea149685ee87003692f39db3a358cb091fe8320f8ba232f7525b612fcd82a3e267cb1a640376d8baebd0081356b8c633cb3758f185b38c2fb83bebbdf7bb3dadf7c2a713fbb0", 0x65}, {&(0x7f0000002140)="0f9cab06fae8aaa724a0f489abd9728732a6aad180a356bd4b1b5689475ecacb2cc19f5409dace5b5cc1f3917371c6a4558862b1ce6890e711bb68799845876f89691afdc37a62f6e56cc31132c89deae828ae1f46b8bd1728aa1daeb98d7315573e8fb786eef3142131a6c3a4954d5afae4eb94", 0x74}, {&(0x7f00000021c0)="3421e693f5d3fae73a13687c8f299a7bba39ae36ec9cca18ac15a8d5b3777da98da0ca400ad50829fa", 0x29}], 0x4}, 0x101}, {{&(0x7f0000002240)=@nfc_llcp={0x27, 0x1, 0x1, 0x7, 0x8, 0x1, "89d69ea8e3f3130c78972d0c4d7e7f99ac33d16f4962cf4d7118787eccaded3b0fd5ff76e304f1794505dced809b41f9b61f8dbe0888d664f300c3caf25c92", 0x2e}, 0x80, &(0x7f0000003800)=[{&(0x7f00000022c0)="c8bf7b4be6e33e7e1c59cd45406bbd61142ff8b6a2ade4448a6d16e063b3e9c1763f00f11cfe57c03a0e7d2a94d2419ba2974d77ec358cbdd9c32aeae6e7977bc252d710", 0x44}, {&(0x7f0000002340)="835aa438d33b64898d1b5aca7b96167ec481b291605a085bca9de8f4096080792f30df810f8469de3d9dc96b443fe32429d0ea66dd9b086e6a4d882c244154513d58468496938526e58f1f1241c7f9baf5a1a5171c8f0822f86d0a1446b45b49c91419cfbe9fd1b8486114586a840dc028d5457045268252915b78f5c0095c6ebb83dacc10265ff1319b195c8d1f1c6579a5716688862949f7770c1395512d", 0x9f}, {&(0x7f0000002400)="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", 0x1000}, {&(0x7f0000003400)="8cbcb3b0426eb6fa204c51fd82916d17d36276399a0637e761ce1346a61afb2e30c6f651d0bfa80f44bffe17919824f9ada8e093149b8d8ca7f954adfa94f386e270e0c3f685add362bccde875f0607de4785fec024f30ef94655e4ca86ce79a6eefc9a9f645b425d6acd8", 0x6b}, {&(0x7f0000003480)="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", 0xff}, {&(0x7f0000003580)="46e6a60bf745eadc3967d525d2bd8f9b3a756fdcebcf2f32ad1016556d6268792fbe3d1ef1d204e3c465a1cd27f72f70c8fc4aa9cdecec54ddabd176b1b23a920d167ebd78bfff7ea142d7b58b45a77f144b4242e22d02c393c688cf7f01ebd680e4b20248008e09f3ff06397f95f9ede3d24e0c51aa01190cb0087d6bf668a14eff371c22e57cf0624cd3f34f1bf7dda709ed492d38b5e642bab8a80d55bfacfd7388bb445b44c264b890f5", 0xac}, {&(0x7f0000003640)="c6b09d9afd066c64a81e08838b828ae31d781e0451df12a78bf793a53100f7d343813b3ff18f463d32252d4ea67d1742476c20641880863b1b3d84f2f8748ce9627eabbd0d533a43f326aa177b00fd5803a4500902e8944d1cd5d3e2d9d3f7f0da723c3777caa0542e9b377e66bef7b63d431a088378795bd72c01bd11ea61e94aea108133a49fa6679f924d17be877413e828e94df9fedb81ba3cf87ae2994ca882d7bf74032ce5d62a79f924b4745a957f0ab300531f9adf", 0xb9}, {&(0x7f0000003700)="57449c7efbcfff01d2de5ce93bd792f2587d56b73c25cdd158627194e81cf08c2830a6b655e731ed9c969636748952c07d18d07f909adaa1a10de493ebcaa86754e1dd1851b1cb9dacbc4fd05a84678c36034395a689e8a0e384a686d7c0cf5c6963a86dfbe6ef7cec7242a26b378b487f442d0d1252dac902ad90303096bafbbf37d262ba0373da302be9f9ef4afcdaa9b4b1b2a6b144fc2373619f661ed7d64d324be7809c2f1d70711316f0d228e88d967a9dad01d226592789af62b94ccc7fd9c7a9a6cafc5552c6d9f4", 0xcc}], 0x8, &(0x7f0000003880)=[{0x98, 0x113, 0x7, "9901de58eec94ee3500a46b3b3049b1cedf5f53c8d45938e28e2b6b9ee091e3d009ecce1440f950beee69ecf835247f0e7cf3abaac15adb90c1ef3a5e33faea07960194facc67f3970779f444fc67194ee673ddb6a39c46b65ee655b9614d7b760074bc2bf4f94dcdd1c84ce10a826b15277e656cdb4993564cee6ad4b59c3598b"}, {0x108, 0x118, 0xfffffffffffffffa, "8e85c09288c94cc75fcb4abcfb1d0c9ed1ef3304b70a7e979b3b0ab51b4023f63b627672eb4e620815f67e5f2e8b2f1f8b70ac5ea7dbf1b9c56d7763444c41038fd709bd6fa26258d715695f9ea180fc82199e0e83785ae8856abd1ee841c4b5a065bbd59007f34a961b0e15c72f15d5d802f4328fe37484e97922a28e15c14740c06b9eaa991402dcb0f26d9fed52f3da00d0da6efec6c9ec2d68b8d0c69fad560e1ca556bc665dc3978253af13725f172a5a7f48aef9b99ba4f7ffbd3b40c2924c4adf40ee901ea1c4c0aea822bd719d20d080ae8d6849d62813bb9b2adaf292416c3f51b185bcbf1d55cf9e8fdd70a468"}], 0x1a0}, 0x5}], 0x6, 0x80) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:43:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0xfec0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:11 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3", 0xc9, 0x10000}], 0x0, 0x0) 14:43:11 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae000800000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:11 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3", 0xc9, 0x10000}], 0x0, 0x0) 14:43:11 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x4000080, 0x0) clone(0x2102081ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000000)={0x7, 0x0, 0x2, 0x7f}) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000040)={0x8, r1, 0x1, 0x74c}) 14:43:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0xff00, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:11 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca}], 0x0, 0x0) 14:43:11 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3", 0xc9, 0x10000}], 0x0, 0x0) 14:43:11 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00022c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:11 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca}], 0x0, 0x0) 14:43:12 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0xffffffffffffffff) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x3, &(0x7f0000000000), 0xffffff83) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x10000, 0x0) accept4$tipc(r1, &(0x7f00000000c0)=@id, &(0x7f0000000100)=0x10, 0x80800) 14:43:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x1000000, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:12 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000001c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:43:12 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3", 0xc9, 0x10000}], 0x0, 0x0) 14:43:12 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00042c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:12 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca}], 0x0, 0x0) 14:43:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x4000000, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:12 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae000a2c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:12 executing program 3: syz_mount_image$btrfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3", 0xc9, 0x10000}], 0x0, 0x0) 14:43:12 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ubi_ctrl\x00', 0xffffffffffffffff, 0x0) ioctl$TIOCSSERIAL(r0, 0x541f, &(0x7f0000000240)={0x80000001, 0x1, 0x9, 0x20, 0x7f, 0xbd, 0x0, 0xbae, 0x9, 0x42f, 0x3ac21cd1, 0x7ff, 0x7f, 0x8, &(0x7f00000001c0)=""/87, 0x101, 0x6, 0x5}) clone(0x1ffffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:43:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x7000000, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:12 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3", 0xc9, 0x10000}], 0x0, 0x0) 14:43:12 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)=0x3ff) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) 14:43:12 executing program 3: syz_mount_image$btrfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3", 0xc9, 0x10000}], 0x0, 0x0) 14:43:12 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae000e2c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x9000000, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:12 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3", 0xc9, 0x10000}], 0x0, 0x0) 14:43:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0xa000000, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:13 executing program 3: syz_mount_image$btrfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3", 0xc9, 0x10000}], 0x0, 0x0) 14:43:13 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3", 0xc9, 0x10000}], 0x0, 0x0) 14:43:13 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae000f2c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0xe000000, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:13 executing program 5: syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x80000000000, 0x1) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000240)=0x0) sched_getparam(r1, &(0x7f0000000280)) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000000), &(0x7f0000000080)=0x4) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") ioctl$sock_netdev_private(r0, 0x89f2, &(0x7f00000001c0)="f2db01dde56cd25b3382057b64d93f3c2c3fc42f70def5029b61156576f9827ea5aaf7658d44a999fed7b29251") 14:43:13 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3", 0xc9, 0x10000}], 0x0, 0x0) 14:43:13 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x80000000000007, &(0x7f0000000040), 0xffffffffffffff05) r1 = syz_open_dev$sndpcmc(&(0x7f00000015c0)='/dev/snd/pcmC#D#c\x00', 0x1, 0x181000) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000001600), &(0x7f0000001640)=0xb) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000014c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f0000001580)={&(0x7f0000001480)={0x10, 0x0, 0x0, 0x4001}, 0xc, &(0x7f0000001540)={&(0x7f0000001500)={0x1c, r3, 0x400, 0x70bd28, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40001}, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f00000017c0)="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") recvmmsg(r0, &(0x7f00000013c0)=[{{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000000c0)=""/20, 0x14}, 0x1f}, {{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000001340)=[{&(0x7f0000000180)=""/45, 0x2d}, {&(0x7f00000001c0)=""/116, 0x74}, {&(0x7f0000000240)=""/142, 0x8e}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001300)=""/44, 0x2c}], 0x5}, 0x8}], 0x2, 0x20, &(0x7f0000001440)) sendmsg$TIPC_CMD_SET_LINK_TOL(r1, &(0x7f0000001780)={&(0x7f0000001680), 0xc, &(0x7f0000001740)={&(0x7f00000016c0)={0x68, r3, 0x204, 0x70bd2d, 0x25dfdbfc, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x5, @media='eth\x00'}}}, ["", "", "", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) write$uinput_user_dev(r2, &(0x7f00000018c0)={'syz1\x00', {0x3, 0x100000000, 0x7, 0xfcc}, 0x4f, [0x3, 0xffffffffffff0001, 0x5, 0x7, 0x1, 0xcd8, 0x9, 0x3, 0x7fff, 0xffffffffffffffff, 0x6, 0x401, 0x40, 0xfe7, 0x100000001, 0x6a74, 0x9, 0xffffffffffffffe1, 0x3, 0x0, 0x1a, 0x0, 0x536, 0x4, 0x4, 0x101, 0x20, 0x9, 0x4, 0x9, 0x20, 0x4, 0xbd8e, 0x100, 0x9, 0x44, 0x1, 0xe31, 0x305bbdc8, 0x200000000000000, 0x3f, 0x4, 0x1, 0x1, 0x1, 0x2, 0xffffffffa4eada17, 0x800, 0x3f, 0x0, 0x80000001, 0x1, 0x5, 0x0, 0x1000, 0x80000000, 0x8, 0x100, 0xffffffffffffffe1, 0x700000, 0x1f, 0x20, 0x0, 0xff], [0x2, 0x9, 0x2, 0x8000, 0x8, 0x7, 0x7fffffff, 0xfffffffffffffffd, 0x1, 0x5, 0x8, 0x7, 0x9, 0x2, 0x9, 0x1f, 0x200, 0x5, 0x7fff, 0x0, 0x0, 0x4, 0x2, 0x6, 0x1000, 0x3, 0x7f, 0x80, 0xfffffffffffffff8, 0x5, 0x119, 0x3, 0xb, 0x7, 0x2, 0x32c000000000000, 0x8, 0x4, 0x10001, 0x8, 0x3, 0x4, 0x8, 0x8, 0xfffffffffffffff8, 0x51167c59, 0x73, 0x5, 0xfffffffffffffff9, 0x10000, 0x32c137d9, 0x4, 0x2, 0x8001, 0x3f, 0x1, 0x3ff, 0xffff, 0x7, 0x7, 0x0, 0x3, 0x5, 0x8], [0xfffffffffffffffe, 0x9, 0x7, 0x6, 0x1, 0x2b, 0x8835, 0x80000001, 0x3, 0xfffffffffffffff8, 0x4, 0xfffffffffffffff9, 0x9, 0x80, 0x6, 0x81, 0xffffffff80000000, 0xfffffffffffff801, 0x8e1, 0x3, 0x81, 0x7fffffff, 0x81, 0x10000, 0x4, 0x2, 0x4, 0x1, 0x7, 0x925, 0xff, 0x8, 0xffffffff, 0x8e20, 0x1ba7, 0x9, 0x101, 0x0, 0x101, 0x1, 0x1, 0x79b, 0x800, 0x9842, 0xc02c, 0x2, 0x1, 0x4, 0x2, 0x0, 0x4, 0xfff, 0x7, 0x3, 0x6, 0xffff, 0x4, 0x0, 0x9, 0x800, 0x9a, 0x8, 0xaa, 0x1], [0x9, 0xa06, 0x1, 0x8, 0x995d, 0x4, 0x9, 0xbe4, 0x3, 0x1, 0x1, 0x1, 0x3e7, 0x7, 0xffff, 0x4, 0x2, 0x730, 0xfff, 0x3ff, 0x6, 0xc0000000000, 0x1, 0x3, 0x4, 0x101, 0x0, 0x8001, 0x40000000, 0x3, 0x5, 0x1, 0xffffffff, 0x8, 0x70, 0x80, 0x6, 0x9, 0x9, 0x6, 0x3, 0x9, 0x401, 0x5, 0x67d3, 0xfa61, 0x1, 0x8, 0x9, 0x3ff, 0x5, 0xfffffffffffffff8, 0x64, 0x1, 0x1, 0x10001, 0x3, 0xffffffffc8eb5180, 0x8, 0x1, 0x7ff, 0x6, 0x200, 0xff]}, 0x45c) 14:43:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x60000000, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:13 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x80000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:43:13 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00602c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:13 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3", 0xc9, 0x10000}], 0x0, 0x0) 14:43:13 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3", 0xc9, 0x10000}], 0x0, 0x0) 14:43:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x8dffffff, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:14 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3", 0xc9, 0x10000}], 0x0, 0x0) 14:43:14 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae0001ff000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:14 executing program 2: syz_mount_image$btrfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3", 0xc9, 0x10000}], 0x0, 0x0) 14:43:14 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x3fffffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:43:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0xe8030000, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:14 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x4) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1000, 0x20000) openat$cgroup_type(r1, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) 14:43:14 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:43:14 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c020500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:14 executing program 2: syz_mount_image$btrfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3", 0xc9, 0x10000}], 0x0, 0x0) 14:43:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0xf4010000, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:14 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:43:14 executing program 2: syz_mount_image$btrfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3", 0xc9, 0x10000}], 0x0, 0x0) 14:43:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0xf5ffffff, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:14 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c040500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:15 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:43:15 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_dev$media(&(0x7f0000000280)='/dev/media#\x00', 0x5, 0x40000) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f00000002c0)={0x1000, 0x7, 0x5, 0x7, 0x1}) r2 = dup(r0) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") ioctl$VIDIOC_S_EXT_CTRLS(r3, 0xc0205648, &(0x7f0000000240)={0x0, 0x5, 0x3, [], &(0x7f0000000200)={0x0, 0x400, [], @p_u8=&(0x7f00000001c0)=0x101}}) ioctl$TIOCSERGETLSR(r3, 0x5459, &(0x7f0000000000)) 14:43:15 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3", 0xc9, 0x10000}], 0x0, 0x0) 14:43:15 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) getsockopt$sock_buf(r0, 0x1, 0x1a, &(0x7f0000000000)=""/75, &(0x7f00000000c0)=0x4b) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) 14:43:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0xfc000000, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:15 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c0a0500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:15 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) 14:43:15 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3", 0xc9, 0x10000}], 0x0, 0x0) 14:43:15 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) lsetxattr$security_smack_transmute(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x1) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:43:15 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3", 0xc9, 0x10000}], 0x0, 0x0) 14:43:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0xfe800000, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:15 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) 14:43:15 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c0e0500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0xfec00000, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:15 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:43:16 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0, 0x4}], 0x1, 0x0, 0x0, 0x537) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) 14:43:16 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) 14:43:16 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c0f0500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:16 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:43:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0xff000000, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:16 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x80002, 0x0) write$P9_RLINK(r0, &(0x7f0000000000)={0x7, 0x47, 0x1}, 0x7) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:43:16 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000000), 0x2000000000000035, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) 14:43:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0xffffff7f, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:16 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:43:16 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 14:43:16 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c600500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0xffffff8d, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:16 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c01ff00018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:17 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 14:43:17 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) 14:43:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0xfffffff5, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:17 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000504008701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:17 executing program 5: r0 = accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) fcntl$getflags(r0, 0x40b) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="75c481c6125108402ae92cb81c750f05bf04002e00c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b363626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffa2dcdcdcc3217e218efbf2a5474eb83aa2f1fbc422c99f9f0f4bc2e2") syz_open_dev$sndmidi(&(0x7f00000000c0)='/dev/snd/midiC#D#\x00', 0x0, 0x80) 14:43:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0x8) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) r1 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r1}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4) 14:43:17 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) 14:43:17 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 14:43:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x100000000000000, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:17 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000502018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:17 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x10002, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000000)=0x7, 0x4) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:43:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x400000000000000, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:17 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) 14:43:17 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 14:43:17 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000504018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:17 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 14:43:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x700000000000000, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:18 executing program 1: syz_open_dev$audion(&(0x7f0000000300)='/dev/audio#\x00', 0x9, 0x80) r0 = socket$rxrpc(0x21, 0x2, 0x2) syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x7fffffff, 0x401) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x200, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)=ANY=[@ANYBLOB="401b0000", @ANYRES16=r2, @ANYBLOB="110425bd7000fedbdf2510000000400005003c000200080001000c00000008000200090000000800040097050000080004000900000008000200da00000008000400b6fb000008000200200000000c000700080002000600000024000600080001003f000000040002000400020008000100100200000800010008000000300002000400040008000200ff0300000800010000000000040004000400040008000200810000000800020002000000"], 0xb4}, 0x1, 0x0, 0x0, 0x1}, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4) 14:43:18 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 14:43:18 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c00050a018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:18 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 14:43:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x900000000000000, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:18 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SG_GET_LOW_DMA(r0, 0x227a, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r0) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") ioctl$SG_SET_DEBUG(r0, 0x227e, &(0x7f00000001c0)=0x1) 14:43:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0xa00000000000000, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:18 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c00050e018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:18 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 14:43:18 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 14:43:18 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) 14:43:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0xe00000000000000, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:19 executing program 1: r0 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) r1 = signalfd(0xffffffffffffff9c, &(0x7f00000000c0)={0x2}, 0x8) ioctl$FICLONE(r0, 0x40049409, r1) r2 = socket$rxrpc(0x21, 0x2, 0x82) ppoll(&(0x7f0000000080)=[{r2}], 0x1, 0x0, 0x0, 0xed) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@multicast2, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}}}, &(0x7f00000002c0)=0xe8) setreuid(r3, r4) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0xc0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r5, 0x40bc5311, &(0x7f0000000340)={0x7, 0x0, 'client1\x00', 0x0, "4da0f39fa52f3877", "acf7b025e3170aafd1f4d6c4b08ff72d4e4c2b8b24d76684829d9bc140759e5a", 0x40, 0xfffffffeffffffff}) fsetxattr$trusted_overlay_upper(r5, &(0x7f0000000440)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x4f, 0x7, 0x1, "e7f21d7d7e8c971962539c622b4555ed", "c865db8259c7e973fa5bb0fd0f6cd6c58482bad8e2395d2ffe2ddc891f5cbea0dae724a0cf11b9eae657bfcb496ceae93eaf2e435ac54d6a47d6"}, 0x4f, 0x1) syz_open_dev$mouse(&(0x7f0000000400)='/dev/input/mouse#\x00', 0x1, 0x40) lsetxattr$security_evm(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x5, 0x2, 0xe, 0x2, 0x54, "2340a8ab870b71703c4f130c0f3f3a4c7c9be390be6ec8805606574d789d09813abfca7a3d7cb42faaab286b63db65c64d619294bb39b94e8ea37e48912c1cc163b51fb8d9e9437d800ec6940c29fda63a8300c3"}, 0x5e, 0x0) setsockopt$sock_int(r2, 0x1, 0x7, &(0x7f0000000040), 0x4) 14:43:19 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c00050f018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:19 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918", 0x65, 0x10000}], 0x0, 0x0) 14:43:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x6000000000000000, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:19 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 14:43:19 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000000), &(0x7f00000001c0)=0x30) clone(0x2102009fd6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) faccessat(r0, &(0x7f0000000200)='./file0\x00', 0x91, 0x0) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:43:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x8dffffff00000000, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:19 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8d", 0x1, 0x10000}], 0x0, 0x0) 14:43:19 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000560018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:19 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f0000000300)={0x1, 0x0, {0x0, 0x8000, 0x301f, 0x4, 0x0, 0x5, 0x2}}) r1 = accept4$inet6(0xffffffffffffff9c, &(0x7f00000001c0)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000200)=0x1c, 0x800) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000240)=[@sack_perm, @timestamp], 0x2) r2 = socket$rxrpc(0x21, 0x2, 0x2) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x402e40, 0x0) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f0000000140)=0x90, &(0x7f0000000180)=0x2) ppoll(&(0x7f0000000080)=[{r2}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000002c0)=0x2, 0x39) timerfd_create(0x368c1f862a27c738, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0, 0x0}, &(0x7f0000000400)=0xc) getresgid(&(0x7f0000000440), &(0x7f0000000480)=0x0, &(0x7f00000004c0)) r7 = getegid() r8 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setgroups(0x6, &(0x7f00000005c0)=[r4, r5, r6, r7, r8, r9]) r10 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x1, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r10, 0x8918, &(0x7f0000000280)={'caif0\x00', {0x2, 0x4e20, @multicast2}}) bind$llc(r10, &(0x7f00000000c0)={0x1a, 0x30f, 0x1, 0x2ef1, 0x0, 0x1, @broadcast}, 0x10) 14:43:19 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 14:43:19 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8d", 0x1, 0x10000}], 0x0, 0x0) 14:43:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0xe803000000000000, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:19 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 14:43:19 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x2) r1 = socket$tipc(0x1e, 0x2, 0x0) r2 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) r3 = epoll_create(0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xb, &(0x7f0000000140)='\xeb(,$$&GPL@\x00'}, 0x30) r5 = accept$nfc_llcp(0xffffffffffffff9c, &(0x7f00000001c0), &(0x7f0000000240)=0x60) ppoll(&(0x7f0000000280)=[{r0, 0x1140}, {r1, 0x80}, {r2, 0x10ca}, {0xffffffffffffffff, 0x20}, {r3, 0x8094}, {r4, 0x20}, {r5, 0x540}], 0x7, &(0x7f00000002c0), &(0x7f0000000300)={0x2321}, 0x8) r6 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r6}], 0x1, 0x0, 0x0, 0x1b5) r7 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/btrfs-control\x00', 0x240040, 0x0) ioctl$TIOCGPKT(r7, 0x80045438, &(0x7f0000000380)) setsockopt$sock_int(r6, 0x1, 0x2f, &(0x7f0000000040), 0x4) ioctl$SG_GET_ACCESS_COUNT(r6, 0x2289, &(0x7f0000000100)) 14:43:19 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c0005002c8701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:19 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8d", 0x1, 0x10000}], 0x0, 0x0) 14:43:20 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x400000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000200)={0x2, [0x0, 0x0]}, &(0x7f0000000240)=0xc) r3 = dup(r0) ioctl$KDMKTONE(r3, 0x4b30, 0x5) ioctl$TIOCSIG(r0, 0x40045436, 0xf) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000280)={r2, 0x8, 0x1, [0x0]}, &(0x7f00000002c0)=0xa) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:43:20 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) 14:43:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0xf401000000000000, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:20 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918", 0x65, 0x10000}], 0x0, 0x0) 14:43:20 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 14:43:20 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000501ff8701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:20 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x13fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:43:20 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 14:43:20 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8d", 0x1, 0x10000}], 0x0, 0x0) 14:43:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0xf5ffffff00000000, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:20 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500028701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:20 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 14:43:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0xfc00000000000000, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:21 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x200000000000035b, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x3f, &(0x7f00000000c0)=0x800005, 0xa7) 14:43:21 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8d", 0x1, 0x10000}], 0x0, 0x0) 14:43:21 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500088701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:21 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf231", 0x4c, 0x10000}], 0x0, 0x0) 14:43:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0xfe80000000000000, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:21 executing program 5: syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x4, 0x40000200002) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:43:21 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x6a6, 0x200) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f00000000c0)={0x2114, 0x4, 0x5ab, 0xd3, 0xfffffffffffff800, 0xffffffffffffd053}) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) 14:43:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0xfec0000000000000, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:21 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8d", 0x1, 0x10000}], 0x0, 0x0) 14:43:21 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 14:43:21 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c0005002c8701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0xff00000000000000, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:21 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 14:43:21 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c00050001ff01546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:21 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 14:43:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0xffffff7f00000000, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:21 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 14:43:22 executing program 5: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x1, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$RTC_WIE_ON(r0, 0x700f) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:43:22 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018702546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:22 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 14:43:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0xffffffff00000000, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:22 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 14:43:22 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000100)='vlan0\x00') r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$KVM_ASSIGN_PCI_DEVICE(r1, 0x8040ae69, &(0x7f00000000c0)={0x8, 0x40, 0x7, 0x6, 0x9}) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) 14:43:22 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000100000000000000", 0x40, 0x10000}], 0x0, 0x0) 14:43:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:22 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:22 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf231", 0x4c, 0x10000}], 0x0, 0x0) 14:43:22 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000100000000000000", 0x40, 0x10000}], 0x0, 0x0) 14:43:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:23 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x80, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000200)={{0x9, 0x100000000}, 'port1\x00', 0x2, 0x4, 0x5, 0xffff, 0x6, 0x5, 0x5, 0x0, 0x4, 0x4}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x12001) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f0000000000), 0x4) 14:43:23 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 14:43:23 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000100000000000000", 0x40, 0x10000}], 0x0, 0x0) 14:43:23 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c00050001872c546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:23 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x80, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r1, 0xc040564a, &(0x7f00000000c0)={0x7fff, 0x0, 0x700f, 0x7, 0x5, 0xffffffffffffffff, 0x6, 0x1}) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) ioctl$SIOCAX25DELFWD(r1, 0x89eb, &(0x7f0000000100)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}) 14:43:23 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 14:43:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:23 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701ff6fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:23 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 14:43:23 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000007c0)="459981c6125108402ae90f5b51001c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7c4617c2b3300ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91b5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:43:23 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 14:43:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:23 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 14:43:23 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af7158397d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:23 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 14:43:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:23 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) tkill(r1, 0x13) 14:43:23 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='io.stat\x00', 0x0, 0x0) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f00000001c0)={0x4, 0x7fff, [{0x3, 0x0, 0x1}, {0x1da4c2f5, 0x0, 0x1}, {0x6, 0x0, 0xc3e}, {0x9, 0x0, 0x6}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:43:23 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000100000000000000", 0x40, 0x10000}], 0x0, 0x0) 14:43:23 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0xf}], 0x1}, 0x0) 14:43:23 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d04", 0x49, 0x10000}], 0x0, 0x0) 14:43:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:24 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x40000a) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) 14:43:24 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 14:43:24 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x3c}], 0x1}, 0x0) 14:43:24 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000100000000000000", 0x40, 0x10000}], 0x0, 0x0) 14:43:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:24 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 14:43:24 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x10080000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e9cf660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40f01a415e6230000c44964660f3838520a8dc48da3bd4877f8aac483397fd300d806c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa0f87d4e3cf26f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:43:24 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0xc0}], 0x1}, 0x0) 14:43:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:24 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000100000000000000", 0x40, 0x10000}], 0x0, 0x0) 14:43:24 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 14:43:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:25 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) ioctl$int_out(r0, 0x2, &(0x7f0000000000)) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x8000, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r1, 0xc0905664, &(0x7f0000000300)={0x0, 0x0, [], @raw_data=[0x0, 0x8, 0x1f, 0x2, 0x5, 0x0, 0x1, 0x735a6ea2, 0x101, 0x28, 0x7, 0x2, 0x1, 0xfffffffffffffff7, 0x8, 0x10000, 0xfff, 0x9, 0x3, 0x9981, 0xffff, 0x1, 0x1ff, 0x20, 0x19, 0x1, 0x1, 0x40, 0x9, 0xfffffffffffffffe, 0x5, 0x2]}) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e24, @remote}, 0x10) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e24, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7}}, 0xffffffff, 0x1, 0x3, 0x6, 0x3}, &(0x7f00000001c0)=0x98) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000200)={r4, 0x100000000, 0x30}, 0xc) bind$pptp(r2, &(0x7f0000000240)={0x18, 0x2, {0x0, @rand_addr=0x80000000}}, 0x1e) io_setup(0x1ff, &(0x7f00000003c0)=0x0) io_submit(r5, 0x2, &(0x7f0000001540)=[&(0x7f0000001400)={0x0, 0x0, 0x0, 0x7, 0x3, r0, &(0x7f0000000400)="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", 0x1000, 0x254d, 0x0, 0x3}, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x100, r0, &(0x7f0000001440)="afcb1c0336987af56822889335785d317984b18a6457ab64fa5700c470f0b88bf7e26e18131ecde66dedcde1d73a1f008b993f4fd201d8eff78a7bf9b5de796d35e9121e02103b9c39a39d4a45c6db146b02a37d70dea4a07f34a4193fef9db06dd77bc43f1703027059a5accf777751f4e6dacfd1959629cd00de2d25f04d690dd3fd830709cabbee63bbf8d35cd13ca804f4e98fdb5527321acf852b772b23c7cffa7a048381c8", 0xa8, 0x3, 0x0, 0x2, r3}]) 14:43:25 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:25 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 14:43:25 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0xec0}], 0x1}, 0x0) 14:43:25 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 14:43:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:25 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:43:25 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0xa) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x40102, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) 14:43:25 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 14:43:25 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x33fe0}], 0x1}, 0x0) 14:43:25 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 14:43:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:25 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 14:43:25 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x20000139}], 0x1}, 0x0) 14:43:25 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 14:43:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:25 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d04", 0x49, 0x10000}], 0x0, 0x0) 14:43:25 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, 0x0) 14:43:26 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x1) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:43:26 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x7ffff000}], 0x1}, 0x0) 14:43:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:26 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, 0x0) 14:43:26 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 14:43:26 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x1f, &(0x7f0000000040), 0x4) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x0, 0x20000) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000140)={0xa20000, 0x7, 0x6, [], &(0x7f0000000100)={0x9b0902, 0x6, [], @string=&(0x7f00000000c0)=0x3}}) 14:43:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:26 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c7465725c000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000010000000000000000a0f30000000000000000"], 0x58) syz_execute_func(&(0x7f0000000e40)="75c42ae92cb81c750f05bf04000000c4a37bf0c55c41e2e9f241d9fc660fde978fe97c80e30b110f33b8c4014e4e4e5b5b66470f7c6d07c421045f4607c40bf89bc44964660f3838520a8dc4f345e136aaf347abd8c0c4a1662a984d344d346766f2aeabab0fec3f67ddea8b4e1e63c4628cb1ccf72ef7d9f9f4f9c4d1e95de67da4c2b0c10b7b57578161a30b8a822292474f47816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000faf3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99fc4417b2cdb0f4bc2e2") openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101000, 0x0) 14:43:26 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 14:43:26 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, 0x0) 14:43:26 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0xfffffdef}], 0x1}, 0x0) 14:43:26 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 14:43:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:26 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000000)=0x20, 0x4) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:43:26 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x2}, 0x0) 14:43:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:26 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:27 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) fsetxattr$security_smack_transmute(r0, &(0x7f0000000000)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x1) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) 14:43:27 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d04", 0x49, 0x10000}], 0x0, 0x0) 14:43:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 14:43:27 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x8}, 0x0) 14:43:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:27 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d04", 0x49, 0x10000}], 0x0, 0x0) 14:43:27 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x2c}, 0x0) 14:43:27 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r0, &(0x7f00000000c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="75c481c6125108402ae92cb81c750f05bf04000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dec421045f4607c40bf8c44964660f3838520a8dc48da3bd4877f8aac483397fd300d8c0c4a1662a984d344d3435cfcfafaf6766f2ab440fec3f67ddeae74ec4628cb1ccf72ef7d9f9f47dd9f9f47da4c2b0c10b7b57578171a30b8a826e4fc4816016f7499900ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa3ebf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb7c46474eb83aa2f1fbc422c99f9f0f4bc2e2") 14:43:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 14:43:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:27 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:28 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) r1 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0xffff, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x200, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x1) syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f0000000040)={0x1, 0x80df, 0x0, 0xdf, &(0x7f0000000300)=""/223, 0x7b, &(0x7f0000000400)=""/123, 0x6f, &(0x7f0000000480)=""/111}) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f00000002c0)=0x7, 0xffffffffffffff5e) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x5, 0x8002) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x2710, 0x3, 0x10f000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) 14:43:28 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0xff01}, 0x0) 14:43:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 14:43:28 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:28 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0xffffff1f}, 0x0) 14:43:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:28 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:28 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8d", 0x1, 0x10000}], 0x0, 0x0) 14:43:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, 0x0) 14:43:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:28 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x2}, 0x0) 14:43:28 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f00000000c0)=[{r0, 0x400}, {r0}, {r0, 0x2000}], 0x200000000000032b, 0x0, 0x0, 0xffffffffffffff97) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) 14:43:28 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, 0x0) 14:43:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:28 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x4}, 0x0) 14:43:28 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x2) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)=0x3ff) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) 14:43:28 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x10000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r1, 0x111, 0x1, 0x5, 0x4) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) 14:43:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:28 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0xa}, 0x0) 14:43:29 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:29 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, 0x0) 14:43:29 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da", 0xc7, 0x10000}], 0x0, 0x0) 14:43:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:29 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:29 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0", 0xbe, 0x10000}], 0x0, 0x0) 14:43:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:29 executing program 2 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 361.397590][T26453] FAULT_INJECTION: forcing a failure. [ 361.397590][T26453] name failslab, interval 1, probability 0, space 0, times 0 [ 361.425448][T26453] CPU: 1 PID: 26453 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 361.433473][T26453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 361.443620][T26453] Call Trace: [ 361.446938][T26453] dump_stack+0x172/0x1f0 [ 361.451286][T26453] should_fail.cold+0xa/0x15 [ 361.455888][T26453] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 361.461704][T26453] ? ___might_sleep+0x163/0x280 [ 361.466566][T26453] __should_failslab+0x121/0x190 [ 361.471514][T26453] should_failslab+0x9/0x14 [ 361.476025][T26453] __kmalloc+0x2dc/0x740 [ 361.480279][T26453] ? fput_many+0x12c/0x1a0 [ 361.484698][T26453] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 361.490962][T26453] ? strnlen_user+0x1f0/0x280 [ 361.495631][T26453] ? __x64_sys_memfd_create+0x13c/0x470 [ 361.501174][T26453] __x64_sys_memfd_create+0x13c/0x470 [ 361.506549][T26453] ? memfd_fcntl+0x1550/0x1550 [ 361.511304][T26453] ? do_syscall_64+0x26/0x610 [ 361.515975][T26453] ? lockdep_hardirqs_on+0x418/0x5d0 [ 361.521249][T26453] ? trace_hardirqs_on+0x67/0x230 [ 361.526269][T26453] do_syscall_64+0x103/0x610 [ 361.530854][T26453] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 361.536734][T26453] RIP: 0033:0x458da9 [ 361.540619][T26453] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 361.560213][T26453] RSP: 002b:00007f082125da88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 361.568615][T26453] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000458da9 [ 361.576577][T26453] RDX: 0000000020000428 RSI: 0000000000000000 RDI: 00000000004bdd07 [ 361.584565][T26453] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 14:43:29 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0xe}, 0x0) [ 361.592530][T26453] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f082125e6d4 [ 361.600488][T26453] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:29 executing program 1: r0 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x1, 0x2) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000180)) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000100)={{0xffffffffffff1e1a, 0x57, 0x7ff, 0xa8}, 'syz1\x00', 0x2b}) r1 = socket$rxrpc(0x21, 0x2, 0xa) ppoll(&(0x7f0000000080)=[{r1}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x2) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x92, 0x2) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r2, 0x2) 14:43:29 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:29 executing program 2 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:29 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d042bf2319b20e1e701e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0", 0xbe, 0x10000}], 0x0, 0x0) 14:43:29 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0xf}, 0x0) [ 361.996676][T26483] FAULT_INJECTION: forcing a failure. [ 361.996676][T26483] name failslab, interval 1, probability 0, space 0, times 0 [ 362.020041][T26483] CPU: 1 PID: 26483 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 362.028051][T26483] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 362.038104][T26483] Call Trace: [ 362.041412][T26483] dump_stack+0x172/0x1f0 [ 362.045742][T26483] should_fail.cold+0xa/0x15 [ 362.050314][T26483] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 362.056104][T26483] ? ___might_sleep+0x163/0x280 [ 362.060936][T26483] __should_failslab+0x121/0x190 [ 362.065854][T26483] ? shmem_destroy_callback+0xc0/0xc0 [ 362.071217][T26483] should_failslab+0x9/0x14 [ 362.075701][T26483] kmem_cache_alloc+0x2b2/0x6f0 [ 362.080531][T26483] ? __alloc_fd+0x44d/0x560 [ 362.085013][T26483] ? shmem_destroy_callback+0xc0/0xc0 [ 362.090359][T26483] shmem_alloc_inode+0x1c/0x50 [ 362.095106][T26483] alloc_inode+0x66/0x190 [ 362.099410][T26483] new_inode_pseudo+0x19/0xf0 [ 362.104066][T26483] new_inode+0x1f/0x40 [ 362.108114][T26483] shmem_get_inode+0x84/0x7e0 [ 362.112769][T26483] __shmem_file_setup.part.0+0x7e/0x2b0 [ 362.118293][T26483] shmem_file_setup+0x66/0x90 [ 362.122951][T26483] __x64_sys_memfd_create+0x2a2/0x470 [ 362.128299][T26483] ? memfd_fcntl+0x1550/0x1550 [ 362.133040][T26483] ? do_syscall_64+0x26/0x610 [ 362.137702][T26483] ? lockdep_hardirqs_on+0x418/0x5d0 [ 362.142971][T26483] ? trace_hardirqs_on+0x67/0x230 [ 362.147973][T26483] do_syscall_64+0x103/0x610 [ 362.152552][T26483] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 362.158421][T26483] RIP: 0033:0x458da9 [ 362.162295][T26483] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 362.181880][T26483] RSP: 002b:00007f082125da88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 14:43:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:30 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x60}, 0x0) 14:43:30 executing program 2 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 362.190266][T26483] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000458da9 [ 362.198213][T26483] RDX: 0000000020000428 RSI: 0000000000000000 RDI: 00000000004bdd07 [ 362.206161][T26483] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 362.214124][T26483] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f082125e6d4 [ 362.222080][T26483] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:30 executing program 5 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:30 executing program 3: r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) [ 362.341976][T26497] FAULT_INJECTION: forcing a failure. [ 362.341976][T26497] name failslab, interval 1, probability 0, space 0, times 0 [ 362.380995][T26501] FAULT_INJECTION: forcing a failure. [ 362.380995][T26501] name failslab, interval 1, probability 0, space 0, times 0 [ 362.405642][T26497] CPU: 1 PID: 26497 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 362.413650][T26497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 362.423706][T26497] Call Trace: [ 362.426999][T26497] dump_stack+0x172/0x1f0 [ 362.431328][T26497] should_fail.cold+0xa/0x15 [ 362.435920][T26497] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 362.441717][T26497] ? ___might_sleep+0x163/0x280 [ 362.446559][T26497] __should_failslab+0x121/0x190 [ 362.451503][T26497] should_failslab+0x9/0x14 [ 362.455999][T26497] kmem_cache_alloc+0x2b2/0x6f0 [ 362.460831][T26497] ? current_time+0x6b/0x140 [ 362.465410][T26497] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 362.471202][T26497] ? lockdep_hardirqs_on+0x418/0x5d0 [ 362.476470][T26497] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 362.482705][T26497] ? timespec64_trunc+0xf0/0x180 [ 362.487628][T26497] __d_alloc+0x2e/0x8c0 [ 362.491772][T26497] d_alloc_pseudo+0x1e/0x30 [ 362.496260][T26497] alloc_file_pseudo+0xe2/0x280 [ 362.501095][T26497] ? alloc_file+0x4d0/0x4d0 [ 362.505585][T26497] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 362.511822][T26497] __shmem_file_setup.part.0+0x108/0x2b0 [ 362.517449][T26497] shmem_file_setup+0x66/0x90 [ 362.522112][T26497] __x64_sys_memfd_create+0x2a2/0x470 [ 362.527468][T26497] ? memfd_fcntl+0x1550/0x1550 [ 362.532221][T26497] ? do_syscall_64+0x26/0x610 [ 362.536884][T26497] ? lockdep_hardirqs_on+0x418/0x5d0 [ 362.542152][T26497] ? trace_hardirqs_on+0x67/0x230 [ 362.547164][T26497] do_syscall_64+0x103/0x610 [ 362.551744][T26497] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 362.557621][T26497] RIP: 0033:0x458da9 [ 362.561499][T26497] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 362.581081][T26497] RSP: 002b:00007f082125da88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 362.589476][T26497] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000458da9 [ 362.597430][T26497] RDX: 0000000020000428 RSI: 0000000000000000 RDI: 00000000004bdd07 [ 362.605397][T26497] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 362.613441][T26497] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f082125e6d4 [ 362.621397][T26497] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) [ 362.640815][T26501] CPU: 0 PID: 26501 Comm: syz-executor.5 Not tainted 5.1.0-rc7+ #96 [ 362.648823][T26501] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 362.658871][T26501] Call Trace: [ 362.658898][T26501] dump_stack+0x172/0x1f0 [ 362.658922][T26501] should_fail.cold+0xa/0x15 [ 362.658943][T26501] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 362.671133][T26501] ? ___might_sleep+0x163/0x280 [ 362.671158][T26501] __should_failslab+0x121/0x190 [ 362.671177][T26501] should_failslab+0x9/0x14 [ 362.691251][T26501] __kmalloc+0x2dc/0x740 [ 362.695505][T26501] ? fput_many+0x12c/0x1a0 [ 362.699934][T26501] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 362.706181][T26501] ? strnlen_user+0x1f0/0x280 [ 362.710865][T26501] ? __x64_sys_memfd_create+0x13c/0x470 [ 362.716429][T26501] __x64_sys_memfd_create+0x13c/0x470 [ 362.721811][T26501] ? memfd_fcntl+0x1550/0x1550 [ 362.726583][T26501] ? do_syscall_64+0x26/0x610 [ 362.731267][T26501] ? lockdep_hardirqs_on+0x418/0x5d0 [ 362.736564][T26501] ? trace_hardirqs_on+0x67/0x230 [ 362.741602][T26501] do_syscall_64+0x103/0x610 [ 362.746206][T26501] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 362.752101][T26501] RIP: 0033:0x458da9 [ 362.755987][T26501] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 362.775584][T26501] RSP: 002b:00007f326b471a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 362.775600][T26501] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000458da9 [ 362.775610][T26501] RDX: 0000000020000428 RSI: 0000000000000000 RDI: 00000000004bdd07 [ 362.775620][T26501] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 362.775630][T26501] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f326b4726d4 [ 362.775639][T26501] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:30 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x10006) ppoll(&(0x7f0000000080), 0x279, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) 14:43:30 executing program 3: r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:30 executing program 2 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:30 executing program 5 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:30 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0xf0}, 0x0) [ 362.964406][T26528] FAULT_INJECTION: forcing a failure. [ 362.964406][T26528] name failslab, interval 1, probability 0, space 0, times 0 [ 362.988258][T26530] FAULT_INJECTION: forcing a failure. [ 362.988258][T26530] name failslab, interval 1, probability 0, space 0, times 0 [ 362.999889][T26528] CPU: 0 PID: 26528 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 363.008932][T26528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 363.018989][T26528] Call Trace: [ 363.022287][T26528] dump_stack+0x172/0x1f0 [ 363.026634][T26528] should_fail.cold+0xa/0x15 [ 363.031230][T26528] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 363.037037][T26528] ? ___might_sleep+0x163/0x280 [ 363.041889][T26528] __should_failslab+0x121/0x190 [ 363.046825][T26528] should_failslab+0x9/0x14 [ 363.051336][T26528] kmem_cache_alloc+0x2b2/0x6f0 [ 363.056197][T26528] __alloc_file+0x27/0x300 [ 363.060611][T26528] alloc_empty_file+0x72/0x170 [ 363.065372][T26528] alloc_file+0x5e/0x4d0 [ 363.069614][T26528] alloc_file_pseudo+0x189/0x280 [ 363.074555][T26528] ? alloc_file+0x4d0/0x4d0 [ 363.079054][T26528] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 363.085307][T26528] __shmem_file_setup.part.0+0x108/0x2b0 [ 363.090940][T26528] shmem_file_setup+0x66/0x90 [ 363.095624][T26528] __x64_sys_memfd_create+0x2a2/0x470 [ 363.100996][T26528] ? memfd_fcntl+0x1550/0x1550 [ 363.105758][T26528] ? do_syscall_64+0x26/0x610 14:43:31 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x6) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xe841, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000001900)=@filter={'filter\x00', 0xe, 0x4, 0x17c8, [0x0, 0x20000100, 0x20000cd0, 0x20000e30], 0x0, &(0x7f00000000c0), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x5, 0x14, 0x88f7, 'veth1_to_bond\x00', 'ipddp0\x00', 'bridge_slave_0\x00', 'veth0_to_team\x00', @empty, [0xff, 0x0, 0xff, 0xff], @local, [0xff, 0xff, 0xff, 0xb080467877043d8b, 0x0, 0xff], 0x70, 0x70, 0xc0}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0xcf12, 0x6}}}}, {{{0x9, 0x1, 0xe8e7, 'veth0\x00', 'eql\x00', 'vxcan1\x00', 'netdevsim0\x00', @remote, [0xff, 0x0, 0xff, 0xff], @dev={[], 0xa}, [0x0, 0xff, 0xff, 0xff, 0xff], 0x980, 0x9b0, 0xae0, [@helper={'helper\x00', 0x28, {{0x0, 'Q.931\x00'}}}, @among={'among\x00', 0x898, {{0x6, 0x6, 0x2, {[0x100000000, 0xe042, 0x0, 0xfff, 0x3, 0x0, 0x0, 0x9, 0x5, 0x6, 0x4, 0x2, 0x81, 0x3a, 0x35f4, 0x1f, 0x7fffffff, 0xc134, 0x10001, 0x2, 0x0, 0x9, 0x4e, 0xffffffffffffff49, 0x100000000, 0x657, 0x7dce, 0x7, 0x4, 0x6, 0x8, 0x8, 0xffffffffffffff8f, 0x1, 0xfffffffffffffffb, 0x7, 0xfffffffffffffffa, 0x87, 0xfffffffffffffc01, 0x0, 0x4, 0x5, 0x5, 0x6, 0x1, 0x1, 0x4, 0x7, 0xc5, 0xfa, 0x9, 0x7ff, 0x4, 0x8, 0x1, 0x7, 0x101, 0x2, 0x2, 0x101, 0x92, 0x94, 0x101, 0x5, 0x1, 0x7, 0x4, 0x7, 0x5, 0xfff, 0x1f, 0x3, 0x14e, 0x0, 0x5, 0x7f, 0x7b80, 0x2, 0x4532, 0xaa50, 0x88, 0x4, 0x8000, 0x5, 0x4, 0x8, 0x4, 0x9, 0x7fffffff, 0x100000000, 0x7, 0x7, 0xffffffff, 0x2, 0x8, 0xffffffffffffff69, 0x4, 0x4, 0x7, 0x0, 0xfffffffffffffff9, 0x4, 0x1, 0x8, 0x5, 0xc9, 0x7, 0x30ad, 0x2, 0x0, 0x3f, 0x2, 0x5, 0x100000001, 0x9, 0x3, 0x0, 0x7, 0x60, 0x8, 0x7, 0x2, 0x80000000000000, 0x800, 0x80, 0x7, 0x1, 0x7, 0x7, 0x5, 0x91, 0x9, 0x8, 0x2, 0xff, 0x9, 0x4, 0x7, 0x7, 0x4, 0xdf15, 0x2, 0x7, 0x8, 0x7fff, 0x1, 0x9, 0x1a, 0x7, 0x2, 0xfff, 0x5, 0x100000000, 0x200, 0x81, 0x1, 0x1, 0x9, 0x10000, 0x7, 0x1, 0x1ff, 0x2, 0x900b, 0x7f, 0xafc8, 0x0, 0x6d, 0x7, 0x1, 0x5, 0x100, 0x8, 0x2, 0x3, 0x7fffffff, 0x8, 0xfffffffffffffff8, 0x81, 0x40, 0x9, 0x0, 0x231, 0x8, 0x7, 0xd747, 0xfffffffffffff80c, 0xc00, 0xffffffff80000001, 0x81, 0x1000, 0x1, 0x3fffffff80000, 0x1085, 0x5, 0x5962, 0x4, 0x0, 0xff, 0xff, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xffffffffffffff81, 0x4e012c6b, 0xfff, 0x8, 0x8000, 0x5, 0x7, 0x52, 0x601, 0x9, 0x2, 0x100, 0x6, 0x1, 0x8, 0x7, 0x80000001, 0x8, 0x7f, 0x38000000, 0x90, 0x4, 0x5, 0x10000, 0x7, 0x80, 0x8, 0x8, 0x6, 0x9, 0x6, 0x9, 0x4, 0x8, 0x1, 0x80000000, 0x2, 0x9, 0x401, 0x5, 0x7, 0x100000000, 0x147, 0x3, 0x8, 0x3, 0x5, 0x3, 0x3ff, 0x1, 0xffe00000, 0x6, 0x2, 0x20, 0x3], 0x5, [{[0x80000000, 0x10000], @broadcast}, {[0x8, 0xffffffff], @multicast1}, {[0x3, 0x3], @rand_addr=0x80000000}, {[0x1], @empty}, {[0x100000001, 0x9], @remote}]}, {[0x7fff, 0x2, 0x16, 0x3, 0x800, 0x1dd5528, 0x3f, 0x0, 0x7, 0x629, 0x100, 0x10001, 0x1000, 0x7, 0xffffffffffffff8d, 0x2, 0x1, 0xfffffffffffffffe, 0x8, 0x8, 0x1, 0x200, 0x0, 0x3, 0x2, 0x401, 0x0, 0x22, 0x9a05, 0x7, 0x6, 0x8, 0xffffffff, 0x6, 0x5, 0xffff, 0x4, 0x1, 0x7, 0x5, 0x9c, 0x8, 0x3, 0xffff, 0x6, 0x6, 0xfffffffffffffff1, 0x0, 0x4, 0x82a5, 0x5, 0x3, 0x2, 0x7ff, 0x4, 0x9, 0x20, 0x4, 0x7ff, 0x0, 0x1, 0x7, 0x2, 0x100000001, 0x332, 0x61d, 0x0, 0x38, 0x9c6, 0x81, 0x9, 0x10001, 0x7, 0x5, 0x6, 0x2, 0x0, 0x0, 0x9, 0x7, 0x8, 0x5, 0x6117, 0x7, 0x97c8, 0x2, 0x6, 0x4, 0x7, 0xffffffff, 0x5, 0x4, 0x3, 0x80000000, 0x0, 0x800, 0x0, 0x3, 0x8, 0x5, 0x1, 0x7, 0x7, 0x0, 0x3, 0x5, 0x5, 0x5, 0x1000, 0x9, 0x245, 0x7, 0x3ff, 0x3, 0x6, 0x0, 0x1ff, 0x6, 0x3, 0x87ba, 0x6, 0x7fffffff, 0x6, 0xff, 0x5, 0x1, 0xdc, 0x0, 0x0, 0xbd, 0x319b, 0x4000, 0x3e3d, 0x4, 0x5, 0x4, 0x10000, 0x4, 0x3, 0x9, 0x5, 0xfffffffffffffff8, 0xb4f9, 0x6, 0x1, 0x1, 0x80000001, 0x7, 0x40, 0x2, 0x6, 0x7, 0xfff, 0xffffffffffffffff, 0x7, 0x1f, 0x5, 0x4, 0x9, 0x80000000, 0x9, 0x8, 0x401, 0x7, 0x3681, 0x3, 0x0, 0x100000000, 0x8, 0x800, 0x7fff, 0x4d7ca61c, 0xfffffffffffffffd, 0x4, 0xc0, 0x8000, 0x7, 0x3f, 0x1, 0x6, 0x101, 0x0, 0x4, 0x8, 0x2, 0xb6, 0x1, 0xb, 0x218691f2, 0x200, 0x6, 0x5, 0xfffffffffffffff7, 0x1, 0x3, 0x20, 0x9, 0x404, 0x1, 0x1, 0x4, 0x2, 0x80000000, 0x4a7a, 0x2, 0x5, 0x401, 0xc00, 0x7, 0x8001, 0x55, 0x3, 0x2, 0x0, 0x2, 0x10001000000, 0x0, 0xe79b, 0xfffffffffffffffb, 0x101, 0x5e29, 0x2, 0xa00000000, 0x2, 0x5, 0x0, 0x0, 0x400, 0x40, 0x5, 0x1, 0x400, 0xfc, 0x80000001, 0xfff, 0x9ccd, 0x9, 0x1, 0x4, 0x10000, 0x3, 0x7, 0xfffffffffffffff8, 0x7, 0x9, 0x7, 0x90f2, 0x8000, 0xfb, 0x612, 0xffffffff00000001, 0x3693, 0x7fffffff, 0x3, 0x1, 0x1, 0x5], 0x5, [{[0x6, 0x6d2d], @local}, {[0x4, 0x97], @local}, {[0x8001, 0x2bd], @initdev={0xac, 0x1e, 0x0, 0x0}}, {[0x40, 0x6], @broadcast}, {[0x1, 0x200], @multicast2}]}}}}]}, [@common=@AUDIT={'AUDIT\x00', 0x8, {{0x3}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x3, 'system_u:object_r:inetd_var_run_t:s0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x3, 0x9, 0x9215, 'yam0\x00', 'veth0_to_bridge\x00', 'hwsim0\x00', 'nr0\x00', @empty, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0x0, 0x0, 0xff, 0x0, 0xff, 0xff], 0xe0, 0xe0, 0x130, [@devgroup={'devgroup\x00', 0x18, {{0x4, 0x8000, 0x4, 0x2, 0x8}}}, @cgroup0={'cgroup\x00', 0x8}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x80000001, 0x18}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0xf, 0x0, 0x88ff, 'yam0\x00', 'veth1_to_bridge\x00', 'bpq0\x00', 'veth1_to_hsr\x00', @random="c0ee9daac8ef", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @remote, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x978, 0x9c0, 0xa38, [@ip={'ip\x00', 0x20, {{@dev={0xac, 0x14, 0x14, 0x17}, @rand_addr=0x20, 0xffffff00, 0xff, 0x5, 0x67, 0x37, 0x2c, 0x4e21, 0x4e24, 0x4e24, 0x4e20}}}, @among={'among\x00', 0x898, {{0x7, 0x3, 0x2, {[0x3, 0x6, 0xfffffffffffffffc, 0xffff, 0x7, 0x3, 0x585, 0x100, 0x3, 0x3ff, 0x2, 0xffff, 0x882, 0x100000001, 0x1, 0x3f, 0xfb, 0xfffffffffffffffa, 0x1, 0x5, 0x8, 0x5, 0x7fffffff, 0x1, 0x7, 0x2, 0x5, 0x2, 0x6, 0x3, 0x2, 0x101, 0x20, 0x5, 0x2, 0x401, 0x5, 0x9, 0x0, 0xffffffff80000000, 0x2, 0x0, 0x7, 0xfff, 0xff, 0xde, 0x8001, 0xc27a, 0xffffffffffffff00, 0x9, 0x2, 0x5, 0x8, 0x6, 0xfea, 0xef, 0xfffffffffffffff8, 0x80, 0x6, 0x2889, 0xfffffffffffffff8, 0x9, 0x7fff, 0x3f, 0x3, 0x800, 0x7fff, 0x9, 0x1, 0x1, 0xf84, 0x1ff, 0xbcbf, 0x2, 0x401, 0x9b, 0x2, 0x5, 0x8, 0x6, 0x8, 0x6, 0x16d, 0x1b3, 0x9, 0x71, 0x8, 0x1f, 0x8fc4, 0x0, 0x4, 0x4, 0x1, 0xfffffffffffffff7, 0x3ff, 0x9, 0x3, 0x9, 0x2, 0x5, 0x44, 0x0, 0x80000001, 0x2, 0x400, 0x8, 0x3f, 0x1ff, 0x20, 0x5, 0x8, 0x1f, 0x9, 0xfff, 0x7, 0x4, 0x7f, 0x9, 0xd2, 0xdc5, 0x74e, 0x219, 0xbe, 0x828, 0x8, 0x6, 0x3d6c56bc, 0x8, 0x0, 0x0, 0x2, 0xc6b, 0x0, 0xfffffffffffeffff, 0x7ff, 0xfff, 0x75, 0x8, 0x8, 0x1, 0x4, 0x4, 0xfcb, 0xed9, 0x401, 0x9, 0x8000, 0xffffffff, 0x2, 0x5, 0xa7, 0x8, 0x3, 0x2, 0x1, 0x6, 0x10000, 0x7, 0x9047, 0x6, 0x6, 0x10e, 0x8, 0x6, 0x10000, 0x0, 0x4, 0xebd, 0xff, 0xffffffffffffffff, 0x7, 0x2ec, 0x81, 0x748, 0x1, 0x800, 0x5b, 0x8, 0xc42, 0x9, 0x7fffffff, 0x0, 0x40, 0x1000, 0x89fa, 0x1, 0x81, 0x2, 0xfffffffffffffffa, 0x3f, 0xffffffffa2a72287, 0xf7a80, 0xffffffffffffedd8, 0xffffffff80000001, 0x6, 0x0, 0x1ff, 0x74, 0x2, 0x8, 0x1, 0x9, 0x2, 0x8, 0x0, 0xe5d, 0x7ce0, 0xffffffff80000001, 0x2, 0x9b, 0x3, 0x8, 0xf922, 0xffffffffffffffff, 0x1, 0x2, 0x0, 0x8, 0x1f, 0x4d1b, 0xfffffffffffffe01, 0x100000000, 0x800, 0x401, 0xffff, 0xc7, 0x2, 0x5, 0x9, 0x2, 0x6, 0x26, 0x200, 0xfffffffffffffffc, 0xfff, 0x3, 0xfffffffffffffff8, 0x1ff, 0x4, 0x8000, 0x3, 0x20, 0x4, 0x1, 0x8, 0x4, 0xffffffffffffef78, 0x81, 0xfffffffffffffffe, 0x4, 0x3, 0x8ee4, 0x31b2, 0x8, 0x7fffffff, 0x9, 0x6], 0x4, [{[0x9, 0x2], @rand_addr=0xfffffffffffeffff}, {[0x10000, 0x35], @multicast1}, {[0x3, 0x1], @loopback}, {[0xff, 0x9], @remote}]}, {[0x8001, 0x100000000, 0x16d, 0x4, 0x101, 0x7, 0x16, 0xfffffffffffffff9, 0x1, 0x62cd, 0x21, 0x100000000, 0x81, 0x2, 0x4cb7fd26, 0x6, 0x8, 0x7, 0x80000001, 0x4, 0x9b, 0x4, 0x7, 0x49, 0x3ff, 0x6, 0x8, 0x0, 0x800, 0x7, 0x20, 0x8, 0x1f, 0x4, 0x2, 0x8, 0x6, 0x20, 0x1c2, 0x98b, 0x0, 0x333, 0x8, 0x499, 0x5, 0xfff, 0x3, 0x153ab8c3, 0x1, 0x94b, 0xffffffff, 0x81, 0x2, 0x800, 0x8, 0x1, 0x3, 0x20, 0x22, 0x5, 0x5, 0x10001, 0x2, 0x8, 0xfffffffffffffffa, 0x3ff, 0x8, 0x3, 0x800, 0x2, 0x0, 0xffffffffffffffff, 0x4, 0x1ff, 0x4, 0x4, 0xffffffffffffff80, 0x691e, 0x4, 0x4, 0xfffffffffffffffe, 0x2, 0x8, 0x0, 0x3, 0x9, 0xffffffffffffffc0, 0x20, 0xb9, 0x20, 0x1, 0x3f, 0x1, 0x8, 0x1135, 0x20, 0x10000, 0xfff, 0xc9d, 0x15f730a0, 0x0, 0x400, 0x0, 0x0, 0x8000, 0x2, 0x20, 0x18, 0x101, 0x8000, 0x0, 0xffffffffffffffc0, 0x2e40, 0x80000000, 0xffffffffffffff00, 0x6, 0x4e, 0x3, 0x6, 0x7, 0x8000, 0x4d13, 0xffffffff, 0x0, 0x1, 0xf33, 0x6, 0x0, 0x2, 0x2, 0xc1, 0x2, 0xef, 0x3, 0x1ff, 0x7, 0x2, 0x7f, 0x8, 0x20, 0x8, 0x4, 0x7, 0x40, 0x9, 0x8, 0x7fff, 0x7, 0x6, 0xfffffffffffffffe, 0x80000001, 0x7, 0x2, 0x6, 0x7, 0x2, 0x80, 0x9, 0xff, 0x10001, 0x1, 0x8, 0x9, 0x78b0, 0x7, 0x100000001, 0x40, 0x34b, 0x7, 0x7, 0x1, 0x8001, 0x4, 0x9, 0x6f39, 0x7ff, 0x5, 0x9, 0x23d3, 0x10001, 0x4, 0x7fff, 0x200, 0x7ff, 0x3, 0x4, 0xffffffff, 0x0, 0xc94, 0x3, 0x3, 0x8, 0xfffffffffffffffe, 0x3f, 0x3ff, 0x164, 0x8000, 0x1ff, 0x5, 0x100000000, 0x9b7, 0x3, 0xffff, 0x3ff, 0x9, 0xf50, 0x1db5, 0x6, 0x6, 0x7, 0x1, 0x9, 0x4, 0x0, 0x80, 0x100, 0x7622, 0x5, 0x6, 0x2, 0x9, 0xff, 0x8001, 0x5, 0x6, 0x3f, 0x9, 0x100000000, 0x4, 0x7, 0x1000, 0x2, 0xc7, 0x6, 0x5, 0x5, 0x144, 0x10001, 0xdea, 0x1000, 0x100000001, 0x9945, 0x6, 0xfff, 0x5, 0x200, 0x4, 0x1ff, 0x100, 0x5, 0x8, 0x6, 0x40, 0xfffffffffffffbf7, 0x1000000000, 0xffffffff, 0x7], 0x6, [{[0x5, 0x1], @loopback}, {[0xfffffffffffffffe], @broadcast}, {[0x9, 0x7], @initdev={0xac, 0x1e, 0x1, 0x0}}, {[0xffffffffffffffb2, 0x8], @multicast2}, {[0x1, 0x6], @multicast1}, {[0xad, 0x7], @remote}]}}}}]}, [@common=@ERROR={'ERROR\x00', 0x20, {"1e384130d0b64994d8a74a60631608cbc2cf9541f7aabaf73696a24d8253"}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x8000, 0xff, 0x0, 0x0, "35c1e23465e9966c4f7f6ce8745955e2e497d1947bfb21adc13e2eb1344583268c58a5d0816f8ea9ef2d2e8dddc1f88adcfbde91ce491f8a2fb5599f3ae6edac"}}}}]}]}, 0x1840) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) [ 363.110437][T26528] ? lockdep_hardirqs_on+0x418/0x5d0 [ 363.115729][T26528] ? trace_hardirqs_on+0x67/0x230 [ 363.120765][T26528] do_syscall_64+0x103/0x610 [ 363.125358][T26528] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 363.125370][T26528] RIP: 0033:0x458da9 [ 363.125386][T26528] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 363.125394][T26528] RSP: 002b:00007f082125da88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 14:43:31 executing program 2 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:31 executing program 3: r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) [ 363.125411][T26528] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000458da9 [ 363.135164][T26528] RDX: 0000000020000428 RSI: 0000000000000000 RDI: 00000000004bdd07 [ 363.135173][T26528] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 363.135181][T26528] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f082125e6d4 [ 363.135189][T26528] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 [ 363.201251][T26530] CPU: 0 PID: 26530 Comm: syz-executor.5 Not tainted 5.1.0-rc7+ #96 [ 363.212231][T26530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 363.222281][T26530] Call Trace: [ 363.225586][T26530] dump_stack+0x172/0x1f0 [ 363.225609][T26530] should_fail.cold+0xa/0x15 [ 363.234509][T26530] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 363.234528][T26530] ? ___might_sleep+0x163/0x280 [ 363.234545][T26530] __should_failslab+0x121/0x190 [ 363.234561][T26530] ? shmem_destroy_callback+0xc0/0xc0 [ 363.234574][T26530] should_failslab+0x9/0x14 [ 363.234589][T26530] kmem_cache_alloc+0x2b2/0x6f0 [ 363.234608][T26530] ? __alloc_fd+0x44d/0x560 [ 363.245234][T26530] ? shmem_destroy_callback+0xc0/0xc0 [ 363.245250][T26530] shmem_alloc_inode+0x1c/0x50 [ 363.245264][T26530] alloc_inode+0x66/0x190 [ 363.245279][T26530] new_inode_pseudo+0x19/0xf0 [ 363.245306][T26530] new_inode+0x1f/0x40 [ 363.255574][T26530] shmem_get_inode+0x84/0x7e0 [ 363.255598][T26530] __shmem_file_setup.part.0+0x7e/0x2b0 [ 363.255616][T26530] shmem_file_setup+0x66/0x90 [ 363.255633][T26530] __x64_sys_memfd_create+0x2a2/0x470 [ 363.255651][T26530] ? memfd_fcntl+0x1550/0x1550 [ 363.317504][T26530] ? do_syscall_64+0x26/0x610 [ 363.322192][T26530] ? lockdep_hardirqs_on+0x418/0x5d0 [ 363.327504][T26530] ? trace_hardirqs_on+0x67/0x230 [ 363.332544][T26530] do_syscall_64+0x103/0x610 [ 363.337142][T26530] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 363.343037][T26530] RIP: 0033:0x458da9 [ 363.346935][T26530] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 363.360443][T26546] FAULT_INJECTION: forcing a failure. [ 363.360443][T26546] name failslab, interval 1, probability 0, space 0, times 0 [ 363.366531][T26530] RSP: 002b:00007f326b471a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 363.366546][T26530] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000458da9 [ 363.366553][T26530] RDX: 0000000020000428 RSI: 0000000000000000 RDI: 00000000004bdd07 [ 363.366562][T26530] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 14:43:31 executing program 5 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:31 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) [ 363.366570][T26530] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f326b4726d4 [ 363.366578][T26530] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:31 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) [ 363.514376][T26546] CPU: 1 PID: 26546 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 363.522654][T26546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 363.532706][T26546] Call Trace: [ 363.536005][T26546] dump_stack+0x172/0x1f0 [ 363.540345][T26546] should_fail.cold+0xa/0x15 [ 363.544945][T26546] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 363.550760][T26546] ? ___might_sleep+0x163/0x280 [ 363.555637][T26546] __should_failslab+0x121/0x190 [ 363.560575][T26546] should_failslab+0x9/0x14 [ 363.565081][T26546] kmem_cache_alloc+0x2b2/0x6f0 [ 363.565769][T26557] FAULT_INJECTION: forcing a failure. [ 363.565769][T26557] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 363.569946][T26546] ? rcu_read_lock_sched_held+0x110/0x130 [ 363.588821][T26546] ? kmem_cache_alloc+0x32e/0x6f0 [ 363.593843][T26546] security_file_alloc+0x39/0x170 [ 363.598856][T26546] __alloc_file+0xac/0x300 [ 363.603267][T26546] alloc_empty_file+0x72/0x170 [ 363.608018][T26546] alloc_file+0x5e/0x4d0 [ 363.612261][T26546] alloc_file_pseudo+0x189/0x280 [ 363.617189][T26546] ? alloc_file+0x4d0/0x4d0 [ 363.621685][T26546] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 363.627927][T26546] __shmem_file_setup.part.0+0x108/0x2b0 [ 363.633554][T26546] shmem_file_setup+0x66/0x90 [ 363.638224][T26546] __x64_sys_memfd_create+0x2a2/0x470 [ 363.643592][T26546] ? memfd_fcntl+0x1550/0x1550 [ 363.648351][T26546] ? do_syscall_64+0x26/0x610 [ 363.653016][T26546] ? lockdep_hardirqs_on+0x418/0x5d0 [ 363.658289][T26546] ? trace_hardirqs_on+0x67/0x230 [ 363.663307][T26546] do_syscall_64+0x103/0x610 [ 363.667888][T26546] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 363.673769][T26546] RIP: 0033:0x458da9 [ 363.677654][T26546] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 363.697241][T26546] RSP: 002b:00007f082125da88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 363.705647][T26546] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000458da9 14:43:31 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x158}, 0x0) [ 363.713607][T26546] RDX: 0000000020000428 RSI: 0000000000000000 RDI: 00000000004bdd07 [ 363.721570][T26546] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 363.729537][T26546] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f082125e6d4 [ 363.737495][T26546] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 [ 363.745474][T26557] CPU: 0 PID: 26557 Comm: syz-executor.5 Not tainted 5.1.0-rc7+ #96 [ 363.753446][T26557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 363.753452][T26557] Call Trace: [ 363.753470][T26557] dump_stack+0x172/0x1f0 [ 363.753488][T26557] should_fail.cold+0xa/0x15 [ 363.753511][T26557] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 363.766824][T26557] ? percpu_ref_tryget_live+0xef/0x290 [ 363.786945][T26557] should_fail_alloc_page+0x50/0x60 [ 363.792149][T26557] __alloc_pages_nodemask+0x1a1/0x8d0 [ 363.797525][T26557] ? find_held_lock+0x35/0x130 [ 363.802293][T26557] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 363.808032][T26557] cache_grow_begin+0x9c/0x860 [ 363.812789][T26557] ? shmem_alloc_inode+0x1c/0x50 [ 363.817714][T26557] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 363.823950][T26557] kmem_cache_alloc+0x62d/0x6f0 [ 363.828792][T26557] ? shmem_destroy_callback+0xc0/0xc0 [ 363.834149][T26557] shmem_alloc_inode+0x1c/0x50 [ 363.838894][T26557] alloc_inode+0x66/0x190 [ 363.843211][T26557] new_inode_pseudo+0x19/0xf0 [ 363.847889][T26557] new_inode+0x1f/0x40 [ 363.851945][T26557] shmem_get_inode+0x84/0x7e0 [ 363.856616][T26557] __shmem_file_setup.part.0+0x7e/0x2b0 [ 363.862149][T26557] shmem_file_setup+0x66/0x90 [ 363.866814][T26557] __x64_sys_memfd_create+0x2a2/0x470 [ 363.872172][T26557] ? memfd_fcntl+0x1550/0x1550 [ 363.876923][T26557] ? do_syscall_64+0x26/0x610 [ 363.881585][T26557] ? lockdep_hardirqs_on+0x418/0x5d0 [ 363.886855][T26557] ? trace_hardirqs_on+0x67/0x230 [ 363.891869][T26557] do_syscall_64+0x103/0x610 [ 363.896451][T26557] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 363.902414][T26557] RIP: 0033:0x458da9 [ 363.906293][T26557] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 363.925880][T26557] RSP: 002b:00007f326b471a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 363.934285][T26557] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000458da9 [ 363.942251][T26557] RDX: 0000000020000428 RSI: 0000000000000000 RDI: 00000000004bdd07 [ 363.950206][T26557] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 363.958180][T26557] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f326b4726d4 14:43:32 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) [ 363.966132][T26557] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:32 executing program 2 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:32 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4}, 0x0, @in6=@mcast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000540)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000440)='ns/pid\x00') r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x2000, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000400)={r3, &(0x7f00000006c0)="a9e773926a1d316e9ac4f04b5bf1ec86c483171804a7512a7ae272ed08da64586bbd699187cc7970282ab1c97b4bab6e3a5bbba7812e68f98fea348ab8f9f3d6f63fe281f2dd1144e80f2fc0da4a74fd537a2fdffccb96cec38cf792316bc688775c9de987a222f0590bf723ae323d0b35923dedad312794b481a21a24c47a1302f8a393548f0b32ac7a7a6ab24879f98259233297c9b7ab1c1460388deec0850dbcfe299d6e6d248be0ee980ab42c5b6ea7b2acadc90604006bda17ef4f00"/201, &(0x7f00000005c0)=""/60}, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) lchown(&(0x7f0000000000)='./file0\x00', r1, r4) socket(0x0, 0x0, 0x7) 14:43:32 executing program 3: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) [ 364.120885][T26579] FAULT_INJECTION: forcing a failure. [ 364.120885][T26579] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 364.148349][T26579] CPU: 1 PID: 26579 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 364.156363][T26579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 364.166421][T26579] Call Trace: [ 364.169731][T26579] dump_stack+0x172/0x1f0 [ 364.174070][T26579] should_fail.cold+0xa/0x15 [ 364.178678][T26579] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 364.184495][T26579] ? ___might_sleep+0x163/0x280 [ 364.189362][T26579] should_fail_alloc_page+0x50/0x60 [ 364.194570][T26579] __alloc_pages_nodemask+0x1a1/0x8d0 [ 364.199954][T26579] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 364.205689][T26579] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 364.211934][T26579] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 14:43:32 executing program 3: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:32 executing program 3: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) [ 364.218181][T26579] alloc_pages_vma+0xdd/0x540 [ 364.222878][T26579] shmem_alloc_page+0xc0/0x180 [ 364.227650][T26579] ? shmem_swapin+0x1a0/0x1a0 [ 364.232337][T26579] ? lock_downgrade+0x880/0x880 [ 364.237191][T26579] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 364.243457][T26579] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 364.249174][T26579] ? __vm_enough_memory+0x320/0x5a0 [ 364.254391][T26579] shmem_alloc_and_acct_page+0x165/0x970 [ 364.260034][T26579] shmem_getpage_gfp+0x43b/0x2500 [ 364.265068][T26579] ? shmem_unuse_inode+0x1010/0x1010 [ 364.270341][T26579] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 364.276138][T26579] ? current_time+0x6b/0x140 [ 364.280714][T26579] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 364.286502][T26579] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 364.292728][T26579] ? iov_iter_fault_in_readable+0x22c/0x450 [ 364.298609][T26579] shmem_write_begin+0x105/0x1e0 [ 364.303535][T26579] generic_perform_write+0x231/0x530 [ 364.308817][T26579] ? page_endio+0x780/0x780 [ 364.313304][T26579] ? current_time+0x140/0x140 [ 364.317974][T26579] ? lock_acquire+0x16f/0x3f0 [ 364.322634][T26579] __generic_file_write_iter+0x25e/0x630 [ 364.328257][T26579] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 364.333963][T26579] generic_file_write_iter+0x360/0x610 [ 364.339404][T26579] ? __generic_file_write_iter+0x630/0x630 [ 364.345202][T26579] ? aa_path_link+0x460/0x460 [ 364.349862][T26579] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 364.356079][T26579] ? iov_iter_init+0xee/0x220 [ 364.361747][T26579] new_sync_write+0x4c7/0x760 [ 364.366411][T26579] ? default_llseek+0x2e0/0x2e0 [ 364.371240][T26579] ? lock_downgrade+0x880/0x880 [ 364.376088][T26579] __vfs_write+0xe4/0x110 [ 364.380398][T26579] vfs_write+0x20c/0x580 [ 364.384627][T26579] ksys_pwrite64+0x183/0x1c0 [ 364.389208][T26579] ? __ia32_sys_pread64+0xf0/0xf0 [ 364.394219][T26579] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 364.399663][T26579] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 364.405099][T26579] ? do_syscall_64+0x26/0x610 [ 364.409760][T26579] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 364.415889][T26579] ? do_syscall_64+0x26/0x610 [ 364.420549][T26579] __x64_sys_pwrite64+0x97/0xf0 [ 364.425381][T26579] do_syscall_64+0x103/0x610 [ 364.429952][T26579] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 364.435822][T26579] RIP: 0033:0x412da7 [ 364.439706][T26579] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 c7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 0d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 364.459287][T26579] RSP: 002b:00007f082125da80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 364.467676][T26579] RAX: ffffffffffffffda RBX: 0000000020000410 RCX: 0000000000412da7 [ 364.475630][T26579] RDX: 0000000000000048 RSI: 00000000200008c0 RDI: 0000000000000004 [ 364.483580][T26579] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 364.491532][T26579] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 364.499480][T26579] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:32 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:32 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:32 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0xa00}, 0x0) 14:43:32 executing program 1: fstat(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r0) r1 = socket$rxrpc(0x21, 0x2, 0x2) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x20000, 0x0) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x34) ppoll(&(0x7f0000000080)=[{r1}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4) 14:43:32 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:32 executing program 2 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:32 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f00000000c0)=[{r0}], 0x1, 0x0, 0x0, 0x123) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) 14:43:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:32 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='%trfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:32 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0xe00}, 0x0) [ 364.806896][T26626] FAULT_INJECTION: forcing a failure. [ 364.806896][T26626] name failslab, interval 1, probability 0, space 0, times 0 [ 364.819975][T26626] CPU: 1 PID: 26626 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 364.827953][T26626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 364.838011][T26626] Call Trace: [ 364.841315][T26626] dump_stack+0x172/0x1f0 [ 364.845657][T26626] should_fail.cold+0xa/0x15 [ 364.850269][T26626] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 364.856095][T26626] __should_failslab+0x121/0x190 [ 364.861044][T26626] should_failslab+0x9/0x14 [ 364.865562][T26626] kmem_cache_alloc+0x47/0x6f0 [ 364.870331][T26626] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 364.876060][T26626] xas_alloc+0x2df/0x3d0 [ 364.880315][T26626] xas_create+0x2cd/0x1040 [ 364.884749][T26626] xas_create_range+0x198/0x5d0 [ 364.889611][T26626] shmem_add_to_page_cache+0x6f3/0x1200 [ 364.895168][T26626] ? shmem_writepage+0xe90/0xe90 [ 364.900113][T26626] shmem_getpage_gfp+0x6db/0x2500 [ 364.905185][T26626] ? shmem_unuse_inode+0x1010/0x1010 [ 364.910461][T26626] ? current_time+0x6b/0x140 [ 364.915035][T26626] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 364.920826][T26626] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 364.927053][T26626] ? iov_iter_fault_in_readable+0x22c/0x450 [ 364.932964][T26626] shmem_write_begin+0x105/0x1e0 [ 364.937896][T26626] generic_perform_write+0x231/0x530 [ 364.943189][T26626] ? page_endio+0x780/0x780 [ 364.947679][T26626] ? current_time+0x140/0x140 [ 364.952344][T26626] ? lock_acquire+0x16f/0x3f0 [ 364.957011][T26626] __generic_file_write_iter+0x25e/0x630 [ 364.962625][T26626] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 364.968334][T26626] generic_file_write_iter+0x360/0x610 [ 364.973780][T26626] ? __generic_file_write_iter+0x630/0x630 [ 364.979572][T26626] ? aa_path_link+0x460/0x460 [ 364.984237][T26626] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 364.990457][T26626] ? iov_iter_init+0xee/0x220 [ 364.995127][T26626] new_sync_write+0x4c7/0x760 [ 364.999804][T26626] ? default_llseek+0x2e0/0x2e0 [ 365.004638][T26626] ? lock_downgrade+0x880/0x880 [ 365.009500][T26626] __vfs_write+0xe4/0x110 [ 365.013817][T26626] vfs_write+0x20c/0x580 [ 365.018048][T26626] ksys_pwrite64+0x183/0x1c0 [ 365.022630][T26626] ? __ia32_sys_pread64+0xf0/0xf0 [ 365.027639][T26626] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 365.033084][T26626] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 365.038527][T26626] ? do_syscall_64+0x26/0x610 [ 365.043188][T26626] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 365.049239][T26626] ? do_syscall_64+0x26/0x610 [ 365.053919][T26626] __x64_sys_pwrite64+0x97/0xf0 [ 365.058754][T26626] do_syscall_64+0x103/0x610 [ 365.063335][T26626] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 365.069210][T26626] RIP: 0033:0x412da7 [ 365.073094][T26626] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 c7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 0d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 365.092684][T26626] RSP: 002b:00007f082125da80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 365.101075][T26626] RAX: ffffffffffffffda RBX: 0000000020000410 RCX: 0000000000412da7 [ 365.109038][T26626] RDX: 0000000000000048 RSI: 00000000200008c0 RDI: 0000000000000004 [ 365.116990][T26626] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 365.124962][T26626] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 365.132915][T26626] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:33 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:33 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='b%rfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:33 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0xec0}, 0x0) 14:43:33 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x0, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:33 executing program 2 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:33 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btr.s\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 365.575235][T26674] FAULT_INJECTION: forcing a failure. [ 365.575235][T26674] name failslab, interval 1, probability 0, space 0, times 0 [ 365.604885][T26674] CPU: 0 PID: 26674 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 365.612900][T26674] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 365.622959][T26674] Call Trace: [ 365.626265][T26674] dump_stack+0x172/0x1f0 [ 365.630607][T26674] should_fail.cold+0xa/0x15 [ 365.630628][T26674] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 365.630655][T26674] ? ___might_sleep+0x163/0x280 [ 365.641024][T26674] __should_failslab+0x121/0x190 [ 365.641042][T26674] should_failslab+0x9/0x14 [ 365.641055][T26674] kmem_cache_alloc+0x2b2/0x6f0 [ 365.641074][T26674] ? lock_downgrade+0x880/0x880 [ 365.655327][T26674] getname_flags+0xd6/0x5b0 [ 365.655346][T26674] getname+0x1a/0x20 [ 365.655361][T26674] do_sys_open+0x2c9/0x5d0 [ 365.655378][T26674] ? filp_open+0x80/0x80 [ 365.655395][T26674] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 365.655409][T26674] ? do_syscall_64+0x26/0x610 [ 365.655429][T26674] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 365.655440][T26674] ? do_syscall_64+0x26/0x610 [ 365.655455][T26674] __x64_sys_open+0x7e/0xc0 [ 365.655468][T26674] do_syscall_64+0x103/0x610 [ 365.655481][T26674] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 365.655490][T26674] RIP: 0033:0x412d41 [ 365.665384][T26674] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 365.741685][T26674] RSP: 002b:00007f082125da80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 365.741701][T26674] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000412d41 [ 365.741711][T26674] RDX: 00007f082125db0a RSI: 0000000000000002 RDI: 00007f082125db00 [ 365.741719][T26674] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 365.741727][T26674] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 365.741740][T26674] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:34 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x40000, 0x1e) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000000c0)={0x100000000, 0x0, 0xfee, 0xe8f, 0x0}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000140)={r2, 0xfffffffffffffffe, 0x6}, 0x8) r3 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video2\x00', 0x2, 0x0) ppoll(&(0x7f00000002c0), 0x45e, 0x0, 0x0, 0xffffffffffffff1d) io_uring_enter(r1, 0x1c, 0x8, 0x3, &(0x7f0000000200)={0x8}, 0x8) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) socket$isdn(0x22, 0x3, 0x4) ioctl$VIDIOC_S_MODULATOR(r3, 0x40445637, &(0x7f0000000240)={0x7, "ccd1d638b82912cdd55c2ede62ec305ba7d9277f694b5cd8c3a4b53ba421b6ec", 0x40, 0xfffffffffffffffb, 0x8, 0x1f, 0x1}) openat$vimc1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video1\x00', 0x2, 0x0) ioctl$SG_SET_RESERVED_SIZE(r1, 0x2275, &(0x7f0000000080)=0x8) 14:43:34 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x0, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:34 executing program 2 (fault-call:0 fault-nth:8): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:34 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0xf00}, 0x0) 14:43:34 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btr/s\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 366.042647][T26708] FAULT_INJECTION: forcing a failure. [ 366.042647][T26708] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 366.055892][T26708] CPU: 0 PID: 26708 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 366.063870][T26708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 366.073926][T26708] Call Trace: [ 366.077242][T26708] dump_stack+0x172/0x1f0 [ 366.081584][T26708] should_fail.cold+0xa/0x15 [ 366.086178][T26708] ? fault_create_debugfs_attr+0x1e0/0x1e0 14:43:34 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000340)={0x5, 0x10, 0xfa00, {&(0x7f0000000140), r1, 0x1}}, 0x18) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040)=0xfffffffffffff7fb, 0x1000000b5) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000380)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r2, 0x8004552d, &(0x7f00000003c0)) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x3f, 0x0) ioctl$TCGETA(r3, 0x5405, &(0x7f00000000c0)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x8c) [ 366.091973][T26708] ? __lock_acquire+0x548/0x3fb0 [ 366.096901][T26708] should_fail_alloc_page+0x50/0x60 [ 366.102105][T26708] __alloc_pages_nodemask+0x1a1/0x8d0 [ 366.107469][T26708] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 366.113180][T26708] ? find_held_lock+0x35/0x130 [ 366.117956][T26708] ? new_sync_write+0x527/0x760 [ 366.122797][T26708] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 366.128597][T26708] cache_grow_begin+0x9c/0x860 [ 366.133364][T26708] ? getname_flags+0xd6/0x5b0 [ 366.138045][T26708] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 366.144299][T26708] kmem_cache_alloc+0x62d/0x6f0 [ 366.149488][T26708] ? lock_downgrade+0x880/0x880 [ 366.154330][T26708] getname_flags+0xd6/0x5b0 [ 366.158815][T26708] getname+0x1a/0x20 [ 366.162686][T26708] do_sys_open+0x2c9/0x5d0 [ 366.167086][T26708] ? filp_open+0x80/0x80 [ 366.171308][T26708] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 366.176744][T26708] ? do_syscall_64+0x26/0x610 [ 366.181401][T26708] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 366.187449][T26708] ? do_syscall_64+0x26/0x610 [ 366.192110][T26708] __x64_sys_open+0x7e/0xc0 [ 366.196620][T26708] do_syscall_64+0x103/0x610 [ 366.201198][T26708] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 366.207078][T26708] RIP: 0033:0x412d41 [ 366.210958][T26708] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 366.230551][T26708] RSP: 002b:00007f082125da80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 14:43:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:34 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x0, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) [ 366.239030][T26708] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000412d41 [ 366.247003][T26708] RDX: 00007f082125db0a RSI: 0000000000000002 RDI: 00007f082125db00 [ 366.254959][T26708] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 366.262923][T26708] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 366.270874][T26708] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:34 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) r1 = dup2(r0, r0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timerfd_settime(r1, 0x1, &(0x7f00000000c0)={{0x77359400}, {r2, r3+10000000}}, &(0x7f0000000100)) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) 14:43:34 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x3f00}, 0x0) 14:43:34 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrf#\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:34 executing program 2 (fault-call:0 fault-nth:9): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:34 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:34 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000100)=[{r0, 0x200}, {r0, 0x220}, {r0, 0x2}, {r0, 0x8000}, {r0}], 0x5, 0x0, 0x0, 0xfffffd0f) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) [ 366.573078][T26738] FAULT_INJECTION: forcing a failure. [ 366.573078][T26738] name failslab, interval 1, probability 0, space 0, times 0 [ 366.636169][T26738] CPU: 1 PID: 26738 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 366.644195][T26738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 366.654246][T26738] Call Trace: [ 366.657547][T26738] dump_stack+0x172/0x1f0 [ 366.661898][T26738] should_fail.cold+0xa/0x15 [ 366.666502][T26738] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 366.672327][T26738] ? ___might_sleep+0x163/0x280 [ 366.677185][T26738] __should_failslab+0x121/0x190 [ 366.682132][T26738] should_failslab+0x9/0x14 [ 366.686820][T26738] kmem_cache_alloc+0x2b2/0x6f0 [ 366.691674][T26738] ? __save_stack_trace+0x99/0x100 [ 366.696792][T26738] __alloc_file+0x27/0x300 [ 366.701213][T26738] alloc_empty_file+0x72/0x170 [ 366.705978][T26738] path_openat+0xef/0x46e0 [ 366.710401][T26738] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 366.716212][T26738] ? kasan_slab_alloc+0xf/0x20 [ 366.720979][T26738] ? kmem_cache_alloc+0x11a/0x6f0 [ 366.726021][T26738] ? getname_flags+0xd6/0x5b0 [ 366.730697][T26738] ? getname+0x1a/0x20 [ 366.734769][T26738] ? do_sys_open+0x2c9/0x5d0 [ 366.739356][T26738] ? __x64_sys_open+0x7e/0xc0 [ 366.744030][T26738] ? do_syscall_64+0x103/0x610 [ 366.748779][T26738] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 366.754835][T26738] ? __lock_acquire+0x548/0x3fb0 [ 366.759778][T26738] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 366.765139][T26738] ? __alloc_fd+0x44d/0x560 [ 366.769636][T26738] do_filp_open+0x1a1/0x280 [ 366.774122][T26738] ? may_open_dev+0x100/0x100 [ 366.778782][T26738] ? lock_downgrade+0x880/0x880 [ 366.783616][T26738] ? kasan_check_read+0x11/0x20 [ 366.788445][T26738] ? do_raw_spin_unlock+0x57/0x270 [ 366.793537][T26738] ? _raw_spin_unlock+0x2d/0x50 [ 366.798366][T26738] ? __alloc_fd+0x44d/0x560 [ 366.802861][T26738] do_sys_open+0x3fe/0x5d0 [ 366.807280][T26738] ? filp_open+0x80/0x80 [ 366.811506][T26738] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 366.816947][T26738] ? do_syscall_64+0x26/0x610 [ 366.821606][T26738] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 366.827650][T26738] ? do_syscall_64+0x26/0x610 [ 366.832313][T26738] __x64_sys_open+0x7e/0xc0 [ 366.836797][T26738] do_syscall_64+0x103/0x610 [ 366.841370][T26738] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 366.847241][T26738] RIP: 0033:0x412d41 [ 366.851117][T26738] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 366.870699][T26738] RSP: 002b:00007f082125da80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 366.879087][T26738] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000412d41 14:43:34 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrf%\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:34 executing program 2 (fault-call:0 fault-nth:10): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 366.887039][T26738] RDX: 00007f082125db0a RSI: 0000000000000002 RDI: 00007f082125db00 [ 366.894990][T26738] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 366.902950][T26738] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 366.910902][T26738] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:34 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x5801}, 0x0) 14:43:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:35 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) [ 367.032073][T26766] FAULT_INJECTION: forcing a failure. [ 367.032073][T26766] name failslab, interval 1, probability 0, space 0, times 0 14:43:35 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrf*\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 367.099506][T26766] CPU: 1 PID: 26766 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 367.107525][T26766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 367.117565][T26766] Call Trace: [ 367.124985][T26766] dump_stack+0x172/0x1f0 [ 367.131299][T26766] should_fail.cold+0xa/0x15 [ 367.135900][T26766] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 367.141701][T26766] ? ___might_sleep+0x163/0x280 [ 367.146533][T26766] __should_failslab+0x121/0x190 [ 367.151454][T26766] should_failslab+0x9/0x14 [ 367.155959][T26766] kmem_cache_alloc+0x2b2/0x6f0 [ 367.160805][T26766] ? rcu_read_lock_sched_held+0x110/0x130 [ 367.166502][T26766] ? kmem_cache_alloc+0x32e/0x6f0 [ 367.171517][T26766] security_file_alloc+0x39/0x170 [ 367.176539][T26766] __alloc_file+0xac/0x300 [ 367.180934][T26766] alloc_empty_file+0x72/0x170 [ 367.185690][T26766] path_openat+0xef/0x46e0 [ 367.191101][T26766] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 367.196893][T26766] ? kasan_slab_alloc+0xf/0x20 [ 367.201634][T26766] ? kmem_cache_alloc+0x11a/0x6f0 [ 367.206635][T26766] ? getname_flags+0xd6/0x5b0 [ 367.211295][T26766] ? getname+0x1a/0x20 [ 367.215341][T26766] ? do_sys_open+0x2c9/0x5d0 [ 367.219908][T26766] ? __x64_sys_open+0x7e/0xc0 [ 367.224566][T26766] ? do_syscall_64+0x103/0x610 [ 367.229306][T26766] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 367.235354][T26766] ? __lock_acquire+0x548/0x3fb0 [ 367.240271][T26766] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 367.245640][T26766] ? __alloc_fd+0x44d/0x560 [ 367.250136][T26766] do_filp_open+0x1a1/0x280 [ 367.254617][T26766] ? may_open_dev+0x100/0x100 [ 367.259273][T26766] ? lock_downgrade+0x880/0x880 [ 367.264104][T26766] ? kasan_check_read+0x11/0x20 [ 367.268950][T26766] ? do_raw_spin_unlock+0x57/0x270 [ 367.274072][T26766] ? _raw_spin_unlock+0x2d/0x50 [ 367.278916][T26766] ? __alloc_fd+0x44d/0x560 [ 367.283429][T26766] do_sys_open+0x3fe/0x5d0 [ 367.287855][T26766] ? filp_open+0x80/0x80 [ 367.292089][T26766] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 367.297538][T26766] ? do_syscall_64+0x26/0x610 [ 367.302191][T26766] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 367.308242][T26766] ? do_syscall_64+0x26/0x610 [ 367.312898][T26766] __x64_sys_open+0x7e/0xc0 [ 367.317376][T26766] do_syscall_64+0x103/0x610 [ 367.321945][T26766] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 367.327831][T26766] RIP: 0033:0x412d41 [ 367.331727][T26766] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 367.351306][T26766] RSP: 002b:00007f082125da80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 367.359693][T26766] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000412d41 [ 367.367643][T26766] RDX: 00007f082125db0a RSI: 0000000000000002 RDI: 00007f082125db00 [ 367.375590][T26766] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 367.383543][T26766] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 367.391493][T26766] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:35 executing program 2 (fault-call:0 fault-nth:11): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:35 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x6000}, 0x0) [ 367.515066][T26779] FAULT_INJECTION: forcing a failure. [ 367.515066][T26779] name failslab, interval 1, probability 0, space 0, times 0 [ 367.537429][T26779] CPU: 1 PID: 26779 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 367.545523][T26779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 367.555586][T26779] Call Trace: [ 367.558886][T26779] dump_stack+0x172/0x1f0 14:43:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) [ 367.563225][T26779] should_fail.cold+0xa/0x15 [ 367.567824][T26779] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 367.573642][T26779] ? ___might_sleep+0x163/0x280 [ 367.578528][T26779] __should_failslab+0x121/0x190 [ 367.583473][T26779] ? loop_info64_to_compat+0x6d0/0x6d0 [ 367.588930][T26779] should_failslab+0x9/0x14 [ 367.593457][T26779] kmem_cache_alloc_trace+0x2d1/0x760 [ 367.598831][T26779] ? lockdep_init_map+0x1be/0x6d0 [ 367.603839][T26779] ? loop_info64_to_compat+0x6d0/0x6d0 [ 367.609278][T26779] __kthread_create_on_node+0xf2/0x460 [ 367.614710][T26779] ? lock_acquire+0x16f/0x3f0 [ 367.619364][T26779] ? kthread_parkme+0xb0/0xb0 [ 367.624024][T26779] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 367.630242][T26779] ? kasan_check_read+0x11/0x20 [ 367.635076][T26779] ? mutex_trylock+0x1e0/0x1e0 [ 367.639820][T26779] ? loop_info64_to_compat+0x6d0/0x6d0 [ 367.645257][T26779] kthread_create_on_node+0xbb/0xf0 [ 367.650429][T26779] ? __kthread_create_on_node+0x460/0x460 [ 367.656137][T26779] ? lockdep_init_map+0x1be/0x6d0 [ 367.661140][T26779] ? lockdep_init_map+0x1be/0x6d0 [ 367.666142][T26779] lo_ioctl+0xc1b/0x2150 [ 367.670365][T26779] ? lo_rw_aio+0x1120/0x1120 [ 367.674943][T26779] blkdev_ioctl+0x6f2/0x1d10 [ 367.679512][T26779] ? blkpg_ioctl+0xa90/0xa90 [ 367.684096][T26779] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 367.689895][T26779] ? __fget+0x35a/0x550 [ 367.694029][T26779] block_ioctl+0xee/0x130 [ 367.698335][T26779] ? blkdev_fallocate+0x410/0x410 [ 367.703354][T26779] do_vfs_ioctl+0xd6e/0x1390 [ 367.707927][T26779] ? ioctl_preallocate+0x210/0x210 [ 367.713035][T26779] ? __fget+0x381/0x550 [ 367.717176][T26779] ? ksys_dup3+0x3e0/0x3e0 [ 367.721569][T26779] ? do_sys_open+0x31d/0x5d0 [ 367.726137][T26779] ? tomoyo_file_ioctl+0x23/0x30 [ 367.731051][T26779] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 367.737269][T26779] ? security_file_ioctl+0x93/0xc0 [ 367.742359][T26779] ksys_ioctl+0xab/0xd0 [ 367.746494][T26779] __x64_sys_ioctl+0x73/0xb0 [ 367.751086][T26779] do_syscall_64+0x103/0x610 [ 367.755671][T26779] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 367.761539][T26779] RIP: 0033:0x458c17 [ 367.765414][T26779] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 367.785006][T26779] RSP: 002b:00007f082125da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 367.793406][T26779] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458c17 [ 367.801353][T26779] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 14:43:35 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:35 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x7) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x4000) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e22, @local}, 0x10) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x40, 0x200000) ioctl$VIDIOC_S_EXT_CTRLS(r2, 0xc0205648, &(0x7f0000000100)={0x9a0000, 0x5, 0xfffffffffffffffe, [], &(0x7f00000000c0)={0x9f0b7f, 0x1400000000000, [], @ptr=0x80000000}}) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) [ 367.809302][T26779] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 367.817247][T26779] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 367.825203][T26779] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:35 executing program 2 (fault-call:0 fault-nth:12): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:35 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) r1 = dup(r0) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000000)={0x6, 0xd5, [0x3, 0x2, 0x3f, 0x1, 0xffffffffffffff65], 0x8}) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) 14:43:35 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0xc00e}, 0x0) 14:43:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) [ 368.022369][T26807] FAULT_INJECTION: forcing a failure. [ 368.022369][T26807] name failslab, interval 1, probability 0, space 0, times 0 [ 368.050938][T26807] CPU: 0 PID: 26807 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 368.058943][T26807] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 368.068990][T26807] Call Trace: [ 368.072289][T26807] dump_stack+0x172/0x1f0 [ 368.076616][T26807] should_fail.cold+0xa/0x15 [ 368.081189][T26807] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 368.086980][T26807] ? ___might_sleep+0x163/0x280 [ 368.091813][T26807] __should_failslab+0x121/0x190 [ 368.096732][T26807] should_failslab+0x9/0x14 [ 368.101215][T26807] kmem_cache_alloc+0x2b2/0x6f0 [ 368.106056][T26807] __kernfs_new_node+0xef/0x690 [ 368.110897][T26807] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 368.116367][T26807] ? __lock_acquire+0x548/0x3fb0 [ 368.121301][T26807] kernfs_new_node+0x99/0x130 [ 368.125959][T26807] kernfs_create_dir_ns+0x52/0x160 [ 368.131050][T26807] internal_create_group+0x7f8/0xc40 [ 368.136315][T26807] ? bd_set_size+0x89/0xb0 [ 368.140734][T26807] ? remove_files.isra.0+0x190/0x190 [ 368.146018][T26807] sysfs_create_group+0x20/0x30 [ 368.150866][T26807] lo_ioctl+0x10af/0x2150 [ 368.155176][T26807] ? lo_rw_aio+0x1120/0x1120 [ 368.159744][T26807] blkdev_ioctl+0x6f2/0x1d10 [ 368.164315][T26807] ? blkpg_ioctl+0xa90/0xa90 [ 368.168883][T26807] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 368.174688][T26807] ? __fget+0x35a/0x550 [ 368.178825][T26807] block_ioctl+0xee/0x130 [ 368.183131][T26807] ? blkdev_fallocate+0x410/0x410 [ 368.188237][T26807] do_vfs_ioctl+0xd6e/0x1390 [ 368.192822][T26807] ? ioctl_preallocate+0x210/0x210 [ 368.197918][T26807] ? __fget+0x381/0x550 [ 368.202054][T26807] ? ksys_dup3+0x3e0/0x3e0 [ 368.206450][T26807] ? do_sys_open+0x31d/0x5d0 [ 368.211020][T26807] ? tomoyo_file_ioctl+0x23/0x30 [ 368.215935][T26807] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 368.222172][T26807] ? security_file_ioctl+0x93/0xc0 [ 368.227268][T26807] ksys_ioctl+0xab/0xd0 [ 368.231405][T26807] __x64_sys_ioctl+0x73/0xb0 [ 368.235987][T26807] do_syscall_64+0x103/0x610 [ 368.240569][T26807] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 368.246435][T26807] RIP: 0033:0x458c17 [ 368.250305][T26807] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:43:36 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, 0x0, 0x0) [ 368.269903][T26807] RSP: 002b:00007f082125da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 368.278291][T26807] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458c17 [ 368.286241][T26807] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 368.294188][T26807] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 368.302136][T26807] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 368.310085][T26807] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:36 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrf+\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:36 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0xf000}, 0x0) 14:43:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:36 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, 0x0, 0x0) 14:43:36 executing program 2 (fault-call:0 fault-nth:13): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:36 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, 0x0, 0x0) 14:43:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:36 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0xff01}, 0x0) [ 368.750224][T26847] FAULT_INJECTION: forcing a failure. [ 368.750224][T26847] name failslab, interval 1, probability 0, space 0, times 0 [ 368.785937][T26847] CPU: 0 PID: 26847 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 368.793945][T26847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 368.803989][T26847] Call Trace: [ 368.807276][T26847] dump_stack+0x172/0x1f0 [ 368.811604][T26847] should_fail.cold+0xa/0x15 [ 368.816180][T26847] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 368.821978][T26847] ? ___might_sleep+0x163/0x280 [ 368.826829][T26847] __should_failslab+0x121/0x190 [ 368.831820][T26847] should_failslab+0x9/0x14 [ 368.836340][T26847] kmem_cache_alloc+0x2b2/0x6f0 [ 368.841192][T26847] ? find_held_lock+0x35/0x130 [ 368.845956][T26847] ? kernfs_activate+0x192/0x1f0 14:43:36 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0xa) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) r1 = syz_open_dev$vbi(&(0x7f00000010c0)='/dev/vbi#\x00', 0x0, 0x2) sendmsg$tipc(r1, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f00000000c0)="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", 0x1000}, {&(0x7f00000010c0)}, {&(0x7f0000001100)="e6ab7ec9262b398d7df9ca013720fd1081551315c87758d3750a24a0d0d142ced8526dffd9410dddfc1fbdfd07d91b663349218cfb4360272fff31369f8684ae59cd30806615ec12e0b62f5f79e44e2fb371b0490f52ddce533008d0aeb6253a503b2d7c62ebf0b5f577c61369ba526eff337ba2ee35500b61d76b4af7e105a4be7ad3684172f8e663c80102da83cb0f84b25cef8b3b583e44c7ea370126e6ca23e7c981a98cf5f99efa5f779da94e82af91918c99b99d8a2bbf8b70a33d8e64e7d43055b1de5345a8fc4b162c8830a668ecc9", 0xd3}, {&(0x7f0000001200)="4a03d098fc14430a06266fbda29d7aeebb6da4c9a93dc897e84dc338706ef5c0d38b9244749679cc67b7c154acb6eed6ca193d76b3c045307e4bf981d4cd159ac54e9bbd5ce0a9f04b2d4201e95b28b0abfedf56073b45c8a6450850fb69ca78b5e4a3856501ef5f46e25d746d4c8989d624ad3c6e647ce67b4241fe14689cae3707d6625e058e261a32b58d37262ec9e3aa76c7e26177db97088e545ba22a291689357ea2bdb3d906c923660c72c3a3755d0da544d7a233dead0c88285ae4610b53f0aa1332e28d47648cd56f01f0873822b7b5e3", 0xd5}], 0x4, &(0x7f0000001340)="1949bb17e6ba43e8e1835decd364702974721c0c61ef8e0c72690b8d891b1f5c357638f80b6587fd30f71c36b631a8075ac32bafb2fbf379dedce4d5a58633c5f802507b596bfc4a18dccb1a7aeab8147d8b7125291aea05f8ea5689945413863ba2e871cbaa98a3cdfb8cfc2a06ac7c24cc16b0b509c59da69afbd1765172ea025bc137357fd4178a1c215309539165888ab085f17f4174e3330c40b5f4769bc2de0efcc3971e5d5a37a483170e36b961edbfc73a93d63bb400a06496258b369c88c8a2009d869d59b59b67b332b9a9705bfc5335e3380612a9f27caa97ce", 0xdf, 0x8000}, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) 14:43:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) [ 368.850899][T26847] __kernfs_new_node+0xef/0x690 [ 368.855751][T26847] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 368.861216][T26847] ? lock_downgrade+0x880/0x880 [ 368.866070][T26847] ? kasan_check_write+0x14/0x20 [ 368.871002][T26847] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 368.876548][T26847] ? wait_for_completion+0x440/0x440 [ 368.881832][T26847] kernfs_new_node+0x99/0x130 [ 368.886647][T26847] __kernfs_create_file+0x51/0x340 [ 368.891737][T26847] sysfs_add_file_mode_ns+0x222/0x560 [ 368.897092][T26847] internal_create_group+0x35b/0xc40 [ 368.902363][T26847] ? bd_set_size+0x89/0xb0 [ 368.906775][T26847] ? remove_files.isra.0+0x190/0x190 [ 368.912046][T26847] sysfs_create_group+0x20/0x30 [ 368.916898][T26847] lo_ioctl+0x10af/0x2150 [ 368.921211][T26847] ? lo_rw_aio+0x1120/0x1120 [ 368.925783][T26847] blkdev_ioctl+0x6f2/0x1d10 [ 368.930364][T26847] ? blkpg_ioctl+0xa90/0xa90 [ 368.934946][T26847] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 368.940745][T26847] ? __fget+0x35a/0x550 [ 368.944882][T26847] block_ioctl+0xee/0x130 [ 368.949204][T26847] ? blkdev_fallocate+0x410/0x410 [ 368.954221][T26847] do_vfs_ioctl+0xd6e/0x1390 [ 368.958806][T26847] ? ioctl_preallocate+0x210/0x210 [ 368.963902][T26847] ? __fget+0x381/0x550 [ 368.968039][T26847] ? ksys_dup3+0x3e0/0x3e0 [ 368.972446][T26847] ? do_sys_open+0x31d/0x5d0 [ 368.977052][T26847] ? tomoyo_file_ioctl+0x23/0x30 [ 368.981976][T26847] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 368.988200][T26847] ? security_file_ioctl+0x93/0xc0 [ 368.993304][T26847] ksys_ioctl+0xab/0xd0 [ 368.997449][T26847] __x64_sys_ioctl+0x73/0xb0 [ 369.002015][T26847] do_syscall_64+0x103/0x610 [ 369.006585][T26847] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 369.012468][T26847] RIP: 0033:0x458c17 [ 369.016353][T26847] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 369.035950][T26847] RSP: 002b:00007f082125da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 369.044342][T26847] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458c17 [ 369.052296][T26847] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 369.060253][T26847] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 369.068203][T26847] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 369.076151][T26847] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:37 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrf-\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:37 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, 0x0}, 0x0) 14:43:37 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x34000}, 0x0) 14:43:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:37 executing program 2 (fault-call:0 fault-nth:14): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:37 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, 0x0}, 0x0) 14:43:37 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrf.\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 369.475850][T26891] FAULT_INJECTION: forcing a failure. [ 369.475850][T26891] name failslab, interval 1, probability 0, space 0, times 0 [ 369.488715][T26891] CPU: 1 PID: 26891 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 369.496695][T26891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 369.506743][T26891] Call Trace: [ 369.510017][T26891] dump_stack+0x172/0x1f0 [ 369.514335][T26891] should_fail.cold+0xa/0x15 [ 369.519194][T26891] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 369.524997][T26891] ? ___might_sleep+0x163/0x280 [ 369.529843][T26891] __should_failslab+0x121/0x190 [ 369.534774][T26891] should_failslab+0x9/0x14 [ 369.539284][T26891] kmem_cache_alloc+0x2b2/0x6f0 [ 369.544129][T26891] ? find_held_lock+0x35/0x130 [ 369.548879][T26891] ? kernfs_activate+0x192/0x1f0 [ 369.553803][T26891] __kernfs_new_node+0xef/0x690 [ 369.558636][T26891] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 369.564073][T26891] ? lock_downgrade+0x880/0x880 [ 369.568901][T26891] ? kasan_check_write+0x14/0x20 [ 369.573830][T26891] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 369.579380][T26891] ? wait_for_completion+0x440/0x440 [ 369.584660][T26891] kernfs_new_node+0x99/0x130 [ 369.589326][T26891] __kernfs_create_file+0x51/0x340 [ 369.594419][T26891] sysfs_add_file_mode_ns+0x222/0x560 [ 369.599771][T26891] internal_create_group+0x35b/0xc40 [ 369.605042][T26891] ? bd_set_size+0x89/0xb0 [ 369.609453][T26891] ? remove_files.isra.0+0x190/0x190 [ 369.614741][T26891] sysfs_create_group+0x20/0x30 [ 369.619614][T26891] lo_ioctl+0x10af/0x2150 [ 369.623929][T26891] ? lo_rw_aio+0x1120/0x1120 [ 369.628496][T26891] blkdev_ioctl+0x6f2/0x1d10 [ 369.633063][T26891] ? blkpg_ioctl+0xa90/0xa90 [ 369.637631][T26891] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 369.643437][T26891] ? __fget+0x35a/0x550 [ 369.647583][T26891] block_ioctl+0xee/0x130 [ 369.651897][T26891] ? blkdev_fallocate+0x410/0x410 [ 369.656901][T26891] do_vfs_ioctl+0xd6e/0x1390 [ 369.661472][T26891] ? ioctl_preallocate+0x210/0x210 [ 369.666569][T26891] ? __fget+0x381/0x550 [ 369.670717][T26891] ? ksys_dup3+0x3e0/0x3e0 [ 369.675111][T26891] ? do_sys_open+0x31d/0x5d0 [ 369.679681][T26891] ? tomoyo_file_ioctl+0x23/0x30 [ 369.684598][T26891] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 369.690816][T26891] ? security_file_ioctl+0x93/0xc0 [ 369.695910][T26891] ksys_ioctl+0xab/0xd0 [ 369.700059][T26891] __x64_sys_ioctl+0x73/0xb0 [ 369.704627][T26891] do_syscall_64+0x103/0x610 [ 369.709196][T26891] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 369.715072][T26891] RIP: 0033:0x458c17 [ 369.718954][T26891] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 369.738542][T26891] RSP: 002b:00007f082125da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 369.746931][T26891] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458c17 [ 369.754883][T26891] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 369.762925][T26891] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 369.770882][T26891] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 369.778850][T26891] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:37 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x400300}, 0x0) 14:43:37 executing program 2 (fault-call:0 fault-nth:15): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:38 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) 14:43:38 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, 0x0}, 0x0) 14:43:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) [ 370.051501][T26920] FAULT_INJECTION: forcing a failure. [ 370.051501][T26920] name failslab, interval 1, probability 0, space 0, times 0 [ 370.083442][T26920] CPU: 1 PID: 26920 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 370.091464][T26920] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 370.101628][T26920] Call Trace: [ 370.104905][T26920] dump_stack+0x172/0x1f0 [ 370.109221][T26920] should_fail.cold+0xa/0x15 [ 370.113798][T26920] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 370.119591][T26920] ? ___might_sleep+0x163/0x280 [ 370.124432][T26920] __should_failslab+0x121/0x190 [ 370.129359][T26920] should_failslab+0x9/0x14 [ 370.133848][T26920] kmem_cache_alloc+0x2b2/0x6f0 [ 370.138683][T26920] ? lock_downgrade+0x880/0x880 [ 370.143525][T26920] ? kasan_check_read+0x11/0x20 [ 370.148368][T26920] __kernfs_new_node+0xef/0x690 [ 370.153197][T26920] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 370.158637][T26920] ? wait_for_completion+0x440/0x440 [ 370.163907][T26920] ? mutex_unlock+0xd/0x10 [ 370.168305][T26920] ? kernfs_activate+0x192/0x1f0 [ 370.173226][T26920] kernfs_new_node+0x99/0x130 [ 370.177896][T26920] __kernfs_create_file+0x51/0x340 [ 370.182988][T26920] sysfs_add_file_mode_ns+0x222/0x560 [ 370.188341][T26920] internal_create_group+0x35b/0xc40 [ 370.193604][T26920] ? bd_set_size+0x89/0xb0 [ 370.198004][T26920] ? remove_files.isra.0+0x190/0x190 [ 370.203276][T26920] sysfs_create_group+0x20/0x30 [ 370.208118][T26920] lo_ioctl+0x10af/0x2150 [ 370.212451][T26920] ? lo_rw_aio+0x1120/0x1120 [ 370.217035][T26920] blkdev_ioctl+0x6f2/0x1d10 [ 370.221605][T26920] ? blkpg_ioctl+0xa90/0xa90 [ 370.226178][T26920] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 370.231980][T26920] ? __fget+0x35a/0x550 [ 370.236128][T26920] block_ioctl+0xee/0x130 [ 370.240453][T26920] ? blkdev_fallocate+0x410/0x410 [ 370.245460][T26920] do_vfs_ioctl+0xd6e/0x1390 [ 370.250049][T26920] ? ioctl_preallocate+0x210/0x210 [ 370.255148][T26920] ? __fget+0x381/0x550 [ 370.259297][T26920] ? ksys_dup3+0x3e0/0x3e0 [ 370.263710][T26920] ? do_sys_open+0x31d/0x5d0 [ 370.268297][T26920] ? tomoyo_file_ioctl+0x23/0x30 [ 370.273214][T26920] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 370.279434][T26920] ? security_file_ioctl+0x93/0xc0 [ 370.284529][T26920] ksys_ioctl+0xab/0xd0 [ 370.288664][T26920] __x64_sys_ioctl+0x73/0xb0 [ 370.293231][T26920] do_syscall_64+0x103/0x610 [ 370.297826][T26920] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 370.303695][T26920] RIP: 0033:0x458c17 [ 370.307579][T26920] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 370.327160][T26920] RSP: 002b:00007f082125da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 370.335556][T26920] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458c17 [ 370.343529][T26920] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 14:43:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) [ 370.351483][T26920] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 370.359438][T26920] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 370.367389][T26920] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:38 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrf0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:38 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0xf0ffff}, 0x0) 14:43:38 executing program 2 (fault-call:0 fault-nth:16): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:38 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0), 0x0) 14:43:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) [ 370.625663][T26956] FAULT_INJECTION: forcing a failure. [ 370.625663][T26956] name failslab, interval 1, probability 0, space 0, times 0 [ 370.640439][T26956] CPU: 1 PID: 26956 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 370.648434][T26956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 370.658470][T26956] Call Trace: [ 370.661746][T26956] dump_stack+0x172/0x1f0 [ 370.666064][T26956] should_fail.cold+0xa/0x15 [ 370.670642][T26956] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 370.676438][T26956] ? ___might_sleep+0x163/0x280 [ 370.681281][T26956] __should_failslab+0x121/0x190 [ 370.686210][T26956] should_failslab+0x9/0x14 [ 370.690715][T26956] kmem_cache_alloc+0x2b2/0x6f0 [ 370.695553][T26956] ? lock_downgrade+0x880/0x880 [ 370.700381][T26956] ? kasan_check_read+0x11/0x20 [ 370.705218][T26956] __kernfs_new_node+0xef/0x690 [ 370.710049][T26956] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 370.715503][T26956] ? wait_for_completion+0x440/0x440 [ 370.720772][T26956] ? mutex_unlock+0xd/0x10 [ 370.725166][T26956] ? kernfs_activate+0x192/0x1f0 [ 370.730081][T26956] kernfs_new_node+0x99/0x130 [ 370.734753][T26956] __kernfs_create_file+0x51/0x340 [ 370.739846][T26956] sysfs_add_file_mode_ns+0x222/0x560 [ 370.745213][T26956] internal_create_group+0x35b/0xc40 [ 370.750477][T26956] ? bd_set_size+0x89/0xb0 [ 370.754875][T26956] ? remove_files.isra.0+0x190/0x190 [ 370.760146][T26956] sysfs_create_group+0x20/0x30 [ 370.764986][T26956] lo_ioctl+0x10af/0x2150 [ 370.769295][T26956] ? lo_rw_aio+0x1120/0x1120 [ 370.773867][T26956] blkdev_ioctl+0x6f2/0x1d10 [ 370.778436][T26956] ? blkpg_ioctl+0xa90/0xa90 [ 370.783014][T26956] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 370.788809][T26956] ? __fget+0x35a/0x550 [ 370.792971][T26956] block_ioctl+0xee/0x130 [ 370.797292][T26956] ? blkdev_fallocate+0x410/0x410 [ 370.802295][T26956] do_vfs_ioctl+0xd6e/0x1390 [ 370.806872][T26956] ? ioctl_preallocate+0x210/0x210 [ 370.811968][T26956] ? __fget+0x381/0x550 [ 370.816113][T26956] ? ksys_dup3+0x3e0/0x3e0 [ 370.820507][T26956] ? do_sys_open+0x31d/0x5d0 14:43:38 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getegid() getresgid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)=0x0) getgroups(0x2, &(0x7f0000000340)=[0xee00, 0xee00]) getgroups(0x4, &(0x7f0000000380)=[0xffffffffffffffff, 0xee01, 0xee01, 0x0]) getgroups(0x1, &(0x7f00000003c0)=[0xee00]) fstat(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getgid() getgroups(0x5, &(0x7f0000000480)=[0xffffffffffffffff, 0xee00, 0x0, 0xee01, 0xffffffffffffffff]) getgroups(0x2, &(0x7f00000004c0)=[0x0, 0xee01]) getgroups(0xa, &(0x7f0000000500)=[r1, r2, r3, r4, r5, r6, r7, r8, r9, r10]) r11 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x6, 0x20000) r12 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r11, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r12, 0x300, 0x70bd27, 0x25dfdbff, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x20004000) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) [ 370.825074][T26956] ? tomoyo_file_ioctl+0x23/0x30 [ 370.830002][T26956] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 370.836233][T26956] ? security_file_ioctl+0x93/0xc0 [ 370.841322][T26956] ksys_ioctl+0xab/0xd0 [ 370.845466][T26956] __x64_sys_ioctl+0x73/0xb0 [ 370.850043][T26956] do_syscall_64+0x103/0x610 [ 370.854613][T26956] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 370.860496][T26956] RIP: 0033:0x458c17 [ 370.864390][T26956] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 370.883994][T26956] RSP: 002b:00007f082125da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 370.892398][T26956] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458c17 [ 370.900345][T26956] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 370.908291][T26956] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 370.916246][T26956] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 370.924207][T26956] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:39 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x1000000}, 0x0) 14:43:39 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0), 0x0) 14:43:39 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfX\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:39 executing program 2 (fault-call:0 fault-nth:17): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:39 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm, @mss={0x2, 0xffffffff}, @mss={0x2, 0x8}, @mss={0x2, 0x6}, @timestamp, @window={0x3, 0x5, 0xffffffffffff1261}], 0x6) 14:43:39 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x2000000}, 0x0) 14:43:39 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0), 0x0) 14:43:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:39 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfc\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 371.370075][T27003] FAULT_INJECTION: forcing a failure. [ 371.370075][T27003] name failslab, interval 1, probability 0, space 0, times 0 [ 371.392957][T27003] CPU: 0 PID: 27003 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 371.400968][T27003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 371.411013][T27003] Call Trace: [ 371.414288][T27003] dump_stack+0x172/0x1f0 [ 371.418604][T27003] should_fail.cold+0xa/0x15 [ 371.423177][T27003] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 371.428961][T27003] ? ___might_sleep+0x163/0x280 [ 371.433807][T27003] __should_failslab+0x121/0x190 [ 371.438718][T27003] should_failslab+0x9/0x14 [ 371.443197][T27003] kmem_cache_alloc+0x2b2/0x6f0 [ 371.448024][T27003] ? lock_downgrade+0x880/0x880 [ 371.452858][T27003] ? kasan_check_read+0x11/0x20 [ 371.457698][T27003] __kernfs_new_node+0xef/0x690 [ 371.462525][T27003] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 371.467964][T27003] ? wait_for_completion+0x440/0x440 [ 371.473231][T27003] ? mutex_unlock+0xd/0x10 [ 371.477621][T27003] ? kernfs_activate+0x192/0x1f0 [ 371.482568][T27003] kernfs_new_node+0x99/0x130 [ 371.487262][T27003] __kernfs_create_file+0x51/0x340 [ 371.492353][T27003] sysfs_add_file_mode_ns+0x222/0x560 [ 371.497701][T27003] internal_create_group+0x35b/0xc40 [ 371.502960][T27003] ? bd_set_size+0x89/0xb0 [ 371.507356][T27003] ? remove_files.isra.0+0x190/0x190 [ 371.512623][T27003] sysfs_create_group+0x20/0x30 [ 371.517471][T27003] lo_ioctl+0x10af/0x2150 [ 371.521778][T27003] ? lo_rw_aio+0x1120/0x1120 [ 371.526345][T27003] blkdev_ioctl+0x6f2/0x1d10 [ 371.530912][T27003] ? blkpg_ioctl+0xa90/0xa90 [ 371.535480][T27003] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 371.541267][T27003] ? __fget+0x35a/0x550 [ 371.545403][T27003] block_ioctl+0xee/0x130 [ 371.549709][T27003] ? blkdev_fallocate+0x410/0x410 [ 371.554711][T27003] do_vfs_ioctl+0xd6e/0x1390 [ 371.559277][T27003] ? ioctl_preallocate+0x210/0x210 [ 371.564365][T27003] ? __fget+0x381/0x550 [ 371.568498][T27003] ? ksys_dup3+0x3e0/0x3e0 [ 371.572890][T27003] ? do_sys_open+0x31d/0x5d0 [ 371.577485][T27003] ? tomoyo_file_ioctl+0x23/0x30 [ 371.582419][T27003] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 371.588648][T27003] ? security_file_ioctl+0x93/0xc0 [ 371.593750][T27003] ksys_ioctl+0xab/0xd0 [ 371.597894][T27003] __x64_sys_ioctl+0x73/0xb0 [ 371.602464][T27003] do_syscall_64+0x103/0x610 [ 371.607030][T27003] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 371.612894][T27003] RIP: 0033:0x458c17 [ 371.616764][T27003] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 371.636340][T27003] RSP: 002b:00007f082125da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 371.644726][T27003] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458c17 [ 371.652670][T27003] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 371.660644][T27003] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 14:43:39 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) [ 371.668588][T27003] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 371.676532][T27003] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:39 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x4000000}, 0x0) 14:43:39 executing program 2 (fault-call:0 fault-nth:18): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:39 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) 14:43:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:39 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfd\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 371.926633][T27025] FAULT_INJECTION: forcing a failure. [ 371.926633][T27025] name failslab, interval 1, probability 0, space 0, times 0 [ 371.948996][T27025] CPU: 0 PID: 27025 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 371.957005][T27025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 371.967059][T27025] Call Trace: [ 371.970363][T27025] dump_stack+0x172/0x1f0 [ 371.974707][T27025] should_fail.cold+0xa/0x15 [ 371.979311][T27025] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 371.985137][T27025] ? ___might_sleep+0x163/0x280 [ 371.989996][T27025] __should_failslab+0x121/0x190 [ 371.994923][T27025] should_failslab+0x9/0x14 [ 371.999410][T27025] kmem_cache_alloc+0x2b2/0x6f0 [ 372.004246][T27025] ? lock_downgrade+0x880/0x880 [ 372.009080][T27025] ? kasan_check_read+0x11/0x20 [ 372.013928][T27025] __kernfs_new_node+0xef/0x690 [ 372.018784][T27025] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 372.024228][T27025] ? wait_for_completion+0x440/0x440 [ 372.029511][T27025] ? mutex_unlock+0xd/0x10 [ 372.033911][T27025] ? kernfs_activate+0x192/0x1f0 [ 372.038839][T27025] kernfs_new_node+0x99/0x130 [ 372.043505][T27025] __kernfs_create_file+0x51/0x340 [ 372.048616][T27025] sysfs_add_file_mode_ns+0x222/0x560 [ 372.053982][T27025] internal_create_group+0x35b/0xc40 [ 372.059251][T27025] ? bd_set_size+0x89/0xb0 [ 372.063662][T27025] ? remove_files.isra.0+0x190/0x190 [ 372.068942][T27025] sysfs_create_group+0x20/0x30 [ 372.073781][T27025] lo_ioctl+0x10af/0x2150 [ 372.078100][T27025] ? lo_rw_aio+0x1120/0x1120 [ 372.082681][T27025] blkdev_ioctl+0x6f2/0x1d10 [ 372.087255][T27025] ? blkpg_ioctl+0xa90/0xa90 [ 372.091833][T27025] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 372.097641][T27025] ? __fget+0x35a/0x550 [ 372.101817][T27025] block_ioctl+0xee/0x130 [ 372.106140][T27025] ? blkdev_fallocate+0x410/0x410 [ 372.111150][T27025] do_vfs_ioctl+0xd6e/0x1390 [ 372.115729][T27025] ? ioctl_preallocate+0x210/0x210 [ 372.120842][T27025] ? __fget+0x381/0x550 [ 372.124991][T27025] ? ksys_dup3+0x3e0/0x3e0 [ 372.129398][T27025] ? do_sys_open+0x31d/0x5d0 [ 372.133978][T27025] ? tomoyo_file_ioctl+0x23/0x30 [ 372.138902][T27025] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 372.145128][T27025] ? security_file_ioctl+0x93/0xc0 [ 372.150225][T27025] ksys_ioctl+0xab/0xd0 [ 372.154371][T27025] __x64_sys_ioctl+0x73/0xb0 [ 372.158971][T27025] do_syscall_64+0x103/0x610 [ 372.163550][T27025] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 372.169425][T27025] RIP: 0033:0x458c17 [ 372.173306][T27025] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 372.192980][T27025] RSP: 002b:00007f082125da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 372.201380][T27025] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458c17 [ 372.209334][T27025] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 372.217290][T27025] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 372.225243][T27025] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 372.233195][T27025] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:40 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0xfffffffffffffe19) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x39, 0x1, 0x7f, "22fd6d54d83384b11961a3e7342e5cfb", "2f94800390b461829e0c9da7138eabf8b949ced0a3d8a4859c89b15e0b0c2b009e816145"}, 0x39, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) 14:43:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) 14:43:40 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0xa000000}, 0x0) 14:43:40 executing program 2 (fault-call:0 fault-nth:19): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:40 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) 14:43:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) [ 372.509126][T27067] FAULT_INJECTION: forcing a failure. [ 372.509126][T27067] name failslab, interval 1, probability 0, space 0, times 0 [ 372.535537][T27067] CPU: 1 PID: 27067 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 372.543562][T27067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 372.553615][T27067] Call Trace: [ 372.556909][T27067] dump_stack+0x172/0x1f0 [ 372.561246][T27067] should_fail.cold+0xa/0x15 [ 372.565849][T27067] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 372.571659][T27067] ? ___might_sleep+0x163/0x280 [ 372.576507][T27067] __should_failslab+0x121/0x190 [ 372.581437][T27067] should_failslab+0x9/0x14 [ 372.585931][T27067] kmem_cache_alloc_trace+0x2d1/0x760 [ 372.591297][T27067] kobject_uevent_env+0x2fb/0x1030 [ 372.596411][T27067] kobject_uevent+0x20/0x26 [ 372.600902][T27067] lo_ioctl+0x112b/0x2150 [ 372.605222][T27067] ? lo_rw_aio+0x1120/0x1120 [ 372.609802][T27067] blkdev_ioctl+0x6f2/0x1d10 [ 372.614381][T27067] ? blkpg_ioctl+0xa90/0xa90 [ 372.618955][T27067] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 372.624758][T27067] ? __fget+0x35a/0x550 [ 372.628905][T27067] block_ioctl+0xee/0x130 [ 372.633246][T27067] ? blkdev_fallocate+0x410/0x410 [ 372.638257][T27067] do_vfs_ioctl+0xd6e/0x1390 [ 372.642837][T27067] ? ioctl_preallocate+0x210/0x210 [ 372.647930][T27067] ? __fget+0x381/0x550 [ 372.652079][T27067] ? ksys_dup3+0x3e0/0x3e0 [ 372.656481][T27067] ? do_sys_open+0x31d/0x5d0 [ 372.661061][T27067] ? tomoyo_file_ioctl+0x23/0x30 [ 372.665987][T27067] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 372.672216][T27067] ? security_file_ioctl+0x93/0xc0 [ 372.677320][T27067] ksys_ioctl+0xab/0xd0 [ 372.681463][T27067] __x64_sys_ioctl+0x73/0xb0 [ 372.686039][T27067] do_syscall_64+0x103/0x610 [ 372.690624][T27067] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 372.696497][T27067] RIP: 0033:0x458c17 [ 372.700380][T27067] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 372.719964][T27067] RSP: 002b:00007f082125da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 372.728356][T27067] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458c17 [ 372.736319][T27067] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 372.744284][T27067] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 372.752335][T27067] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 14:43:40 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0xe000000}, 0x0) 14:43:40 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfi\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 372.760293][T27067] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:40 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)}], 0x1}, 0x0) 14:43:40 executing program 2 (fault-call:0 fault-nth:20): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) [ 373.006011][T27090] FAULT_INJECTION: forcing a failure. [ 373.006011][T27090] name failslab, interval 1, probability 0, space 0, times 0 [ 373.019159][T27090] CPU: 1 PID: 27090 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 373.027148][T27090] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 373.037190][T27090] Call Trace: [ 373.040477][T27090] dump_stack+0x172/0x1f0 [ 373.044804][T27090] should_fail.cold+0xa/0x15 [ 373.049383][T27090] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 373.055201][T27090] ? ___might_sleep+0x163/0x280 [ 373.060050][T27090] __should_failslab+0x121/0x190 [ 373.064969][T27090] should_failslab+0x9/0x14 [ 373.069454][T27090] __kmalloc+0x2dc/0x740 [ 373.073683][T27090] ? kobject_uevent_env+0x2fb/0x1030 [ 373.078950][T27090] ? rcu_read_lock_sched_held+0x110/0x130 [ 373.084649][T27090] ? kobject_get_path+0xc4/0x1b0 [ 373.089577][T27090] kobject_get_path+0xc4/0x1b0 [ 373.094322][T27090] kobject_uevent_env+0x31f/0x1030 [ 373.099430][T27090] kobject_uevent+0x20/0x26 [ 373.103916][T27090] lo_ioctl+0x112b/0x2150 [ 373.108225][T27090] ? lo_rw_aio+0x1120/0x1120 [ 373.112793][T27090] blkdev_ioctl+0x6f2/0x1d10 [ 373.117366][T27090] ? blkpg_ioctl+0xa90/0xa90 [ 373.121935][T27090] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 373.127723][T27090] ? __fget+0x35a/0x550 [ 373.131858][T27090] block_ioctl+0xee/0x130 [ 373.136162][T27090] ? blkdev_fallocate+0x410/0x410 [ 373.141183][T27090] do_vfs_ioctl+0xd6e/0x1390 [ 373.145766][T27090] ? ioctl_preallocate+0x210/0x210 [ 373.150986][T27090] ? __fget+0x381/0x550 [ 373.155137][T27090] ? ksys_dup3+0x3e0/0x3e0 [ 373.159539][T27090] ? do_sys_open+0x31d/0x5d0 [ 373.164112][T27090] ? tomoyo_file_ioctl+0x23/0x30 [ 373.169030][T27090] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 373.175249][T27090] ? security_file_ioctl+0x93/0xc0 [ 373.180345][T27090] ksys_ioctl+0xab/0xd0 [ 373.184480][T27090] __x64_sys_ioctl+0x73/0xb0 [ 373.189966][T27090] do_syscall_64+0x103/0x610 [ 373.194540][T27090] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 373.200428][T27090] RIP: 0033:0x458c17 [ 373.204304][T27090] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 373.223906][T27090] RSP: 002b:00007f082125da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 373.232299][T27090] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458c17 [ 373.240253][T27090] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 373.248214][T27090] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 14:43:41 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0xf000000}, 0x0) [ 373.256165][T27090] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 373.264114][T27090] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:41 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4800) setsockopt$inet_tcp_int(r1, 0x6, 0x1b, &(0x7f00000000c0)=0x1f, 0x4) 14:43:41 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)}], 0x1}, 0x0) 14:43:41 executing program 2 (fault-call:0 fault-nth:21): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x2}], 0x1}, 0x0) 14:43:41 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfl\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:41 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x4000000000003) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) 14:43:41 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)}], 0x1}, 0x0) [ 373.604326][T27122] FAULT_INJECTION: forcing a failure. [ 373.604326][T27122] name failslab, interval 1, probability 0, space 0, times 0 [ 373.667608][T27122] CPU: 0 PID: 27122 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 373.675648][T27122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 373.685709][T27122] Call Trace: [ 373.689014][T27122] dump_stack+0x172/0x1f0 [ 373.693355][T27122] should_fail.cold+0xa/0x15 [ 373.697955][T27122] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 373.703772][T27122] ? ___might_sleep+0x163/0x280 [ 373.708631][T27122] __should_failslab+0x121/0x190 [ 373.713573][T27122] should_failslab+0x9/0x14 [ 373.718082][T27122] kmem_cache_alloc_node+0x264/0x710 [ 373.723381][T27122] ? find_held_lock+0x35/0x130 [ 373.728153][T27122] __alloc_skb+0xd5/0x5e0 [ 373.732501][T27122] ? skb_trim+0x190/0x190 [ 373.736836][T27122] ? kasan_check_read+0x11/0x20 [ 373.741692][T27122] alloc_uevent_skb+0x83/0x1e2 [ 373.746475][T27122] kobject_uevent_env+0xa63/0x1030 [ 373.751603][T27122] kobject_uevent+0x20/0x26 [ 373.756106][T27122] lo_ioctl+0x112b/0x2150 [ 373.760441][T27122] ? lo_rw_aio+0x1120/0x1120 [ 373.765046][T27122] blkdev_ioctl+0x6f2/0x1d10 [ 373.769644][T27122] ? blkpg_ioctl+0xa90/0xa90 [ 373.774243][T27122] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 373.780065][T27122] ? __fget+0x35a/0x550 [ 373.784232][T27122] block_ioctl+0xee/0x130 [ 373.788563][T27122] ? blkdev_fallocate+0x410/0x410 [ 373.793589][T27122] do_vfs_ioctl+0xd6e/0x1390 [ 373.798182][T27122] ? ioctl_preallocate+0x210/0x210 [ 373.803294][T27122] ? __fget+0x381/0x550 [ 373.807477][T27122] ? ksys_dup3+0x3e0/0x3e0 [ 373.811892][T27122] ? do_sys_open+0x31d/0x5d0 [ 373.816499][T27122] ? tomoyo_file_ioctl+0x23/0x30 [ 373.821439][T27122] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 373.827689][T27122] ? security_file_ioctl+0x93/0xc0 [ 373.832805][T27122] ksys_ioctl+0xab/0xd0 [ 373.836967][T27122] __x64_sys_ioctl+0x73/0xb0 [ 373.841558][T27122] do_syscall_64+0x103/0x610 [ 373.846151][T27122] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 373.852037][T27122] RIP: 0033:0x458c17 [ 373.855932][T27122] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 373.875534][T27122] RSP: 002b:00007f082125da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 373.883950][T27122] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458c17 [ 373.891932][T27122] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 373.899899][T27122] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 373.907867][T27122] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 14:43:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x3}], 0x1}, 0x0) [ 373.915838][T27122] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:42 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x3f000000}, 0x0) 14:43:42 executing program 2 (fault-call:0 fault-nth:22): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:42 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315", 0x1d}], 0x1}, 0x0) 14:43:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x4}], 0x1}, 0x0) 14:43:42 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x58010000}, 0x0) [ 374.254492][T27151] FAULT_INJECTION: forcing a failure. [ 374.254492][T27151] name failslab, interval 1, probability 0, space 0, times 0 [ 374.289408][T27151] CPU: 1 PID: 27151 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 374.297438][T27151] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 374.307500][T27151] Call Trace: [ 374.310796][T27151] dump_stack+0x172/0x1f0 [ 374.315137][T27151] should_fail.cold+0xa/0x15 [ 374.319737][T27151] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 374.325552][T27151] ? ___might_sleep+0x163/0x280 [ 374.330409][T27151] __should_failslab+0x121/0x190 [ 374.335349][T27151] should_failslab+0x9/0x14 [ 374.339847][T27151] kmem_cache_alloc_node+0x264/0x710 [ 374.345111][T27151] ? find_held_lock+0x35/0x130 [ 374.349858][T27151] __alloc_skb+0xd5/0x5e0 [ 374.354177][T27151] ? skb_trim+0x190/0x190 [ 374.359481][T27151] ? kasan_check_read+0x11/0x20 [ 374.364324][T27151] alloc_uevent_skb+0x83/0x1e2 [ 374.369065][T27151] kobject_uevent_env+0xa63/0x1030 [ 374.374170][T27151] kobject_uevent+0x20/0x26 [ 374.378655][T27151] lo_ioctl+0x112b/0x2150 [ 374.382979][T27151] ? lo_rw_aio+0x1120/0x1120 [ 374.387569][T27151] blkdev_ioctl+0x6f2/0x1d10 [ 374.392138][T27151] ? blkpg_ioctl+0xa90/0xa90 [ 374.396707][T27151] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 374.402496][T27151] ? __fget+0x35a/0x550 [ 374.406632][T27151] block_ioctl+0xee/0x130 [ 374.410941][T27151] ? blkdev_fallocate+0x410/0x410 [ 374.415959][T27151] do_vfs_ioctl+0xd6e/0x1390 [ 374.420531][T27151] ? ioctl_preallocate+0x210/0x210 [ 374.425619][T27151] ? __fget+0x381/0x550 [ 374.429752][T27151] ? ksys_dup3+0x3e0/0x3e0 [ 374.434159][T27151] ? do_sys_open+0x31d/0x5d0 [ 374.438743][T27151] ? tomoyo_file_ioctl+0x23/0x30 [ 374.443678][T27151] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 374.449909][T27151] ? security_file_ioctl+0x93/0xc0 [ 374.455015][T27151] ksys_ioctl+0xab/0xd0 [ 374.459164][T27151] __x64_sys_ioctl+0x73/0xb0 [ 374.463735][T27151] do_syscall_64+0x103/0x610 [ 374.468306][T27151] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 374.474173][T27151] RIP: 0033:0x458c17 [ 374.478045][T27151] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:43:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x5}], 0x1}, 0x0) [ 374.497632][T27151] RSP: 002b:00007f082125da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 374.506032][T27151] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458c17 [ 374.513982][T27151] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 374.521927][T27151] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 374.529872][T27151] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 374.537829][T27151] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:42 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315", 0x1d}], 0x1}, 0x0) 14:43:42 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfo\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:42 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x60000000}, 0x0) 14:43:42 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x210001, 0x0) ioctl$KVM_SET_CLOCK(r1, 0x4030ae7b, &(0x7f00000000c0)={0xffffffff7fffffff, 0x6151}) 14:43:42 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315", 0x1d}], 0x1}, 0x0) 14:43:42 executing program 2 (fault-call:0 fault-nth:23): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x8}], 0x1}, 0x0) 14:43:42 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x9effffff}, 0x0) 14:43:42 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfp\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 374.961446][T27194] FAULT_INJECTION: forcing a failure. [ 374.961446][T27194] name failslab, interval 1, probability 0, space 0, times 0 14:43:43 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e05926166", 0x2b}], 0x1}, 0x0) [ 375.009761][T27194] CPU: 0 PID: 27194 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 375.017778][T27194] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 375.027833][T27194] Call Trace: [ 375.031128][T27194] dump_stack+0x172/0x1f0 [ 375.035463][T27194] should_fail.cold+0xa/0x15 [ 375.040054][T27194] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 375.045857][T27194] ? ___might_sleep+0x163/0x280 [ 375.050703][T27194] __should_failslab+0x121/0x190 [ 375.055626][T27194] should_failslab+0x9/0x14 [ 375.060116][T27194] kmem_cache_alloc_node+0x264/0x710 [ 375.065391][T27194] ? find_held_lock+0x35/0x130 [ 375.070164][T27194] __alloc_skb+0xd5/0x5e0 [ 375.074481][T27194] ? skb_trim+0x190/0x190 [ 375.078811][T27194] ? kasan_check_read+0x11/0x20 [ 375.083651][T27194] alloc_uevent_skb+0x83/0x1e2 [ 375.088403][T27194] kobject_uevent_env+0xa63/0x1030 [ 375.093507][T27194] kobject_uevent+0x20/0x26 [ 375.097994][T27194] lo_ioctl+0x112b/0x2150 [ 375.102317][T27194] ? lo_rw_aio+0x1120/0x1120 [ 375.106893][T27194] blkdev_ioctl+0x6f2/0x1d10 [ 375.111556][T27194] ? blkpg_ioctl+0xa90/0xa90 [ 375.116129][T27194] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 375.121929][T27194] ? __fget+0x35a/0x550 [ 375.126078][T27194] block_ioctl+0xee/0x130 [ 375.130391][T27194] ? blkdev_fallocate+0x410/0x410 [ 375.135401][T27194] do_vfs_ioctl+0xd6e/0x1390 [ 375.139982][T27194] ? ioctl_preallocate+0x210/0x210 [ 375.145089][T27194] ? __fget+0x381/0x550 [ 375.149237][T27194] ? ksys_dup3+0x3e0/0x3e0 [ 375.153642][T27194] ? do_sys_open+0x31d/0x5d0 [ 375.158219][T27194] ? tomoyo_file_ioctl+0x23/0x30 [ 375.163144][T27194] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 375.169375][T27194] ? security_file_ioctl+0x93/0xc0 [ 375.174482][T27194] ksys_ioctl+0xab/0xd0 [ 375.178629][T27194] __x64_sys_ioctl+0x73/0xb0 [ 375.183205][T27194] do_syscall_64+0x103/0x610 [ 375.187781][T27194] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 375.195135][T27194] RIP: 0033:0x458c17 [ 375.199015][T27194] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 375.218603][T27194] RSP: 002b:00007f082125da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 375.226999][T27194] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458c17 [ 375.234952][T27194] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 375.242904][T27194] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 375.250857][T27194] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 375.258810][T27194] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x9}], 0x1}, 0x0) 14:43:43 executing program 2 (fault-call:0 fault-nth:24): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:43 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e05926166", 0x2b}], 0x1}, 0x0) 14:43:43 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfu\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 375.477621][T27224] FAULT_INJECTION: forcing a failure. [ 375.477621][T27224] name failslab, interval 1, probability 0, space 0, times 0 [ 375.491255][T27224] CPU: 0 PID: 27224 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 375.499245][T27224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 375.509294][T27224] Call Trace: [ 375.512603][T27224] dump_stack+0x172/0x1f0 [ 375.516938][T27224] should_fail.cold+0xa/0x15 [ 375.521534][T27224] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 375.527351][T27224] ? ___might_sleep+0x163/0x280 [ 375.532199][T27224] __should_failslab+0x121/0x190 [ 375.537129][T27224] should_failslab+0x9/0x14 [ 375.541626][T27224] kmem_cache_alloc+0x2b2/0x6f0 [ 375.546458][T27224] ? __fget+0x381/0x550 [ 375.550605][T27224] getname_flags+0xd6/0x5b0 [ 375.555099][T27224] do_mkdirat+0xa0/0x2a0 [ 375.559415][T27224] ? __ia32_sys_mknod+0xb0/0xb0 [ 375.564248][T27224] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 375.569688][T27224] ? do_syscall_64+0x26/0x610 [ 375.574353][T27224] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 375.580402][T27224] ? do_syscall_64+0x26/0x610 [ 375.585064][T27224] ? lockdep_hardirqs_on+0x418/0x5d0 [ 375.590346][T27224] __x64_sys_mkdir+0x5c/0x80 [ 375.594921][T27224] do_syscall_64+0x103/0x610 [ 375.599497][T27224] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 375.605371][T27224] RIP: 0033:0x4581c7 14:43:43 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0xc00e0000}, 0x0) [ 375.609249][T27224] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 375.628835][T27224] RSP: 002b:00007f082125da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 375.637232][T27224] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 00000000004581c7 [ 375.645185][T27224] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000000 [ 375.653145][T27224] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 375.661101][T27224] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 375.669054][T27224] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:43 executing program 1: r0 = syz_open_dev$radio(&(0x7f0000000240)='/dev/radio#\x00', 0x1, 0x2) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000280)={0x0, 0x6291, 0x3}) r1 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000640)=[{r1}], 0x20f5, 0x0, 0x0, 0x136) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000002c0)=@assoc_id=0x0, &(0x7f0000000440)=0x4) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000480)=@assoc_value={r2, 0x3ff}, 0x8) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101000, 0x0) accept4$unix(r0, &(0x7f0000000580), &(0x7f0000000540)=0x6e, 0x80800) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000000c0)={{0x2002, 0x1, 0x0, 0x1, 0x5, 0x2, 0x2, 0x0, 0x9, 0x5, 0x7ff, 0x8}, {0x5004, 0x2000, 0xf, 0x3, 0x6, 0x3f, 0x8379, 0x27dd0, 0x1, 0x4, 0x2, 0x1}, {0xd000, 0x2, 0x4, 0x5, 0x100000000, 0x8, 0x74e, 0x7ff, 0x2, 0x8000, 0xf18}, {0x3000, 0x102004, 0x8, 0x0, 0x3, 0x1, 0x9043, 0x7, 0x4, 0x7ff, 0x380000000, 0x5}, {0x102003, 0x3000, 0x10, 0x800, 0x3, 0x3, 0x733e07ca, 0x6, 0x10001, 0x9, 0xc000000}, {0x4, 0x0, 0x14, 0xa2, 0x3c, 0x800, 0x5, 0x700000000000, 0x9, 0x9, 0x2, 0xb02e}, {0xf001, 0x2, 0xf, 0xa64, 0x401, 0x1, 0x8, 0x0, 0x5, 0x100000000, 0xeaf5, 0x400}, {0x7000, 0x100001, 0xf, 0xff, 0x80000000, 0x2, 0xff, 0x3, 0xfffffffffffffffe, 0x0, 0x81, 0x4}, {0x100000, 0xd000}, {0x0, 0xd5417e8d490809bf}, 0x6, 0x0, 0xf000, 0x2, 0xa, 0x2000, 0x4, [0xd73, 0x9, 0x3675, 0x3]}) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4) socketpair(0x1, 0x8000a, 0xfff, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f00000004c0)={0x0, 0x0}) clock_settime(0x3, &(0x7f0000000500)={r4, r5+30000000}) write$UHID_CREATE(r3, &(0x7f0000000300)={0x0, 'syz1\x00', 'syz1\x00', 'syz1\x00', &(0x7f00000002c0), 0x0, 0x3, 0x68, 0x14, 0x6, 0x2}, 0x120) 14:43:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0xc}], 0x1}, 0x0) 14:43:43 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e05926166", 0x2b}], 0x1}, 0x0) 14:43:43 executing program 2 (fault-call:0 fault-nth:25): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:43 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0xf0ffffff}, 0x0) 14:43:43 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c", 0x32}], 0x1}, 0x0) 14:43:43 executing program 1: ppoll(&(0x7f0000000080)=[{}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x7, &(0x7f0000000040), 0x4) [ 375.987783][T27260] FAULT_INJECTION: forcing a failure. [ 375.987783][T27260] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 376.001028][T27260] CPU: 0 PID: 27260 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 376.008996][T27260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 376.019044][T27260] Call Trace: [ 376.022342][T27260] dump_stack+0x172/0x1f0 [ 376.026693][T27260] should_fail.cold+0xa/0x15 [ 376.031294][T27260] ? lo_ioctl+0xcf/0x2150 [ 376.031320][T27260] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 376.041433][T27260] ? __lock_acquire+0x548/0x3fb0 [ 376.046384][T27260] should_fail_alloc_page+0x50/0x60 [ 376.051585][T27260] __alloc_pages_nodemask+0x1a1/0x8d0 [ 376.051609][T27260] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 376.062666][T27260] ? find_held_lock+0x35/0x130 [ 376.067430][T27260] ? __fget+0x35a/0x550 [ 376.071581][T27260] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 376.077383][T27260] cache_grow_begin+0x9c/0x860 [ 376.082139][T27260] ? getname_flags+0xd6/0x5b0 [ 376.086803][T27260] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 376.093033][T27260] kmem_cache_alloc+0x62d/0x6f0 [ 376.097881][T27260] ? __fget+0x381/0x550 [ 376.102027][T27260] getname_flags+0xd6/0x5b0 [ 376.106533][T27260] do_mkdirat+0xa0/0x2a0 [ 376.110761][T27260] ? __ia32_sys_mknod+0xb0/0xb0 [ 376.115600][T27260] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 376.121044][T27260] ? do_syscall_64+0x26/0x610 [ 376.125703][T27260] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 376.131750][T27260] ? do_syscall_64+0x26/0x610 [ 376.136415][T27260] ? lockdep_hardirqs_on+0x418/0x5d0 [ 376.141700][T27260] __x64_sys_mkdir+0x5c/0x80 [ 376.146287][T27260] do_syscall_64+0x103/0x610 [ 376.150864][T27260] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 376.156736][T27260] RIP: 0033:0x4581c7 [ 376.160614][T27260] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 376.180197][T27260] RSP: 002b:00007f082125da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 376.188590][T27260] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 00000000004581c7 [ 376.196543][T27260] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000000 [ 376.204497][T27260] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 376.212452][T27260] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 376.220407][T27260] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x11}], 0x1}, 0x0) 14:43:44 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfx\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:44 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0xff010000}, 0x0) 14:43:44 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c", 0x32}], 0x1}, 0x0) 14:43:44 executing program 2 (fault-call:0 fault-nth:26): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0xffd7}], 0x1}, 0x0) 14:43:44 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0xfffff000}, 0x0) 14:43:44 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c", 0x32}], 0x1}, 0x0) 14:43:44 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x02', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 376.587837][T27301] FAULT_INJECTION: forcing a failure. [ 376.587837][T27301] name failslab, interval 1, probability 0, space 0, times 0 [ 376.656737][T27301] CPU: 0 PID: 27301 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 376.664760][T27301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 376.674827][T27301] Call Trace: [ 376.678132][T27301] dump_stack+0x172/0x1f0 [ 376.682478][T27301] should_fail.cold+0xa/0x15 [ 376.687090][T27301] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 376.692917][T27301] ? ___might_sleep+0x163/0x280 [ 376.697777][T27301] __should_failslab+0x121/0x190 [ 376.702727][T27301] should_failslab+0x9/0x14 [ 376.707243][T27301] kmem_cache_alloc+0x2b2/0x6f0 [ 376.712090][T27301] ? __fget+0x381/0x550 [ 376.716277][T27301] getname_flags+0xd6/0x5b0 [ 376.720791][T27301] do_mkdirat+0xa0/0x2a0 [ 376.725013][T27301] ? __ia32_sys_mknod+0xb0/0xb0 [ 376.729844][T27301] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 376.735279][T27301] ? do_syscall_64+0x26/0x610 [ 376.739938][T27301] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 376.745995][T27301] ? do_syscall_64+0x26/0x610 [ 376.750657][T27301] ? lockdep_hardirqs_on+0x418/0x5d0 [ 376.755941][T27301] __x64_sys_mkdir+0x5c/0x80 [ 376.760524][T27301] do_syscall_64+0x103/0x610 [ 376.765109][T27301] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 376.770989][T27301] RIP: 0033:0x4581c7 [ 376.774861][T27301] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 376.794448][T27301] RSP: 002b:00007f082125da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 14:43:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x20000501}], 0x1}, 0x0) [ 376.802836][T27301] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 00000000004581c7 [ 376.810796][T27301] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000000 [ 376.818755][T27301] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 376.826715][T27301] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 376.834675][T27301] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:44 executing program 2 (fault-call:0 fault-nth:27): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 377.044749][T27332] FAULT_INJECTION: forcing a failure. [ 377.044749][T27332] name failslab, interval 1, probability 0, space 0, times 0 [ 377.069086][T27332] CPU: 1 PID: 27332 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 377.077180][T27332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 377.087230][T27332] Call Trace: [ 377.090520][T27332] dump_stack+0x172/0x1f0 [ 377.094860][T27332] should_fail.cold+0xa/0x15 [ 377.099443][T27332] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 377.105265][T27332] ? ___might_sleep+0x163/0x280 [ 377.110106][T27332] __should_failslab+0x121/0x190 [ 377.115025][T27332] should_failslab+0x9/0x14 [ 377.128096][T27332] kmem_cache_alloc+0x2b2/0x6f0 [ 377.132937][T27332] ? __d_lookup+0x433/0x760 [ 377.137435][T27332] ? lookup_dcache+0x23/0x140 14:43:45 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2000000020002, 0x0) flock(r0, 0x1) r1 = socket$rxrpc(0x21, 0x2, 0xa) listen(r1, 0x9) ppoll(&(0x7f0000000080)=[{r1}], 0x1, 0x0, 0x0, 0x1b5) ioctl$VIDIOC_G_AUDOUT(r0, 0x80345631, &(0x7f00000000c0)) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040)=0x4, 0x4) 14:43:45 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a658", 0x36}], 0x1}, 0x0) 14:43:45 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0xffffff7f}, 0x0) 14:43:45 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x03', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 377.142107][T27332] ? d_lookup+0xf9/0x260 [ 377.146355][T27332] ? lockdep_hardirqs_on+0x418/0x5d0 [ 377.151640][T27332] __d_alloc+0x2e/0x8c0 [ 377.155807][T27332] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 377.161505][T27332] d_alloc+0x4d/0x2b0 [ 377.165489][T27332] __lookup_hash+0xcd/0x190 [ 377.169984][T27332] filename_create+0x1a7/0x4f0 [ 377.174731][T27332] ? kern_path_mountpoint+0x40/0x40 [ 377.179905][T27332] ? strncpy_from_user+0x2a8/0x380 [ 377.185013][T27332] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 377.192100][T27332] ? getname_flags+0x277/0x5b0 [ 377.196876][T27332] do_mkdirat+0xb5/0x2a0 [ 377.201122][T27332] ? __ia32_sys_mknod+0xb0/0xb0 [ 377.205971][T27332] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 377.211432][T27332] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 377.217501][T27332] ? do_syscall_64+0x26/0x610 [ 377.222171][T27332] ? lockdep_hardirqs_on+0x418/0x5d0 [ 377.227465][T27332] __x64_sys_mkdir+0x5c/0x80 [ 377.232063][T27332] do_syscall_64+0x103/0x610 [ 377.236649][T27332] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 377.242531][T27332] RIP: 0033:0x4581c7 [ 377.246412][T27332] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 377.266000][T27332] RSP: 002b:00007f082125da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 377.274414][T27332] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 00000000004581c7 [ 377.282386][T27332] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000000 [ 377.290359][T27332] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 377.298329][T27332] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 377.306286][T27332] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:45 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a658", 0x36}], 0x1}, 0x0) 14:43:45 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x04', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:45 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0xffffff9e}, 0x0) 14:43:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x7ffff000}], 0x1}, 0x0) 14:43:45 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a658", 0x36}], 0x1}, 0x0) 14:43:45 executing program 2 (fault-call:0 fault-nth:28): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:45 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0xfffffff0}, 0x0) [ 377.704673][T27374] FAULT_INJECTION: forcing a failure. [ 377.704673][T27374] name failslab, interval 1, probability 0, space 0, times 0 [ 377.717926][T27374] CPU: 0 PID: 27374 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 377.725902][T27374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 377.735948][T27374] Call Trace: [ 377.739240][T27374] dump_stack+0x172/0x1f0 [ 377.743590][T27374] should_fail.cold+0xa/0x15 [ 377.748193][T27374] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 377.748212][T27374] ? __es_tree_search.isra.0+0x1bf/0x230 [ 377.748234][T27374] __should_failslab+0x121/0x190 [ 377.748250][T27374] should_failslab+0x9/0x14 [ 377.748269][T27374] kmem_cache_alloc+0x47/0x6f0 [ 377.773823][T27374] ? ext4_es_scan+0x730/0x730 [ 377.778510][T27374] ? do_raw_write_lock+0x124/0x290 [ 377.783617][T27374] __es_insert_extent+0x2cc/0xf20 [ 377.788634][T27374] ext4_es_insert_extent+0x2b7/0xa40 [ 377.793913][T27374] ? ext4_es_scan_clu+0x50/0x50 [ 377.798768][T27374] ? rcu_read_lock_sched_held+0x110/0x130 [ 377.804492][T27374] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 377.810725][T27374] ? ext4_es_find_extent_range+0xff/0x600 [ 377.816440][T27374] ext4_ext_put_gap_in_cache+0xfe/0x150 [ 377.821963][T27374] ? ext4_rereserve_cluster+0x240/0x240 [ 377.827501][T27374] ? ext4_find_extent+0x76e/0x9d0 [ 377.832511][T27374] ? ext4_find_extent+0x6a6/0x9d0 [ 377.837531][T27374] ext4_ext_map_blocks+0x20a8/0x5260 [ 377.842832][T27374] ? ext4_ext_release+0x10/0x10 [ 377.847670][T27374] ? lock_acquire+0x16f/0x3f0 [ 377.852335][T27374] ? ext4_map_blocks+0x3fd/0x18e0 [ 377.857352][T27374] ext4_map_blocks+0xec7/0x18e0 [ 377.862201][T27374] ? ext4_issue_zeroout+0x190/0x190 [ 377.867393][T27374] ? kasan_check_write+0x14/0x20 [ 377.872312][T27374] ? __brelse+0x95/0xb0 [ 377.876464][T27374] ext4_getblk+0xc4/0x510 [ 377.880783][T27374] ? ext4_iomap_begin+0xfe0/0xfe0 [ 377.885790][T27374] ? ext4_free_inode+0x1450/0x1450 [ 377.890892][T27374] ext4_bread+0x8f/0x230 [ 377.895123][T27374] ? ext4_getblk+0x510/0x510 [ 377.899770][T27374] ext4_append+0x155/0x370 [ 377.904192][T27374] ext4_mkdir+0x61b/0xdf0 [ 377.908526][T27374] ? ext4_init_dot_dotdot+0x520/0x520 [ 377.913899][T27374] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 377.920125][T27374] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 377.926366][T27374] ? security_inode_permission+0xd5/0x110 [ 377.932072][T27374] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 377.938289][T27374] ? security_inode_mkdir+0xee/0x120 [ 377.943553][T27374] vfs_mkdir+0x433/0x690 [ 377.947787][T27374] do_mkdirat+0x234/0x2a0 [ 377.952108][T27374] ? __ia32_sys_mknod+0xb0/0xb0 [ 377.956945][T27374] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 377.962392][T27374] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 377.968433][T27374] ? do_syscall_64+0x26/0x610 [ 377.973086][T27374] ? lockdep_hardirqs_on+0x418/0x5d0 [ 377.978350][T27374] __x64_sys_mkdir+0x5c/0x80 [ 377.982916][T27374] do_syscall_64+0x103/0x610 [ 377.987487][T27374] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 377.993375][T27374] RIP: 0033:0x4581c7 [ 377.997258][T27374] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 378.016841][T27374] RSP: 002b:00007f082125da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 378.025238][T27374] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 00000000004581c7 [ 378.033203][T27374] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000000 [ 378.041170][T27374] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 14:43:46 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x05', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 378.049141][T27374] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 378.057090][T27374] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:46 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x100) setsockopt$ax25_int(r1, 0x101, 0x1, &(0x7f00000000c0)=0x1, 0x4) 14:43:46 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e88", 0x38}], 0x1}, 0x0) 14:43:46 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x06', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:46 executing program 2 (fault-call:0 fault-nth:29): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:46 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x40030000000000}, 0x0) 14:43:46 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e88", 0x38}], 0x1}, 0x0) 14:43:46 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\a', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 378.431877][T27415] FAULT_INJECTION: forcing a failure. [ 378.431877][T27415] name failslab, interval 1, probability 0, space 0, times 0 [ 378.444784][T27415] CPU: 0 PID: 27415 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 378.452765][T27415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 378.462820][T27415] Call Trace: [ 378.466142][T27415] dump_stack+0x172/0x1f0 [ 378.470487][T27415] should_fail.cold+0xa/0x15 [ 378.475104][T27415] ? fault_create_debugfs_attr+0x1e0/0x1e0 14:43:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0xfffffdef}], 0x1}, 0x0) [ 378.480916][T27415] ? __es_tree_search.isra.0+0x1bf/0x230 [ 378.486554][T27415] __should_failslab+0x121/0x190 [ 378.491503][T27415] should_failslab+0x9/0x14 [ 378.496015][T27415] kmem_cache_alloc+0x47/0x6f0 [ 378.500779][T27415] ? ext4_es_scan+0x730/0x730 [ 378.505452][T27415] ? do_raw_write_lock+0x124/0x290 [ 378.510548][T27415] __es_insert_extent+0x2cc/0xf20 [ 378.515561][T27415] ext4_es_insert_extent+0x2b7/0xa40 [ 378.520833][T27415] ? ext4_es_scan_clu+0x50/0x50 [ 378.525688][T27415] ? rcu_read_lock_sched_held+0x110/0x130 [ 378.531391][T27415] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 378.537616][T27415] ? ext4_es_find_extent_range+0xff/0x600 [ 378.543325][T27415] ext4_ext_put_gap_in_cache+0xfe/0x150 [ 378.548857][T27415] ? ext4_rereserve_cluster+0x240/0x240 [ 378.554388][T27415] ? ext4_find_extent+0x76e/0x9d0 [ 378.559399][T27415] ? ext4_find_extent+0x6a6/0x9d0 [ 378.564411][T27415] ext4_ext_map_blocks+0x20a8/0x5260 [ 378.569691][T27415] ? ext4_ext_release+0x10/0x10 [ 378.574534][T27415] ? lock_acquire+0x16f/0x3f0 [ 378.579206][T27415] ? ext4_map_blocks+0x3fd/0x18e0 [ 378.584397][T27415] ext4_map_blocks+0xec7/0x18e0 [ 378.589249][T27415] ? ext4_issue_zeroout+0x190/0x190 [ 378.594444][T27415] ? kasan_check_write+0x14/0x20 [ 378.599365][T27415] ? __brelse+0x95/0xb0 [ 378.603510][T27415] ext4_getblk+0xc4/0x510 [ 378.607915][T27415] ? ext4_iomap_begin+0xfe0/0xfe0 [ 378.612926][T27415] ? ext4_free_inode+0x1450/0x1450 [ 378.618026][T27415] ext4_bread+0x8f/0x230 [ 378.622265][T27415] ? ext4_getblk+0x510/0x510 [ 378.626913][T27415] ext4_append+0x155/0x370 [ 378.631332][T27415] ext4_mkdir+0x61b/0xdf0 [ 378.635653][T27415] ? ext4_init_dot_dotdot+0x520/0x520 [ 378.641013][T27415] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 378.647246][T27415] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 378.653491][T27415] ? security_inode_permission+0xd5/0x110 [ 378.659200][T27415] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 378.665431][T27415] ? security_inode_mkdir+0xee/0x120 [ 378.670726][T27415] vfs_mkdir+0x433/0x690 [ 378.675051][T27415] do_mkdirat+0x234/0x2a0 [ 378.679399][T27415] ? __ia32_sys_mknod+0xb0/0xb0 [ 378.684378][T27415] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 378.689837][T27415] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 378.695889][T27415] ? do_syscall_64+0x26/0x610 [ 378.700559][T27415] ? lockdep_hardirqs_on+0x418/0x5d0 [ 378.705851][T27415] __x64_sys_mkdir+0x5c/0x80 [ 378.710449][T27415] do_syscall_64+0x103/0x610 [ 378.715049][T27415] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 378.720967][T27415] RIP: 0033:0x4581c7 [ 378.724922][T27415] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 378.744540][T27415] RSP: 002b:00007f082125da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 378.752967][T27415] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 00000000004581c7 [ 378.760944][T27415] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000000 [ 378.768904][T27415] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 378.776868][T27415] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 378.784838][T27415] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:46 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0xf0ffffffffffff}, 0x0) 14:43:46 executing program 2 (fault-call:0 fault-nth:30): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:46 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e88", 0x38}], 0x1}, 0x0) 14:43:46 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\b', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 378.987305][T27434] FAULT_INJECTION: forcing a failure. [ 378.987305][T27434] name failslab, interval 1, probability 0, space 0, times 0 [ 379.000216][T27434] CPU: 0 PID: 27434 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 379.008211][T27434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 379.018268][T27434] Call Trace: [ 379.021653][T27434] dump_stack+0x172/0x1f0 [ 379.026107][T27434] should_fail.cold+0xa/0x15 [ 379.030754][T27434] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 379.036563][T27434] ? __es_tree_search.isra.0+0x1bf/0x230 [ 379.042205][T27434] __should_failslab+0x121/0x190 [ 379.047146][T27434] should_failslab+0x9/0x14 [ 379.051735][T27434] kmem_cache_alloc+0x47/0x6f0 [ 379.056541][T27434] ? ext4_es_scan+0x730/0x730 [ 379.061217][T27434] ? do_raw_write_lock+0x124/0x290 [ 379.066328][T27434] __es_insert_extent+0x2cc/0xf20 [ 379.071355][T27434] ext4_es_insert_extent+0x2b7/0xa40 [ 379.076642][T27434] ? ext4_es_scan_clu+0x50/0x50 [ 379.081495][T27434] ? rcu_read_lock_sched_held+0x110/0x130 [ 379.087215][T27434] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 379.093452][T27434] ? ext4_es_find_extent_range+0xff/0x600 [ 379.099174][T27434] ext4_ext_put_gap_in_cache+0xfe/0x150 [ 379.104719][T27434] ? ext4_rereserve_cluster+0x240/0x240 [ 379.110262][T27434] ? ext4_find_extent+0x76e/0x9d0 [ 379.115286][T27434] ? ext4_find_extent+0x6a6/0x9d0 [ 379.120314][T27434] ext4_ext_map_blocks+0x20a8/0x5260 [ 379.125690][T27434] ? ext4_ext_release+0x10/0x10 [ 379.130549][T27434] ? lock_acquire+0x16f/0x3f0 [ 379.135224][T27434] ? ext4_map_blocks+0x3fd/0x18e0 [ 379.140254][T27434] ext4_map_blocks+0xec7/0x18e0 [ 379.145115][T27434] ? ext4_issue_zeroout+0x190/0x190 [ 379.150315][T27434] ? kasan_check_write+0x14/0x20 [ 379.155246][T27434] ? __brelse+0x95/0xb0 [ 379.159406][T27434] ext4_getblk+0xc4/0x510 [ 379.163739][T27434] ? ext4_iomap_begin+0xfe0/0xfe0 [ 379.168764][T27434] ? ext4_free_inode+0x1450/0x1450 [ 379.173876][T27434] ext4_bread+0x8f/0x230 [ 379.178118][T27434] ? ext4_getblk+0x510/0x510 [ 379.182711][T27434] ext4_append+0x155/0x370 [ 379.187131][T27434] ext4_mkdir+0x61b/0xdf0 [ 379.192836][T27434] ? ext4_init_dot_dotdot+0x520/0x520 [ 379.198208][T27434] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 379.204440][T27434] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 379.210679][T27434] ? security_inode_permission+0xd5/0x110 [ 379.216395][T27434] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 379.222631][T27434] ? security_inode_mkdir+0xee/0x120 [ 379.227914][T27434] vfs_mkdir+0x433/0x690 [ 379.232249][T27434] do_mkdirat+0x234/0x2a0 [ 379.236636][T27434] ? __ia32_sys_mknod+0xb0/0xb0 [ 379.241535][T27434] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 379.246994][T27434] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 379.253083][T27434] ? do_syscall_64+0x26/0x610 [ 379.257757][T27434] ? lockdep_hardirqs_on+0x418/0x5d0 [ 379.263131][T27434] __x64_sys_mkdir+0x5c/0x80 [ 379.267718][T27434] do_syscall_64+0x103/0x610 [ 379.272314][T27434] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 379.278203][T27434] RIP: 0033:0x4581c7 [ 379.282183][T27434] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 379.301787][T27434] RSP: 002b:00007f082125da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 379.310243][T27434] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 00000000004581c7 [ 379.318259][T27434] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000000 [ 379.326317][T27434] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 379.334287][T27434] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 379.342255][T27434] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:47 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000), 0xfffffffffffffdfe) 14:43:47 executing program 2 (fault-call:0 fault-nth:31): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:47 executing program 3: r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:47 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x100000000000000}, 0x0) [ 379.644096][T27463] FAULT_INJECTION: forcing a failure. [ 379.644096][T27463] name failslab, interval 1, probability 0, space 0, times 0 [ 379.660770][T27463] CPU: 0 PID: 27463 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 379.668770][T27463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 379.679018][T27463] Call Trace: [ 379.682366][T27463] dump_stack+0x172/0x1f0 [ 379.686720][T27463] should_fail.cold+0xa/0x15 [ 379.691326][T27463] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 379.697156][T27463] ? ___might_sleep+0x163/0x280 [ 379.702059][T27463] __should_failslab+0x121/0x190 [ 379.707039][T27463] should_failslab+0x9/0x14 [ 379.711559][T27463] __kmalloc+0x2dc/0x740 [ 379.715909][T27463] ? mark_held_locks+0xa4/0xf0 [ 379.720690][T27463] ? kfree+0x173/0x230 [ 379.724774][T27463] ? ext4_find_extent+0x76e/0x9d0 [ 379.729811][T27463] ext4_find_extent+0x76e/0x9d0 [ 379.729833][T27463] ext4_ext_map_blocks+0x1c3/0x5260 [ 379.740086][T27463] ? ext4_ext_release+0x10/0x10 14:43:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x2}, 0x0) 14:43:47 executing program 3 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:47 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\t', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 379.740100][T27463] ? find_held_lock+0x35/0x130 [ 379.740123][T27463] ? lock_acquire+0x16f/0x3f0 [ 379.749832][T27463] ? ext4_map_blocks+0x85d/0x18e0 [ 379.759557][T27463] ext4_map_blocks+0x8c5/0x18e0 [ 379.759581][T27463] ? ext4_issue_zeroout+0x190/0x190 [ 379.769625][T27463] ? kasan_check_write+0x14/0x20 [ 379.774577][T27463] ? __brelse+0x95/0xb0 [ 379.778753][T27463] ext4_getblk+0xc4/0x510 [ 379.783108][T27463] ? ext4_iomap_begin+0xfe0/0xfe0 [ 379.788144][T27463] ? ext4_free_inode+0x1450/0x1450 [ 379.793268][T27463] ext4_bread+0x8f/0x230 [ 379.797623][T27463] ? ext4_getblk+0x510/0x510 [ 379.802233][T27463] ext4_append+0x155/0x370 [ 379.806669][T27463] ext4_mkdir+0x61b/0xdf0 [ 379.811055][T27463] ? ext4_init_dot_dotdot+0x520/0x520 [ 379.816446][T27463] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 379.822698][T27463] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 379.828966][T27463] ? security_inode_permission+0xd5/0x110 [ 379.834738][T27463] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 379.841027][T27463] ? security_inode_mkdir+0xee/0x120 [ 379.846330][T27463] vfs_mkdir+0x433/0x690 [ 379.850592][T27463] do_mkdirat+0x234/0x2a0 [ 379.850611][T27463] ? __ia32_sys_mknod+0xb0/0xb0 [ 379.850627][T27463] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 379.850641][T27463] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 379.850659][T27463] ? do_syscall_64+0x26/0x610 [ 379.859853][T27463] ? lockdep_hardirqs_on+0x418/0x5d0 [ 379.859873][T27463] __x64_sys_mkdir+0x5c/0x80 [ 379.859890][T27463] do_syscall_64+0x103/0x610 [ 379.859908][T27463] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 379.859924][T27463] RIP: 0033:0x4581c7 [ 379.900587][T27463] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 379.920203][T27463] RSP: 002b:00007f082125da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 379.928629][T27463] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 00000000004581c7 [ 379.936618][T27463] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000000 [ 379.944726][T27463] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 379.952713][T27463] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 379.960699][T27463] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x3}, 0x0) 14:43:48 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:48 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x200000000000000}, 0x0) 14:43:48 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x10', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:48 executing program 2 (fault-call:0 fault-nth:32): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x4}, 0x0) [ 380.319061][T27513] FAULT_INJECTION: forcing a failure. [ 380.319061][T27513] name failslab, interval 1, probability 0, space 0, times 0 [ 380.367668][T27513] CPU: 0 PID: 27513 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 380.375906][T27513] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 380.386157][T27513] Call Trace: [ 380.389463][T27513] dump_stack+0x172/0x1f0 [ 380.393817][T27513] should_fail.cold+0xa/0x15 [ 380.398507][T27513] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 380.404439][T27513] ? ___might_sleep+0x163/0x280 [ 380.409418][T27513] __should_failslab+0x121/0x190 [ 380.414387][T27513] should_failslab+0x9/0x14 [ 380.419020][T27513] kmem_cache_alloc+0x2b2/0x6f0 [ 380.423886][T27513] ? rcu_read_lock_sched_held+0x110/0x130 [ 380.429691][T27513] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 380.436128][T27513] ? __mark_inode_dirty+0x241/0x1290 [ 380.441415][T27513] ext4_mb_new_blocks+0x5a0/0x3c20 [ 380.446532][T27513] ? mark_held_locks+0xa4/0xf0 [ 380.451289][T27513] ? ext4_find_extent+0x76e/0x9d0 [ 380.456311][T27513] ext4_ext_map_blocks+0x2b8a/0x5260 [ 380.461593][T27513] ? ext4_ext_release+0x10/0x10 [ 380.466445][T27513] ? find_held_lock+0x35/0x130 [ 380.471227][T27513] ext4_map_blocks+0x8c5/0x18e0 [ 380.476226][T27513] ? ext4_issue_zeroout+0x190/0x190 [ 380.481436][T27513] ? kasan_check_write+0x14/0x20 [ 380.486487][T27513] ? __brelse+0x95/0xb0 [ 380.490728][T27513] ext4_getblk+0xc4/0x510 [ 380.495056][T27513] ? ext4_iomap_begin+0xfe0/0xfe0 [ 380.500091][T27513] ? ext4_free_inode+0x1450/0x1450 [ 380.505293][T27513] ext4_bread+0x8f/0x230 [ 380.509531][T27513] ? ext4_getblk+0x510/0x510 [ 380.514235][T27513] ext4_append+0x155/0x370 [ 380.518649][T27513] ext4_mkdir+0x61b/0xdf0 [ 380.522993][T27513] ? ext4_init_dot_dotdot+0x520/0x520 [ 380.528455][T27513] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 380.534699][T27513] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 380.540971][T27513] ? security_inode_permission+0xd5/0x110 [ 380.546742][T27513] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 380.553002][T27513] ? security_inode_mkdir+0xee/0x120 [ 380.558289][T27513] vfs_mkdir+0x433/0x690 [ 380.562530][T27513] do_mkdirat+0x234/0x2a0 [ 380.566856][T27513] ? __ia32_sys_mknod+0xb0/0xb0 [ 380.571855][T27513] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 380.577356][T27513] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 380.583418][T27513] ? do_syscall_64+0x26/0x610 [ 380.588090][T27513] ? lockdep_hardirqs_on+0x418/0x5d0 [ 380.593459][T27513] __x64_sys_mkdir+0x5c/0x80 [ 380.598057][T27513] do_syscall_64+0x103/0x610 [ 380.602652][T27513] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 380.608669][T27513] RIP: 0033:0x4581c7 [ 380.612564][T27513] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 380.632443][T27513] RSP: 002b:00007f082125da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 380.640989][T27513] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 00000000004581c7 [ 380.648972][T27513] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000000 [ 380.656959][T27513] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 14:43:48 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x14000, 0x0) ioctl$VIDIOC_ENUMAUDOUT(r1, 0xc0345642, &(0x7f0000000140)={0x7ff, "219498d817ae4dd939b039f8597960be1468122a04a73a2ae9f223ecaf09aebb", 0x1, 0x1}) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) socket$inet6_udplite(0xa, 0x2, 0x88) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='coredump_filter\x00') ioctl$BLKFRASET(r2, 0x1264, &(0x7f00000000c0)=0xffffffffffffff00) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) 14:43:48 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:48 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x400000000000000}, 0x0) 14:43:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x5}, 0x0) [ 380.665036][T27513] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 380.673007][T27513] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:48 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x3, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:48 executing program 2 (fault-call:0 fault-nth:33): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:48 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs#', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:48 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0xa00000000000000}, 0x0) 14:43:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x8}, 0x0) [ 380.927402][T27548] FAULT_INJECTION: forcing a failure. [ 380.927402][T27548] name failslab, interval 1, probability 0, space 0, times 0 [ 380.964807][T27548] CPU: 0 PID: 27548 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 380.972956][T27548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 380.983028][T27548] Call Trace: [ 380.986347][T27548] dump_stack+0x172/0x1f0 [ 380.990692][T27548] should_fail.cold+0xa/0x15 [ 380.995331][T27548] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 381.001149][T27548] ? ___might_sleep+0x163/0x280 [ 381.006014][T27548] __should_failslab+0x121/0x190 [ 381.010957][T27548] should_failslab+0x9/0x14 [ 381.015461][T27548] __kmalloc_track_caller+0x2d8/0x740 [ 381.020958][T27548] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 381.027200][T27548] ? strndup_user+0x77/0xd0 [ 381.031703][T27548] memdup_user+0x26/0xb0 [ 381.035972][T27548] strndup_user+0x77/0xd0 [ 381.040302][T27548] ksys_mount+0x7b/0x150 [ 381.044545][T27548] __x64_sys_mount+0xbe/0x150 [ 381.049228][T27548] do_syscall_64+0x103/0x610 [ 381.053822][T27548] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 381.059711][T27548] RIP: 0033:0x45b81a [ 381.063606][T27548] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 381.083206][T27548] RSP: 002b:00007f082125da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 381.091616][T27548] RAX: ffffffffffffffda RBX: 00007f082125db40 RCX: 000000000045b81a [ 381.099596][T27548] RDX: 00007f082125dae0 RSI: 0000000020000000 RDI: 00007f082125db00 [ 381.107578][T27548] RBP: 0000000000000001 R08: 00007f082125db40 R09: 00007f082125dae0 [ 381.115634][T27548] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 381.123778][T27548] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:49 executing program 2 (fault-call:0 fault-nth:34): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:49 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfsH', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:49 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0xe00000000000000}, 0x0) [ 381.397955][T27577] FAULT_INJECTION: forcing a failure. [ 381.397955][T27577] name failslab, interval 1, probability 0, space 0, times 0 [ 381.412610][T27577] CPU: 0 PID: 27577 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 381.420616][T27577] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 381.430690][T27577] Call Trace: [ 381.433993][T27577] dump_stack+0x172/0x1f0 [ 381.438418][T27577] should_fail.cold+0xa/0x15 [ 381.443025][T27577] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 381.448837][T27577] ? ___might_sleep+0x163/0x280 [ 381.453738][T27577] __should_failslab+0x121/0x190 [ 381.458677][T27577] should_failslab+0x9/0x14 [ 381.463180][T27577] __kmalloc_track_caller+0x2d8/0x740 [ 381.468555][T27577] ? setup_sigcontext+0x7d0/0x7d0 [ 381.473580][T27577] ? __bad_area_nosemaphore+0xb3/0x420 [ 381.479036][T27577] ? strndup_user+0x77/0xd0 [ 381.483541][T27577] memdup_user+0x26/0xb0 [ 381.487905][T27577] strndup_user+0x77/0xd0 [ 381.492285][T27577] ksys_mount+0x3c/0x150 [ 381.496531][T27577] __x64_sys_mount+0xbe/0x150 [ 381.501214][T27577] do_syscall_64+0x103/0x610 [ 381.505807][T27577] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 381.511759][T27577] RIP: 0033:0x45b81a [ 381.515654][T27577] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 381.535382][T27577] RSP: 002b:00007f082125da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 381.543793][T27577] RAX: ffffffffffffffda RBX: 00007f082125db40 RCX: 000000000045b81a [ 381.551762][T27577] RDX: 00007f082125dae0 RSI: 0000000020000000 RDI: 00007f082125db00 [ 381.559730][T27577] RBP: 0000000000000001 R08: 00007f082125db40 R09: 00007f082125dae0 [ 381.567700][T27577] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 381.575671][T27577] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:49 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x200000, 0x0) write$P9_RSTAT(r1, &(0x7f00000000c0)={0x61, 0x7d, 0x2, {0x0, 0x5a, 0x927e, 0x9, {0x8, 0x3, 0x5}, 0xc0000000, 0x0, 0x2, 0x1, 0x2, '}\x95', 0x8, 'selinux}', 0x11, '^posix_acl_access', 0xc, '^}\\&ppp0GPL\''}}, 0x61) 14:43:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x9}, 0x0) 14:43:49 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:49 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfsL', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:49 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0xf00000000000000}, 0x0) 14:43:49 executing program 2 (fault-call:0 fault-nth:35): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:49 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x3f00000000000000}, 0x0) 14:43:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0xc}, 0x0) [ 381.868500][T27612] FAULT_INJECTION: forcing a failure. [ 381.868500][T27612] name failslab, interval 1, probability 0, space 0, times 0 [ 381.895204][T27612] CPU: 1 PID: 27612 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 381.903230][T27612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 381.913290][T27612] Call Trace: [ 381.913316][T27612] dump_stack+0x172/0x1f0 [ 381.913344][T27612] should_fail.cold+0xa/0x15 [ 381.913365][T27612] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 381.913385][T27612] ? ___might_sleep+0x163/0x280 [ 381.913406][T27612] __should_failslab+0x121/0x190 [ 381.941371][T27612] should_failslab+0x9/0x14 [ 381.941389][T27612] kmem_cache_alloc_trace+0x2d1/0x760 [ 381.941411][T27612] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 381.957602][T27612] ? _copy_from_user+0xdd/0x150 [ 381.962509][T27612] copy_mount_options+0x5c/0x3a0 [ 381.967466][T27612] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 381.973813][T27612] ksys_mount+0xa7/0x150 [ 381.978100][T27612] __x64_sys_mount+0xbe/0x150 [ 381.982793][T27612] do_syscall_64+0x103/0x610 [ 381.987432][T27612] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 381.993338][T27612] RIP: 0033:0x45b81a [ 381.997246][T27612] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 14:43:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x11}, 0x0) 14:43:50 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x5, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) [ 382.017093][T27612] RSP: 002b:00007f082125da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 382.025499][T27612] RAX: ffffffffffffffda RBX: 00007f082125db40 RCX: 000000000045b81a [ 382.033469][T27612] RDX: 00007f082125dae0 RSI: 0000000020000000 RDI: 00007f082125db00 [ 382.041449][T27612] RBP: 0000000000000001 R08: 00007f082125db40 R09: 00007f082125dae0 [ 382.049526][T27612] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 382.057492][T27612] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:50 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfsh', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:50 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x5801000000000000}, 0x0) 14:43:50 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x2, 0x10000) ioctl$TCSETA(r1, 0x5406, &(0x7f00000000c0)={0x3, 0x8, 0x1, 0x8, 0x16, 0x4, 0x5, 0x3b7c, 0x8001, 0x5}) 14:43:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0xffd7}, 0x0) 14:43:50 executing program 2 (fault-call:0 fault-nth:36): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:50 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x6000000000000000}, 0x0) 14:43:50 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x6, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:50 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfsl', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 382.640089][T27672] FAULT_INJECTION: forcing a failure. [ 382.640089][T27672] name failslab, interval 1, probability 0, space 0, times 0 [ 382.653633][T27672] CPU: 0 PID: 27672 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 382.661724][T27672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 382.671835][T27672] Call Trace: [ 382.671862][T27672] dump_stack+0x172/0x1f0 [ 382.671886][T27672] should_fail.cold+0xa/0x15 [ 382.671905][T27672] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 382.671925][T27672] ? ___might_sleep+0x163/0x280 [ 382.671946][T27672] __should_failslab+0x121/0x190 [ 382.671961][T27672] should_failslab+0x9/0x14 [ 382.671975][T27672] kmem_cache_alloc_trace+0x2d1/0x760 [ 382.671991][T27672] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 382.672008][T27672] ? _copy_from_user+0xdd/0x150 [ 382.720801][T27672] copy_mount_options+0x5c/0x3a0 [ 382.725806][T27672] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 382.732137][T27672] ksys_mount+0xa7/0x150 [ 382.736381][T27672] __x64_sys_mount+0xbe/0x150 [ 382.741062][T27672] do_syscall_64+0x103/0x610 [ 382.745660][T27672] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 382.751549][T27672] RIP: 0033:0x45b81a [ 382.755444][T27672] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 382.775184][T27672] RSP: 002b:00007f082125da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 14:43:50 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x9effffff00000000}, 0x0) [ 382.783591][T27672] RAX: ffffffffffffffda RBX: 00007f082125db40 RCX: 000000000045b81a [ 382.791560][T27672] RDX: 00007f082125dae0 RSI: 0000000020000000 RDI: 00007f082125db00 [ 382.799527][T27672] RBP: 0000000000000001 R08: 00007f082125db40 R09: 00007f082125dae0 [ 382.807495][T27672] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 382.815465][T27672] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:50 executing program 2 (fault-call:0 fault-nth:37): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:50 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0xc00e000000000000}, 0x0) [ 382.983669][T27698] FAULT_INJECTION: forcing a failure. [ 382.983669][T27698] name failslab, interval 1, probability 0, space 0, times 0 [ 383.002455][T27698] CPU: 0 PID: 27698 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 383.010817][T27698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 383.020883][T27698] Call Trace: [ 383.024185][T27698] dump_stack+0x172/0x1f0 [ 383.028524][T27698] should_fail.cold+0xa/0x15 [ 383.033127][T27698] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 383.038968][T27698] ? ___might_sleep+0x163/0x280 [ 383.043827][T27698] __should_failslab+0x121/0x190 [ 383.048785][T27698] should_failslab+0x9/0x14 [ 383.053289][T27698] kmem_cache_alloc_trace+0x2d1/0x760 [ 383.058775][T27698] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 383.065013][T27698] ? _copy_from_user+0xdd/0x150 [ 383.069867][T27698] copy_mount_options+0x5c/0x3a0 [ 383.074806][T27698] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 383.081093][T27698] ksys_mount+0xa7/0x150 [ 383.085341][T27698] __x64_sys_mount+0xbe/0x150 [ 383.090019][T27698] do_syscall_64+0x103/0x610 [ 383.094610][T27698] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 383.100498][T27698] RIP: 0033:0x45b81a [ 383.104392][T27698] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 383.124168][T27698] RSP: 002b:00007f082125da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 14:43:51 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x7, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) [ 383.132664][T27698] RAX: ffffffffffffffda RBX: 00007f082125db40 RCX: 000000000045b81a [ 383.140653][T27698] RDX: 00007f082125dae0 RSI: 0000000020000000 RDI: 00007f082125db00 [ 383.148710][T27698] RBP: 0000000000000001 R08: 00007f082125db40 R09: 00007f082125dae0 [ 383.156705][T27698] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 383.164698][T27698] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:51 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfst', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:51 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0xf0ffffff00000000}, 0x0) 14:43:51 executing program 1: socketpair(0x4, 0x5, 0x100000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000140)=@generic={0x2, 0x50000, 0x5}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0}, &(0x7f0000000300)=0xc) timer_create(0x0, &(0x7f0000000380)={0x0, 0x1b, 0x0, @tid=r1}, &(0x7f0000000340)=0x0) timer_getoverrun(r2) r3 = socket$rxrpc(0x21, 0x2, 0x2) r4 = syz_open_procfs(r1, &(0x7f0000000000)='net/ip6_flowlabel\x00') ioctl$BLKROGET(r4, 0x125e, &(0x7f00000000c0)) ppoll(&(0x7f0000000080)=[{r3}], 0x1, 0x0, 0x0, 0x1b5) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r6 = creat(&(0x7f0000000040)='./file1\x00', 0x0) fallocate(r6, 0x40, 0x0, 0x9) setsockopt$sock_int(r3, 0x1, 0x7, &(0x7f0000000040), 0x4) 14:43:51 executing program 2 (fault-call:0 fault-nth:38): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:51 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfsz', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x20000501}, 0x0) 14:43:51 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0xa, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) [ 383.550184][T27740] FAULT_INJECTION: forcing a failure. [ 383.550184][T27740] name failslab, interval 1, probability 0, space 0, times 0 14:43:51 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0xff01000000000000}, 0x0) [ 383.621156][T27740] CPU: 1 PID: 27740 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 383.629219][T27740] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 383.639381][T27740] Call Trace: [ 383.642729][T27740] dump_stack+0x172/0x1f0 [ 383.647075][T27740] should_fail.cold+0xa/0x15 [ 383.651663][T27740] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 383.657495][T27740] ? ___might_sleep+0x163/0x280 [ 383.662358][T27740] __should_failslab+0x121/0x190 [ 383.667309][T27740] should_failslab+0x9/0x14 [ 383.671806][T27740] kmem_cache_alloc_trace+0x2d1/0x760 [ 383.677265][T27740] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 383.683083][T27740] ? rcu_read_lock_sched_held+0x110/0x130 [ 383.688817][T27740] ? kmem_cache_alloc_trace+0x354/0x760 [ 383.694456][T27740] legacy_init_fs_context+0x48/0xe0 [ 383.699646][T27740] ? generic_parse_monolithic+0x200/0x200 [ 383.705357][T27740] alloc_fs_context+0x365/0x640 [ 383.710387][T27740] fs_context_for_mount+0x25/0x30 [ 383.715502][T27740] do_mount+0x13d7/0x2c40 [ 383.719849][T27740] ? copy_mount_string+0x40/0x40 [ 383.724878][T27740] ? _copy_from_user+0xdd/0x150 [ 383.729855][T27740] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 383.736096][T27740] ? copy_mount_options+0x280/0x3a0 [ 383.741285][T27740] ksys_mount+0xdb/0x150 [ 383.745523][T27740] __x64_sys_mount+0xbe/0x150 [ 383.750217][T27740] do_syscall_64+0x103/0x610 [ 383.754808][T27740] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 383.760812][T27740] RIP: 0033:0x45b81a [ 383.764727][T27740] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 383.784584][T27740] RSP: 002b:00007f082125da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 383.792988][T27740] RAX: ffffffffffffffda RBX: 00007f082125db40 RCX: 000000000045b81a [ 383.801126][T27740] RDX: 00007f082125dae0 RSI: 0000000020000000 RDI: 00007f082125db00 [ 383.809109][T27740] RBP: 0000000000000001 R08: 00007f082125db40 R09: 00007f082125dae0 14:43:51 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1000100, 0x1) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f00000000c0)={[{0x0, 0x0, 0x4, 0x9cf0, 0x9, 0x6, 0x5, 0xf70, 0x4, 0x3, 0xa, 0x9f65}, {0x3ff, 0x1, 0x6c, 0x200, 0xd, 0x50, 0x5, 0x100000001, 0x4, 0x100, 0x5, 0x3514, 0x5}, {0x4, 0x80, 0x3, 0x3ff, 0x4, 0x61c29158, 0x200, 0x3, 0x0, 0x4, 0x7fff, 0x0, 0x1ff}], 0x47}) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) [ 383.817074][T27740] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 383.825458][T27740] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:51 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:51 executing program 2 (fault-call:0 fault-nth:39): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:52 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0xffffff7f00000000}, 0x0) 14:43:52 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xd1', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 384.057745][T27771] FAULT_INJECTION: forcing a failure. [ 384.057745][T27771] name failslab, interval 1, probability 0, space 0, times 0 [ 384.113545][T27771] CPU: 1 PID: 27771 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 384.121583][T27771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 384.121589][T27771] Call Trace: [ 384.121613][T27771] dump_stack+0x172/0x1f0 [ 384.121639][T27771] should_fail.cold+0xa/0x15 [ 384.139525][T27771] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 384.139546][T27771] ? ___might_sleep+0x163/0x280 [ 384.139566][T27771] __should_failslab+0x121/0x190 [ 384.159793][T27771] should_failslab+0x9/0x14 [ 384.164323][T27771] kmem_cache_alloc_trace+0x2d1/0x760 [ 384.169726][T27771] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 384.175549][T27771] ? rcu_read_lock_sched_held+0x110/0x130 [ 384.181291][T27771] ? kmem_cache_alloc_trace+0x354/0x760 [ 384.186936][T27771] legacy_init_fs_context+0x48/0xe0 [ 384.192127][T27771] ? generic_parse_monolithic+0x200/0x200 [ 384.197943][T27771] alloc_fs_context+0x365/0x640 [ 384.202795][T27771] fs_context_for_mount+0x25/0x30 [ 384.207872][T27771] do_mount+0x13d7/0x2c40 [ 384.212200][T27771] ? copy_mount_string+0x40/0x40 [ 384.217237][T27771] ? _copy_from_user+0xdd/0x150 [ 384.223049][T27771] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 384.229281][T27771] ? copy_mount_options+0x280/0x3a0 [ 384.234482][T27771] ksys_mount+0xdb/0x150 [ 384.238879][T27771] __x64_sys_mount+0xbe/0x150 [ 384.243551][T27771] do_syscall_64+0x103/0x610 [ 384.248265][T27771] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 384.254172][T27771] RIP: 0033:0x45b81a [ 384.258068][T27771] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 384.277761][T27771] RSP: 002b:00007f082125da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 384.286176][T27771] RAX: ffffffffffffffda RBX: 00007f082125db40 RCX: 000000000045b81a [ 384.294311][T27771] RDX: 00007f082125dae0 RSI: 0000000020000000 RDI: 00007f082125db00 [ 384.302295][T27771] RBP: 0000000000000001 R08: 00007f082125db40 R09: 00007f082125dae0 14:43:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x7ffff000}, 0x0) [ 384.310257][T27771] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 384.318220][T27771] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:52 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0xffffffff00000000}, 0x0) 14:43:52 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0xf, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:52 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:52 executing program 2 (fault-call:0 fault-nth:40): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 384.570307][T27807] FAULT_INJECTION: forcing a failure. [ 384.570307][T27807] name failslab, interval 1, probability 0, space 0, times 0 [ 384.583825][T27807] CPU: 0 PID: 27807 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 384.591828][T27807] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 384.601891][T27807] Call Trace: [ 384.605202][T27807] dump_stack+0x172/0x1f0 [ 384.609679][T27807] should_fail.cold+0xa/0x15 [ 384.615347][T27807] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 384.623281][T27807] ? ___might_sleep+0x163/0x280 [ 384.628152][T27807] __should_failslab+0x121/0x190 [ 384.633092][T27807] should_failslab+0x9/0x14 [ 384.637590][T27807] __kmalloc_track_caller+0x2d8/0x740 [ 384.643028][T27807] ? vfs_parse_fs_string+0xe8/0x170 [ 384.648222][T27807] kmemdup_nul+0x31/0xa0 [ 384.652553][T27807] vfs_parse_fs_string+0xe8/0x170 [ 384.657573][T27807] ? vfs_parse_fs_param+0x510/0x510 [ 384.662888][T27807] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 14:43:52 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0xa) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) [ 384.669266][T27807] ? alloc_fs_context+0x3bb/0x640 [ 384.674536][T27807] do_mount+0x6e9/0x2c40 [ 384.678772][T27807] ? copy_mount_string+0x40/0x40 [ 384.683797][T27807] ? _copy_from_user+0xdd/0x150 [ 384.688680][T27807] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 384.694932][T27807] ? copy_mount_options+0x280/0x3a0 [ 384.700145][T27807] ksys_mount+0xdb/0x150 [ 384.704399][T27807] __x64_sys_mount+0xbe/0x150 [ 384.709084][T27807] do_syscall_64+0x103/0x610 [ 384.713677][T27807] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 384.719563][T27807] RIP: 0033:0x45b81a [ 384.723560][T27807] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 384.743224][T27807] RSP: 002b:00007f082125da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 384.751651][T27807] RAX: ffffffffffffffda RBX: 00007f082125db40 RCX: 000000000045b81a [ 384.759710][T27807] RDX: 00007f082125dae0 RSI: 0000000020000000 RDI: 00007f082125db00 [ 384.767677][T27807] RBP: 0000000000000001 R08: 00007f082125db40 R09: 00007f082125dae0 [ 384.775651][T27807] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 384.783655][T27807] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:52 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0xfffffffffffff000}, 0x0) 14:43:52 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:52 executing program 2 (fault-call:0 fault-nth:41): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:52 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x48, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:53 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 385.031997][T27834] FAULT_INJECTION: forcing a failure. [ 385.031997][T27834] name failslab, interval 1, probability 0, space 0, times 0 [ 385.053022][T27834] CPU: 0 PID: 27834 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 385.061128][T27834] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 385.071186][T27834] Call Trace: [ 385.074489][T27834] dump_stack+0x172/0x1f0 [ 385.078828][T27834] should_fail.cold+0xa/0x15 [ 385.083425][T27834] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 385.089237][T27834] ? ___might_sleep+0x163/0x280 [ 385.094094][T27834] __should_failslab+0x121/0x190 [ 385.099034][T27834] should_failslab+0x9/0x14 [ 385.103602][T27834] kmem_cache_alloc_trace+0x2d1/0x760 [ 385.108975][T27834] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 385.114779][T27834] ? rcu_read_lock_sched_held+0x110/0x130 [ 385.120501][T27834] ? kmem_cache_alloc_trace+0x354/0x760 [ 385.126053][T27834] legacy_init_fs_context+0x48/0xe0 [ 385.131256][T27834] ? generic_parse_monolithic+0x200/0x200 [ 385.137057][T27834] alloc_fs_context+0x365/0x640 [ 385.142005][T27834] fs_context_for_mount+0x25/0x30 [ 385.147025][T27834] do_mount+0x13d7/0x2c40 [ 385.151360][T27834] ? copy_mount_string+0x40/0x40 [ 385.156298][T27834] ? _copy_from_user+0xdd/0x150 [ 385.161156][T27834] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 385.167478][T27834] ? copy_mount_options+0x280/0x3a0 [ 385.172681][T27834] ksys_mount+0xdb/0x150 [ 385.176973][T27834] __x64_sys_mount+0xbe/0x150 [ 385.181681][T27834] do_syscall_64+0x103/0x610 [ 385.186278][T27834] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 385.193700][T27834] RIP: 0033:0x45b81a [ 385.197616][T27834] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 385.217312][T27834] RSP: 002b:00007f082125da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 385.225724][T27834] RAX: ffffffffffffffda RBX: 00007f082125db40 RCX: 000000000045b81a [ 385.233693][T27834] RDX: 00007f082125dae0 RSI: 0000000020000000 RDI: 00007f082125db00 [ 385.241662][T27834] RBP: 0000000000000001 R08: 00007f082125db40 R09: 00007f082125dae0 [ 385.249633][T27834] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 385.257613][T27834] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:53 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x0, 0x2}, 0x0) 14:43:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0xfffffdef}, 0x0) 14:43:53 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x4c, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:53 executing program 2 (fault-call:0 fault-nth:42): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:53 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:53 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x0, 0x4}, 0x0) [ 385.594446][T27866] FAULT_INJECTION: forcing a failure. [ 385.594446][T27866] name failslab, interval 1, probability 0, space 0, times 0 14:43:53 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) r1 = accept(r0, &(0x7f00000000c0)=@nl=@unspec, &(0x7f0000000000)=0x80) bind$isdn_base(r1, &(0x7f0000000140)={0x22, 0x6, 0x10001, 0x4, 0x9}, 0x6) [ 385.659652][T27866] CPU: 0 PID: 27866 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 385.667771][T27866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 385.677973][T27866] Call Trace: [ 385.681287][T27866] dump_stack+0x172/0x1f0 [ 385.685644][T27866] should_fail.cold+0xa/0x15 [ 385.690259][T27866] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 385.696088][T27866] ? ___might_sleep+0x163/0x280 [ 385.700987][T27866] __should_failslab+0x121/0x190 [ 385.706018][T27866] should_failslab+0x9/0x14 [ 385.710564][T27866] __kmalloc_track_caller+0x2d8/0x740 [ 385.716223][T27866] ? vfs_parse_fs_string+0xe8/0x170 [ 385.721699][T27866] kmemdup_nul+0x31/0xa0 [ 385.725945][T27866] vfs_parse_fs_string+0xe8/0x170 [ 385.730960][T27866] ? vfs_parse_fs_param+0x510/0x510 [ 385.736288][T27866] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 385.742557][T27866] ? alloc_fs_context+0x3bb/0x640 [ 385.747597][T27866] do_mount+0x6e9/0x2c40 [ 385.751850][T27866] ? copy_mount_string+0x40/0x40 [ 385.756813][T27866] ? _copy_from_user+0xdd/0x150 [ 385.761671][T27866] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 385.767911][T27866] ? copy_mount_options+0x280/0x3a0 [ 385.773108][T27866] ksys_mount+0xdb/0x150 [ 385.777343][T27866] __x64_sys_mount+0xbe/0x150 [ 385.782032][T27866] do_syscall_64+0x103/0x610 [ 385.786641][T27866] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 385.792682][T27866] RIP: 0033:0x45b81a [ 385.796640][T27866] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 385.816289][T27866] RSP: 002b:00007f082125da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 385.824706][T27866] RAX: ffffffffffffffda RBX: 00007f082125db40 RCX: 000000000045b81a [ 385.832780][T27866] RDX: 00007f082125dae0 RSI: 0000000020000000 RDI: 00007f082125db00 [ 385.840766][T27866] RBP: 0000000000000001 R08: 00007f082125db40 R09: 00007f082125dae0 [ 385.848777][T27866] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 385.856896][T27866] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:53 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x60, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:54 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:54 executing program 2 (fault-call:0 fault-nth:43): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:54 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x0, 0xa}, 0x0) [ 386.086620][T27898] FAULT_INJECTION: forcing a failure. [ 386.086620][T27898] name failslab, interval 1, probability 0, space 0, times 0 [ 386.132049][T27898] CPU: 0 PID: 27898 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 386.140085][T27898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 386.150150][T27898] Call Trace: [ 386.153457][T27898] dump_stack+0x172/0x1f0 [ 386.157845][T27898] should_fail.cold+0xa/0x15 [ 386.162460][T27898] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 386.168333][T27898] ? ___might_sleep+0x163/0x280 [ 386.173307][T27898] __should_failslab+0x121/0x190 [ 386.178348][T27898] should_failslab+0x9/0x14 [ 386.182872][T27898] __kmalloc_track_caller+0x2d8/0x740 [ 386.188267][T27898] ? vfs_parse_fs_string+0xe8/0x170 [ 386.193519][T27898] kmemdup_nul+0x31/0xa0 [ 386.197782][T27898] vfs_parse_fs_string+0xe8/0x170 [ 386.202818][T27898] ? vfs_parse_fs_param+0x510/0x510 [ 386.208130][T27898] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 386.214382][T27898] ? alloc_fs_context+0x3bb/0x640 [ 386.219427][T27898] do_mount+0x6e9/0x2c40 [ 386.223696][T27898] ? copy_mount_string+0x40/0x40 14:43:54 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x68, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) [ 386.228651][T27898] ? _copy_from_user+0xdd/0x150 [ 386.233553][T27898] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 386.239812][T27898] ? copy_mount_options+0x280/0x3a0 [ 386.245041][T27898] ksys_mount+0xdb/0x150 [ 386.249290][T27898] __x64_sys_mount+0xbe/0x150 [ 386.253972][T27898] do_syscall_64+0x103/0x610 [ 386.253993][T27898] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 386.254003][T27898] RIP: 0033:0x45b81a 14:43:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1, 0x0, 0x4}, 0x0) [ 386.254014][T27898] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 386.254026][T27898] RSP: 002b:00007f082125da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 386.296544][T27898] RAX: ffffffffffffffda RBX: 00007f082125db40 RCX: 000000000045b81a [ 386.304552][T27898] RDX: 00007f082125dae0 RSI: 0000000020000000 RDI: 00007f082125db00 [ 386.312536][T27898] RBP: 0000000000000001 R08: 00007f082125db40 R09: 00007f082125dae0 [ 386.320536][T27898] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 386.328655][T27898] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:54 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x0, 0xe}, 0x0) 14:43:54 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x6c, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:54 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs#', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:54 executing program 2 (fault-call:0 fault-nth:44): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:54 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x0, 0xf}, 0x0) [ 386.618019][T27935] FAULT_INJECTION: forcing a failure. [ 386.618019][T27935] name failslab, interval 1, probability 0, space 0, times 0 [ 386.640937][T27935] CPU: 0 PID: 27935 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 386.648970][T27935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 386.659084][T27935] Call Trace: [ 386.659114][T27935] dump_stack+0x172/0x1f0 [ 386.659137][T27935] should_fail.cold+0xa/0x15 [ 386.659158][T27935] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 386.659178][T27935] ? ___might_sleep+0x163/0x280 [ 386.659198][T27935] __should_failslab+0x121/0x190 [ 386.682167][T27935] should_failslab+0x9/0x14 [ 386.682186][T27935] kmem_cache_alloc_trace+0x2d1/0x760 [ 386.682201][T27935] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 386.682217][T27935] ? rcu_read_lock_sched_held+0x110/0x130 [ 386.682233][T27935] ? kmem_cache_alloc_trace+0x354/0x760 [ 386.682255][T27935] legacy_init_fs_context+0x48/0xe0 [ 386.682275][T27935] ? generic_parse_monolithic+0x200/0x200 [ 386.691711][T27935] alloc_fs_context+0x365/0x640 [ 386.691732][T27935] fs_context_for_mount+0x25/0x30 [ 386.691751][T27935] vfs_kern_mount.part.0+0x28/0xf0 [ 386.691771][T27935] vfs_kern_mount+0x40/0x60 [ 386.691789][T27935] btrfs_mount+0x2b4/0x15e2 [ 386.691808][T27935] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 386.754643][T27935] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 386.760879][T27935] ? should_fail+0x1de/0x852 [ 386.765489][T27935] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 386.771293][T27935] ? btrfs_remount+0x11f0/0x11f0 [ 386.776232][T27935] ? rcu_read_lock_sched_held+0x110/0x130 [ 386.781991][T27935] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 386.788226][T27935] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 386.794491][T27935] ? vfs_parse_fs_string+0x111/0x170 [ 386.799773][T27935] ? vfs_parse_fs_string+0x111/0x170 [ 386.805139][T27935] ? rcu_read_lock_sched_held+0x110/0x130 [ 386.810870][T27935] ? kfree+0x1fa/0x230 [ 386.814934][T27935] ? vfs_parse_fs_string+0x116/0x170 [ 386.820364][T27935] ? btrfs_remount+0x11f0/0x11f0 [ 386.825293][T27935] legacy_get_tree+0xf2/0x200 [ 386.829969][T27935] ? btrfs_remount+0x11f0/0x11f0 [ 386.834897][T27935] ? legacy_get_tree+0xf2/0x200 [ 386.839739][T27935] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 386.845977][T27935] vfs_get_tree+0x123/0x450 [ 386.850491][T27935] do_mount+0x1436/0x2c40 [ 386.854824][T27935] ? copy_mount_string+0x40/0x40 [ 386.859764][T27935] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 386.865998][T27935] ? copy_mount_options+0x280/0x3a0 [ 386.871191][T27935] ksys_mount+0xdb/0x150 [ 386.875427][T27935] __x64_sys_mount+0xbe/0x150 [ 386.880123][T27935] do_syscall_64+0x103/0x610 [ 386.884715][T27935] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 386.890684][T27935] RIP: 0033:0x45b81a [ 386.894582][T27935] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 14:43:55 executing program 1: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x2000) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x401, 0x3a, 0x80000001, 0x4, 0x1, 0xffffffff, 0x9, {0x0, @in={{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0x77b, 0x100000001, 0x1, 0x5}}, &(0x7f00000001c0)=0xb0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000200)={r1, 0x10, "b41620a334902e6efba76d3ed9148f20"}, &(0x7f0000000240)=0x18) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000000c0)) r2 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r2}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r2, 0x1, 0x7, &(0x7f0000000040), 0x4) [ 386.914180][T27935] RSP: 002b:00007f082125da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 386.922583][T27935] RAX: ffffffffffffffda RBX: 00007f082125db40 RCX: 000000000045b81a [ 386.930546][T27935] RDX: 00007f082125dae0 RSI: 0000000020000000 RDI: 00007f082125db00 [ 386.938514][T27935] RBP: 0000000000000001 R08: 00007f082125db40 R09: 00007f082125dae0 [ 386.946481][T27935] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 386.954535][T27935] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:55 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x74, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:55 executing program 2 (fault-call:0 fault-nth:45): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:55 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x109000, 0x0) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@local, @in6=@loopback, 0x4e22, 0x5, 0x4e23, 0x4, 0x2, 0x80, 0xa0, 0xff, 0x0, r1}, {0x10000, 0x0, 0x8, 0x5e, 0x10, 0x1, 0x100000001, 0x2}, {0xbd8, 0x80010000, 0x200, 0xe6}, 0x4c48bf31, 0x6e6bb3, 0x3, 0x1, 0x3, 0x3}, {{@in6=@dev={0xfe, 0x80, [], 0x24}, 0x4d4, 0x32}, 0xa, @in=@multicast1, 0x3507, 0x7, 0x1, 0x3ff, 0x5, 0xcb, 0x1f}}, 0xe8) r2 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r2}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r2, 0x1, 0x7, &(0x7f0000000040), 0x4) setsockopt$sock_int(r2, 0x1, 0x27, &(0x7f0000000000)=0x80000000, 0x4) 14:43:55 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs ', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:55 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x0, 0x60}, 0x0) [ 387.229846][T27963] FAULT_INJECTION: forcing a failure. [ 387.229846][T27963] name failslab, interval 1, probability 0, space 0, times 0 14:43:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1, 0x0, 0x7}, 0x0) 14:43:55 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000000), 0xe70928ec486a176a) 14:43:55 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x7a, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) [ 387.331237][T27963] CPU: 0 PID: 27963 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 387.339278][T27963] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 387.350492][T27963] Call Trace: [ 387.353929][T27963] dump_stack+0x172/0x1f0 [ 387.358287][T27963] should_fail.cold+0xa/0x15 [ 387.362911][T27963] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 387.368728][T27963] ? ___might_sleep+0x163/0x280 [ 387.368750][T27963] __should_failslab+0x121/0x190 [ 387.368768][T27963] should_failslab+0x9/0x14 [ 387.368783][T27963] kmem_cache_alloc_trace+0x2d1/0x760 [ 387.368800][T27963] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 387.388459][T27963] ? rcu_read_lock_sched_held+0x110/0x130 [ 387.388479][T27963] ? kmem_cache_alloc_trace+0x354/0x760 [ 387.388501][T27963] legacy_init_fs_context+0x48/0xe0 [ 387.388514][T27963] ? generic_parse_monolithic+0x200/0x200 [ 387.388528][T27963] alloc_fs_context+0x365/0x640 [ 387.388551][T27963] fs_context_for_mount+0x25/0x30 [ 387.400229][T27963] vfs_kern_mount.part.0+0x28/0xf0 [ 387.400248][T27963] vfs_kern_mount+0x40/0x60 [ 387.400271][T27963] btrfs_mount+0x2b4/0x15e2 [ 387.400289][T27963] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 387.400305][T27963] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 387.400317][T27963] ? should_fail+0x1de/0x852 [ 387.400335][T27963] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 387.431957][T27963] ? btrfs_remount+0x11f0/0x11f0 [ 387.431984][T27963] ? rcu_read_lock_sched_held+0x110/0x130 [ 387.432000][T27963] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 387.432015][T27963] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 387.432029][T27963] ? vfs_parse_fs_string+0x111/0x170 [ 387.432047][T27963] ? vfs_parse_fs_string+0x111/0x170 [ 387.441102][T27963] ? rcu_read_lock_sched_held+0x110/0x130 [ 387.441119][T27963] ? kfree+0x1fa/0x230 [ 387.441136][T27963] ? vfs_parse_fs_string+0x116/0x170 [ 387.441158][T27963] ? btrfs_remount+0x11f0/0x11f0 [ 387.441172][T27963] legacy_get_tree+0xf2/0x200 [ 387.441185][T27963] ? btrfs_remount+0x11f0/0x11f0 [ 387.441200][T27963] ? legacy_get_tree+0xf2/0x200 [ 387.531860][T27963] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 387.538257][T27963] vfs_get_tree+0x123/0x450 [ 387.542781][T27963] do_mount+0x1436/0x2c40 [ 387.547116][T27963] ? copy_mount_string+0x40/0x40 [ 387.552145][T27963] ? _copy_from_user+0xdd/0x150 [ 387.557009][T27963] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 387.563420][T27963] ? copy_mount_options+0x280/0x3a0 [ 387.568648][T27963] ksys_mount+0xdb/0x150 [ 387.572882][T27963] __x64_sys_mount+0xbe/0x150 [ 387.577676][T27963] do_syscall_64+0x103/0x610 [ 387.582272][T27963] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 387.588157][T27963] RIP: 0033:0x45b81a [ 387.592048][T27963] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 387.611665][T27963] RSP: 002b:00007f082125da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 387.620171][T27963] RAX: ffffffffffffffda RBX: 00007f082125db40 RCX: 000000000045b81a 14:43:55 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x0, 0xf0}, 0x0) [ 387.628137][T27963] RDX: 00007f082125dae0 RSI: 0000000020000000 RDI: 00007f082125db00 [ 387.636100][T27963] RBP: 0000000000000001 R08: 00007f082125db40 R09: 00007f082125dae0 [ 387.644059][T27963] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 387.652325][T27963] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:55 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0xf0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:55 executing program 2 (fault-call:0 fault-nth:46): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:55 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:55 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x0, 0x158}, 0x0) [ 387.884564][T28010] FAULT_INJECTION: forcing a failure. [ 387.884564][T28010] name failslab, interval 1, probability 0, space 0, times 0 [ 387.901946][T28010] CPU: 0 PID: 28010 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 387.909968][T28010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 387.920460][T28010] Call Trace: [ 387.923929][T28010] dump_stack+0x172/0x1f0 [ 387.928263][T28010] should_fail.cold+0xa/0x15 [ 387.932850][T28010] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 387.938656][T28010] ? ___might_sleep+0x163/0x280 [ 387.943509][T28010] __should_failslab+0x121/0x190 [ 387.948451][T28010] should_failslab+0x9/0x14 [ 387.952959][T28010] kmem_cache_alloc_node_trace+0x270/0x720 [ 387.958806][T28010] __kmalloc_node+0x3d/0x70 [ 387.963302][T28010] kvmalloc_node+0xbd/0x100 [ 387.967800][T28010] btrfs_mount_root+0x12b/0x1220 [ 387.972734][T28010] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 387.979118][T28010] ? btrfs_decode_error+0x70/0x70 [ 387.984139][T28010] ? rcu_read_lock_sched_held+0x110/0x130 [ 387.990022][T28010] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 387.996341][T28010] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 388.002600][T28010] ? vfs_parse_fs_string+0x111/0x170 [ 388.007878][T28010] ? vfs_parse_fs_string+0x111/0x170 [ 388.013156][T28010] ? rcu_read_lock_sched_held+0x110/0x130 [ 388.018872][T28010] ? kfree+0x1fa/0x230 [ 388.022981][T28010] ? vfs_parse_fs_string+0x116/0x170 [ 388.028258][T28010] ? btrfs_decode_error+0x70/0x70 [ 388.033273][T28010] legacy_get_tree+0xf2/0x200 [ 388.037945][T28010] vfs_get_tree+0x123/0x450 [ 388.042494][T28010] fc_mount+0x17/0xc0 [ 388.046603][T28010] vfs_kern_mount.part.0+0xd8/0xf0 [ 388.051710][T28010] vfs_kern_mount+0x40/0x60 [ 388.056278][T28010] btrfs_mount+0x2b4/0x15e2 [ 388.060949][T28010] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 388.066579][T28010] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 388.072813][T28010] ? should_fail+0x1de/0x852 [ 388.077406][T28010] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 388.083208][T28010] ? btrfs_remount+0x11f0/0x11f0 [ 388.088147][T28010] ? rcu_read_lock_sched_held+0x110/0x130 [ 388.093903][T28010] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 388.100135][T28010] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 388.106394][T28010] ? vfs_parse_fs_string+0x111/0x170 [ 388.111670][T28010] ? vfs_parse_fs_string+0x111/0x170 [ 388.116949][T28010] ? rcu_read_lock_sched_held+0x110/0x130 [ 388.122750][T28010] ? kfree+0x1fa/0x230 [ 388.126811][T28010] ? vfs_parse_fs_string+0x116/0x170 [ 388.132090][T28010] ? btrfs_remount+0x11f0/0x11f0 [ 388.137023][T28010] legacy_get_tree+0xf2/0x200 [ 388.141779][T28010] ? btrfs_remount+0x11f0/0x11f0 [ 388.146750][T28010] ? legacy_get_tree+0xf2/0x200 [ 388.151595][T28010] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 388.157828][T28010] vfs_get_tree+0x123/0x450 [ 388.162393][T28010] do_mount+0x1436/0x2c40 [ 388.166806][T28010] ? copy_mount_string+0x40/0x40 [ 388.171929][T28010] ? _copy_from_user+0xdd/0x150 [ 388.176909][T28010] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 388.183139][T28010] ? copy_mount_options+0x280/0x3a0 [ 388.188362][T28010] ksys_mount+0xdb/0x150 [ 388.192601][T28010] __x64_sys_mount+0xbe/0x150 [ 388.197282][T28010] do_syscall_64+0x103/0x610 [ 388.201870][T28010] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 388.207799][T28010] RIP: 0033:0x45b81a [ 388.211726][T28010] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 388.231409][T28010] RSP: 002b:00007f082125da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 388.239859][T28010] RAX: ffffffffffffffda RBX: 00007f082125db40 RCX: 000000000045b81a [ 388.248122][T28010] RDX: 00007f082125dae0 RSI: 0000000020000000 RDI: 00007f082125db00 [ 388.256132][T28010] RBP: 0000000000000001 R08: 00007f082125db40 R09: 00007f082125dae0 [ 388.264268][T28010] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 388.272232][T28010] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:56 executing program 1: ppoll(&(0x7f0000000080)=[{}], 0x1, 0x0, 0x0, 0x1b5) r0 = syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0x3, 0x2) sendto$isdn(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000002000000099b17157c793fe865eed55c61029506c8ae7e0870e32515933e7de2eb361584735702a760ec80a668f01dfa987db185974"], 0x39, 0x0, &(0x7f0000000100)={0x22, 0x80, 0x2, 0x8, 0x3}, 0x6) write$UHID_INPUT2(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0c000000aa00a67bec2e58c00035a5c6c52136aed6ae2f195dc5674b2b1ed862d960921f41f805afb25f073d716740eb2abcaa0c3a96b8fb726004211a9a97da45b5dc2030bd28a2b7ff45916ab1c91e4c9c113e8fdf6151f619b6c9d12aebaf335e558f1d3bce5a86dd7b091b955a57bb8600c4df4515ef37d603f3fe2842acb4bf05e6a7219a48206d6674df991bbb786b8e1d3778a2fe70a4381fe44da122a6f818166c94fcec6249aff2a8bfb591"], 0xb0) write$binfmt_elf64(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x2e5f, 0x40, 0x4, 0x1, 0x7f, 0x3, 0x7, 0x80000001, 0x17b, 0x40, 0x278, 0xe863, 0x2, 0x38, 0x1, 0x1, 0x101, 0xcf}, [{0x60000007, 0x400, 0x2632, 0x1, 0x3, 0x8, 0x4, 0x36}, {0x6474e557, 0x6, 0x7, 0x0, 0x6, 0xf8, 0x0, 0x1}], "94e03b7611ff58e67e3a894f0691f845a1e288afa3f7bfdaf2b827e7e380b2ed6b82d829cfb0b4a707e02372090f4b5c15a3ee70f10cbf94a718a0d9ca4af7404eb9930824327ff2df90325a9639204d194ffbf9ba9a451174895cdfd9dcab85dd05c1689137758a62f2ad721be5a7f8385c8a402e094dbfd8f25c0bcf4a49002d58398fb5a93011467cda1a3dacf8044de26c428459ad9956f0f333b4", [[], [], [], [], [], [], [], [], [], []]}, 0xb4d) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x7, &(0x7f0000000000), 0x0) 14:43:56 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x300, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1, 0x0, 0x9}, 0x0) 14:43:56 executing program 2 (fault-call:0 fault-nth:47): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:56 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x0, 0xa00}, 0x0) [ 388.501592][T28041] FAULT_INJECTION: forcing a failure. [ 388.501592][T28041] name failslab, interval 1, probability 0, space 0, times 0 [ 388.576413][T28041] CPU: 1 PID: 28041 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 388.584455][T28041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 388.594522][T28041] Call Trace: [ 388.597814][T28041] dump_stack+0x172/0x1f0 [ 388.602153][T28041] should_fail.cold+0xa/0x15 [ 388.606953][T28041] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 388.612771][T28041] ? ___might_sleep+0x163/0x280 [ 388.617651][T28041] __should_failslab+0x121/0x190 [ 388.622609][T28041] should_failslab+0x9/0x14 [ 388.627135][T28041] __kmalloc_track_caller+0x2d8/0x740 [ 388.632521][T28041] ? rcu_read_lock_sched_held+0x110/0x130 [ 388.638266][T28041] ? btrfs_mount_root+0x2b8/0x1220 [ 388.643430][T28041] kstrdup+0x3a/0x70 [ 388.647367][T28041] btrfs_mount_root+0x2b8/0x1220 [ 388.652354][T28041] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 388.658600][T28041] ? btrfs_decode_error+0x70/0x70 [ 388.663666][T28041] ? rcu_read_lock_sched_held+0x110/0x130 [ 388.669377][T28041] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 388.675697][T28041] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 388.681930][T28041] ? vfs_parse_fs_string+0x111/0x170 [ 388.687214][T28041] ? vfs_parse_fs_string+0x111/0x170 [ 388.692507][T28041] ? rcu_read_lock_sched_held+0x110/0x130 [ 388.698229][T28041] ? kfree+0x1fa/0x230 [ 388.702317][T28041] ? vfs_parse_fs_string+0x116/0x170 [ 388.707691][T28041] ? btrfs_decode_error+0x70/0x70 [ 388.712713][T28041] legacy_get_tree+0xf2/0x200 [ 388.717450][T28041] vfs_get_tree+0x123/0x450 [ 388.721950][T28041] fc_mount+0x17/0xc0 [ 388.725938][T28041] vfs_kern_mount.part.0+0xd8/0xf0 [ 388.731052][T28041] vfs_kern_mount+0x40/0x60 [ 388.735558][T28041] btrfs_mount+0x2b4/0x15e2 [ 388.740078][T28041] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 388.745720][T28041] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 388.751979][T28041] ? should_fail+0x1de/0x852 [ 388.756562][T28041] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 388.762363][T28041] ? btrfs_remount+0x11f0/0x11f0 [ 388.767330][T28041] ? rcu_read_lock_sched_held+0x110/0x130 [ 388.773058][T28041] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 388.779325][T28041] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 388.785563][T28041] ? vfs_parse_fs_string+0x111/0x170 [ 388.790885][T28041] ? vfs_parse_fs_string+0x111/0x170 [ 388.796162][T28041] ? rcu_read_lock_sched_held+0x110/0x130 [ 388.801869][T28041] ? kfree+0x1fa/0x230 [ 388.805924][T28041] ? vfs_parse_fs_string+0x116/0x170 [ 388.811212][T28041] ? btrfs_remount+0x11f0/0x11f0 [ 388.816146][T28041] legacy_get_tree+0xf2/0x200 [ 388.820813][T28041] ? btrfs_remount+0x11f0/0x11f0 [ 388.825744][T28041] ? legacy_get_tree+0xf2/0x200 [ 388.830591][T28041] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 388.836827][T28041] vfs_get_tree+0x123/0x450 [ 388.841339][T28041] do_mount+0x1436/0x2c40 [ 388.845679][T28041] ? copy_mount_string+0x40/0x40 [ 388.850658][T28041] ? copy_mount_options+0x1ea/0x3a0 [ 388.855852][T28041] ? copy_mount_options+0x1f0/0x3a0 [ 388.861054][T28041] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 388.867289][T28041] ? copy_mount_options+0x280/0x3a0 [ 388.872488][T28041] ksys_mount+0xdb/0x150 [ 388.876764][T28041] __x64_sys_mount+0xbe/0x150 [ 388.881441][T28041] do_syscall_64+0x103/0x610 [ 388.886028][T28041] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 388.891900][T28041] RIP: 0033:0x45b81a [ 388.895819][T28041] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 388.916632][T28041] RSP: 002b:00007f082125da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 388.925035][T28041] RAX: ffffffffffffffda RBX: 00007f082125db40 RCX: 000000000045b81a [ 388.932993][T28041] RDX: 00007f082125dae0 RSI: 0000000020000000 RDI: 00007f082125db00 [ 388.940958][T28041] RBP: 0000000000000001 R08: 00007f082125db40 R09: 00007f082125dae0 [ 388.948918][T28041] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 388.956867][T28041] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:57 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x4ae, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:57 executing program 2 (fault-call:0 fault-nth:48): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 389.101354][T28058] FAULT_INJECTION: forcing a failure. [ 389.101354][T28058] name failslab, interval 1, probability 0, space 0, times 0 [ 389.115132][T28058] CPU: 1 PID: 28058 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 389.123130][T28058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 389.133184][T28058] Call Trace: [ 389.136480][T28058] dump_stack+0x172/0x1f0 [ 389.140822][T28058] should_fail.cold+0xa/0x15 [ 389.145423][T28058] ? fault_create_debugfs_attr+0x1e0/0x1e0 14:43:57 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 389.151243][T28058] ? ___might_sleep+0x163/0x280 [ 389.156113][T28058] __should_failslab+0x121/0x190 [ 389.161060][T28058] should_failslab+0x9/0x14 [ 389.165570][T28058] kmem_cache_alloc_trace+0x2d1/0x760 [ 389.170945][T28058] ? kasan_kmalloc+0x9/0x10 [ 389.175455][T28058] ? __kmalloc_node+0x4e/0x70 [ 389.180140][T28058] btrfs_mount_root+0x1d0/0x1220 [ 389.185081][T28058] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 389.192261][T28058] ? btrfs_decode_error+0x70/0x70 [ 389.197292][T28058] ? rcu_read_lock_sched_held+0x110/0x130 [ 389.203000][T28058] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 389.209226][T28058] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 389.215458][T28058] ? vfs_parse_fs_string+0x111/0x170 [ 389.220725][T28058] ? vfs_parse_fs_string+0x111/0x170 [ 389.225999][T28058] ? rcu_read_lock_sched_held+0x110/0x130 [ 389.231705][T28058] ? kfree+0x1fa/0x230 [ 389.235765][T28058] ? vfs_parse_fs_string+0x116/0x170 [ 389.241036][T28058] ? btrfs_decode_error+0x70/0x70 [ 389.246060][T28058] legacy_get_tree+0xf2/0x200 [ 389.250727][T28058] vfs_get_tree+0x123/0x450 [ 389.255222][T28058] fc_mount+0x17/0xc0 [ 389.259197][T28058] vfs_kern_mount.part.0+0xd8/0xf0 [ 389.264300][T28058] vfs_kern_mount+0x40/0x60 [ 389.268788][T28058] btrfs_mount+0x2b4/0x15e2 [ 389.273284][T28058] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 389.278899][T28058] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 389.285122][T28058] ? should_fail+0x1de/0x852 [ 389.289702][T28058] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 389.295507][T28058] ? btrfs_remount+0x11f0/0x11f0 [ 389.300436][T28058] ? rcu_read_lock_sched_held+0x110/0x130 [ 389.306139][T28058] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 389.312363][T28058] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 389.318587][T28058] ? vfs_parse_fs_string+0x111/0x170 [ 389.323860][T28058] ? vfs_parse_fs_string+0x111/0x170 [ 389.329135][T28058] ? rcu_read_lock_sched_held+0x110/0x130 [ 389.334839][T28058] ? kfree+0x1fa/0x230 [ 389.338984][T28058] ? vfs_parse_fs_string+0x116/0x170 [ 389.344268][T28058] ? btrfs_remount+0x11f0/0x11f0 [ 389.349188][T28058] legacy_get_tree+0xf2/0x200 [ 389.353850][T28058] ? btrfs_remount+0x11f0/0x11f0 [ 389.358770][T28058] ? legacy_get_tree+0xf2/0x200 [ 389.363603][T28058] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 389.369829][T28058] vfs_get_tree+0x123/0x450 [ 389.374319][T28058] do_mount+0x1436/0x2c40 [ 389.378641][T28058] ? copy_mount_string+0x40/0x40 [ 389.383561][T28058] ? _copy_from_user+0xdd/0x150 [ 389.388399][T28058] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 389.394619][T28058] ? copy_mount_options+0x280/0x3a0 [ 389.399802][T28058] ksys_mount+0xdb/0x150 [ 389.404032][T28058] __x64_sys_mount+0xbe/0x150 [ 389.408711][T28058] do_syscall_64+0x103/0x610 [ 389.413295][T28058] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 389.419179][T28058] RIP: 0033:0x45b81a [ 389.423064][T28058] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 389.442653][T28058] RSP: 002b:00007f082125da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 14:43:57 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:43:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1, 0x0, 0xa}, 0x0) [ 389.451045][T28058] RAX: ffffffffffffffda RBX: 00007f082125db40 RCX: 000000000045b81a [ 389.459012][T28058] RDX: 00007f082125dae0 RSI: 0000000020000000 RDI: 00007f082125db00 [ 389.466967][T28058] RBP: 0000000000000001 R08: 00007f082125db40 R09: 00007f082125dae0 [ 389.474925][T28058] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 389.482881][T28058] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:57 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0xfffffffffffffffd) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x200, 0x0) ioctl$TCSETXF(r1, 0x5434, &(0x7f00000000c0)={0x9b, 0x80000000, [0x4, 0x3, 0x9, 0x9, 0x400], 0x1}) 14:43:57 executing program 2 (fault-call:0 fault-nth:49): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:57 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x500, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) [ 389.715249][T28087] FAULT_INJECTION: forcing a failure. [ 389.715249][T28087] name failslab, interval 1, probability 0, space 0, times 0 [ 389.755982][T28087] CPU: 0 PID: 28087 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 389.763995][T28087] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 389.774049][T28087] Call Trace: [ 389.777338][T28087] dump_stack+0x172/0x1f0 [ 389.781656][T28087] should_fail.cold+0xa/0x15 [ 389.786237][T28087] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 389.792035][T28087] ? ___might_sleep+0x163/0x280 [ 389.796877][T28087] __should_failslab+0x121/0x190 [ 389.801793][T28087] should_failslab+0x9/0x14 [ 389.806312][T28087] kmem_cache_alloc_trace+0x2d1/0x760 [ 389.811682][T28087] ? kasan_kmalloc+0x9/0x10 [ 389.816190][T28087] ? __kmalloc_node+0x4e/0x70 [ 389.820880][T28087] btrfs_mount_root+0x1d0/0x1220 [ 389.825808][T28087] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 389.832046][T28087] ? btrfs_decode_error+0x70/0x70 [ 389.837051][T28087] ? rcu_read_lock_sched_held+0x110/0x130 [ 389.842751][T28087] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 389.848979][T28087] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 389.855217][T28087] ? vfs_parse_fs_string+0x111/0x170 [ 389.860478][T28087] ? vfs_parse_fs_string+0x111/0x170 [ 389.865738][T28087] ? rcu_read_lock_sched_held+0x110/0x130 [ 389.871442][T28087] ? kfree+0x1fa/0x230 [ 389.875487][T28087] ? vfs_parse_fs_string+0x116/0x170 [ 389.880762][T28087] ? btrfs_decode_error+0x70/0x70 [ 389.885873][T28087] legacy_get_tree+0xf2/0x200 [ 389.890531][T28087] vfs_get_tree+0x123/0x450 [ 389.895025][T28087] fc_mount+0x17/0xc0 [ 389.898999][T28087] vfs_kern_mount.part.0+0xd8/0xf0 [ 389.904092][T28087] vfs_kern_mount+0x40/0x60 [ 389.908586][T28087] btrfs_mount+0x2b4/0x15e2 [ 389.913091][T28087] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 389.918708][T28087] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 389.924926][T28087] ? should_fail+0x1de/0x852 [ 389.929495][T28087] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 389.935289][T28087] ? btrfs_remount+0x11f0/0x11f0 [ 389.940221][T28087] ? rcu_read_lock_sched_held+0x110/0x130 [ 389.945916][T28087] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 389.952142][T28087] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 389.958369][T28087] ? vfs_parse_fs_string+0x111/0x170 [ 389.963631][T28087] ? vfs_parse_fs_string+0x111/0x170 [ 389.968896][T28087] ? rcu_read_lock_sched_held+0x110/0x130 [ 389.974596][T28087] ? kfree+0x1fa/0x230 [ 389.978643][T28087] ? vfs_parse_fs_string+0x116/0x170 [ 389.983920][T28087] ? btrfs_remount+0x11f0/0x11f0 [ 389.988929][T28087] legacy_get_tree+0xf2/0x200 [ 389.993582][T28087] ? btrfs_remount+0x11f0/0x11f0 [ 389.998507][T28087] ? legacy_get_tree+0xf2/0x200 [ 390.003338][T28087] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 390.009558][T28087] vfs_get_tree+0x123/0x450 [ 390.014039][T28087] do_mount+0x1436/0x2c40 [ 390.018358][T28087] ? copy_mount_string+0x40/0x40 [ 390.023286][T28087] ? _copy_from_user+0xdd/0x150 [ 390.028114][T28087] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 390.034328][T28087] ? copy_mount_options+0x280/0x3a0 [ 390.039506][T28087] ksys_mount+0xdb/0x150 [ 390.043726][T28087] __x64_sys_mount+0xbe/0x150 [ 390.048383][T28087] do_syscall_64+0x103/0x610 [ 390.052963][T28087] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 390.058844][T28087] RIP: 0033:0x45b81a [ 390.062719][T28087] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 390.082298][T28087] RSP: 002b:00007f082125da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 390.090682][T28087] RAX: ffffffffffffffda RBX: 00007f082125db40 RCX: 000000000045b81a [ 390.098633][T28087] RDX: 00007f082125dae0 RSI: 0000000020000000 RDI: 00007f082125db00 14:43:58 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x0, 0xec0}, 0x0) [ 390.106580][T28087] RBP: 0000000000000001 R08: 00007f082125db40 R09: 00007f082125dae0 [ 390.114526][T28087] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 390.122486][T28087] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:58 executing program 2 (fault-call:0 fault-nth:50): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:58 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x10', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 390.260196][T28105] FAULT_INJECTION: forcing a failure. [ 390.260196][T28105] name failslab, interval 1, probability 0, space 0, times 0 [ 390.297109][T28105] CPU: 1 PID: 28105 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 390.305137][T28105] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 390.315198][T28105] Call Trace: [ 390.318485][T28105] dump_stack+0x172/0x1f0 [ 390.322830][T28105] should_fail.cold+0xa/0x15 [ 390.327436][T28105] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 390.333259][T28105] ? ___might_sleep+0x163/0x280 [ 390.333312][T28105] __should_failslab+0x121/0x190 [ 390.333328][T28105] should_failslab+0x9/0x14 [ 390.333347][T28105] __kmalloc_track_caller+0x2d8/0x740 [ 390.333361][T28105] ? btrfs_mount_root+0x1d0/0x1220 [ 390.333377][T28105] ? rcu_read_lock_sched_held+0x110/0x130 [ 390.333395][T28105] ? btrfs_mount_root+0x2b8/0x1220 [ 390.333412][T28105] kstrdup+0x3a/0x70 [ 390.333430][T28105] btrfs_mount_root+0x2b8/0x1220 [ 390.333448][T28105] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 390.333473][T28105] ? btrfs_decode_error+0x70/0x70 [ 390.343236][T28105] ? rcu_read_lock_sched_held+0x110/0x130 [ 390.343252][T28105] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 390.343267][T28105] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 390.343283][T28105] ? vfs_parse_fs_string+0x111/0x170 [ 390.343297][T28105] ? vfs_parse_fs_string+0x111/0x170 [ 390.343312][T28105] ? rcu_read_lock_sched_held+0x110/0x130 [ 390.343333][T28105] ? kfree+0x1fa/0x230 [ 390.428609][T28105] ? vfs_parse_fs_string+0x116/0x170 [ 390.433902][T28105] ? btrfs_decode_error+0x70/0x70 [ 390.439001][T28105] legacy_get_tree+0xf2/0x200 [ 390.443656][T28105] vfs_get_tree+0x123/0x450 [ 390.448163][T28105] fc_mount+0x17/0xc0 [ 390.452128][T28105] vfs_kern_mount.part.0+0xd8/0xf0 [ 390.457226][T28105] vfs_kern_mount+0x40/0x60 [ 390.461711][T28105] btrfs_mount+0x2b4/0x15e2 [ 390.466196][T28105] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 390.471630][T28105] ? lockdep_hardirqs_on+0x418/0x5d0 [ 390.476902][T28105] ? retint_kernel+0x2d/0x2d [ 390.481471][T28105] ? trace_hardirqs_on_caller+0x6a/0x220 [ 390.487084][T28105] ? btrfs_remount+0x11f0/0x11f0 [ 390.492015][T28105] ? retint_kernel+0x2d/0x2d [ 390.496605][T28105] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 390.502846][T28105] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 390.509076][T28105] ? vfs_parse_fs_string+0x111/0x170 [ 390.514349][T28105] ? vfs_parse_fs_string+0x111/0x170 [ 390.519633][T28105] ? rcu_read_lock_sched_held+0x110/0x130 [ 390.525345][T28105] ? kfree+0x1fa/0x230 [ 390.529392][T28105] ? vfs_parse_fs_string+0x116/0x170 [ 390.534678][T28105] ? btrfs_remount+0x11f0/0x11f0 [ 390.539606][T28105] legacy_get_tree+0xf2/0x200 [ 390.544273][T28105] ? btrfs_remount+0x11f0/0x11f0 [ 390.549188][T28105] ? legacy_get_tree+0xf2/0x200 [ 390.554031][T28105] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 390.560270][T28105] vfs_get_tree+0x123/0x450 [ 390.564751][T28105] do_mount+0x1436/0x2c40 [ 390.569059][T28105] ? copy_mount_string+0x40/0x40 [ 390.573994][T28105] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 390.580222][T28105] ? copy_mount_options+0x280/0x3a0 [ 390.585399][T28105] ksys_mount+0xdb/0x150 [ 390.589620][T28105] __x64_sys_mount+0xbe/0x150 [ 390.594292][T28105] do_syscall_64+0x103/0x610 [ 390.598875][T28105] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 390.604743][T28105] RIP: 0033:0x45b81a [ 390.608618][T28105] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 390.628206][T28105] RSP: 002b:00007f082125da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 390.636593][T28105] RAX: ffffffffffffffda RBX: 00007f082125db40 RCX: 000000000045b81a [ 390.644542][T28105] RDX: 00007f082125dae0 RSI: 0000000020000000 RDI: 00007f082125db00 [ 390.652501][T28105] RBP: 0000000000000001 R08: 00007f082125db40 R09: 00007f082125dae0 14:43:58 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x600, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1, 0x0, 0xe}, 0x0) 14:43:58 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x200000, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000000c0)=ANY=[@ANYBLOB="06000000008002000800ffff05000400"], &(0x7f0000000100)=0x10) r1 = socket$rxrpc(0x21, 0x2, 0xa) ppoll(&(0x7f0000000080)=[{r1}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4) [ 390.660458][T28105] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 390.668407][T28105] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:58 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:58 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x0, 0xf00}, 0x0) 14:43:58 executing program 2 (fault-call:0 fault-nth:51): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:58 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x700, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:43:59 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x0f', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 391.010459][T28144] FAULT_INJECTION: forcing a failure. [ 391.010459][T28144] name failslab, interval 1, probability 0, space 0, times 0 [ 391.048651][T28144] CPU: 1 PID: 28144 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 391.056644][T28144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 391.066685][T28144] Call Trace: [ 391.069983][T28144] dump_stack+0x172/0x1f0 [ 391.074322][T28144] should_fail.cold+0xa/0x15 [ 391.078918][T28144] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 391.084722][T28144] ? ___might_sleep+0x163/0x280 [ 391.089569][T28144] __should_failslab+0x121/0x190 [ 391.094496][T28144] should_failslab+0x9/0x14 [ 391.098987][T28144] kmem_cache_alloc+0x2b2/0x6f0 [ 391.103825][T28144] ? fc_mount+0x17/0xc0 [ 391.107978][T28144] ? vfs_kern_mount.part.0+0xd8/0xf0 [ 391.113335][T28144] ? vfs_kern_mount+0x40/0x60 [ 391.117994][T28144] ? btrfs_mount+0x2b4/0x15e2 [ 391.122657][T28144] ? legacy_get_tree+0xf2/0x200 [ 391.132982][T28144] ? vfs_get_tree+0x123/0x450 [ 391.137824][T28144] ? do_mount+0x1436/0x2c40 [ 391.142309][T28144] ? ksys_mount+0xdb/0x150 [ 391.146721][T28144] getname_kernel+0x53/0x370 [ 391.151297][T28144] kern_path+0x20/0x40 [ 391.155357][T28144] lookup_bdev.part.0+0x7b/0x1b0 [ 391.160280][T28144] ? blkdev_open+0x290/0x290 [ 391.164854][T28144] ? lock_downgrade+0x880/0x880 [ 391.169700][T28144] blkdev_get_by_path+0x81/0x130 [ 391.174631][T28144] btrfs_scan_one_device+0xd3/0x720 [ 391.179815][T28144] ? kfree+0x173/0x230 [ 391.183872][T28144] ? device_list_add+0x14d0/0x14d0 [ 391.189855][T28144] ? trace_hardirqs_on+0x50/0x230 [ 391.194868][T28144] ? btrfs_mount_root+0xb36/0x1220 [ 391.199969][T28144] btrfs_mount_root+0x718/0x1220 [ 391.204904][T28144] ? btrfs_decode_error+0x70/0x70 [ 391.209917][T28144] ? rcu_read_lock_sched_held+0x110/0x130 [ 391.215627][T28144] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 391.221855][T28144] ? vfs_parse_fs_string+0x111/0x170 [ 391.227131][T28144] ? vfs_parse_fs_string+0x111/0x170 [ 391.232402][T28144] ? rcu_read_lock_sched_held+0x110/0x130 [ 391.238114][T28144] ? kfree+0x1fa/0x230 [ 391.242169][T28144] ? vfs_parse_fs_string+0x116/0x170 [ 391.247442][T28144] ? btrfs_decode_error+0x70/0x70 [ 391.252450][T28144] legacy_get_tree+0xf2/0x200 [ 391.257126][T28144] vfs_get_tree+0x123/0x450 [ 391.261622][T28144] fc_mount+0x17/0xc0 [ 391.265590][T28144] vfs_kern_mount.part.0+0xd8/0xf0 [ 391.270693][T28144] vfs_kern_mount+0x40/0x60 [ 391.275185][T28144] btrfs_mount+0x2b4/0x15e2 [ 391.279673][T28144] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 391.285291][T28144] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 391.291533][T28144] ? should_fail+0x1de/0x852 [ 391.296121][T28144] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 391.301919][T28144] ? btrfs_remount+0x11f0/0x11f0 [ 391.306851][T28144] ? rcu_read_lock_sched_held+0x110/0x130 [ 391.312553][T28144] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 391.318777][T28144] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 391.325007][T28144] ? vfs_parse_fs_string+0x111/0x170 [ 391.330287][T28144] ? vfs_parse_fs_string+0x111/0x170 [ 391.335558][T28144] ? rcu_read_lock_sched_held+0x110/0x130 [ 391.341262][T28144] ? kfree+0x1fa/0x230 [ 391.345317][T28144] ? vfs_parse_fs_string+0x116/0x170 [ 391.350589][T28144] ? btrfs_remount+0x11f0/0x11f0 [ 391.355517][T28144] legacy_get_tree+0xf2/0x200 [ 391.360178][T28144] ? btrfs_remount+0x11f0/0x11f0 [ 391.365111][T28144] ? legacy_get_tree+0xf2/0x200 [ 391.369945][T28144] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 391.376172][T28144] vfs_get_tree+0x123/0x450 [ 391.380662][T28144] do_mount+0x1436/0x2c40 [ 391.384986][T28144] ? copy_mount_string+0x40/0x40 [ 391.389909][T28144] ? _copy_from_user+0xdd/0x150 [ 391.394747][T28144] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 391.400970][T28144] ? copy_mount_options+0x280/0x3a0 [ 391.406159][T28144] ksys_mount+0xdb/0x150 [ 391.410477][T28144] __x64_sys_mount+0xbe/0x150 [ 391.415143][T28144] do_syscall_64+0x103/0x610 [ 391.419725][T28144] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 391.425604][T28144] RIP: 0033:0x45b81a [ 391.429486][T28144] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 391.449108][T28144] RSP: 002b:00007f082125da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 14:43:59 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x0, 0x3f00}, 0x0) [ 391.457502][T28144] RAX: ffffffffffffffda RBX: 00007f082125db40 RCX: 000000000045b81a [ 391.465459][T28144] RDX: 00007f082125dae0 RSI: 0000000020000000 RDI: 00007f082125db00 [ 391.473414][T28144] RBP: 0000000000000001 R08: 00007f082125db40 R09: 00007f082125dae0 [ 391.481376][T28144] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 391.489331][T28144] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:43:59 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:59 executing program 2 (fault-call:0 fault-nth:52): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:43:59 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) socket$inet_dccp(0x2, 0x6, 0x0) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000000)=0x3, 0x4) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x8, 0x2) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r1, 0xc0305616, &(0x7f0000000100)={0x0, {0x5, 0xfff}}) ioctl$KVM_SET_MSRS(r1, 0x4008ae89, &(0x7f00000000c0)={0x1, 0x0, [{0x400008fd, 0x0, 0x8001}]}) 14:43:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1, 0x0, 0x60}, 0x0) 14:43:59 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0xa00, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) [ 391.786354][T28177] FAULT_INJECTION: forcing a failure. [ 391.786354][T28177] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 391.799604][T28177] CPU: 0 PID: 28177 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 391.807577][T28177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 391.817619][T28177] Call Trace: [ 391.820904][T28177] dump_stack+0x172/0x1f0 [ 391.825231][T28177] should_fail.cold+0xa/0x15 [ 391.829805][T28177] ? legacy_get_tree+0xf2/0x200 [ 391.834643][T28177] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 391.840434][T28177] ? __lock_acquire+0x548/0x3fb0 [ 391.845356][T28177] ? do_syscall_64+0x103/0x610 [ 391.850101][T28177] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 391.856152][T28177] should_fail_alloc_page+0x50/0x60 [ 391.861334][T28177] __alloc_pages_nodemask+0x1a1/0x8d0 [ 391.866692][T28177] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 391.872392][T28177] ? find_held_lock+0x35/0x130 [ 391.877158][T28177] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 391.882949][T28177] cache_grow_begin+0x9c/0x860 [ 391.887696][T28177] ? btrfs_mount_root+0x1d0/0x1220 [ 391.892791][T28177] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 391.899016][T28177] kmem_cache_alloc_trace+0x67f/0x760 [ 391.904378][T28177] ? kasan_kmalloc+0x9/0x10 [ 391.908868][T28177] btrfs_mount_root+0x1d0/0x1220 [ 391.913788][T28177] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 391.920010][T28177] ? btrfs_decode_error+0x70/0x70 [ 391.925021][T28177] ? rcu_read_lock_sched_held+0x110/0x130 [ 391.930732][T28177] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 391.936965][T28177] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 391.943187][T28177] ? vfs_parse_fs_string+0x111/0x170 [ 391.948455][T28177] ? vfs_parse_fs_string+0x111/0x170 [ 391.953723][T28177] ? rcu_read_lock_sched_held+0x110/0x130 [ 391.959422][T28177] ? kfree+0x1fa/0x230 [ 391.963473][T28177] ? vfs_parse_fs_string+0x116/0x170 [ 391.968742][T28177] ? btrfs_decode_error+0x70/0x70 [ 391.973747][T28177] legacy_get_tree+0xf2/0x200 [ 391.978409][T28177] vfs_get_tree+0x123/0x450 [ 391.982899][T28177] fc_mount+0x17/0xc0 [ 391.986866][T28177] vfs_kern_mount.part.0+0xd8/0xf0 [ 391.991958][T28177] vfs_kern_mount+0x40/0x60 [ 391.996443][T28177] btrfs_mount+0x2b4/0x15e2 [ 392.000928][T28177] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 392.006541][T28177] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 392.012763][T28177] ? should_fail+0x1de/0x852 [ 392.017339][T28177] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 392.023128][T28177] ? btrfs_remount+0x11f0/0x11f0 [ 392.028061][T28177] ? rcu_read_lock_sched_held+0x110/0x130 [ 392.033764][T28177] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 392.039982][T28177] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 392.046203][T28177] ? vfs_parse_fs_string+0x111/0x170 [ 392.051467][T28177] ? vfs_parse_fs_string+0x111/0x170 [ 392.056735][T28177] ? rcu_read_lock_sched_held+0x110/0x130 [ 392.062438][T28177] ? kfree+0x1fa/0x230 [ 392.066600][T28177] ? vfs_parse_fs_string+0x116/0x170 [ 392.071869][T28177] ? btrfs_remount+0x11f0/0x11f0 [ 392.076788][T28177] legacy_get_tree+0xf2/0x200 [ 392.081448][T28177] ? btrfs_remount+0x11f0/0x11f0 [ 392.086362][T28177] ? legacy_get_tree+0xf2/0x200 [ 392.091194][T28177] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 392.097417][T28177] vfs_get_tree+0x123/0x450 [ 392.101901][T28177] do_mount+0x1436/0x2c40 [ 392.106230][T28177] ? copy_mount_string+0x40/0x40 [ 392.111157][T28177] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 392.117378][T28177] ? copy_mount_options+0x280/0x3a0 [ 392.122574][T28177] ksys_mount+0xdb/0x150 [ 392.126803][T28177] __x64_sys_mount+0xbe/0x150 [ 392.131466][T28177] do_syscall_64+0x103/0x610 [ 392.136067][T28177] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 392.141955][T28177] RIP: 0033:0x45b81a [ 392.145842][T28177] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 392.165430][T28177] RSP: 002b:00007f082125da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 392.173820][T28177] RAX: ffffffffffffffda RBX: 00007f082125db40 RCX: 000000000045b81a 14:44:00 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x0, 0x5801}, 0x0) [ 392.181774][T28177] RDX: 00007f082125dae0 RSI: 0000000020000000 RDI: 00007f082125db00 [ 392.189727][T28177] RBP: 0000000000000001 R08: 00007f082125db40 R09: 00007f082125dae0 [ 392.197688][T28177] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 392.205657][T28177] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:44:00 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0xe00, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:44:00 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:44:00 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 14:44:00 executing program 2 (fault-call:0 fault-nth:53): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:44:00 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0xf00, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:44:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1, 0x0, 0xfc}, 0x0) 14:44:00 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt(r0, 0x5, 0x6, &(0x7f00000000c0)="bedfb729b64090f81a8fc0bae6e7e53a1d88b9423604e64da3997d15c56ff867ef7955192ab7efe3541f0a4e69ac7cd4d7b9551b7c795e81ecaa0f436b788b4706398afb46206a7ab271a1b3bffc0e3c20965678606084fbd4a914ca056f30011f56dcef0592e07c87894cb704d192c5f010816449f349f8cddaf0f6000e68eec56818efde96538c27d51b6d2f80fe2c76eb0d88f2343780e15547fb1c6491bb4f1147402872de805b32359c6aaf8dec536f17aa5d5ba66ffcd429e855f4e26da1700c5d1c96ddd8651c6182fa639401a2659995930716b50bdf5bcc21d81d4bc33988", 0xe3) setsockopt$sock_int(r0, 0x1, 0x1000000000000007, &(0x7f0000000040)=0x5, 0x320) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x401, 0x10000) readlinkat(r1, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=""/151, 0x97) [ 392.608530][T28214] FAULT_INJECTION: forcing a failure. [ 392.608530][T28214] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 392.621767][T28214] CPU: 0 PID: 28214 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 392.629745][T28214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 392.639805][T28214] Call Trace: [ 392.643109][T28214] dump_stack+0x172/0x1f0 [ 392.647450][T28214] should_fail.cold+0xa/0x15 [ 392.652042][T28214] ? __lock_acquire+0x548/0x3fb0 [ 392.656974][T28214] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 392.662783][T28214] ? __lock_acquire+0x548/0x3fb0 [ 392.667732][T28214] should_fail_alloc_page+0x50/0x60 [ 392.672935][T28214] __alloc_pages_nodemask+0x1a1/0x8d0 [ 392.678317][T28214] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 392.684042][T28214] ? find_held_lock+0x35/0x130 [ 392.688806][T28214] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 392.694596][T28214] cache_grow_begin+0x9c/0x860 [ 392.699341][T28214] ? getname_kernel+0x53/0x370 [ 392.704084][T28214] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 392.710305][T28214] kmem_cache_alloc+0x62d/0x6f0 [ 392.715138][T28214] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 392.720837][T28214] ? devid_cmp+0x95/0xb0 [ 392.725062][T28214] getname_kernel+0x53/0x370 [ 392.729646][T28214] kern_path+0x20/0x40 [ 392.733724][T28214] lookup_bdev.part.0+0x7b/0x1b0 [ 392.738651][T28214] ? blkdev_open+0x290/0x290 [ 392.743238][T28214] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 392.749459][T28214] ? list_sort.part.0+0x605/0x8b0 [ 392.754481][T28214] blkdev_get_by_path+0x81/0x130 [ 392.759415][T28214] btrfs_get_bdev_and_sb+0x38/0x300 [ 392.764598][T28214] open_fs_devices+0x68e/0xbd0 [ 392.769361][T28214] ? find_fsid+0x2e0/0x2e0 [ 392.773796][T28214] ? memmove_extent_buffer.cold+0x44/0x44 [ 392.779506][T28214] btrfs_open_devices+0x147/0x170 [ 392.784512][T28214] btrfs_mount_root+0x79a/0x1220 [ 392.789449][T28214] ? btrfs_decode_error+0x70/0x70 [ 392.794457][T28214] ? rcu_read_lock_sched_held+0x110/0x130 [ 392.800154][T28214] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 392.806378][T28214] ? vfs_parse_fs_string+0x111/0x170 [ 392.811641][T28214] ? vfs_parse_fs_string+0x111/0x170 [ 392.816903][T28214] ? rcu_read_lock_sched_held+0x110/0x130 [ 392.822602][T28214] ? kfree+0x1fa/0x230 [ 392.826669][T28214] ? vfs_parse_fs_string+0x116/0x170 [ 392.831940][T28214] ? btrfs_decode_error+0x70/0x70 [ 392.836959][T28214] legacy_get_tree+0xf2/0x200 [ 392.841647][T28214] vfs_get_tree+0x123/0x450 [ 392.846147][T28214] fc_mount+0x17/0xc0 [ 392.850112][T28214] vfs_kern_mount.part.0+0xd8/0xf0 [ 392.855202][T28214] vfs_kern_mount+0x40/0x60 [ 392.859689][T28214] btrfs_mount+0x2b4/0x15e2 [ 392.864177][T28214] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 392.869786][T28214] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 392.876006][T28214] ? should_fail+0x1de/0x852 [ 392.880577][T28214] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 392.886364][T28214] ? btrfs_remount+0x11f0/0x11f0 [ 392.891298][T28214] ? rcu_read_lock_sched_held+0x110/0x130 [ 392.897023][T28214] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 392.903240][T28214] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 392.909464][T28214] ? vfs_parse_fs_string+0x111/0x170 [ 392.914820][T28214] ? vfs_parse_fs_string+0x111/0x170 [ 392.920084][T28214] ? rcu_read_lock_sched_held+0x110/0x130 [ 392.925782][T28214] ? kfree+0x1fa/0x230 [ 392.929830][T28214] ? vfs_parse_fs_string+0x116/0x170 [ 392.935095][T28214] ? btrfs_remount+0x11f0/0x11f0 [ 392.940023][T28214] legacy_get_tree+0xf2/0x200 [ 392.944685][T28214] ? btrfs_remount+0x11f0/0x11f0 [ 392.949598][T28214] ? legacy_get_tree+0xf2/0x200 [ 392.954436][T28214] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 392.960665][T28214] vfs_get_tree+0x123/0x450 [ 392.965162][T28214] do_mount+0x1436/0x2c40 [ 392.969477][T28214] ? copy_mount_string+0x40/0x40 [ 392.974401][T28214] ? _copy_from_user+0xdd/0x150 [ 392.979243][T28214] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 392.985458][T28214] ? copy_mount_options+0x280/0x3a0 [ 392.990655][T28214] ksys_mount+0xdb/0x150 [ 392.994904][T28214] __x64_sys_mount+0xbe/0x150 [ 392.999572][T28214] do_syscall_64+0x103/0x610 [ 393.004151][T28214] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 393.010030][T28214] RIP: 0033:0x45b81a [ 393.013906][T28214] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 393.033490][T28214] RSP: 002b:00007f082125da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 393.041883][T28214] RAX: ffffffffffffffda RBX: 00007f082125db40 RCX: 000000000045b81a [ 393.049844][T28214] RDX: 00007f082125dae0 RSI: 0000000020000000 RDI: 00007f082125db00 [ 393.057793][T28214] RBP: 0000000000000001 R08: 00007f082125db40 R09: 00007f082125dae0 [ 393.065757][T28214] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 393.073725][T28214] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:44:01 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x0, 0xc00e}, 0x0) 14:44:01 executing program 2 (fault-call:0 fault-nth:54): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:44:01 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:44:01 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x3f00, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:44:01 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x0, 0xf000}, 0x0) [ 393.369581][T28246] BTRFS warning (device ): duplicate device fsid:devid for ecf6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop5 new:/dev/loop2 14:44:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1, 0x0, 0x1f4}, 0x0) 14:44:01 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 393.462945][T28246] FAULT_INJECTION: forcing a failure. [ 393.462945][T28246] name failslab, interval 1, probability 0, space 0, times 0 [ 393.485747][T28246] CPU: 0 PID: 28246 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 393.493773][T28246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 393.503833][T28246] Call Trace: [ 393.507122][T28246] dump_stack+0x172/0x1f0 [ 393.511447][T28246] should_fail.cold+0xa/0x15 [ 393.516044][T28246] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 393.521856][T28246] ? ___might_sleep+0x163/0x280 [ 393.526695][T28246] __should_failslab+0x121/0x190 [ 393.531618][T28246] should_failslab+0x9/0x14 [ 393.536106][T28246] kmem_cache_alloc_node+0x264/0x710 [ 393.541376][T28246] ? find_held_lock+0x35/0x130 [ 393.546149][T28246] __alloc_skb+0xd5/0x5e0 [ 393.550480][T28246] ? skb_trim+0x190/0x190 [ 393.554798][T28246] ? kasan_check_read+0x11/0x20 [ 393.559643][T28246] alloc_uevent_skb+0x83/0x1e2 [ 393.564396][T28246] kobject_uevent_env+0xa63/0x1030 [ 393.569505][T28246] kobject_uevent+0x20/0x26 [ 393.573997][T28246] __loop_clr_fd+0x4ee/0xd60 [ 393.578581][T28246] lo_ioctl+0x210/0x2150 [ 393.582815][T28246] ? tomoyo_domain+0xc5/0x160 [ 393.587478][T28246] ? lo_rw_aio+0x1120/0x1120 [ 393.592058][T28246] blkdev_ioctl+0x6f2/0x1d10 [ 393.596636][T28246] ? blkpg_ioctl+0xa90/0xa90 [ 393.601214][T28246] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 393.607020][T28246] ? __fget+0x35a/0x550 [ 393.611167][T28246] block_ioctl+0xee/0x130 [ 393.615481][T28246] ? blkdev_fallocate+0x410/0x410 [ 393.620497][T28246] do_vfs_ioctl+0xd6e/0x1390 [ 393.625081][T28246] ? ioctl_preallocate+0x210/0x210 [ 393.630179][T28246] ? __fget+0x381/0x550 [ 393.634332][T28246] ? ksys_dup3+0x3e0/0x3e0 [ 393.638731][T28246] ? kfree+0x173/0x230 [ 393.642794][T28246] ? kfree+0x173/0x230 [ 393.646871][T28246] ? tomoyo_file_ioctl+0x23/0x30 [ 393.651793][T28246] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 393.658121][T28246] ? security_file_ioctl+0x93/0xc0 [ 393.663224][T28246] ksys_ioctl+0xab/0xd0 [ 393.667370][T28246] __x64_sys_ioctl+0x73/0xb0 [ 393.671949][T28246] do_syscall_64+0x103/0x610 [ 393.676543][T28246] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 393.682421][T28246] RIP: 0033:0x458c17 [ 393.686303][T28246] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 393.705888][T28246] RSP: 002b:00007f082125da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 393.714291][T28246] RAX: ffffffffffffffda RBX: 00007f082125db40 RCX: 0000000000458c17 [ 393.722245][T28246] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 393.730204][T28246] RBP: 0000000000000001 R08: 00007f082125db40 R09: 00007f082125dae0 [ 393.738173][T28246] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 393.746128][T28246] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:44:01 executing program 2 (fault-call:0 fault-nth:55): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:44:01 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x4000, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:44:01 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ubi_ctrl\x00', 0x900403e, 0x0) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f00000000c0)={0x446, 0xfffffffffffffffc, 0x1ff, 0x8, 0x3, 0x9}) [ 393.902931][T28274] FAULT_INJECTION: forcing a failure. [ 393.902931][T28274] name failslab, interval 1, probability 0, space 0, times 0 [ 393.951229][T28274] CPU: 0 PID: 28274 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 393.959252][T28274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 393.969310][T28274] Call Trace: [ 393.972597][T28274] dump_stack+0x172/0x1f0 [ 393.976910][T28274] should_fail.cold+0xa/0x15 [ 393.981475][T28274] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 393.987266][T28274] ? legacy_get_tree+0xf2/0x200 [ 393.992106][T28274] ? vfs_get_tree+0x123/0x450 [ 393.996783][T28274] ? fc_mount+0x17/0xc0 [ 394.000944][T28274] ? vfs_kern_mount.part.0+0xd8/0xf0 [ 394.006236][T28274] ? vfs_kern_mount+0x40/0x60 [ 394.010926][T28274] ? btrfs_mount+0x2b4/0x15e2 [ 394.015605][T28274] ? legacy_get_tree+0xf2/0x200 [ 394.020457][T28274] ? vfs_get_tree+0x123/0x450 [ 394.025139][T28274] __should_failslab+0x121/0x190 [ 394.030091][T28274] should_failslab+0x9/0x14 [ 394.034688][T28274] kmem_cache_alloc+0x47/0x6f0 [ 394.039462][T28274] ? ___might_sleep+0x163/0x280 [ 394.044319][T28274] ? mempool_alloc+0x380/0x380 [ 394.049087][T28274] mempool_alloc_slab+0x47/0x60 [ 394.053935][T28274] mempool_alloc+0x16b/0x380 [ 394.058519][T28274] ? mempool_destroy+0x40/0x40 [ 394.063283][T28274] ? find_held_lock+0x35/0x130 [ 394.068038][T28274] ? create_empty_buffers+0x59e/0x840 [ 394.073395][T28274] ? kasan_check_write+0x14/0x20 [ 394.078314][T28274] bio_alloc_bioset+0x3bf/0x680 [ 394.083152][T28274] ? bvec_alloc+0x2f0/0x2f0 [ 394.087638][T28274] submit_bh_wbc+0x133/0x7f0 [ 394.092222][T28274] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 394.098448][T28274] block_read_full_page+0x7e4/0xd70 [ 394.103644][T28274] ? check_disk_change+0x140/0x140 [ 394.108738][T28274] ? __bread_gfp+0x300/0x300 [ 394.113307][T28274] ? add_to_page_cache_lru+0x34e/0x760 [ 394.118746][T28274] ? add_to_page_cache_locked+0x40/0x40 [ 394.124277][T28274] blkdev_readpage+0x1d/0x30 [ 394.128846][T28274] do_read_cache_page+0xc5c/0x14c0 [ 394.133944][T28274] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 394.140162][T28274] ? blkdev_writepages+0x30/0x30 [ 394.145106][T28274] ? blkdev_get+0xcc/0x990 [ 394.149504][T28274] ? pagecache_get_page+0x740/0x740 [ 394.154687][T28274] ? bd_may_claim+0xd0/0xd0 [ 394.159172][T28274] ? lookup_bdev.part.0+0x10e/0x1b0 [ 394.164350][T28274] ? blkdev_open+0x290/0x290 [ 394.168923][T28274] ? lock_downgrade+0x880/0x880 [ 394.173774][T28274] read_cache_page_gfp+0x6e/0x90 [ 394.178707][T28274] btrfs_scan_one_device+0x19b/0x720 [ 394.183991][T28274] ? kfree+0x173/0x230 [ 394.188053][T28274] ? device_list_add+0x14d0/0x14d0 [ 394.193144][T28274] ? trace_hardirqs_on+0x50/0x230 [ 394.198153][T28274] ? btrfs_mount_root+0xb36/0x1220 [ 394.203257][T28274] btrfs_mount_root+0x718/0x1220 [ 394.208180][T28274] ? btrfs_decode_error+0x70/0x70 [ 394.213201][T28274] ? rcu_read_lock_sched_held+0x110/0x130 [ 394.218913][T28274] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 394.225143][T28274] ? vfs_parse_fs_string+0x111/0x170 [ 394.230404][T28274] ? vfs_parse_fs_string+0x111/0x170 [ 394.235666][T28274] ? rcu_read_lock_sched_held+0x110/0x130 [ 394.241383][T28274] ? kfree+0x1fa/0x230 [ 394.245444][T28274] ? vfs_parse_fs_string+0x116/0x170 [ 394.250707][T28274] ? btrfs_decode_error+0x70/0x70 [ 394.255709][T28274] legacy_get_tree+0xf2/0x200 [ 394.260367][T28274] vfs_get_tree+0x123/0x450 [ 394.264853][T28274] fc_mount+0x17/0xc0 [ 394.268845][T28274] vfs_kern_mount.part.0+0xd8/0xf0 [ 394.273965][T28274] vfs_kern_mount+0x40/0x60 [ 394.278455][T28274] btrfs_mount+0x2b4/0x15e2 [ 394.282936][T28274] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 394.288548][T28274] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 394.294766][T28274] ? should_fail+0x1de/0x852 [ 394.299336][T28274] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 394.305135][T28274] ? btrfs_remount+0x11f0/0x11f0 [ 394.310067][T28274] ? rcu_read_lock_sched_held+0x110/0x130 [ 394.315765][T28274] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 394.321992][T28274] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 394.328220][T28274] ? vfs_parse_fs_string+0x111/0x170 [ 394.333486][T28274] ? vfs_parse_fs_string+0x111/0x170 [ 394.338759][T28274] ? rcu_read_lock_sched_held+0x110/0x130 [ 394.344478][T28274] ? kfree+0x1fa/0x230 [ 394.348553][T28274] ? vfs_parse_fs_string+0x116/0x170 [ 394.353819][T28274] ? btrfs_remount+0x11f0/0x11f0 [ 394.358733][T28274] legacy_get_tree+0xf2/0x200 [ 394.363389][T28274] ? btrfs_remount+0x11f0/0x11f0 [ 394.368312][T28274] ? legacy_get_tree+0xf2/0x200 [ 394.374390][T28274] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 394.380618][T28274] vfs_get_tree+0x123/0x450 [ 394.385102][T28274] do_mount+0x1436/0x2c40 [ 394.389416][T28274] ? copy_mount_string+0x40/0x40 [ 394.394331][T28274] ? _copy_from_user+0xdd/0x150 [ 394.399173][T28274] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 394.405399][T28274] ? copy_mount_options+0x280/0x3a0 [ 394.410577][T28274] ksys_mount+0xdb/0x150 [ 394.414799][T28274] __x64_sys_mount+0xbe/0x150 [ 394.419471][T28274] do_syscall_64+0x103/0x610 [ 394.424051][T28274] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 394.429922][T28274] RIP: 0033:0x45b81a [ 394.433795][T28274] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 14:44:02 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 394.453377][T28274] RSP: 002b:00007f082125da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 394.461763][T28274] RAX: ffffffffffffffda RBX: 00007f082125db40 RCX: 000000000045b81a [ 394.469729][T28274] RDX: 00007f082125dae0 RSI: 0000000020000000 RDI: 00007f082125db00 [ 394.477683][T28274] RBP: 0000000000000001 R08: 00007f082125db40 R09: 00007f082125dae0 [ 394.485634][T28274] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 394.493590][T28274] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:44:02 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x0, 0xff01}, 0x0) 14:44:02 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:44:02 executing program 2 (fault-call:0 fault-nth:56): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:44:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1, 0x0, 0x3e8}, 0x0) [ 394.683787][T28306] FAULT_INJECTION: forcing a failure. [ 394.683787][T28306] name failslab, interval 1, probability 0, space 0, times 0 [ 394.721400][T28306] CPU: 0 PID: 28306 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 14:44:02 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x4800, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) [ 394.729421][T28306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 394.739472][T28306] Call Trace: [ 394.742765][T28306] dump_stack+0x172/0x1f0 [ 394.747111][T28306] should_fail.cold+0xa/0x15 [ 394.751701][T28306] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 394.757508][T28306] ? ___might_sleep+0x163/0x280 [ 394.762357][T28306] __should_failslab+0x121/0x190 [ 394.767278][T28306] should_failslab+0x9/0x14 [ 394.771758][T28306] __kmalloc+0x2dc/0x740 [ 394.775991][T28306] ? btrfs_find_device+0x135/0x1d0 [ 394.781091][T28306] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 394.787429][T28306] ? btrfs_find_device+0x189/0x1d0 [ 394.792531][T28306] ? device_list_add+0xf16/0x14d0 [ 394.797552][T28306] device_list_add+0xf16/0x14d0 [ 394.802387][T28306] ? btrfs_rm_dev_replace_free_srcdev+0x300/0x300 [ 394.808783][T28306] ? ___might_sleep+0x163/0x280 [ 394.813613][T28306] btrfs_scan_one_device+0x378/0x720 [ 394.818877][T28306] ? btrfs_scan_one_device+0x378/0x720 [ 394.824404][T28306] ? device_list_add+0x14d0/0x14d0 [ 394.829511][T28306] ? trace_hardirqs_on+0x50/0x230 [ 394.834521][T28306] ? btrfs_mount_root+0xb36/0x1220 [ 394.839717][T28306] btrfs_mount_root+0x718/0x1220 [ 394.844637][T28306] ? btrfs_decode_error+0x70/0x70 [ 394.849646][T28306] ? rcu_read_lock_sched_held+0x110/0x130 [ 394.855359][T28306] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 394.861578][T28306] ? vfs_parse_fs_string+0x111/0x170 [ 394.866851][T28306] ? vfs_parse_fs_string+0x111/0x170 [ 394.872135][T28306] ? rcu_read_lock_sched_held+0x110/0x130 [ 394.877842][T28306] ? kfree+0x1fa/0x230 [ 394.881895][T28306] ? vfs_parse_fs_string+0x116/0x170 [ 394.887164][T28306] ? btrfs_decode_error+0x70/0x70 [ 394.892165][T28306] legacy_get_tree+0xf2/0x200 [ 394.896833][T28306] vfs_get_tree+0x123/0x450 [ 394.901319][T28306] fc_mount+0x17/0xc0 [ 394.905297][T28306] vfs_kern_mount.part.0+0xd8/0xf0 [ 394.910417][T28306] vfs_kern_mount+0x40/0x60 [ 394.914912][T28306] btrfs_mount+0x2b4/0x15e2 [ 394.919396][T28306] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 394.925004][T28306] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 394.931221][T28306] ? should_fail+0x1de/0x852 [ 394.935801][T28306] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 394.941624][T28306] ? btrfs_remount+0x11f0/0x11f0 [ 394.946571][T28306] ? rcu_read_lock_sched_held+0x110/0x130 [ 394.952270][T28306] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 394.958489][T28306] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 394.964707][T28306] ? vfs_parse_fs_string+0x111/0x170 [ 394.969970][T28306] ? vfs_parse_fs_string+0x111/0x170 [ 394.975239][T28306] ? rcu_read_lock_sched_held+0x110/0x130 [ 394.980940][T28306] ? kfree+0x1fa/0x230 [ 394.984988][T28306] ? vfs_parse_fs_string+0x116/0x170 [ 394.990252][T28306] ? btrfs_remount+0x11f0/0x11f0 [ 394.995167][T28306] legacy_get_tree+0xf2/0x200 [ 394.999829][T28306] ? btrfs_remount+0x11f0/0x11f0 [ 395.004742][T28306] ? legacy_get_tree+0xf2/0x200 [ 395.009570][T28306] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 395.015787][T28306] vfs_get_tree+0x123/0x450 [ 395.020281][T28306] do_mount+0x1436/0x2c40 [ 395.024592][T28306] ? copy_mount_string+0x40/0x40 [ 395.029509][T28306] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 395.035723][T28306] ? copy_mount_options+0x280/0x3a0 [ 395.040900][T28306] ksys_mount+0xdb/0x150 [ 395.045123][T28306] __x64_sys_mount+0xbe/0x150 [ 395.049784][T28306] do_syscall_64+0x103/0x610 [ 395.054367][T28306] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 395.060235][T28306] RIP: 0033:0x45b81a [ 395.064109][T28306] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 14:44:03 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:44:03 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0, 0x40000000000}], 0x1, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) [ 395.083697][T28306] RSP: 002b:00007f082125da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 395.092095][T28306] RAX: ffffffffffffffda RBX: 00007f082125db40 RCX: 000000000045b81a [ 395.100133][T28306] RDX: 00007f082125dae0 RSI: 0000000020000000 RDI: 00007f082125db00 [ 395.108081][T28306] RBP: 0000000000000001 R08: 00007f082125db40 R09: 00007f082125dae0 [ 395.116028][T28306] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 395.123980][T28306] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:44:03 executing program 2 (fault-call:0 fault-nth:57): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:44:03 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x0, 0x34000}, 0x0) [ 395.363551][T28332] FAULT_INJECTION: forcing a failure. [ 395.363551][T28332] name failslab, interval 1, probability 0, space 0, times 0 [ 395.382126][T28332] CPU: 1 PID: 28332 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 395.390135][T28332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 395.400182][T28332] Call Trace: [ 395.403467][T28332] dump_stack+0x172/0x1f0 [ 395.407813][T28332] should_fail.cold+0xa/0x15 14:44:03 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 395.412413][T28332] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 395.418226][T28332] ? ___might_sleep+0x163/0x280 [ 395.423085][T28332] __should_failslab+0x121/0x190 [ 395.428027][T28332] should_failslab+0x9/0x14 [ 395.432533][T28332] __kmalloc+0x2dc/0x740 [ 395.436789][T28332] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 395.443027][T28332] ? btrfs_find_device+0x189/0x1d0 [ 395.443058][T28332] ? device_list_add+0xf16/0x14d0 [ 395.443077][T28332] device_list_add+0xf16/0x14d0 [ 395.443102][T28332] ? btrfs_rm_dev_replace_free_srcdev+0x300/0x300 [ 395.443117][T28332] ? ___might_sleep+0x163/0x280 [ 395.443138][T28332] btrfs_scan_one_device+0x378/0x720 [ 395.453243][T28332] ? btrfs_scan_one_device+0x378/0x720 [ 395.453262][T28332] ? device_list_add+0x14d0/0x14d0 [ 395.453284][T28332] ? trace_hardirqs_on+0x50/0x230 [ 395.453302][T28332] ? btrfs_mount_root+0xb36/0x1220 [ 395.453321][T28332] btrfs_mount_root+0x718/0x1220 [ 395.453341][T28332] ? btrfs_decode_error+0x70/0x70 [ 395.453358][T28332] ? rcu_read_lock_sched_held+0x110/0x130 [ 395.453375][T28332] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 395.453390][T28332] ? vfs_parse_fs_string+0x111/0x170 [ 395.453403][T28332] ? vfs_parse_fs_string+0x111/0x170 [ 395.453422][T28332] ? rcu_read_lock_sched_held+0x110/0x130 [ 395.533395][T28332] ? kfree+0x1fa/0x230 [ 395.537461][T28332] ? vfs_parse_fs_string+0x116/0x170 [ 395.542746][T28332] ? btrfs_decode_error+0x70/0x70 [ 395.547790][T28332] legacy_get_tree+0xf2/0x200 [ 395.552481][T28332] vfs_get_tree+0x123/0x450 [ 395.557107][T28332] fc_mount+0x17/0xc0 [ 395.561085][T28332] vfs_kern_mount.part.0+0xd8/0xf0 [ 395.566190][T28332] vfs_kern_mount+0x40/0x60 [ 395.570700][T28332] btrfs_mount+0x2b4/0x15e2 [ 395.575209][T28332] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 395.580845][T28332] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 395.587087][T28332] ? should_fail+0x1de/0x852 [ 395.591690][T28332] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 395.597504][T28332] ? btrfs_remount+0x11f0/0x11f0 [ 395.602456][T28332] ? rcu_read_lock_sched_held+0x110/0x130 [ 395.608182][T28332] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 395.614431][T28332] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 395.620667][T28332] ? vfs_parse_fs_string+0x111/0x170 [ 395.625945][T28332] ? vfs_parse_fs_string+0x111/0x170 [ 395.631237][T28332] ? rcu_read_lock_sched_held+0x110/0x130 [ 395.636981][T28332] ? kfree+0x1fa/0x230 [ 395.641064][T28332] ? vfs_parse_fs_string+0x116/0x170 [ 395.646348][T28332] ? btrfs_remount+0x11f0/0x11f0 [ 395.651292][T28332] legacy_get_tree+0xf2/0x200 [ 395.655975][T28332] ? btrfs_remount+0x11f0/0x11f0 [ 395.660915][T28332] ? legacy_get_tree+0xf2/0x200 [ 395.665769][T28332] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 395.672002][T28332] vfs_get_tree+0x123/0x450 [ 395.676506][T28332] do_mount+0x1436/0x2c40 [ 395.680846][T28332] ? copy_mount_string+0x40/0x40 [ 395.685803][T28332] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 395.692033][T28332] ? copy_mount_options+0x280/0x3a0 [ 395.697212][T28332] ksys_mount+0xdb/0x150 [ 395.701437][T28332] __x64_sys_mount+0xbe/0x150 [ 395.706120][T28332] ? do_syscall_64+0x5b/0x610 [ 395.710820][T28332] do_syscall_64+0x103/0x610 [ 395.715406][T28332] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 395.721278][T28332] RIP: 0033:0x45b81a [ 395.725153][T28332] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 395.744734][T28332] RSP: 002b:00007f082125da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 395.753146][T28332] RAX: ffffffffffffffda RBX: 00007f082125db40 RCX: 000000000045b81a 14:44:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1, 0x0, 0x700}, 0x0) [ 395.761099][T28332] RDX: 00007f082125dae0 RSI: 0000000020000000 RDI: 00007f082125db00 [ 395.769060][T28332] RBP: 0000000000000001 R08: 00007f082125db40 R09: 00007f082125dae0 [ 395.777007][T28332] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 395.784955][T28332] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:44:03 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x4c00, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:44:03 executing program 2 (fault-call:0 fault-nth:58): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 395.953172][T28365] FAULT_INJECTION: forcing a failure. [ 395.953172][T28365] name failslab, interval 1, probability 0, space 0, times 0 [ 395.968251][T28365] CPU: 0 PID: 28365 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 395.976255][T28365] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 395.986337][T28365] Call Trace: [ 395.989642][T28365] dump_stack+0x172/0x1f0 [ 395.994078][T28365] should_fail.cold+0xa/0x15 [ 395.998686][T28365] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 396.004507][T28365] ? legacy_get_tree+0xf2/0x200 [ 396.009362][T28365] ? vfs_get_tree+0x123/0x450 [ 396.014039][T28365] ? fc_mount+0x17/0xc0 [ 396.018187][T28365] ? vfs_kern_mount.part.0+0xd8/0xf0 [ 396.023469][T28365] ? vfs_kern_mount+0x40/0x60 [ 396.028131][T28365] ? btrfs_mount+0x2b4/0x15e2 [ 396.032795][T28365] ? legacy_get_tree+0xf2/0x200 [ 396.037627][T28365] ? vfs_get_tree+0x123/0x450 [ 396.042297][T28365] __should_failslab+0x121/0x190 [ 396.047220][T28365] should_failslab+0x9/0x14 [ 396.051710][T28365] kmem_cache_alloc+0x47/0x6f0 [ 396.056473][T28365] ? ___might_sleep+0x163/0x280 [ 396.061314][T28365] ? mempool_alloc+0x380/0x380 [ 396.066060][T28365] mempool_alloc_slab+0x47/0x60 [ 396.070894][T28365] mempool_alloc+0x16b/0x380 [ 396.075476][T28365] ? mempool_destroy+0x40/0x40 [ 396.080224][T28365] ? find_held_lock+0x35/0x130 [ 396.084973][T28365] ? create_empty_buffers+0x59e/0x840 [ 396.090334][T28365] ? kasan_check_write+0x14/0x20 [ 396.095280][T28365] bio_alloc_bioset+0x3bf/0x680 [ 396.100123][T28365] ? bvec_alloc+0x2f0/0x2f0 [ 396.104620][T28365] submit_bh_wbc+0x133/0x7f0 [ 396.109196][T28365] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 396.115427][T28365] block_read_full_page+0x7e4/0xd70 [ 396.120613][T28365] ? check_disk_change+0x140/0x140 [ 396.125727][T28365] ? __bread_gfp+0x300/0x300 [ 396.130302][T28365] ? add_to_page_cache_lru+0x34e/0x760 [ 396.135757][T28365] ? add_to_page_cache_locked+0x40/0x40 [ 396.141294][T28365] blkdev_readpage+0x1d/0x30 [ 396.145870][T28365] do_read_cache_page+0xc5c/0x14c0 [ 396.150964][T28365] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 396.157188][T28365] ? blkdev_writepages+0x30/0x30 [ 396.162116][T28365] ? blkdev_get+0xcc/0x990 [ 396.166521][T28365] ? pagecache_get_page+0x740/0x740 [ 396.171706][T28365] ? bd_may_claim+0xd0/0xd0 [ 396.176218][T28365] ? lookup_bdev.part.0+0x10e/0x1b0 [ 396.181404][T28365] ? blkdev_open+0x290/0x290 [ 396.185981][T28365] ? lock_downgrade+0x880/0x880 [ 396.190829][T28365] read_cache_page_gfp+0x6e/0x90 [ 396.195759][T28365] btrfs_scan_one_device+0x19b/0x720 [ 396.201035][T28365] ? kfree+0x173/0x230 [ 396.205092][T28365] ? device_list_add+0x14d0/0x14d0 [ 396.210189][T28365] ? trace_hardirqs_on+0x50/0x230 [ 396.215202][T28365] ? btrfs_mount_root+0xb36/0x1220 [ 396.220305][T28365] btrfs_mount_root+0x718/0x1220 [ 396.225240][T28365] ? btrfs_decode_error+0x70/0x70 [ 396.230253][T28365] ? rcu_read_lock_sched_held+0x110/0x130 [ 396.235960][T28365] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 396.242182][T28365] ? vfs_parse_fs_string+0x111/0x170 [ 396.247456][T28365] ? vfs_parse_fs_string+0x111/0x170 [ 396.252744][T28365] ? rcu_read_lock_sched_held+0x110/0x130 [ 396.258450][T28365] ? kfree+0x1fa/0x230 [ 396.262510][T28365] ? vfs_parse_fs_string+0x116/0x170 [ 396.267785][T28365] ? btrfs_decode_error+0x70/0x70 [ 396.272804][T28365] legacy_get_tree+0xf2/0x200 [ 396.277469][T28365] vfs_get_tree+0x123/0x450 [ 396.281959][T28365] fc_mount+0x17/0xc0 [ 396.285929][T28365] vfs_kern_mount.part.0+0xd8/0xf0 [ 396.291032][T28365] vfs_kern_mount+0x40/0x60 [ 396.295525][T28365] btrfs_mount+0x2b4/0x15e2 [ 396.300017][T28365] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 396.305634][T28365] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 396.311871][T28365] ? should_fail+0x1de/0x852 [ 396.316450][T28365] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 396.322245][T28365] ? btrfs_remount+0x11f0/0x11f0 [ 396.327178][T28365] ? rcu_read_lock_sched_held+0x110/0x130 [ 396.332882][T28365] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 396.339105][T28365] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 396.345330][T28365] ? vfs_parse_fs_string+0x111/0x170 [ 396.350599][T28365] ? vfs_parse_fs_string+0x111/0x170 [ 396.356724][T28365] ? rcu_read_lock_sched_held+0x110/0x130 [ 396.362431][T28365] ? kfree+0x1fa/0x230 [ 396.366485][T28365] ? vfs_parse_fs_string+0x116/0x170 [ 396.371848][T28365] ? btrfs_remount+0x11f0/0x11f0 [ 396.376770][T28365] legacy_get_tree+0xf2/0x200 [ 396.381430][T28365] ? btrfs_remount+0x11f0/0x11f0 [ 396.386348][T28365] ? legacy_get_tree+0xf2/0x200 [ 396.391186][T28365] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 396.397415][T28365] vfs_get_tree+0x123/0x450 [ 396.401908][T28365] do_mount+0x1436/0x2c40 [ 396.406230][T28365] ? copy_mount_string+0x40/0x40 [ 396.411158][T28365] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 396.417392][T28365] ? copy_mount_options+0x280/0x3a0 [ 396.422580][T28365] ksys_mount+0xdb/0x150 [ 396.426810][T28365] __x64_sys_mount+0xbe/0x150 [ 396.431476][T28365] do_syscall_64+0x103/0x610 [ 396.436053][T28365] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 396.441925][T28365] RIP: 0033:0x45b81a [ 396.445814][T28365] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 396.465407][T28365] RSP: 002b:00007f082125da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 396.473798][T28365] RAX: ffffffffffffffda RBX: 00007f082125db40 RCX: 000000000045b81a [ 396.481754][T28365] RDX: 00007f082125dae0 RSI: 0000000020000000 RDI: 00007f082125db00 [ 396.489712][T28365] RBP: 0000000000000001 R08: 00007f082125db40 R09: 00007f082125dae0 [ 396.497665][T28365] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 14:44:04 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x0, 0x400300}, 0x0) 14:44:04 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:44:04 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) [ 396.505630][T28365] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:44:04 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x6000, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:44:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1, 0x0, 0x900}, 0x0) 14:44:04 executing program 2 (fault-call:0 fault-nth:59): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:44:04 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x0, 0xf0ffff}, 0x0) 14:44:04 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xc0', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 396.869271][T28401] FAULT_INJECTION: forcing a failure. [ 396.869271][T28401] name failslab, interval 1, probability 0, space 0, times 0 [ 396.891730][T28401] CPU: 0 PID: 28401 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 396.899737][T28401] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 396.909798][T28401] Call Trace: [ 396.913099][T28401] dump_stack+0x172/0x1f0 [ 396.917443][T28401] should_fail.cold+0xa/0x15 [ 396.922041][T28401] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 396.927939][T28401] ? ___might_sleep+0x163/0x280 [ 396.932785][T28401] __should_failslab+0x121/0x190 [ 396.937713][T28401] should_failslab+0x9/0x14 [ 396.942205][T28401] __kmalloc+0x2dc/0x740 [ 396.946439][T28401] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 396.952678][T28401] ? btrfs_find_device+0x189/0x1d0 [ 396.957775][T28401] ? device_list_add+0xf16/0x14d0 [ 396.962789][T28401] device_list_add+0xf16/0x14d0 [ 396.967632][T28401] ? btrfs_rm_dev_replace_free_srcdev+0x300/0x300 [ 396.974043][T28401] ? ___might_sleep+0x163/0x280 [ 396.978887][T28401] btrfs_scan_one_device+0x378/0x720 [ 396.984153][T28401] ? btrfs_scan_one_device+0x378/0x720 [ 396.989601][T28401] ? device_list_add+0x14d0/0x14d0 [ 396.994697][T28401] ? trace_hardirqs_on+0x50/0x230 [ 396.999707][T28401] ? btrfs_mount_root+0xb36/0x1220 [ 397.004806][T28401] btrfs_mount_root+0x718/0x1220 [ 397.009737][T28401] ? btrfs_decode_error+0x70/0x70 [ 397.014749][T28401] ? rcu_read_lock_sched_held+0x110/0x130 [ 397.020456][T28401] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 397.026680][T28401] ? vfs_parse_fs_string+0x111/0x170 [ 397.031951][T28401] ? vfs_parse_fs_string+0x111/0x170 [ 397.037261][T28401] ? rcu_read_lock_sched_held+0x110/0x130 [ 397.042963][T28401] ? kfree+0x1fa/0x230 [ 397.047015][T28401] ? vfs_parse_fs_string+0x116/0x170 [ 397.052289][T28401] ? btrfs_decode_error+0x70/0x70 [ 397.057311][T28401] legacy_get_tree+0xf2/0x200 [ 397.061982][T28401] vfs_get_tree+0x123/0x450 [ 397.066491][T28401] fc_mount+0x17/0xc0 [ 397.070462][T28401] vfs_kern_mount.part.0+0xd8/0xf0 [ 397.075560][T28401] vfs_kern_mount+0x40/0x60 [ 397.080141][T28401] btrfs_mount+0x2b4/0x15e2 [ 397.084631][T28401] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 397.090267][T28401] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 397.096492][T28401] ? should_fail+0x1de/0x852 [ 397.101073][T28401] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 397.106870][T28401] ? btrfs_remount+0x11f0/0x11f0 [ 397.111800][T28401] ? rcu_read_lock_sched_held+0x110/0x130 [ 397.120025][T28401] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 397.127986][T28401] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 397.134212][T28401] ? vfs_parse_fs_string+0x111/0x170 [ 397.139479][T28401] ? vfs_parse_fs_string+0x111/0x170 [ 397.144750][T28401] ? rcu_read_lock_sched_held+0x110/0x130 [ 397.150452][T28401] ? kfree+0x1fa/0x230 [ 397.154510][T28401] ? vfs_parse_fs_string+0x116/0x170 [ 397.159784][T28401] ? btrfs_remount+0x11f0/0x11f0 [ 397.164704][T28401] legacy_get_tree+0xf2/0x200 [ 397.169376][T28401] ? btrfs_remount+0x11f0/0x11f0 [ 397.174294][T28401] ? legacy_get_tree+0xf2/0x200 [ 397.179130][T28401] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 397.185357][T28401] vfs_get_tree+0x123/0x450 [ 397.191340][T28401] do_mount+0x1436/0x2c40 [ 397.195673][T28401] ? copy_mount_string+0x40/0x40 [ 397.200598][T28401] ? _copy_from_user+0xdd/0x150 [ 397.205447][T28401] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 397.211668][T28401] ? copy_mount_options+0x280/0x3a0 [ 397.216880][T28401] ksys_mount+0xdb/0x150 [ 397.221112][T28401] __x64_sys_mount+0xbe/0x150 [ 397.225779][T28401] do_syscall_64+0x103/0x610 [ 397.230377][T28401] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 397.236256][T28401] RIP: 0033:0x45b81a [ 397.240139][T28401] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 397.259725][T28401] RSP: 002b:00007f082125da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 14:44:05 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x6800, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) [ 397.268122][T28401] RAX: ffffffffffffffda RBX: 00007f082125db40 RCX: 000000000045b81a [ 397.276078][T28401] RDX: 00007f082125dae0 RSI: 0000000020000000 RDI: 00007f082125db00 [ 397.284033][T28401] RBP: 0000000000000001 R08: 00007f082125db40 R09: 00007f082125dae0 [ 397.291986][T28401] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 397.299963][T28401] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:44:05 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x0, 0x1000000}, 0x0) 14:44:05 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000140)='\x00', 0x1) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x410040, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f00000000c0), &(0x7f0000000100)=0xc) ppoll(&(0x7f0000000080)=[{r0, 0x3341}], 0x1, 0x0, 0x0, 0xff59) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) 14:44:05 executing program 2 (fault-call:0 fault-nth:60): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:44:05 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x0f', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:44:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1, 0x0, 0xa00}, 0x0) [ 397.599507][T28436] FAULT_INJECTION: forcing a failure. [ 397.599507][T28436] name failslab, interval 1, probability 0, space 0, times 0 [ 397.642430][T28436] CPU: 1 PID: 28436 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 397.650456][T28436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 397.660517][T28436] Call Trace: [ 397.663822][T28436] dump_stack+0x172/0x1f0 [ 397.668173][T28436] should_fail.cold+0xa/0x15 [ 397.672778][T28436] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 397.678620][T28436] ? ___might_sleep+0x163/0x280 [ 397.683491][T28436] __should_failslab+0x121/0x190 [ 397.688440][T28436] should_failslab+0x9/0x14 [ 397.693035][T28436] kmem_cache_alloc+0x2b2/0x6f0 [ 397.697907][T28436] ? ___might_sleep+0x163/0x280 [ 397.702771][T28436] getname_kernel+0x53/0x370 [ 397.707369][T28436] kern_path+0x20/0x40 [ 397.711440][T28436] lookup_bdev.part.0+0x7b/0x1b0 [ 397.716365][T28436] ? blkdev_open+0x290/0x290 [ 397.716383][T28436] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 397.716397][T28436] ? btrfs_read_dev_super+0x8e/0xd0 [ 397.716412][T28436] ? btrfs_read_dev_one_super+0x2a0/0x2a0 [ 397.716429][T28436] blkdev_get_by_path+0x81/0x130 [ 397.716447][T28436] btrfs_get_bdev_and_sb+0x38/0x300 [ 397.716465][T28436] open_fs_devices+0x68e/0xbd0 [ 397.716488][T28436] ? find_fsid+0x2e0/0x2e0 [ 397.716509][T28436] ? memmove_extent_buffer.cold+0x44/0x44 [ 397.716527][T28436] btrfs_open_devices+0x147/0x170 [ 397.716547][T28436] btrfs_mount_root+0x79a/0x1220 [ 397.716569][T28436] ? btrfs_decode_error+0x70/0x70 [ 397.743221][T28436] ? rcu_read_lock_sched_held+0x110/0x130 [ 397.743241][T28436] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 14:44:05 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) r1 = accept(r0, &(0x7f0000000140)=@tipc, &(0x7f00000001c0)=0x80) bind$bt_sco(r1, &(0x7f0000000200)={0x1f, {0x7de, 0x8, 0xcf, 0x2, 0x400, 0x1000000000}}, 0x8) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x20000000000002d, &(0x7f0000000040), 0x4) socket$unix(0x1, 0x7, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x100, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) [ 397.743256][T28436] ? vfs_parse_fs_string+0x111/0x170 [ 397.743268][T28436] ? vfs_parse_fs_string+0x111/0x170 [ 397.743283][T28436] ? rcu_read_lock_sched_held+0x110/0x130 [ 397.743298][T28436] ? kfree+0x1fa/0x230 [ 397.743313][T28436] ? vfs_parse_fs_string+0x116/0x170 [ 397.743335][T28436] ? btrfs_decode_error+0x70/0x70 [ 397.753279][T28436] legacy_get_tree+0xf2/0x200 [ 397.825414][T28436] vfs_get_tree+0x123/0x450 [ 397.829923][T28436] fc_mount+0x17/0xc0 [ 397.833909][T28436] vfs_kern_mount.part.0+0xd8/0xf0 [ 397.839029][T28436] vfs_kern_mount+0x40/0x60 [ 397.843542][T28436] btrfs_mount+0x2b4/0x15e2 [ 397.848064][T28436] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 397.853710][T28436] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 397.859956][T28436] ? should_fail+0x1de/0x852 [ 397.864559][T28436] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 397.870387][T28436] ? btrfs_remount+0x11f0/0x11f0 [ 397.875326][T28436] ? rcu_read_lock_sched_held+0x110/0x130 [ 397.881127][T28436] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 397.887348][T28436] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 397.893592][T28436] ? vfs_parse_fs_string+0x111/0x170 [ 397.898878][T28436] ? vfs_parse_fs_string+0x111/0x170 [ 397.904158][T28436] ? rcu_read_lock_sched_held+0x110/0x130 [ 397.909870][T28436] ? kfree+0x1fa/0x230 [ 397.913945][T28436] ? vfs_parse_fs_string+0x116/0x170 [ 397.919240][T28436] ? btrfs_remount+0x11f0/0x11f0 [ 397.924184][T28436] legacy_get_tree+0xf2/0x200 [ 397.928979][T28436] ? btrfs_remount+0x11f0/0x11f0 [ 397.933937][T28436] ? legacy_get_tree+0xf2/0x200 [ 397.938783][T28436] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 397.945012][T28436] vfs_get_tree+0x123/0x450 [ 397.949517][T28436] do_mount+0x1436/0x2c40 [ 397.953851][T28436] ? copy_mount_string+0x40/0x40 [ 397.958792][T28436] ? _copy_from_user+0xdd/0x150 [ 397.963637][T28436] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 397.969868][T28436] ? copy_mount_options+0x280/0x3a0 [ 397.975071][T28436] ksys_mount+0xdb/0x150 [ 397.979309][T28436] __x64_sys_mount+0xbe/0x150 [ 397.983969][T28436] do_syscall_64+0x103/0x610 [ 397.988562][T28436] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 397.994456][T28436] RIP: 0033:0x45b81a [ 397.998351][T28436] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 398.017954][T28436] RSP: 002b:00007f082125da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 398.026355][T28436] RAX: ffffffffffffffda RBX: 00007f082125db40 RCX: 000000000045b81a [ 398.034312][T28436] RDX: 00007f082125dae0 RSI: 0000000020000000 RDI: 00007f082125db00 14:44:06 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x6c00, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) [ 398.042282][T28436] RBP: 0000000000000001 R08: 00007f082125db40 R09: 00007f082125dae0 [ 398.050251][T28436] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 398.058212][T28436] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:44:06 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:44:06 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x0, 0x2000000}, 0x0) 14:44:06 executing program 2 (fault-call:0 fault-nth:61): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:44:06 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 398.328258][T28475] FAULT_INJECTION: forcing a failure. [ 398.328258][T28475] name failslab, interval 1, probability 0, space 0, times 0 [ 398.355505][T28475] CPU: 0 PID: 28475 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 398.363535][T28475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 398.373629][T28475] Call Trace: [ 398.376928][T28475] dump_stack+0x172/0x1f0 [ 398.381269][T28475] should_fail.cold+0xa/0x15 [ 398.385873][T28475] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 398.391680][T28475] ? find_held_lock+0x35/0x130 [ 398.396439][T28475] ? find_get_entry+0x50e/0x880 [ 398.396459][T28475] __should_failslab+0x121/0x190 [ 398.396474][T28475] should_failslab+0x9/0x14 [ 398.396487][T28475] kmem_cache_alloc+0x47/0x6f0 [ 398.396505][T28475] ? ___might_sleep+0x163/0x280 [ 398.420349][T28475] ? mempool_alloc+0x380/0x380 [ 398.425117][T28475] mempool_alloc_slab+0x47/0x60 [ 398.429967][T28475] mempool_alloc+0x16b/0x380 [ 398.434593][T28475] ? mempool_destroy+0x40/0x40 [ 398.439339][T28475] ? mark_held_locks+0xa4/0xf0 [ 398.444089][T28475] ? lock_downgrade+0x880/0x880 [ 398.448974][T28475] ? __find_get_block+0x9ba/0xcf0 [ 398.453989][T28475] ? __getblk_gfp+0x1b1/0x970 [ 398.458670][T28475] ? __find_get_block+0x9ba/0xcf0 [ 398.463703][T28475] ? lockdep_hardirqs_on+0x418/0x5d0 [ 398.468997][T28475] bio_alloc_bioset+0x3bf/0x680 [ 398.473856][T28475] ? __find_get_block+0x317/0xcf0 [ 398.478886][T28475] ? bvec_alloc+0x2f0/0x2f0 [ 398.483401][T28475] submit_bh_wbc+0x133/0x7f0 [ 398.488003][T28475] __bread_gfp+0x13d/0x300 [ 398.492433][T28475] btrfs_read_dev_one_super+0xb6/0x2a0 [ 398.497897][T28475] btrfs_read_dev_super+0x6c/0xd0 [ 398.502931][T28475] ? btrfs_read_dev_one_super+0x2a0/0x2a0 [ 398.508666][T28475] btrfs_get_bdev_and_sb+0xff/0x300 [ 398.513872][T28475] open_fs_devices+0x68e/0xbd0 [ 398.518650][T28475] ? find_fsid+0x2e0/0x2e0 [ 398.523076][T28475] ? memmove_extent_buffer.cold+0x44/0x44 [ 398.528781][T28475] btrfs_open_devices+0x147/0x170 [ 398.533800][T28475] btrfs_mount_root+0x79a/0x1220 [ 398.538745][T28475] ? btrfs_decode_error+0x70/0x70 [ 398.543770][T28475] ? rcu_read_lock_sched_held+0x110/0x130 [ 398.549482][T28475] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 398.555723][T28475] ? vfs_parse_fs_string+0x111/0x170 [ 398.560985][T28475] ? vfs_parse_fs_string+0x111/0x170 [ 398.566249][T28475] ? rcu_read_lock_sched_held+0x110/0x130 [ 398.571948][T28475] ? kfree+0x1fa/0x230 [ 398.576004][T28475] ? vfs_parse_fs_string+0x116/0x170 [ 398.581283][T28475] ? btrfs_decode_error+0x70/0x70 [ 398.586297][T28475] legacy_get_tree+0xf2/0x200 [ 398.590955][T28475] vfs_get_tree+0x123/0x450 [ 398.595459][T28475] fc_mount+0x17/0xc0 [ 398.599429][T28475] vfs_kern_mount.part.0+0xd8/0xf0 [ 398.604653][T28475] vfs_kern_mount+0x40/0x60 [ 398.609161][T28475] btrfs_mount+0x2b4/0x15e2 [ 398.613654][T28475] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 398.619271][T28475] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 398.625504][T28475] ? should_fail+0x1de/0x852 [ 398.630106][T28475] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 398.635912][T28475] ? btrfs_remount+0x11f0/0x11f0 [ 398.640847][T28475] ? rcu_read_lock_sched_held+0x110/0x130 [ 398.646551][T28475] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 398.652787][T28475] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 398.659035][T28475] ? vfs_parse_fs_string+0x111/0x170 [ 398.664320][T28475] ? vfs_parse_fs_string+0x111/0x170 [ 398.669595][T28475] ? rcu_read_lock_sched_held+0x110/0x130 [ 398.675308][T28475] ? kfree+0x1fa/0x230 [ 398.675327][T28475] ? vfs_parse_fs_string+0x116/0x170 [ 398.675349][T28475] ? btrfs_remount+0x11f0/0x11f0 [ 398.675362][T28475] legacy_get_tree+0xf2/0x200 [ 398.675377][T28475] ? btrfs_remount+0x11f0/0x11f0 [ 398.675388][T28475] ? legacy_get_tree+0xf2/0x200 [ 398.675407][T28475] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 398.684726][T28475] vfs_get_tree+0x123/0x450 [ 398.684744][T28475] do_mount+0x1436/0x2c40 [ 398.684770][T28475] ? copy_mount_string+0x40/0x40 [ 398.724076][T28475] ? _copy_from_user+0xdd/0x150 [ 398.728941][T28475] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 398.735292][T28475] ? copy_mount_options+0x280/0x3a0 [ 398.740487][T28475] ksys_mount+0xdb/0x150 [ 398.744722][T28475] __x64_sys_mount+0xbe/0x150 [ 398.749382][T28475] do_syscall_64+0x103/0x610 [ 398.753959][T28475] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 398.759849][T28475] RIP: 0033:0x45b81a [ 398.763735][T28475] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 398.783320][T28475] RSP: 002b:00007f082125da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 398.791716][T28475] RAX: ffffffffffffffda RBX: 00007f082125db40 RCX: 000000000045b81a [ 398.799683][T28475] RDX: 00007f082125dae0 RSI: 0000000020000000 RDI: 00007f082125db00 [ 398.807639][T28475] RBP: 0000000000000001 R08: 00007f082125db40 R09: 00007f082125dae0 [ 398.815591][T28475] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 14:44:06 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x7400, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:44:06 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x4) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) fstat(r0, &(0x7f00000000c0)) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) 14:44:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1, 0x0, 0xe00}, 0x0) [ 398.823543][T28475] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:44:06 executing program 2 (fault-call:0 fault-nth:62): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:44:06 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x0, 0x4000000}, 0x0) [ 399.034217][T28509] FAULT_INJECTION: forcing a failure. [ 399.034217][T28509] name failslab, interval 1, probability 0, space 0, times 0 [ 399.047338][T28509] CPU: 0 PID: 28509 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 399.055432][T28509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 399.065475][T28509] Call Trace: [ 399.068787][T28509] dump_stack+0x172/0x1f0 [ 399.073133][T28509] should_fail.cold+0xa/0x15 [ 399.077722][T28509] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 399.083540][T28509] __should_failslab+0x121/0x190 [ 399.088461][T28509] should_failslab+0x9/0x14 [ 399.092955][T28509] kmem_cache_alloc+0x47/0x6f0 [ 399.097698][T28509] ? __lock_acquire+0x548/0x3fb0 [ 399.102620][T28509] xas_alloc+0x2df/0x3d0 [ 399.106861][T28509] xas_create+0x2cd/0x1040 [ 399.111266][T28509] xas_store+0x9a/0x19b0 [ 399.115510][T28509] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 399.121729][T28509] ? xas_start+0x166/0x560 [ 399.126126][T28509] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 399.132346][T28509] ? xas_load+0x67/0x150 [ 399.136577][T28509] __add_to_page_cache_locked+0x5be/0xe70 [ 399.142282][T28509] ? file_check_and_advance_wb_err+0x3a0/0x3a0 [ 399.148416][T28509] ? __alloc_pages_nodemask+0x61d/0x8d0 [ 399.153942][T28509] ? lock_downgrade+0x880/0x880 [ 399.158778][T28509] ? count_shadow_nodes+0x500/0x500 [ 399.163975][T28509] ? find_get_entry+0x535/0x880 [ 399.168822][T28509] add_to_page_cache_lru+0x1cb/0x760 [ 399.174093][T28509] ? add_to_page_cache_locked+0x40/0x40 [ 399.179627][T28509] ? __page_cache_alloc+0x131/0x460 [ 399.184810][T28509] pagecache_get_page+0x35c/0x740 [ 399.191351][T28509] __getblk_gfp+0x27e/0x970 [ 399.195839][T28509] ? kasan_check_write+0x14/0x20 [ 399.200761][T28509] __bread_gfp+0x2f/0x300 [ 399.205078][T28509] btrfs_read_dev_one_super+0xb6/0x2a0 [ 399.210523][T28509] btrfs_read_dev_super+0x6c/0xd0 [ 399.215528][T28509] ? btrfs_read_dev_one_super+0x2a0/0x2a0 [ 399.221233][T28509] btrfs_get_bdev_and_sb+0xff/0x300 [ 399.226430][T28509] open_fs_devices+0x68e/0xbd0 [ 399.231180][T28509] ? find_fsid+0x2e0/0x2e0 [ 399.235586][T28509] ? memmove_extent_buffer.cold+0x44/0x44 [ 399.241289][T28509] btrfs_open_devices+0x147/0x170 [ 399.246299][T28509] btrfs_mount_root+0x79a/0x1220 [ 399.251236][T28509] ? btrfs_decode_error+0x70/0x70 [ 399.256245][T28509] ? rcu_read_lock_sched_held+0x110/0x130 [ 399.261946][T28509] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 399.268168][T28509] ? vfs_parse_fs_string+0x111/0x170 [ 399.273432][T28509] ? vfs_parse_fs_string+0x111/0x170 [ 399.278744][T28509] ? rcu_read_lock_sched_held+0x110/0x130 [ 399.284445][T28509] ? kfree+0x1fa/0x230 [ 399.288509][T28509] ? vfs_parse_fs_string+0x116/0x170 [ 399.293779][T28509] ? btrfs_decode_error+0x70/0x70 [ 399.298783][T28509] legacy_get_tree+0xf2/0x200 [ 399.303443][T28509] vfs_get_tree+0x123/0x450 [ 399.307940][T28509] fc_mount+0x17/0xc0 [ 399.311908][T28509] vfs_kern_mount.part.0+0xd8/0xf0 [ 399.317006][T28509] vfs_kern_mount+0x40/0x60 [ 399.321498][T28509] btrfs_mount+0x2b4/0x15e2 [ 399.325985][T28509] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 399.331601][T28509] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 399.337820][T28509] ? should_fail+0x1de/0x852 [ 399.342408][T28509] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 399.348195][T28509] ? btrfs_remount+0x11f0/0x11f0 [ 399.353118][T28509] ? rcu_read_lock_sched_held+0x110/0x130 [ 399.358820][T28509] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 399.365038][T28509] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 399.371257][T28509] ? vfs_parse_fs_string+0x111/0x170 [ 399.376556][T28509] ? vfs_parse_fs_string+0x111/0x170 [ 399.381828][T28509] ? rcu_read_lock_sched_held+0x110/0x130 [ 399.387527][T28509] ? kfree+0x1fa/0x230 [ 399.391577][T28509] ? vfs_parse_fs_string+0x116/0x170 [ 399.396845][T28509] ? btrfs_remount+0x11f0/0x11f0 [ 399.401761][T28509] legacy_get_tree+0xf2/0x200 [ 399.406422][T28509] ? btrfs_remount+0x11f0/0x11f0 [ 399.411344][T28509] ? legacy_get_tree+0xf2/0x200 [ 399.416174][T28509] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 399.422392][T28509] vfs_get_tree+0x123/0x450 [ 399.426877][T28509] do_mount+0x1436/0x2c40 [ 399.431191][T28509] ? copy_mount_string+0x40/0x40 [ 399.436108][T28509] ? _copy_from_user+0xdd/0x150 [ 399.440942][T28509] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 399.447162][T28509] ? copy_mount_options+0x280/0x3a0 [ 399.452357][T28509] ksys_mount+0xdb/0x150 [ 399.456583][T28509] __x64_sys_mount+0xbe/0x150 [ 399.461245][T28509] do_syscall_64+0x103/0x610 [ 399.465909][T28509] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 399.471780][T28509] RIP: 0033:0x45b81a [ 399.475660][T28509] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 399.495241][T28509] RSP: 002b:00007f082125da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 399.503635][T28509] RAX: ffffffffffffffda RBX: 00007f082125db40 RCX: 000000000045b81a [ 399.511589][T28509] RDX: 00007f082125dae0 RSI: 0000000020000000 RDI: 00007f082125db00 [ 399.519542][T28509] RBP: 0000000000000001 R08: 00007f082125db40 R09: 00007f082125dae0 [ 399.527492][T28509] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 14:44:07 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:44:07 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f00000000c0)) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) [ 399.535440][T28509] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:44:07 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x7a00, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:44:07 executing program 2 (fault-call:0 fault-nth:63): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:44:07 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x0, 0xa000000}, 0x0) 14:44:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1, 0x0, 0x6000}, 0x0) 14:44:07 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 399.844366][T28546] FAULT_INJECTION: forcing a failure. [ 399.844366][T28546] name failslab, interval 1, probability 0, space 0, times 0 [ 399.857012][T28546] CPU: 0 PID: 28546 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 399.864983][T28546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 399.875029][T28546] Call Trace: [ 399.878316][T28546] dump_stack+0x172/0x1f0 [ 399.882646][T28546] should_fail.cold+0xa/0x15 [ 399.887231][T28546] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 399.893035][T28546] __should_failslab+0x121/0x190 [ 399.897960][T28546] should_failslab+0x9/0x14 [ 399.902458][T28546] kmem_cache_alloc+0x47/0x6f0 [ 399.907205][T28546] ? __lock_acquire+0x548/0x3fb0 [ 399.912138][T28546] xas_alloc+0x2df/0x3d0 [ 399.916372][T28546] xas_create+0x2cd/0x1040 [ 399.920786][T28546] xas_store+0x9a/0x19b0 [ 399.925018][T28546] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 399.931242][T28546] ? xas_start+0x166/0x560 [ 399.935735][T28546] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 399.941958][T28546] ? xas_load+0x67/0x150 [ 399.946193][T28546] __add_to_page_cache_locked+0x5be/0xe70 [ 399.951905][T28546] ? file_check_and_advance_wb_err+0x3a0/0x3a0 [ 399.958059][T28546] ? __alloc_pages_nodemask+0x61d/0x8d0 [ 399.963590][T28546] ? lock_downgrade+0x880/0x880 [ 399.968442][T28546] ? count_shadow_nodes+0x500/0x500 [ 399.973629][T28546] ? find_get_entry+0x535/0x880 [ 399.978469][T28546] add_to_page_cache_lru+0x1cb/0x760 [ 399.983745][T28546] ? add_to_page_cache_locked+0x40/0x40 [ 399.989277][T28546] ? __page_cache_alloc+0x131/0x460 [ 399.994468][T28546] pagecache_get_page+0x35c/0x740 [ 399.999485][T28546] __getblk_gfp+0x27e/0x970 [ 400.003980][T28546] ? kasan_check_write+0x14/0x20 [ 400.008908][T28546] __bread_gfp+0x2f/0x300 [ 400.013227][T28546] btrfs_read_dev_one_super+0xb6/0x2a0 [ 400.018673][T28546] btrfs_read_dev_super+0x6c/0xd0 [ 400.023681][T28546] ? btrfs_read_dev_one_super+0x2a0/0x2a0 [ 400.029394][T28546] btrfs_get_bdev_and_sb+0xff/0x300 [ 400.034620][T28546] open_fs_devices+0x68e/0xbd0 [ 400.039378][T28546] ? find_fsid+0x2e0/0x2e0 [ 400.043809][T28546] ? memmove_extent_buffer.cold+0x44/0x44 [ 400.049518][T28546] btrfs_open_devices+0x147/0x170 [ 400.054533][T28546] btrfs_mount_root+0x79a/0x1220 [ 400.059465][T28546] ? btrfs_decode_error+0x70/0x70 [ 400.064480][T28546] ? rcu_read_lock_sched_held+0x110/0x130 [ 400.070186][T28546] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 400.076423][T28546] ? vfs_parse_fs_string+0x111/0x170 [ 400.081693][T28546] ? vfs_parse_fs_string+0x111/0x170 [ 400.086978][T28546] ? rcu_read_lock_sched_held+0x110/0x130 [ 400.092688][T28546] ? kfree+0x1fa/0x230 [ 400.096743][T28546] ? vfs_parse_fs_string+0x116/0x170 [ 400.102014][T28546] ? btrfs_decode_error+0x70/0x70 [ 400.107022][T28546] legacy_get_tree+0xf2/0x200 [ 400.111692][T28546] vfs_get_tree+0x123/0x450 [ 400.116187][T28546] fc_mount+0x17/0xc0 [ 400.120156][T28546] vfs_kern_mount.part.0+0xd8/0xf0 [ 400.125258][T28546] vfs_kern_mount+0x40/0x60 [ 400.129750][T28546] btrfs_mount+0x2b4/0x15e2 [ 400.134239][T28546] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 400.139856][T28546] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 400.146080][T28546] ? should_fail+0x1de/0x852 [ 400.150657][T28546] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 400.156455][T28546] ? btrfs_remount+0x11f0/0x11f0 [ 400.161384][T28546] ? rcu_read_lock_sched_held+0x110/0x130 [ 400.167098][T28546] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 400.173322][T28546] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 400.179549][T28546] ? vfs_parse_fs_string+0x111/0x170 [ 400.184820][T28546] ? vfs_parse_fs_string+0x111/0x170 [ 400.190092][T28546] ? rcu_read_lock_sched_held+0x110/0x130 [ 400.195800][T28546] ? kfree+0x1fa/0x230 [ 400.199855][T28546] ? vfs_parse_fs_string+0x116/0x170 [ 400.205132][T28546] ? btrfs_remount+0x11f0/0x11f0 [ 400.210055][T28546] legacy_get_tree+0xf2/0x200 [ 400.214731][T28546] ? btrfs_remount+0x11f0/0x11f0 [ 400.219651][T28546] ? legacy_get_tree+0xf2/0x200 [ 400.224484][T28546] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 400.230711][T28546] vfs_get_tree+0x123/0x450 [ 400.235202][T28546] do_mount+0x1436/0x2c40 [ 400.239525][T28546] ? copy_mount_string+0x40/0x40 [ 400.244635][T28546] ? _copy_from_user+0xdd/0x150 [ 400.249567][T28546] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 400.255789][T28546] ? copy_mount_options+0x280/0x3a0 [ 400.260976][T28546] ksys_mount+0xdb/0x150 [ 400.265319][T28546] __x64_sys_mount+0xbe/0x150 [ 400.269987][T28546] do_syscall_64+0x103/0x610 [ 400.274566][T28546] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 400.280528][T28546] RIP: 0033:0x45b81a [ 400.284422][T28546] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 400.304007][T28546] RSP: 002b:00007f082125da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 400.312412][T28546] RAX: ffffffffffffffda RBX: 00007f082125db40 RCX: 000000000045b81a [ 400.320367][T28546] RDX: 00007f082125dae0 RSI: 0000000020000000 RDI: 00007f082125db00 [ 400.328334][T28546] RBP: 0000000000000001 R08: 00007f082125db40 R09: 00007f082125dae0 [ 400.336288][T28546] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 14:44:08 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0xae04, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) [ 400.344242][T28546] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:44:08 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'rose0\x00', &(0x7f00000000c0)=@ethtool_per_queue_op={0x4b, 0xffffffff, [0x6, 0x80, 0x7fffffff, 0x6, 0x8, 0x3, 0x1000, 0x3, 0x5, 0xd28, 0x6, 0xf0f, 0x7, 0x400, 0x9, 0x2, 0x3f, 0x68d, 0x9, 0x200, 0x3, 0x9, 0x1f, 0x1bb, 0x5, 0x200, 0xfffffffffffffffc, 0x4, 0x0, 0xffffffffffffffff, 0x3ff, 0x4, 0x12, 0x8001, 0x3, 0x9, 0xffffffff, 0x2, 0xe75, 0x401, 0x70, 0x3ff, 0x6, 0x6, 0x7ff, 0x8001, 0x9, 0x7fff, 0x9, 0x1, 0x2, 0x100, 0x8dab, 0x40, 0x9, 0x9, 0x7f, 0xffffffff, 0x5, 0x3, 0xffff, 0x1, 0x4, 0x8, 0x8, 0x3, 0x0, 0x3, 0x3, 0x3f, 0x6, 0x80000001, 0x4, 0x4, 0x1, 0x7fffffff, 0x100, 0x9, 0x2, 0x0, 0xd60f, 0x0, 0xfb, 0x6, 0x98, 0xffffffffffffffff, 0x8, 0xffff, 0xffff, 0x0, 0x0, 0x0, 0xc8, 0x80000001, 0x7b1, 0x2, 0x800, 0x97f, 0x2, 0x9, 0xfffffffffffffffc, 0x6, 0x1, 0x2, 0x1, 0x3ca6, 0x7, 0x4, 0x4, 0x2, 0x6, 0x0, 0xfffffffffffffffe, 0x6, 0x100000000, 0x7ff, 0x4, 0x1, 0x45, 0x3, 0xdef3, 0x4, 0x7, 0x5, 0x800, 0x5, 0x100, 0x401, 0xd7e4, 0x81, 0x3, 0xffffffffffffffe1, 0x100000001, 0x1000, 0x10001, 0x2, 0x0, 0x8, 0x4, 0x8, 0x9, 0xfffffffffffffffd, 0xd65f, 0x7, 0x0, 0x8, 0x8, 0x9, 0x8, 0xdfd, 0x901, 0x6, 0xb4a, 0x6, 0x0, 0x200, 0x1000, 0x0, 0x5, 0x100, 0x100, 0x9, 0xffffffff, 0xe4d3, 0xfffffffffffffff9, 0x1, 0x925, 0x1f, 0x52b99690, 0x7, 0x6d40, 0x7fffffff, 0x1, 0x53c, 0x4, 0x700000000, 0x9da, 0x7, 0x8, 0x6, 0x5, 0x6, 0xf5, 0x800, 0x98, 0xfffffffffffff800, 0x1, 0xa9c4, 0xff, 0x247f3502, 0x6, 0x3f, 0x8, 0x2aa, 0x8, 0x7, 0x7fff, 0x2, 0x1, 0x0, 0x10001, 0x68, 0xffffffffffff0001, 0x9a05, 0x1, 0x400, 0x4, 0x80, 0x4, 0xff, 0x7, 0x8001, 0x7f4, 0x1, 0x7, 0x2, 0x7, 0x3, 0x9, 0x4, 0x4, 0x5, 0x81, 0x99, 0xb3d, 0x7fff, 0x3, 0x4, 0x3, 0x101, 0x20, 0x7, 0xce5, 0x2, 0x1, 0x8, 0x80, 0x6, 0x0, 0x9, 0x1, 0x7fffffff, 0x0, 0x5, 0xb3ba, 0x1000, 0x400, 0x4, 0x6, 0x6, 0x921, 0x1, 0xcf2c, 0x6082, 0x80000000, 0x7eccf024, 0x200, 0xea08, 0x40, 0xb781, 0x7f, 0x1, 0x401, 0x5, 0x7ed73e47, 0x4, 0x0, 0x8, 0x2, 0x4, 0x80000001, 0xfffffffffffffffe, 0x5, 0x5, 0x9b, 0x9, 0x8000, 0x7f, 0x0, 0xffffffffffff9d99, 0x2, 0xdd4, 0x80000000, 0x7f, 0x0, 0x5, 0x5, 0x7, 0x7, 0x8, 0x43d1, 0x3, 0x4, 0x3ff, 0x0, 0x6, 0x8d, 0x6d, 0x1, 0x2, 0x8, 0xf7, 0x1, 0x80000001, 0x9, 0x0, 0x80, 0x9, 0x6, 0x3, 0xfffffffffffff001, 0x5, 0x8001, 0x400, 0x500, 0x0, 0x1, 0x4, 0x7, 0x3, 0x5, 0x9, 0x400, 0xd9c, 0x80, 0x10001, 0x0, 0x10000, 0xfff, 0x8728000000000, 0x400, 0x8, 0x400, 0xfffffffffffffff8, 0x8, 0x6, 0x0, 0x100000000, 0x10001, 0x7, 0x4, 0x1, 0x0, 0x3c5e, 0x5, 0x6000, 0xae9a, 0x4, 0x3f, 0x7, 0x80000001, 0x3, 0x1f, 0x3, 0x4, 0xffff, 0x8, 0x3, 0xfffffffffffffffe, 0x877, 0x100000000, 0x0, 0x4, 0x7, 0x3, 0x0, 0x400, 0x3, 0x1, 0x7, 0x3, 0xfffffffffffffff9, 0x29, 0x1, 0x0, 0x1, 0x374, 0x88f1, 0x5ada, 0x3, 0x1, 0x304, 0x694, 0x8001, 0x7fff, 0x7, 0x6, 0x3, 0x7ff, 0x0, 0x6, 0x1000, 0x1, 0x9, 0xfffffffffffffff8, 0xe2, 0x0, 0x5, 0x3ff, 0x9, 0x4, 0xe1, 0x800, 0x8, 0x1, 0x200, 0x10001, 0x5, 0x3, 0x3ff, 0x1eca9c6f, 0x655, 0x6, 0x6, 0x7f, 0x6, 0x8000, 0x1ff, 0xffffffffffffffff, 0x7f, 0x205b, 0x4, 0xed4, 0x9, 0x0, 0x9, 0x5, 0x1, 0x2, 0x8, 0x0, 0x4, 0x9a4c, 0xfff, 0x99a4, 0x7fff, 0x5, 0x3, 0x1, 0x1f, 0x5, 0xd2e6, 0x6, 0x1, 0x4, 0x2, 0xff, 0x100, 0x6, 0x1, 0x7, 0x7, 0x0, 0x0, 0x1f, 0x400, 0x3, 0x2, 0x4, 0x3, 0x3, 0x4, 0x6, 0x2, 0x348, 0x2, 0xfffffffffffff7d4, 0x7, 0x1, 0x80, 0xfffffffffffffff8, 0x10000, 0x100, 0x10001, 0x9, 0x100000000, 0xdd, 0x9, 0x7ff, 0x6, 0x0, 0x9, 0x7d6, 0x4, 0x45, 0x3b, 0x8, 0x3ff, 0xffffffffffff8bdf, 0x6, 0x40, 0x401, 0x80000001, 0xaf, 0x101, 0x5, 0xffffffffffffff80, 0x738f, 0xcb6, 0x7, 0xad7, 0x1f, 0x7f, 0x100, 0xb208, 0x8, 0xc4, 0x1, 0x3, 0x9, 0x4000, 0x10001, 0x1, 0x7, 0x4, 0x6, 0x4b, 0x7, 0x1, 0x1f, 0x0, 0x7fffffff, 0x400, 0x8, 0x0, 0x20, 0x10000, 0xc4a2, 0xd6e5, 0x8, 0x40, 0xfffffffffffff001, 0xfffffffffffffffd, 0x4, 0xf0, 0x2, 0x6, 0x1, 0x8, 0xf41, 0x1000, 0x3000, 0x2, 0x0, 0x1000, 0x7ae9668a, 0x8, 0x1, 0x1, 0x80000001, 0x80000000, 0x298, 0x7994, 0x7fff, 0x3, 0x9, 0x7f, 0x3, 0x9, 0xfffffffffffffffe, 0x6369, 0x80000000, 0xe0000000000000, 0x8, 0x80, 0xfffffffffffffffd, 0x1, 0x44, 0x3, 0x4, 0x4, 0x6, 0x4, 0x91, 0x3f, 0x10000, 0x3ff, 0x1, 0x4, 0x1, 0x0, 0x8, 0xffffffff00000001, 0x7ff, 0x4, 0xbac1, 0x1, 0x0, 0x0, 0xfffffffffffffffb, 0x800, 0x8, 0x0, 0x3, 0x755, 0xffffffffffffffff, 0x3, 0x2, 0x8, 0x7, 0x7, 0xf3b, 0x3, 0xe37, 0x2, 0x10000, 0x602, 0x10000, 0x3, 0x12a, 0xffffffffffffffe1, 0x3f, 0x100, 0x6, 0x1f, 0x1, 0x3ff, 0x2, 0xfffffffffffff041, 0x720e, 0x1, 0x5, 0x6, 0x8, 0x8, 0x1, 0x37b, 0xffffffffffffffff, 0x7, 0x6, 0x2, 0x10000, 0x8, 0x9f, 0xa4, 0x40000000000000, 0x3f, 0xffffffff, 0x401, 0x8, 0xeb, 0x8, 0x1, 0x6, 0x9, 0x81, 0x5, 0xdd, 0x4, 0xa0, 0xa40, 0x3, 0x5, 0xeff, 0x8000, 0x3, 0x9, 0x148, 0x6, 0x8, 0x4, 0x6, 0x2, 0x80000000, 0x100000000, 0x2, 0x100, 0xff, 0x1f, 0x0, 0x0, 0x8000000000000, 0x80, 0x8, 0x200, 0x100, 0x10001, 0x888d, 0xff, 0x3, 0x3, 0x1, 0x1, 0x6, 0x8, 0x4f83, 0xffffffff, 0x8000, 0xfff, 0x8c9, 0x800, 0x386a6c6e, 0xd21, 0x3de8dbb, 0x8, 0x1ff, 0x1b82, 0x20, 0x8, 0x9, 0x0, 0xca0, 0xfffffffffffffffa, 0x80, 0x0, 0x9, 0x4e72, 0x6, 0x9, 0x8a0, 0xff, 0x7e, 0x6, 0xfff, 0x6, 0xfffffffffffffffd, 0x6, 0x5, 0x3, 0xaa87, 0x4, 0x6, 0x23, 0xffffffffffffff80, 0x3, 0x100000000, 0x5, 0x7, 0x6, 0x8, 0x5, 0x7, 0x80000001, 0xba3, 0x10001, 0x2, 0x6, 0xc3, 0x1, 0x20, 0xffff, 0x1f, 0x6, 0x7f, 0x5, 0x7fff0000000, 0x5, 0x3f, 0x6, 0xffffffffacb91bb8, 0xfffffffffffffffb, 0x0, 0x2, 0x401, 0x7d, 0x6, 0x6, 0x2, 0x0, 0xffffffffffff16a8, 0x3, 0x2, 0x8001, 0x9, 0x0, 0x3ff, 0xd8, 0x3ff, 0x7, 0xffffffff, 0x3, 0x3c, 0xb89a, 0x5, 0x6, 0x0, 0xfffffffffffff162, 0x2f3, 0xa249, 0xedec, 0x8001, 0xffffffffffff9455, 0x0, 0x4, 0x4, 0xe490, 0x400, 0x1f, 0x5, 0x1, 0x80000001, 0x2000000000000000, 0xffffffffffffffff, 0x1ff, 0x0, 0xfff, 0x0, 0x9, 0xfff, 0x5, 0xb8, 0xfffffffffffffffc, 0xf5, 0x7, 0x3, 0x7, 0x6, 0x8001, 0x7, 0x1, 0x8001, 0x0, 0x67e, 0xe3, 0xfffffffffffffff7, 0x10000, 0x200, 0x7c, 0x7ff, 0x9, 0x7, 0x8, 0xfffffffffffffffa, 0x0, 0x0, 0x9, 0x9, 0x1f, 0x1f, 0x3ff, 0x7, 0x5, 0x9e, 0xfffffffffffff45b, 0x2, 0x7, 0xfffffffffffffffc, 0x7, 0xf5, 0xfff, 0x6, 0x8000, 0xffffffff00000001, 0xdc, 0x4, 0x7, 0x4, 0x200, 0xd914, 0x7, 0x2f1c96df, 0x80000000, 0xc9b5, 0x200, 0x5, 0x0, 0x40, 0x1, 0x6f94, 0x6, 0x4, 0x80, 0x7, 0x0, 0x4, 0x89e, 0xffff, 0x1, 0x9, 0x6, 0x1, 0xa, 0x7, 0x1, 0x82, 0x6, 0x7f, 0x7, 0xffff, 0x3ff, 0x4, 0x1, 0x1, 0x40, 0x7, 0x81, 0x101, 0x5, 0xfffffffffffff81a, 0x7, 0x3, 0x80, 0x6, 0x6, 0x6, 0x2f2e, 0x5, 0x4, 0x4, 0x81, 0x4e, 0x1000, 0x10000, 0x52f, 0x5, 0xae3d, 0x2, 0xcd, 0x4, 0x6d, 0x9, 0x984, 0x1, 0x1, 0x100000001, 0x5, 0x1a9, 0x5, 0x7, 0x7, 0x26da2e0b, 0x80, 0x7, 0x4db9, 0x0, 0x0, 0x3f, 0x6, 0x4, 0x100, 0x8, 0x0, 0x0, 0x4, 0x100, 0x0, 0x3, 0x7, 0x1000, 0x3, 0x3, 0x8, 0x1, 0x0, 0x80000000, 0x3, 0xf37, 0x3ff, 0x4, 0x2, 0x555, 0x0, 0xf44, 0xff, 0x6, 0x2ef, 0x7, 0x29ca, 0x3, 0xffffffffffff0001, 0x3, 0x7, 0xfffffffffffff8c1, 0x7, 0x6, 0x3, 0xa6, 0x1, 0x8, 0x7ff, 0x15de2cd8, 0x7fc, 0xd2, 0x0, 0xda9c, 0x2, 0x7, 0x1000, 0x5, 0x7bc, 0x3, 0xfee, 0x8b9, 0x1, 0x5, 0xd80, 0x9, 0xffffffffffff98c0, 0x6, 0x81, 0x40, 0x0, 0x1, 0x0, 0x1, 0x8676, 0x482f, 0x1, 0x5, 0xfea2, 0x7, 0x1f, 0x8000, 0x100000000, 0x2, 0x7, 0x9, 0x4, 0x20, 0x401, 0x7, 0xffffffffffffff81, 0x6, 0x6, 0x1, 0x0, 0x4, 0x3ff, 0x0, 0x8, 0xa00000000, 0x7f, 0x0, 0xffffffffffffff9f, 0xfffffffffffffff8, 0xfffffffffffffffb, 0x80000000, 0x1f, 0x1acd, 0x2, 0xffffffff, 0x7ff, 0x0, 0x1, 0xfffffffffffffe00, 0x5, 0x0, 0x5, 0xa8fc, 0x3, 0x2, 0x6c, 0x7, 0x2d6, 0x9, 0x6, 0x9, 0x1, 0x3ff, 0x101, 0x3, 0xffff, 0x6, 0x9, 0xffff, 0x6, 0x2, 0x40, 0xb67, 0xfffffffffffffff9, 0x8, 0x4, 0x0, 0x5, 0x7, 0x40, 0x2, 0x131, 0xa8, 0x5, 0x0, 0x5, 0x800, 0xfffffffffffffff8, 0x8, 0x7ff, 0x7, 0x2, 0x6, 0xffffffff7fffffff, 0x19, 0x7, 0x8, 0x8, 0xff, 0x1, 0x3, 0x0, 0xfffffffffffffffe, 0x7, 0xd3, 0xb85, 0x7ff, 0x9, 0x86d, 0x6, 0xf2, 0x7ff, 0x8, 0x2, 0x0, 0x401, 0x5, 0x612434e6, 0x1, 0x7fff, 0xc5, 0xa385, 0xffffffffffff8e3c, 0x8, 0x3, 0x2, 0x8c, 0x8001, 0x4, 0x5, 0x4, 0x2, 0x100000001, 0x4, 0x9, 0x8, 0x8, 0x1, 0x11f, 0x4e, 0x81, 0x8, 0x100000000, 0x0, 0x0, 0x1, 0x7fffffff, 0x10001, 0x2, 0x1f, 0x40, 0x80000000, 0x1, 0x3, 0x10000, 0x4, 0x7, 0x7, 0x4, 0x3, 0x3a3, 0x8, 0x9, 0x1, 0x7, 0x6, 0xa19, 0xfffffffffffffeff, 0xa53a, 0x7f, 0x8000, 0x2, 0x6, 0x9, 0x3ff, 0x10001, 0xee, 0x30, 0x4, 0x80000000, 0x9, 0x3, 0x53, 0x8, 0xffff, 0x5, 0x1f, 0xff, 0x2, 0x2, 0x1, 0xd2b, 0x0, 0xd0b, 0x3e00000000000, 0x101, 0x7, 0x1, 0xe0, 0x3f, 0x6, 0x2, 0x4, 0x9, 0x8000, 0x7e3b, 0x5, 0x3, 0xff, 0x200, 0xffffffffffff8001, 0xffffffff, 0x408, 0x5, 0x5, 0xfca, 0x6, 0x6, 0x100, 0x7, 0x6, 0x2, 0x10000, 0x3, 0x6, 0x40, 0x4, 0x7, 0x1, 0x7, 0x990c, 0xf7, 0xfffffffffffffffa, 0xac, 0x7db80000000, 0x8, 0x2, 0x0, 0x4, 0xfffffffffffff686, 0x0, 0x2, 0x4d59116f, 0x4, 0x4, 0x9, 0x1, 0x7, 0x0, 0x40, 0x7, 0x8, 0x1f, 0x1, 0x7c291be, 0x9, 0x4, 0x6, 0x0, 0x7, 0x1, 0x9, 0xafd, 0x1, 0x2, 0x4fd, 0x9, 0x2, 0x152a, 0xfffffffffffffffb, 0x2, 0x2, 0x1a9a, 0x40, 0x5, 0x79, 0x200, 0x2, 0x2eff, 0x3, 0x3, 0x80000001, 0x1ff, 0xf325, 0x1, 0x100000000, 0x7, 0x100000000, 0x3ff, 0x76e, 0x77, 0xfffffffffffffffe, 0x7, 0x4, 0x8, 0x6, 0xfffffffffffffffd, 0x5b, 0x9, 0x101, 0xff, 0x101, 0x8000, 0x3, 0x7, 0xffffffff, 0x200, 0x2, 0x4, 0x401, 0x4, 0x10001, 0x7, 0x7fffffff, 0x0, 0x7, 0x1647, 0x6, 0x6, 0x3, 0x2, 0x0, 0xe48d, 0x20, 0x5, 0x7fff, 0x1, 0x3, 0x4, 0x3, 0x7b, 0xd6, 0x9, 0x6, 0xffff, 0xffffffff, 0x7, 0x2, 0x3, 0x3, 0x6, 0xd6c8, 0x3f, 0x9, 0x3, 0x3, 0x1, 0x4, 0x1, 0x4, 0x3, 0x7fffffff, 0x3, 0x5, 0x8, 0x20, 0x3, 0x5, 0x4, 0x0, 0x0, 0x7, 0x80000001, 0x15, 0x0, 0x7fff, 0x5, 0x80000000, 0x5, 0x100000000, 0x7c76, 0xffffffff00000000, 0x1, 0x5, 0x2, 0x1, 0x95, 0x5, 0xffffffffffffffa4, 0x69, 0x1, 0xfbe, 0x0, 0xa77, 0xf74, 0x5, 0x3ff, 0x9c95, 0x3, 0x7, 0x5c45544d, 0x2, 0x4, 0x8, 0x7, 0x4, 0x100000000, 0xfffffffffffffff9, 0x1, 0x5, 0x976, 0x2, 0x9, 0x9, 0xa3c7, 0x5, 0x9, 0x9, 0x80000000000000, 0x80000000, 0xffffffffffff8000, 0x4d, 0xffffffffffff8001, 0xc4c, 0x20, 0x8, 0x8, 0x8001, 0x533, 0x3e5b, 0x9, 0x9, 0x6d8, 0x4, 0x1, 0x3, 0x8, 0x100000001, 0x0, 0x7, 0x100000000, 0x8, 0x5, 0x4, 0x5, 0xfd, 0x0, 0x4, 0x2, 0x1, 0x9, 0x3, 0x2, 0xbb6d, 0x652af8d4, 0x0, 0x910, 0x6, 0x6, 0x1, 0x702e, 0x72ee, 0x20, 0x1, 0x7, 0x9, 0x4000000, 0xe348, 0x3f, 0xffff, 0xba, 0x20, 0x6, 0x7, 0x401, 0x40, 0x7, 0xffffffffffffff00, 0x2, 0x10001, 0x97, 0x8, 0x400, 0x8, 0x100000000, 0x7, 0x2, 0xffffffffffffff01, 0x3f, 0x2, 0x0, 0x5, 0x7ff, 0x3ff, 0x0, 0x2, 0x5, 0x3, 0x5, 0x1ff, 0x101, 0x6, 0x8, 0x8, 0xffffffffffffff01, 0x8, 0x9a96, 0x8, 0x0, 0x5, 0xffff, 0x6, 0x1000, 0x2, 0x93, 0x9, 0x8, 0xf28, 0x100000000, 0xfffffffffffffffc, 0xc0, 0x3b82, 0x8, 0x7, 0xe14f, 0x10000, 0x1, 0x81, 0x401, 0x3, 0x8, 0x40, 0x1, 0xbc3e, 0x4, 0x4, 0xcc, 0x6, 0x2cf, 0x401, 0xf4, 0x2b6509ce, 0x9, 0x3, 0x1, 0x7fff, 0x7, 0x100000001, 0x100000000, 0xd8c9, 0x4, 0x2, 0x1000, 0x47, 0x0, 0xfffffffffffff6ec, 0x7f, 0x5, 0x3ff, 0x0, 0x4, 0x101, 0x100000001, 0x7f, 0x7, 0x56, 0x1, 0x3, 0x5, 0x1, 0x0, 0x5, 0x3, 0x3f, 0x0, 0x7, 0x401, 0x2, 0x0, 0x9, 0x0, 0x7fffffff, 0x7, 0x101, 0x6, 0x10000, 0x24000000, 0x400, 0x4, 0xffffffffffffa67e, 0x6, 0x100000001, 0x50, 0x80000001, 0xfffffffffffffffa, 0xffffffffffff0001, 0x623, 0x2, 0x5, 0x6, 0x800, 0x8, 0x7ff, 0x6, 0x4, 0x9, 0x5, 0x7ff, 0x4, 0x2400000000000, 0x5, 0x0, 0x200, 0x9, 0x4, 0xfa7e, 0x3, 0x100, 0x4, 0x20000000400000, 0x9d, 0x1000, 0x4, 0x0, 0x0, 0x0, 0xf24, 0xff, 0xfffffffffffffffc, 0xc7fb, 0x65, 0x9, 0x7, 0xfffffffffffeffff, 0x6, 0x10001, 0x1ff, 0xcb, 0x3ff, 0x5, 0x8985, 0x6, 0x8000, 0xfff, 0x7, 0x100000001, 0x8000, 0x4, 0xfffffffffffffffa, 0x7, 0x2, 0x62507e56, 0x98d2, 0x0, 0xee, 0xffffffffffffffff, 0xfffffffffffffffe, 0x7, 0x6, 0x101, 0x800, 0x49e1, 0x63c888ab, 0x0, 0x1, 0x1ff, 0x0, 0x7fff, 0x418, 0x4, 0x101, 0x0, 0x6, 0x29, 0x100000001, 0xfff, 0x20000000000000, 0x4, 0x80, 0x3, 0xc9, 0x3, 0x6, 0x8, 0xfffffffffffffff9, 0x9, 0x0, 0x0, 0x6, 0x3, 0x3, 0x0, 0x0, 0x2, 0x8, 0xffffffff, 0x7fffffff, 0x1ff, 0x6, 0x10000, 0xfffffffffffffffb, 0x8000, 0xba, 0x0, 0x1000, 0xfffffffffffffff8, 0x8000, 0x7, 0x3, 0x3000000, 0xab44, 0x4, 0x1, 0x9, 0xffffffffffff2c1d, 0x6, 0x2, 0x7, 0x1, 0x5, 0x9, 0x8, 0x2379, 0x200, 0x4, 0x100, 0x3, 0x7001, 0x8, 0x0, 0xf6fb, 0xaf39, 0xfff, 0x0, 0x1, 0x80000000, 0x4e7, 0x9f3, 0x3, 0xfff, 0x8, 0x200, 0x1e, 0x8, 0x5, 0x1, 0x7, 0x1ff, 0x1, 0x8000, 0xffffffffffffff80, 0x7c8, 0x2, 0x400, 0x8001, 0x2, 0x3, 0x6, 0x8, 0x4, 0x5, 0xac, 0x10000, 0x10000, 0x34dcd988, 0x1, 0x8, 0x1000000000000000, 0x2c, 0xfffffffffffff3d0, 0x5231dd21, 0x425, 0x9, 0x9750, 0x6, 0x6, 0x80000000, 0x7, 0xff, 0xffff, 0x4, 0x45c, 0xffffffff, 0x0, 0x4, 0x5, 0xff, 0x2, 0x221, 0x7f, 0x4, 0x3, 0x6, 0x2, 0x7d42, 0xffffffffffffffff, 0x3f, 0x4, 0xfff, 0xffffffffffffffb8, 0x8, 0x54c, 0x7fffffff, 0xfffffffffffffff7, 0x1000, 0xffffffff, 0x7, 0x1000, 0xfffffffffffffffb, 0x9, 0xffffffffffffffff, 0x0, 0xfffffffffffffff9, 0x3, 0x80, 0x2, 0x7, 0x0, 0x1ff, 0x6d, 0x8, 0x1, 0x1000, 0x7f, 0x10000, 0xd4, 0x8, 0x2, 0xc4, 0x7, 0x1, 0x5, 0xc1, 0x0, 0x7, 0x8001, 0x9, 0x3, 0x33e, 0x4, 0x1f, 0x3, 0xfffffffffffffff9, 0x5e, 0xff, 0x1, 0x1, 0x1f, 0x8, 0x40000, 0x9, 0x8000, 0x1, 0x40, 0x0, 0x22, 0x8001, 0x80, 0x2, 0x10001, 0x7, 0x0, 0x963, 0x3, 0x8, 0x80000001, 0x1, 0x6, 0x2, 0x100000001, 0x4, 0x100, 0xff8, 0x2b0, 0x8, 0xffffffffffffffff, 0xffffffffffffffff, 0x800, 0x2, 0x7, 0x2, 0x9, 0x100, 0x0, 0xd59, 0x5, 0x2, 0x1, 0x8, 0x6, 0x401, 0x7, 0x5, 0x5, 0x7, 0x1, 0x4, 0x4, 0x3, 0x3, 0x7, 0x401, 0x3, 0x3, 0x5, 0x8, 0x65426c59, 0x1, 0x80000000, 0x8209, 0x80, 0x100, 0x0, 0x401, 0x7b, 0x6, 0x6, 0x100000000, 0x3, 0x6a13, 0x7, 0x5, 0x0, 0xffff, 0x1, 0x6000000000000, 0x1, 0x1f, 0x40, 0x2, 0x0, 0x100, 0x1ff, 0x1ff, 0x9, 0xf, 0x6, 0x3, 0x8, 0x7f82, 0x0, 0x7, 0x51c0000000, 0x6cff, 0x20, 0x1, 0x2, 0x7f, 0xffe000, 0x1000, 0x40, 0x8, 0x5f, 0x5e, 0xffffffffffff7fff, 0x5, 0xc8, 0x3, 0x5, 0x1f, 0x5, 0x2, 0x2, 0x3, 0x6, 0x81, 0x80000001, 0x100000000, 0xffffffffffffff64, 0xffffffffffff958a, 0x100000001, 0x9, 0xce, 0x9, 0x0, 0x2, 0x9, 0x0, 0x3f, 0x100000000, 0x7f, 0x7f, 0x477, 0x80000001, 0x80000001, 0x7ff, 0x9, 0x3ff, 0x7fffffff, 0x37, 0xffffffffffffffe0, 0x238, 0x3, 0x100000000, 0x4341b31c, 0x3, 0x4, 0x8001, 0x100000000, 0x1000, 0x400, 0x400, 0xffffffff, 0x8, 0x8000, 0x1, 0x100000001, 0x40000000, 0x5, 0x5, 0x8000, 0x7a3e, 0x4d05, 0x0, 0x8, 0xc84b, 0x4, 0x1, 0x6, 0x0, 0x0, 0x100, 0x30000000, 0x1e3, 0x1, 0xc0db, 0x5, 0x7, 0x8000, 0x3ff, 0x4b45, 0x6, 0x2, 0x9, 0x0, 0x8000, 0x8, 0x2, 0x9, 0x7, 0x20, 0x2, 0x8, 0xffffffffffff8001, 0x5, 0x1, 0x4, 0x0, 0x58, 0x0, 0x834, 0x7, 0x8, 0x100, 0xffff, 0x7d, 0x2, 0x3, 0x2, 0x1000, 0xffffffff80000001, 0xffffffff, 0x3, 0x7, 0xfffffffffffffffc, 0x401f, 0x8, 0x100000000, 0x7, 0xff, 0x1, 0x4, 0x401, 0x6, 0xff, 0x5, 0x5, 0x1f, 0x517, 0x10000, 0xfffffffffffff000, 0x5, 0x6, 0x8, 0x0, 0xf7c, 0x800, 0x3e, 0x80000001, 0xffffffff, 0x7, 0x80000000, 0x9, 0x9757, 0x1, 0x3, 0x3, 0x10001, 0x8, 0x4, 0x8000, 0xfffffffffffffff8, 0x0, 0x9, 0x8000, 0x7ff, 0x5, 0x1, 0x0, 0x3, 0x200, 0x100000000, 0xffffffffffffb6b6, 0x73, 0x0, 0x9, 0x1, 0x100000001, 0xeb9, 0x3, 0x7, 0x7, 0x6, 0x8, 0x118a, 0x0, 0x4, 0xfffffffffffff001, 0xeadf, 0x8, 0x5, 0x1, 0x1, 0xffffffffffffff00, 0x7fffffff, 0x0, 0x7a1e, 0x0, 0x3, 0x1000, 0x5, 0x6, 0x8b8, 0xb32d, 0x6, 0x0, 0x2, 0xdb79, 0x9, 0x4, 0x1, 0x0, 0xfff, 0x7fff, 0x42, 0x8, 0x101, 0x6, 0x5, 0x72ed59d8, 0x4, 0x8000, 0x4387, 0x6, 0x9, 0x3038, 0x9, 0x1, 0xfffffffffffffffa, 0x8000, 0x5, 0xf6, 0x400, 0x0, 0x0, 0xff, 0xf89, 0x100000001, 0x5, 0x9, 0x7, 0x0, 0x7, 0x401, 0xb0, 0x100000000000000, 0x8, 0x1, 0x7, 0x2f38, 0x847, 0x3, 0x8000, 0x80000000, 0xfffffffffffffffb, 0x2, 0x3, 0xfffffffffffffaae, 0x152, 0xd32, 0x401, 0xe755, 0x3, 0xcce, 0x9, 0x3, 0x7fff, 0x6, 0x6, 0x7fff, 0x8, 0x8001, 0xab5, 0x5ca, 0x0, 0x101, 0x8000000, 0x8, 0x3, 0x3f, 0x0, 0x3ff, 0x1, 0x7fffffff, 0x7, 0xffffffffffffff42, 0x0, 0x10000000000, 0x870, 0x2, 0x2, 0x101, 0x518c, 0x10000, 0x1ff, 0x5, 0x1, 0x8, 0x1, 0xb5, 0x3, 0x1, 0x8, 0x192, 0x8, 0x1, 0x2, 0xc1, 0xfffffffffffffffb, 0x3, 0x100000001, 0x1, 0x100000001, 0xfffffffffffffffc, 0x2, 0x1000000000, 0x6, 0x4, 0xfffffffffffffff9, 0xfffffffffffffff8, 0x7, 0x4, 0x8000, 0x1, 0x3ff, 0x32f8, 0x5ba, 0x1000, 0x7, 0x7ff, 0x5, 0x8, 0x1f, 0x5, 0x8000, 0x9, 0x6, 0x1, 0x74d, 0x8, 0x8, 0x89f1, 0x14, 0x2, 0x8000, 0xfff, 0x81, 0x800000, 0x93c, 0xfffffffffffffff7, 0xffff, 0x200, 0x7, 0x8, 0x1000, 0x1, 0x4, 0x1f, 0x32, 0x100000000, 0x5, 0x1ff, 0x2, 0x6, 0x5, 0x100, 0x2, 0xe2ea000000000000, 0x6, 0x7f2, 0x4, 0x4, 0x0, 0x5, 0x1, 0x8000, 0x5, 0x0, 0x1ff, 0x6, 0x80, 0x7be, 0x35dbdb4f, 0x40, 0x82, 0x7, 0x2, 0xdf, 0x9, 0x7, 0x8, 0x7, 0xac4b, 0x8, 0x7, 0x6, 0x5, 0xfffffffffffffffd, 0x100000001, 0x5, 0x5, 0x8, 0xffff, 0x1, 0xea1, 0x20, 0x5, 0x5e, 0x0, 0x7fffffff, 0x6, 0x7, 0x4b4, 0x3, 0x10000, 0x98, 0x3f, 0x3, 0x8001, 0xc6e, 0x401, 0x7, 0xbfa6, 0xd2, 0x4, 0x7, 0x0, 0x1, 0x957, 0x0, 0x40, 0x2fb, 0x0, 0x0, 0x6, 0x0, 0x7, 0x9, 0x9, 0x5, 0x80000001, 0x3, 0x1, 0x73b2, 0x8001, 0x0, 0xffffffffffffffe1, 0xffffffffffffff7f, 0x5, 0x5e09, 0x0, 0x10001, 0x4, 0x4, 0x7, 0xa8c3, 0x1, 0x401, 0x4, 0x8762, 0x4000000000, 0x6, 0xb4e1, 0x40, 0xffffffffffff8000, 0xfffffffffffffffb, 0x80000000, 0x0, 0x7, 0x2, 0x3, 0x800, 0x400, 0xc1, 0x6, 0x0, 0x1dc66706, 0x401, 0x9, 0x9, 0xc691, 0xc95, 0x1, 0x9, 0x9, 0x0, 0xfff, 0x0, 0x4, 0x1, 0x412, 0x100000001, 0x4d, 0x2d92, 0x1ff, 0x8, 0x3, 0x74e, 0x7ff, 0x0, 0x6, 0x7f, 0x6, 0x8, 0x400000000000, 0x1, 0xfff, 0x80000001, 0x1, 0x80000000, 0x252, 0x8000, 0x8, 0x6, 0x34, 0x0, 0x3f, 0x9, 0x0, 0x616420fd, 0xff, 0x0, 0x800, 0xfffffffffffffffe, 0xea, 0x10001, 0x4, 0x9, 0xfffffffffffffffd, 0x7ff, 0x1, 0x6, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x4, 0x4, 0x8d122d0, 0x50e, 0x8001, 0x8, 0xff, 0x2, 0x401, 0x2, 0x5, 0x3, 0x100000001, 0x4, 0x0, 0x6, 0x7, 0x3476bca1, 0x7f, 0xffffffffffffffe1, 0xff, 0x9, 0x5, 0x0, 0x4, 0x4e19, 0x9, 0x9, 0x1, 0x100000001, 0x3, 0x11d, 0x5, 0x7, 0x5, 0x401, 0x1c165c95, 0x608, 0x80000001, 0x41, 0x4, 0x8, 0x6, 0x8000000080, 0x3, 0x1, 0x9, 0x5, 0x3f94, 0x7, 0x80, 0x100, 0x881, 0x3, 0x22f, 0x2, 0xfffffffffffffffd, 0x4, 0x61d, 0x1, 0x5, 0x1ff, 0x7ff, 0x401, 0x7, 0x7ff, 0x6be1f1b, 0x60c70e39, 0xffffffff, 0x632, 0x80000000, 0xfffffffffffffffc, 0x4, 0x0, 0x4, 0xb3, 0x5, 0x9, 0x9, 0x4, 0x8, 0x4, 0x3, 0xffffffffffffa481, 0x2, 0x6, 0x61f0000000000, 0x1000, 0x2, 0x2, 0x62, 0x9, 0x9, 0x2, 0x10000, 0x5, 0x100000000, 0x1, 0x6, 0x9, 0x4, 0x7, 0x1, 0x2, 0x5, 0x83f, 0x4, 0x5, 0x1, 0xbc0, 0x2, 0x0, 0x1, 0x2, 0x1000, 0x81, 0x9, 0x80000000, 0x5, 0x0, 0x2, 0x800, 0x6, 0x3ff, 0x9, 0xeeaa, 0xab2, 0x2, 0x8, 0x2, 0x9af1, 0x1, 0x10001, 0xffffffffffffff44, 0x1000, 0x7, 0x682, 0x1000, 0x7, 0x1, 0x3, 0x20, 0x100000001, 0x3bdc, 0x9, 0x4, 0x2, 0x4, 0x8000, 0x8, 0x100000000, 0xdc, 0x9, 0x1, 0x1f, 0x9, 0xffffffffffffff01, 0x5, 0x3a3f, 0x20, 0x4, 0x10001, 0x7, 0x4162, 0xfffffffffffffffe, 0x52, 0xa4c8, 0x100000000, 0x8001, 0x7, 0x80000000, 0xe5b2, 0xfffffffffffffbff, 0xeac, 0x0, 0xcd, 0x401, 0x7, 0x0, 0x48d, 0x2, 0x8001, 0x31, 0x5, 0x3, 0xe400, 0x80, 0x7fffffff, 0x80000000000, 0x4, 0x8, 0x7fffffff, 0x3, 0x8, 0x1, 0x4, 0x3, 0x0, 0xffffffff, 0x1, 0x1, 0x7, 0x80000001, 0x9, 0xaf6b, 0x3ff, 0x0, 0x7, 0x0, 0xfffffffffffffade, 0x2, 0x100000000, 0x6, 0xfffffffffffffffb, 0x4, 0x8, 0x7fffffff, 0x7, 0xffff, 0xfffffffffffffffb, 0x1000, 0x7, 0x1, 0xfffffffffffffff8, 0x10000, 0x0, 0x0, 0x9, 0x80000000, 0x7, 0x2, 0xec, 0x3, 0x8, 0x20000000000, 0x1f, 0xff, 0x6, 0x80, 0x1, 0x672c, 0x2, 0x3, 0x5, 0x6a39c154, 0x7, 0x8, 0xf2, 0x7fff, 0x6, 0xef, 0x800, 0x9, 0x100, 0x5, 0xfffffffeffffffff, 0x1, 0x8, 0x6, 0x800, 0x7ff, 0x8, 0x80000001, 0x1b66, 0x3, 0x5, 0x2, 0x4, 0x80000000, 0x80000001, 0xb76, 0x9, 0xd8, 0x6, 0x3, 0x3, 0x9, 0x7fff, 0x4, 0x529d, 0x8, 0x7, 0x7, 0x12e7, 0xa8, 0x9, 0x100, 0x0, 0x80, 0x8000, 0x4, 0x9, 0x2, 0xfffffffffffffeff, 0x7ff, 0x10001, 0x7ff, 0x52, 0x8, 0x7, 0x9, 0xffff, 0x7, 0x7, 0xd1, 0x1, 0x3, 0x2, 0x8, 0x7, 0x7fffffff, 0x6, 0x6, 0x4, 0xecfb, 0x8000, 0x200, 0x9, 0x1, 0x3, 0x1f, 0xad8, 0x5, 0x6, 0x1000, 0x7, 0xffffffff, 0x1, 0xa6, 0x200, 0x9, 0x5, 0x8, 0x909, 0xfff, 0x1, 0x3a, 0x1000, 0x1, 0x3, 0x6, 0x4, 0x68e0, 0x1, 0x5, 0x0, 0x5, 0x3, 0x9, 0x1, 0x100, 0x4, 0x71b, 0x7ff, 0x0, 0x8, 0xad10, 0x7, 0x3a9, 0x7ff, 0xfffffffffffffffb, 0x0, 0x0, 0x9, 0x0, 0x5, 0x401, 0x6, 0xcf31, 0x3, 0x400, 0x2, 0x80000001, 0x2, 0xfffffffffffffffa, 0x0, 0x431, 0x6, 0x3, 0x0, 0x10000, 0x9, 0x0, 0x100, 0xb6e, 0x62b, 0x7, 0x7ff, 0x81, 0x7, 0x9, 0xd5a, 0xffff, 0x6, 0x1, 0x1, 0x800, 0xfff, 0x2000000000, 0x4, 0x751, 0x5, 0x2, 0x3, 0x2, 0x6, 0x7fff, 0x4, 0x400, 0xf6, 0xff, 0x1, 0x7fff, 0x7, 0x1000, 0x7, 0x7, 0x8000, 0xd1c1, 0x4, 0x100, 0x0, 0x0, 0x8, 0x7fffffff, 0x5, 0x8, 0x1f, 0x0, 0x7ff, 0x38e, 0x4, 0x1, 0x6, 0x3b8, 0x80000001, 0x5, 0x4, 0xffff, 0xfffffffffffffffe, 0x6, 0x2, 0x0, 0x100, 0x766e9309, 0x4, 0x7, 0x3f, 0x2, 0x1, 0x5, 0x2, 0x0, 0x2, 0x5, 0x10001, 0xffff, 0x0, 0x4, 0xffffffffffffff01, 0x6e, 0x7, 0x4, 0x40, 0x4, 0x4, 0x6, 0x9, 0xfff, 0x400, 0x5, 0x100000000, 0x1000, 0x1f, 0x1, 0x0, 0x2, 0x3, 0x4917, 0xa0, 0x9, 0x4, 0x1, 0x6, 0x6, 0xfffffffffffffff9, 0x4, 0x1, 0x3, 0x10000, 0x3, 0x6, 0x1, 0x1, 0x4, 0x30000000, 0x4, 0x1, 0x1, 0x7, 0x5, 0x7, 0x7, 0x8, 0x5, 0x1, 0xff, 0x1, 0xfffffffffffffff8, 0x8, 0xaf1, 0xffff, 0xffffffff7fffffff, 0x8, 0xb14, 0x9, 0x2, 0x46fa, 0xd1, 0x8, 0x94d, 0x6, 0x4, 0x2, 0xfffffffffffffff9, 0xd547, 0x2, 0x3, 0x81, 0x7, 0x4, 0xfffffffffffffffd, 0x9, 0x253, 0x3, 0x8, 0x3ff, 0xffff, 0x2, 0x2, 0x3, 0x0, 0x7, 0xfaa0, 0x5, 0x7, 0x200, 0x1ff, 0x1, 0x4, 0x1000, 0x3ff, 0x2, 0x0, 0x44c6, 0x400, 0x7fffffff, 0x5, 0x8, 0x0, 0x4, 0xfffffffffffffff7, 0x4, 0xba0000000, 0x3, 0x7, 0x7, 0x73e8, 0xec5, 0x5ce8419f, 0x100000000, 0x76, 0x7ff, 0xfffffffffffffffa, 0x80010000000, 0x7, 0x1, 0x8, 0x8, 0x73a8, 0x5, 0x8001, 0xbdb, 0xfffffffffffffffb, 0x80000000, 0x9, 0x20, 0x7fff, 0x7, 0x1, 0xfe, 0x6, 0xffffffffffffffff, 0x8000, 0x5, 0x5, 0x401, 0x80, 0x7, 0x6fb5, 0x7, 0x3, 0x8, 0x6, 0x8000, 0xfffffffffffffff7, 0x7, 0x5, 0x8, 0x87f, 0x4, 0xfffffffffffffffe, 0xfd, 0x20, 0x8000, 0xffff, 0x8, 0x0, 0x4, 0x0, 0xfffffffffffffffe, 0x7, 0x20, 0x2, 0x8, 0xffff, 0x0, 0x8, 0x4, 0x3, 0x9, 0x6, 0xd77c, 0xffff, 0x6, 0xde, 0x6, 0x8, 0x9a, 0x1ff, 0x1, 0x4, 0x1ff, 0x1, 0x100, 0x1, 0x7e6, 0xfffffffffffffbff, 0x5ac, 0x72, 0xffffffffffffff23, 0x2, 0x1000000000000000, 0x1, 0xfffffffffffffff9, 0x101, 0x9, 0x1, 0xffff, 0x9, 0x7ff, 0x100000000, 0x9, 0xffffffffffffffff, 0x9, 0xb136, 0xfffffffffffffff9, 0x2, 0x6, 0x6, 0xffff, 0x8, 0x100000001, 0x6, 0x8, 0xc2, 0x7f, 0x1, 0x0, 0x5, 0x7f, 0x80, 0x7fff, 0x275, 0xfff, 0x100000000, 0x3, 0x80000000, 0x0, 0x8, 0x8001, 0x7, 0x1505, 0x401, 0x8000, 0x80, 0x400, 0x8, 0x40, 0x10001, 0x4, 0x6c1, 0x200, 0x10001, 0x2, 0xffff, 0x5, 0x0, 0x1, 0x6573, 0x40, 0x8, 0x7, 0x1000, 0x1f, 0x7f, 0x20eb, 0xff, 0xfff, 0x101, 0x1000, 0x9, 0x5, 0x1, 0x7, 0x2, 0x3, 0x7db, 0x9, 0x6, 0xc5d, 0x8, 0xff, 0xffffffff, 0x7ff, 0x7, 0x0, 0x6, 0x7, 0x0, 0xe4df, 0xa9, 0x8d, 0x6, 0x0, 0x8, 0x1, 0xbbc4, 0x1, 0x10001, 0x101, 0x200, 0x7, 0x1, 0x100000000, 0x6, 0x1, 0xf6c7, 0x8, 0x10000, 0x7, 0x7, 0x1, 0x8000, 0xfffffffffffffc00, 0x7, 0x2b, 0x4, 0x1, 0x7, 0x0, 0x40, 0x3f, 0x9, 0x2f7, 0xfffffffffffffff8, 0x4, 0x9, 0x3, 0x8d4, 0x6, 0xcd, 0xffffffff, 0x4, 0xf5, 0x8, 0x145a, 0x1, 0x0, 0x7ff, 0x9, 0x0, 0x1, 0x2, 0x3, 0x1, 0x7, 0x80000001, 0x1, 0x55, 0x0, 0x0, 0xffffffff80000000, 0x0, 0x6, 0xe8, 0x0, 0x17, 0x2, 0x7, 0x100000000, 0x2, 0x1ff, 0xffffffff, 0x6, 0x2, 0x3e, 0x1f1a0, 0x1, 0x80000001, 0xc15, 0x28, 0x100, 0xf1e, 0x100000001, 0x10001, 0x4c15, 0x5, 0x0, 0x9, 0x6, 0xaa5e, 0xdd6a, 0x8, 0x100000001, 0x3, 0x1, 0x1, 0x0, 0x80000000, 0x6, 0x1000, 0x4800000, 0x8, 0x4eb00000000, 0x5, 0x9, 0x2, 0x0, 0x0, 0xffffffffffffffff, 0x5, 0xa4, 0x3, 0x6, 0x0, 0x7, 0x7, 0x2, 0x8000, 0x1, 0x8d6, 0x401, 0xfb, 0x1, 0x9, 0xcb1, 0x200, 0x1f, 0x189c, 0x8, 0xffffffff7fffffff, 0x1, 0xfffffffeffffffff, 0x9, 0x4, 0xff, 0xfffffffffffffff9, 0x7, 0x5, 0x80000001, 0x8, 0x40, 0x1, 0x0, 0x691, 0x8, 0x4, 0x4, 0x2, 0x2e589c87, 0x8, 0x3, 0x0, 0x100000001, 0x6, 0xffffffff7fffffff, 0x5, 0x9, 0x3, 0x401, 0x7, 0x7fffffff, 0x5, 0x77, 0x7ff, 0x0, 0xfaacdd4, 0x8, 0x0, 0x8, 0x0, 0x4, 0x2, 0x5, 0x3f, 0x1, 0x7, 0x0, 0x1ce588a4, 0x100, 0x10000, 0x8001, 0xed2, 0x3ff, 0x67b3, 0x4, 0xffff, 0xe333, 0x3ff, 0x800, 0x1, 0x4, 0xffffffff00000000, 0x800, 0x3e, 0x1000, 0x5, 0x3581, 0x80000001, 0x3, 0x8001, 0x7f, 0x3, 0x9, 0x3ffc000000000, 0x400, 0x80000001, 0x400, 0xd79, 0x1a8, 0x4, 0x4, 0x2725, 0x1, 0xfffffffffffffff7, 0x9, 0xffffffff, 0x401, 0x9, 0xffffffffffffff0b, 0x4, 0x2, 0x1000, 0x400, 0x40, 0x6, 0x1c00000000000000, 0xfaed, 0x8, 0x8, 0xffffffff, 0x8, 0x4, 0xd3, 0x40, 0xe90d, 0x3f, 0x94, 0x81, 0x6, 0x616, 0x7, 0x0, 0x7fff, 0x3f, 0x0, 0x9, 0x5, 0x2, 0x1, 0x3, 0xfff, 0xb3, 0xffffffff, 0xfffffffffffffffe, 0x3, 0x0, 0x0, 0xfffffffffffff001, 0x0, 0x7, 0x6, 0x8, 0x5, 0x2, 0x4, 0x6, 0x6, 0x2fa9c6dc, 0x2, 0x7ff, 0x12b2, 0x6, 0x1af0, 0x6, 0xf77, 0x6, 0x1000, 0x6, 0x5, 0x2, 0x7a, 0x1, 0x4, 0x0, 0x7, 0x100000000, 0x80, 0x8001, 0xffff, 0x5, 0x1, 0x2, 0xffff, 0x401, 0x59, 0x9, 0x6, 0x2, 0x8001, 0x1, 0xffffffffffffffc7, 0xfb0c, 0x5, 0x9, 0x9, 0x8, 0xac, 0x2, 0x0, 0xd3, 0x10000, 0x1, 0x57, 0xeb9, 0x80, 0xffffffffffffff81, 0x200, 0x20, 0x1ff, 0x1, 0x3f, 0xffffffff, 0x7fff, 0x81, 0x100000001, 0x100000, 0x9, 0x3f, 0x6, 0x1f, 0x7, 0x8000, 0xffffffff, 0x7, 0x1, 0x6, 0x5, 0x3016, 0x400, 0xbdf1, 0x20, 0x6, 0x65, 0x0, 0xff, 0x7, 0x15, 0xfffffffeffffffff, 0x80000001, 0x3, 0x50f, 0xfffffffffffffffd, 0xffffffffffff7fff, 0x8001, 0xee6, 0x800, 0x100, 0x8, 0x4, 0x6, 0x9f8d, 0x8, 0x2, 0x0, 0x3, 0x7f, 0xd7c, 0x4, 0x1ff, 0x4, 0x4, 0x8001, 0x4, 0x4, 0x8000, 0x9, 0x7fffffff, 0x0, 0x800, 0x9, 0x101, 0x5, 0x5, 0x10001, 0x200, 0x0, 0x8, 0xfffffffffffffff8, 0x9, 0x8, 0x1, 0x9, 0x8, 0x10001, 0x81, 0x896, 0xffffffff, 0x0, 0x42fd, 0x6, 0x7fffffff, 0x1, 0xffffffffffffff01, 0x3, 0x7000000000000000, 0x3f, 0x7, 0x9, 0x20, 0x2, 0x3, 0x59a, 0x19b, 0x71da, 0x7, 0x1, 0x86f0571, 0x7040acf4, 0x3ff, 0xfffffffffffffff9, 0x6, 0xffffffffffffff81, 0x85d9, 0x1, 0x7, 0x7, 0x8000, 0x5, 0x1, 0x400, 0x1, 0x1, 0x3, 0x581670eb, 0xaa, 0x1, 0x1000, 0x0, 0x81, 0xc, 0x39, 0x8, 0xffff, 0x5, 0x7f, 0xfffffffffffff7d1, 0x2b, 0x4000000000000, 0x3, 0x5, 0x1304, 0x8, 0x36, 0x5, 0xfffffffffffffffc, 0x0, 0x4fe, 0x80000001, 0x8, 0x8, 0x2, 0x7fff, 0x7, 0x94, 0x3, 0xffffffffffffff01, 0x7f, 0x7, 0x3, 0x9, 0x5cf1, 0x1e3, 0xffffffff00000000, 0x100000000, 0x4, 0x2, 0x3, 0x7, 0x1, 0x8, 0xfffffffffffff801, 0x9, 0x4, 0x3ff, 0x9, 0xffff, 0x1, 0x100000000, 0x5, 0x0, 0x7f, 0xe4a0, 0x8, 0x4, 0x0, 0x4f, 0x100, 0x8, 0x400, 0x9, 0x1ff, 0x76, 0x40, 0x8, 0x88b5, 0x6, 0x6, 0xffffffff, 0x7, 0x5, 0xfd0, 0x2, 0x10001, 0x7fffffff, 0x5, 0x100, 0x1, 0xa5, 0x100, 0x8f4, 0x1, 0x2, 0x9, 0x7, 0x7, 0x7, 0x3, 0x2, 0x5, 0x1, 0xfffffffffffff801, 0xc684d64, 0x1ff, 0x1ff, 0xfffffffffffffffd, 0x1, 0x77, 0x2, 0x4, 0x9232, 0x0, 0x9, 0x4, 0x72a06a0, 0x10001, 0xf9, 0x1ff, 0x6, 0x6, 0x7ff, 0x9, 0x1f, 0x7f, 0x5, 0x2, 0x5, 0x3, 0x4, 0x0, 0x6, 0x5, 0x53d3, 0x4, 0xffffffff, 0x2, 0x0, 0x2, 0x8001, 0x4, 0x6, 0xa5c, 0x2, 0x0, 0x1000, 0xfffffffffffff801, 0x3d, 0x488, 0x951, 0x2, 0xffff, 0x3, 0x6, 0x4a0, 0x800, 0x3, 0x5, 0xa1c8, 0x2, 0x7fffffff, 0x9, 0x0, 0x5, 0x10000, 0xe58, 0x8, 0x3, 0x401, 0x7b, 0xa3f, 0x80, 0x5, 0x100000000, 0x6, 0xffffffff, 0xa9, 0x6, 0x7fff, 0x27, 0xfff, 0x10000, 0xbb66, 0x8, 0xfffffffffffff772, 0x7ff, 0x100000000, 0x2, 0x6, 0x5, 0x3, 0x642, 0x10000, 0x2, 0x7, 0x0, 0x242, 0x9, 0xfff, 0x2, 0x7f, 0x529, 0x2, 0x9, 0x2, 0x6, 0x3, 0x6, 0x7, 0xffff, 0x1, 0x10001, 0x0, 0x9, 0x100000000, 0x1f, 0x3, 0x800, 0x7, 0x2, 0x2, 0x5, 0x8000, 0x7ff, 0x7, 0x5, 0x80000001, 0xffffffff, 0x7ff, 0x0, 0x3, 0x1ff, 0x7, 0x0, 0x1502, 0x4, 0x400, 0x101, 0x7ff, 0x5, 0x2, 0x8, 0x6f7, 0x800, 0x1, 0x4, 0x7, 0x1000, 0x2, 0x5126, 0xffffffff, 0x3, 0xfffffffffffffffb, 0xfff, 0x1, 0x0, 0x7, 0x6, 0x1, 0xffff, 0x6, 0x972, 0x68a5, 0xe7, 0x0, 0xfffffffeffffffff, 0x2, 0xad2b, 0x8, 0xabb1, 0x800c, 0x2, 0x0, 0x18, 0x82, 0x10001, 0xdbee, 0x100, 0x1, 0xfffffffffffffffc, 0x3f000000000000, 0x5, 0x8001, 0x401, 0x7, 0x1, 0x1, 0x68, 0x2, 0x0, 0x5e3, 0xf4f, 0x4, 0x3ff, 0x100, 0x7ff, 0x4, 0x9, 0x6000000000000, 0x7, 0x3, 0x100000001, 0x9, 0x75e, 0x0, 0x4, 0x100000001, 0xb5f0, 0x3ff, 0x10001, 0x3f, 0x1, 0x1, 0x800, 0x8, 0x4390, 0x5, 0x7ff, 0x4, 0x1, 0x3ff, 0x5, 0x3, 0x100000000, 0x3, 0x3, 0x6f, 0x80008, 0xe0f, 0x3, 0xdf2, 0x9, 0x6, 0x6, 0x8000, 0x1, 0x1f, 0x9, 0x6, 0x7fffffff, 0x5, 0xfffffffffffffff9, 0x7f, 0x7, 0x7f, 0x1, 0x26a1, 0xd29a, 0x7, 0x7, 0x4, 0xfffffffffffffffb, 0x80000001, 0x5, 0x7, 0x81, 0x4, 0xc3d7, 0x80, 0xffffffffffffffc0, 0x5, 0x7, 0x101, 0x3, 0x7, 0x3, 0x4, 0xfffffffffffeffff, 0xf0, 0x0, 0x8, 0x7, 0x1, 0x5, 0x4, 0x1, 0x1f0, 0x401, 0x100000000, 0x40, 0x1, 0x100000001, 0x3, 0x13, 0xfffffffffffffff8, 0xfb18, 0x3f, 0x7, 0x861f, 0x5, 0x0, 0x5, 0x273e, 0x2, 0x3, 0x7fff, 0x3f, 0x7, 0x3, 0x531, 0x81, 0xffffffffffff1dda, 0x1f, 0x1ff, 0xb3c, 0x400, 0x7f, 0x40, 0x33, 0x0, 0x5, 0x5, 0x80, 0x8000000000, 0x0, 0x8, 0x9, 0x101, 0x7, 0x2b75, 0x7, 0x3ff, 0x9, 0xfffffffffffffffb, 0x0, 0x81, 0x1, 0xd233, 0x200, 0x8001, 0x5, 0xfffffffffffffffd, 0x10001, 0xff, 0x75, 0x2, 0x4, 0xffffffff00000001, 0x4, 0xc5, 0x81, 0x7, 0x57, 0x80000000, 0x3, 0xcc81, 0x0, 0x8, 0x1, 0x7fff0000000, 0x7, 0x2, 0x81, 0x5, 0x1, 0x80000000, 0x1, 0x6, 0x8000, 0x6, 0x9, 0x7, 0x8000, 0x800, 0xa3, 0x100000001, 0x2, 0x681, 0x0, 0x7, 0xd2be, 0x2a70000000000000], "452b5120159512e6ec5f9e3922dca67b895c827c5a7b32bc446e1b64ab4de4bf2df8953ef7e714565fa3640f5cb535be99ef97327610bb22788ee058657d6607a8e55ca2a443fba91f0d1ac33aabdf55055a1941264cfd1c5a22b128b0d9642cafc63e8a9821a9fbbe5f764d6c01ace429dc8679aaa8e4d51c97fa31ec"}}) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) 14:44:08 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x0, 0xe000000}, 0x0) [ 400.427168][T28552] BTRFS warning (device ): duplicate device fsid:devid for ecf6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop2 new:/dev/loop5 14:44:08 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xff', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:44:08 executing program 2 (fault-call:0 fault-nth:64): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:44:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1, 0x0, 0x80fe}, 0x0) 14:44:08 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0xf000, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:44:08 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 400.734250][T28584] FAULT_INJECTION: forcing a failure. [ 400.734250][T28584] name failslab, interval 1, probability 0, space 0, times 0 [ 400.746995][T28584] CPU: 1 PID: 28584 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 400.754966][T28584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 400.765175][T28584] Call Trace: [ 400.768476][T28584] dump_stack+0x172/0x1f0 [ 400.768498][T28584] should_fail.cold+0xa/0x15 [ 400.768514][T28584] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 400.768536][T28584] __should_failslab+0x121/0x190 [ 400.788143][T28584] should_failslab+0x9/0x14 [ 400.792656][T28584] kmem_cache_alloc+0x47/0x6f0 [ 400.797418][T28584] ? __lock_acquire+0x548/0x3fb0 [ 400.802354][T28584] xas_alloc+0x2df/0x3d0 [ 400.806582][T28584] xas_create+0x2cd/0x1040 [ 400.810988][T28584] xas_store+0x9a/0x19b0 [ 400.815212][T28584] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 400.821430][T28584] ? xas_start+0x166/0x560 [ 400.825830][T28584] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 400.832051][T28584] ? xas_load+0x67/0x150 [ 400.836280][T28584] __add_to_page_cache_locked+0x5be/0xe70 [ 400.841987][T28584] ? file_check_and_advance_wb_err+0x3a0/0x3a0 [ 400.848121][T28584] ? __alloc_pages_nodemask+0x61d/0x8d0 [ 400.853648][T28584] ? lock_downgrade+0x880/0x880 [ 400.858487][T28584] ? count_shadow_nodes+0x500/0x500 [ 400.863673][T28584] ? find_get_entry+0x535/0x880 [ 400.868510][T28584] add_to_page_cache_lru+0x1cb/0x760 [ 400.873779][T28584] ? add_to_page_cache_locked+0x40/0x40 [ 400.879406][T28584] ? __page_cache_alloc+0x131/0x460 [ 400.884589][T28584] pagecache_get_page+0x35c/0x740 [ 400.889600][T28584] __getblk_gfp+0x27e/0x970 [ 400.894089][T28584] ? kasan_check_write+0x14/0x20 [ 400.899011][T28584] __bread_gfp+0x2f/0x300 [ 400.903325][T28584] btrfs_read_dev_one_super+0xb6/0x2a0 [ 400.908786][T28584] btrfs_read_dev_super+0x6c/0xd0 [ 400.913794][T28584] ? btrfs_read_dev_one_super+0x2a0/0x2a0 [ 400.919504][T28584] btrfs_get_bdev_and_sb+0xff/0x300 [ 400.924684][T28584] open_fs_devices+0x68e/0xbd0 [ 400.929437][T28584] ? find_fsid+0x2e0/0x2e0 [ 400.933841][T28584] ? memmove_extent_buffer.cold+0x44/0x44 [ 400.939550][T28584] btrfs_open_devices+0x147/0x170 [ 400.944559][T28584] btrfs_mount_root+0x79a/0x1220 [ 400.949484][T28584] ? btrfs_decode_error+0x70/0x70 [ 400.954491][T28584] ? rcu_read_lock_sched_held+0x110/0x130 [ 400.960191][T28584] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 400.966421][T28584] ? vfs_parse_fs_string+0x111/0x170 [ 400.971700][T28584] ? vfs_parse_fs_string+0x111/0x170 [ 400.976967][T28584] ? rcu_read_lock_sched_held+0x110/0x130 [ 400.982680][T28584] ? kfree+0x1fa/0x230 [ 400.986729][T28584] ? vfs_parse_fs_string+0x116/0x170 [ 400.991996][T28584] ? btrfs_decode_error+0x70/0x70 [ 400.997002][T28584] legacy_get_tree+0xf2/0x200 [ 401.001661][T28584] vfs_get_tree+0x123/0x450 [ 401.006150][T28584] fc_mount+0x17/0xc0 [ 401.010116][T28584] vfs_kern_mount.part.0+0xd8/0xf0 [ 401.015221][T28584] vfs_kern_mount+0x40/0x60 [ 401.019707][T28584] btrfs_mount+0x2b4/0x15e2 [ 401.024206][T28584] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 401.029819][T28584] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 401.036044][T28584] ? should_fail+0x1de/0x852 [ 401.040619][T28584] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 401.046407][T28584] ? btrfs_remount+0x11f0/0x11f0 [ 401.051338][T28584] ? rcu_read_lock_sched_held+0x110/0x130 [ 401.057041][T28584] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 401.063264][T28584] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 401.069498][T28584] ? vfs_parse_fs_string+0x111/0x170 [ 401.074762][T28584] ? vfs_parse_fs_string+0x111/0x170 [ 401.080027][T28584] ? rcu_read_lock_sched_held+0x110/0x130 [ 401.085729][T28584] ? kfree+0x1fa/0x230 [ 401.089779][T28584] ? vfs_parse_fs_string+0x116/0x170 [ 401.095049][T28584] ? btrfs_remount+0x11f0/0x11f0 [ 401.099966][T28584] legacy_get_tree+0xf2/0x200 [ 401.104743][T28584] ? btrfs_remount+0x11f0/0x11f0 [ 401.109657][T28584] ? legacy_get_tree+0xf2/0x200 [ 401.114492][T28584] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 401.120716][T28584] vfs_get_tree+0x123/0x450 [ 401.133891][T28584] do_mount+0x1436/0x2c40 [ 401.138207][T28584] ? copy_mount_string+0x40/0x40 [ 401.143131][T28584] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 401.149355][T28584] ? copy_mount_options+0x280/0x3a0 [ 401.154538][T28584] ksys_mount+0xdb/0x150 [ 401.158777][T28584] __x64_sys_mount+0xbe/0x150 [ 401.163455][T28584] do_syscall_64+0x103/0x610 [ 401.168029][T28584] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 401.173900][T28584] RIP: 0033:0x45b81a [ 401.177779][T28584] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 401.198484][T28584] RSP: 002b:00007f082125da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 401.206879][T28584] RAX: ffffffffffffffda RBX: 00007f082125db40 RCX: 000000000045b81a [ 401.214834][T28584] RDX: 00007f082125dae0 RSI: 0000000020000000 RDI: 00007f082125db00 [ 401.222785][T28584] RBP: 0000000000000001 R08: 00007f082125db40 R09: 00007f082125dae0 14:44:09 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x0, 0xf000000}, 0x0) [ 401.230737][T28584] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 401.238690][T28584] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 [ 401.261512][T28590] BTRFS warning (device ): duplicate device fsid:devid for ecf6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop2 new:/dev/loop5 14:44:09 executing program 2 (fault-call:0 fault-nth:65): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:44:09 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x34000, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:44:09 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 401.419706][T28603] FAULT_INJECTION: forcing a failure. [ 401.419706][T28603] name failslab, interval 1, probability 0, space 0, times 0 14:44:09 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x0, 0x3f000000}, 0x0) [ 401.496791][T28603] CPU: 1 PID: 28603 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 401.504829][T28603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 401.514986][T28603] Call Trace: [ 401.518270][T28603] dump_stack+0x172/0x1f0 [ 401.522605][T28603] should_fail.cold+0xa/0x15 [ 401.527189][T28603] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 401.532984][T28603] ? find_held_lock+0x35/0x130 [ 401.537737][T28603] ? find_get_entry+0x50e/0x880 [ 401.542579][T28603] __should_failslab+0x121/0x190 [ 401.547502][T28603] should_failslab+0x9/0x14 [ 401.551989][T28603] kmem_cache_alloc+0x47/0x6f0 [ 401.556741][T28603] ? ___might_sleep+0x163/0x280 [ 401.561584][T28603] ? mempool_alloc+0x380/0x380 [ 401.566330][T28603] mempool_alloc_slab+0x47/0x60 [ 401.571163][T28603] mempool_alloc+0x16b/0x380 [ 401.575745][T28603] ? mempool_destroy+0x40/0x40 [ 401.580495][T28603] ? mark_held_locks+0xa4/0xf0 [ 401.585241][T28603] ? lock_downgrade+0x880/0x880 [ 401.590082][T28603] ? __find_get_block+0x9ba/0xcf0 [ 401.595087][T28603] ? __getblk_gfp+0x1b1/0x970 [ 401.599747][T28603] ? __find_get_block+0x9ba/0xcf0 [ 401.604759][T28603] ? lockdep_hardirqs_on+0x418/0x5d0 [ 401.610058][T28603] bio_alloc_bioset+0x3bf/0x680 [ 401.614897][T28603] ? __find_get_block+0x317/0xcf0 [ 401.619910][T28603] ? bvec_alloc+0x2f0/0x2f0 [ 401.624415][T28603] submit_bh_wbc+0x133/0x7f0 [ 401.628996][T28603] __bread_gfp+0x13d/0x300 [ 401.633401][T28603] btrfs_read_dev_one_super+0xb6/0x2a0 [ 401.638845][T28603] btrfs_read_dev_super+0x6c/0xd0 [ 401.643856][T28603] ? btrfs_read_dev_one_super+0x2a0/0x2a0 [ 401.649569][T28603] btrfs_get_bdev_and_sb+0xff/0x300 [ 401.654754][T28603] open_fs_devices+0x68e/0xbd0 [ 401.659515][T28603] ? find_fsid+0x2e0/0x2e0 [ 401.663923][T28603] ? memmove_extent_buffer.cold+0x44/0x44 [ 401.669634][T28603] btrfs_open_devices+0x147/0x170 [ 401.674651][T28603] btrfs_mount_root+0x79a/0x1220 [ 401.679584][T28603] ? btrfs_decode_error+0x70/0x70 [ 401.684597][T28603] ? rcu_read_lock_sched_held+0x110/0x130 [ 401.690313][T28603] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 401.696541][T28603] ? vfs_parse_fs_string+0x111/0x170 [ 401.701816][T28603] ? vfs_parse_fs_string+0x111/0x170 [ 401.707088][T28603] ? rcu_read_lock_sched_held+0x110/0x130 [ 401.712795][T28603] ? kfree+0x1fa/0x230 [ 401.716853][T28603] ? vfs_parse_fs_string+0x116/0x170 [ 401.722140][T28603] ? btrfs_decode_error+0x70/0x70 [ 401.727235][T28603] legacy_get_tree+0xf2/0x200 [ 401.731900][T28603] vfs_get_tree+0x123/0x450 [ 401.736396][T28603] fc_mount+0x17/0xc0 [ 401.740370][T28603] vfs_kern_mount.part.0+0xd8/0xf0 [ 401.745473][T28603] vfs_kern_mount+0x40/0x60 [ 401.749965][T28603] btrfs_mount+0x2b4/0x15e2 [ 401.754457][T28603] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 401.760081][T28603] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 401.766307][T28603] ? should_fail+0x1de/0x852 [ 401.770887][T28603] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 401.776684][T28603] ? btrfs_remount+0x11f0/0x11f0 [ 401.781616][T28603] ? rcu_read_lock_sched_held+0x110/0x130 [ 401.787319][T28603] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 401.793545][T28603] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 401.799771][T28603] ? vfs_parse_fs_string+0x111/0x170 [ 401.805045][T28603] ? vfs_parse_fs_string+0x111/0x170 [ 401.810316][T28603] ? rcu_read_lock_sched_held+0x110/0x130 [ 401.816023][T28603] ? kfree+0x1fa/0x230 [ 401.820082][T28603] ? vfs_parse_fs_string+0x116/0x170 [ 401.825357][T28603] ? btrfs_remount+0x11f0/0x11f0 [ 401.830285][T28603] legacy_get_tree+0xf2/0x200 [ 401.834968][T28603] ? btrfs_remount+0x11f0/0x11f0 [ 401.839891][T28603] ? legacy_get_tree+0xf2/0x200 [ 401.844726][T28603] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 401.850960][T28603] vfs_get_tree+0x123/0x450 [ 401.855453][T28603] do_mount+0x1436/0x2c40 [ 401.859780][T28603] ? copy_mount_string+0x40/0x40 [ 401.864702][T28603] ? copy_mount_options+0x1ea/0x3a0 [ 401.869892][T28603] ? copy_mount_options+0x1ed/0x3a0 [ 401.875088][T28603] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 401.881310][T28603] ? copy_mount_options+0x280/0x3a0 [ 401.886517][T28603] ksys_mount+0xdb/0x150 [ 401.890755][T28603] __x64_sys_mount+0xbe/0x150 [ 401.895429][T28603] do_syscall_64+0x103/0x610 [ 401.900008][T28603] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 401.905882][T28603] RIP: 0033:0x45b81a [ 401.909764][T28603] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 401.929443][T28603] RSP: 002b:00007f082125da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 401.937840][T28603] RAX: ffffffffffffffda RBX: 00007f082125db40 RCX: 000000000045b81a 14:44:10 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1, 0x8000) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f0000000240)={0x1, 0x8, 0x2}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r2, 0x300, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x6}}, ["", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x0) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f00000000c0)=[r0, r0], 0x2) [ 401.945794][T28603] RDX: 00007f082125dae0 RSI: 0000000020000000 RDI: 00007f082125db00 [ 401.953750][T28603] RBP: 0000000000000001 R08: 00007f082125db40 R09: 00007f082125dae0 [ 401.961716][T28603] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 401.969671][T28603] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:44:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1, 0x0, 0xc0fe}, 0x0) 14:44:10 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x0, 0x58010000}, 0x0) 14:44:10 executing program 2 (fault-call:0 fault-nth:66): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:44:10 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x400300, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:44:10 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:44:10 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x0, 0x60000000}, 0x0) [ 402.328864][T28648] FAULT_INJECTION: forcing a failure. [ 402.328864][T28648] name failslab, interval 1, probability 0, space 0, times 0 [ 402.359250][T28648] CPU: 0 PID: 28648 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 402.367296][T28648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 402.367303][T28648] Call Trace: [ 402.367328][T28648] dump_stack+0x172/0x1f0 [ 402.367351][T28648] should_fail.cold+0xa/0x15 [ 402.367376][T28648] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 402.380720][T28648] ? find_held_lock+0x35/0x130 [ 402.380737][T28648] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 402.380760][T28648] ? debug_smp_processor_id+0x3c/0x280 [ 402.389668][T28648] __should_failslab+0x121/0x190 [ 402.406545][T28648] should_failslab+0x9/0x14 [ 402.406567][T28648] kmem_cache_alloc+0x47/0x6f0 [ 402.426190][T28648] ? ___might_sleep+0x163/0x280 [ 402.431078][T28648] ? mempool_alloc+0x380/0x380 [ 402.435855][T28648] mempool_alloc_slab+0x47/0x60 [ 402.440713][T28648] mempool_alloc+0x16b/0x380 [ 402.445390][T28648] ? mempool_destroy+0x40/0x40 [ 402.450157][T28648] ? mark_held_locks+0xa4/0xf0 [ 402.454930][T28648] ? lock_downgrade+0x880/0x880 [ 402.459786][T28648] ? __find_get_block+0x9ba/0xcf0 [ 402.464811][T28648] ? __getblk_gfp+0x1b1/0x970 [ 402.469486][T28648] ? __find_get_block+0x9ba/0xcf0 [ 402.474501][T28648] ? lockdep_hardirqs_on+0x418/0x5d0 [ 402.479778][T28648] bio_alloc_bioset+0x3bf/0x680 [ 402.484615][T28648] ? __find_get_block+0x317/0xcf0 [ 402.489640][T28648] ? bvec_alloc+0x2f0/0x2f0 [ 402.494141][T28648] submit_bh_wbc+0x133/0x7f0 [ 402.498721][T28648] __bread_gfp+0x13d/0x300 [ 402.503130][T28648] btrfs_read_dev_one_super+0xb6/0x2a0 [ 402.508580][T28648] btrfs_read_dev_super+0x6c/0xd0 [ 402.513589][T28648] ? btrfs_read_dev_one_super+0x2a0/0x2a0 [ 402.519305][T28648] btrfs_get_bdev_and_sb+0xff/0x300 [ 402.524494][T28648] open_fs_devices+0x68e/0xbd0 [ 402.529258][T28648] ? find_fsid+0x2e0/0x2e0 [ 402.533670][T28648] ? memmove_extent_buffer.cold+0x44/0x44 [ 402.539380][T28648] btrfs_open_devices+0x147/0x170 [ 402.544395][T28648] btrfs_mount_root+0x79a/0x1220 [ 402.549328][T28648] ? btrfs_decode_error+0x70/0x70 [ 402.554343][T28648] ? rcu_read_lock_sched_held+0x110/0x130 [ 402.560048][T28648] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 402.566294][T28648] ? vfs_parse_fs_string+0x111/0x170 [ 402.571563][T28648] ? vfs_parse_fs_string+0x111/0x170 [ 402.576837][T28648] ? rcu_read_lock_sched_held+0x110/0x130 [ 402.582542][T28648] ? kfree+0x1fa/0x230 [ 402.586597][T28648] ? vfs_parse_fs_string+0x116/0x170 [ 402.591878][T28648] ? btrfs_decode_error+0x70/0x70 [ 402.596886][T28648] legacy_get_tree+0xf2/0x200 [ 402.601553][T28648] vfs_get_tree+0x123/0x450 [ 402.606050][T28648] fc_mount+0x17/0xc0 [ 402.610024][T28648] vfs_kern_mount.part.0+0xd8/0xf0 [ 402.615123][T28648] vfs_kern_mount+0x40/0x60 [ 402.619618][T28648] btrfs_mount+0x2b4/0x15e2 [ 402.624112][T28648] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 402.629729][T28648] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 402.635953][T28648] ? should_fail+0x1de/0x852 [ 402.640532][T28648] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 402.646328][T28648] ? btrfs_remount+0x11f0/0x11f0 [ 402.651259][T28648] ? rcu_read_lock_sched_held+0x110/0x130 [ 402.656962][T28648] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 402.663189][T28648] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 402.669425][T28648] ? vfs_parse_fs_string+0x111/0x170 [ 402.674695][T28648] ? vfs_parse_fs_string+0x111/0x170 [ 402.679965][T28648] ? rcu_read_lock_sched_held+0x110/0x130 [ 402.685669][T28648] ? kfree+0x1fa/0x230 [ 402.689724][T28648] ? vfs_parse_fs_string+0x116/0x170 [ 402.695174][T28648] ? btrfs_remount+0x11f0/0x11f0 [ 402.700107][T28648] legacy_get_tree+0xf2/0x200 [ 402.704782][T28648] ? btrfs_remount+0x11f0/0x11f0 [ 402.709702][T28648] ? legacy_get_tree+0xf2/0x200 [ 402.714538][T28648] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 402.720779][T28648] vfs_get_tree+0x123/0x450 [ 402.725271][T28648] do_mount+0x1436/0x2c40 [ 402.729591][T28648] ? copy_mount_string+0x40/0x40 [ 402.734513][T28648] ? _copy_from_user+0xdd/0x150 [ 402.739352][T28648] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 402.745576][T28648] ? copy_mount_options+0x280/0x3a0 [ 402.750772][T28648] ksys_mount+0xdb/0x150 [ 402.755020][T28648] __x64_sys_mount+0xbe/0x150 [ 402.759699][T28648] do_syscall_64+0x103/0x610 [ 402.764279][T28648] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 402.770154][T28648] RIP: 0033:0x45b81a [ 402.774039][T28648] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 402.793624][T28648] RSP: 002b:00007f082125da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 402.802030][T28648] RAX: ffffffffffffffda RBX: 00007f082125db40 RCX: 000000000045b81a [ 402.809986][T28648] RDX: 00007f082125dae0 RSI: 0000000020000000 RDI: 00007f082125db00 [ 402.817946][T28648] RBP: 0000000000000001 R08: 00007f082125db40 R09: 00007f082125dae0 14:44:10 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x0, 0x9effffff}, 0x0) [ 402.825946][T28648] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 402.833903][T28648] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 [ 402.856458][T28654] BTRFS warning (device ): duplicate device fsid:devid for ecf6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop2 new:/dev/loop5 14:44:10 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f00000000c0)=[{r0, 0x8000}, {r0, 0x44}, {r0, 0x40}, {r0, 0x2}, {r0, 0x8000}, {r0, 0x80}, {r0, 0x1000}, {r0, 0x400}, {r0, 0x10}], 0x9, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) 14:44:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1, 0x0, 0xe803}, 0x0) 14:44:10 executing program 2 (fault-call:0 fault-nth:67): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:44:11 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x0, 0xc00e0000}, 0x0) 14:44:11 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0xf0ffff, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:44:11 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000000)=[{r0, 0x3}], 0x1, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x82500, 0x0) r2 = socket$inet_smc(0x2b, 0x1, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r1, &(0x7f00000001c0)={0x2, 0x6a76}, 0x2) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f0000000140)={'filter\x00', 0x3, [{}, {}, {}]}, 0x58) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x82000, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000100)={0x3, r3, 0x1}) [ 403.144299][T28683] FAULT_INJECTION: forcing a failure. [ 403.144299][T28683] name failslab, interval 1, probability 0, space 0, times 0 [ 403.190901][T28683] CPU: 0 PID: 28683 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 403.198930][T28683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 403.208986][T28683] Call Trace: [ 403.212283][T28683] dump_stack+0x172/0x1f0 [ 403.216628][T28683] should_fail.cold+0xa/0x15 [ 403.221235][T28683] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 403.227049][T28683] ? find_held_lock+0x35/0x130 [ 403.231836][T28683] ? find_get_entry+0x50e/0x880 14:44:11 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 403.236690][T28683] __should_failslab+0x121/0x190 [ 403.241640][T28683] should_failslab+0x9/0x14 [ 403.246151][T28683] kmem_cache_alloc+0x47/0x6f0 [ 403.250960][T28683] ? ___might_sleep+0x163/0x280 [ 403.255819][T28683] ? mempool_alloc+0x380/0x380 [ 403.260586][T28683] mempool_alloc_slab+0x47/0x60 [ 403.265437][T28683] mempool_alloc+0x16b/0x380 [ 403.265462][T28683] ? mempool_destroy+0x40/0x40 [ 403.265483][T28683] ? mark_held_locks+0xa4/0xf0 [ 403.265495][T28683] ? lock_downgrade+0x880/0x880 [ 403.265514][T28683] ? __find_get_block+0x9ba/0xcf0 [ 403.274833][T28683] ? __getblk_gfp+0x1b1/0x970 [ 403.274847][T28683] ? __find_get_block+0x9ba/0xcf0 [ 403.274863][T28683] ? lockdep_hardirqs_on+0x418/0x5d0 [ 403.274885][T28683] bio_alloc_bioset+0x3bf/0x680 [ 403.274899][T28683] ? __find_get_block+0x317/0xcf0 [ 403.274914][T28683] ? bvec_alloc+0x2f0/0x2f0 [ 403.274934][T28683] submit_bh_wbc+0x133/0x7f0 [ 403.274952][T28683] __bread_gfp+0x13d/0x300 [ 403.292797][T28703] Unknown ioctl 1075359421 [ 403.294211][T28683] btrfs_read_dev_one_super+0xb6/0x2a0 [ 403.294230][T28683] btrfs_read_dev_super+0x6c/0xd0 [ 403.342544][T28683] ? btrfs_read_dev_one_super+0x2a0/0x2a0 [ 403.348261][T28683] btrfs_get_bdev_and_sb+0xff/0x300 [ 403.353461][T28683] open_fs_devices+0x68e/0xbd0 [ 403.358220][T28683] ? find_fsid+0x2e0/0x2e0 [ 403.362621][T28683] ? memmove_extent_buffer.cold+0x44/0x44 [ 403.368325][T28683] btrfs_open_devices+0x147/0x170 [ 403.373348][T28683] btrfs_mount_root+0x79a/0x1220 [ 403.378277][T28683] ? btrfs_decode_error+0x70/0x70 [ 403.383284][T28683] ? rcu_read_lock_sched_held+0x110/0x130 [ 403.388984][T28683] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 403.395206][T28683] ? vfs_parse_fs_string+0x111/0x170 [ 403.400492][T28683] ? vfs_parse_fs_string+0x111/0x170 [ 403.405766][T28683] ? rcu_read_lock_sched_held+0x110/0x130 [ 403.411468][T28683] ? kfree+0x1fa/0x230 [ 403.415525][T28683] ? vfs_parse_fs_string+0x116/0x170 [ 403.420804][T28683] ? btrfs_decode_error+0x70/0x70 [ 403.425807][T28683] legacy_get_tree+0xf2/0x200 [ 403.430480][T28683] vfs_get_tree+0x123/0x450 [ 403.434989][T28683] fc_mount+0x17/0xc0 [ 403.438982][T28683] vfs_kern_mount.part.0+0xd8/0xf0 [ 403.444076][T28683] vfs_kern_mount+0x40/0x60 [ 403.448562][T28683] btrfs_mount+0x2b4/0x15e2 [ 403.453050][T28683] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 403.458677][T28683] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 403.464907][T28683] ? should_fail+0x1de/0x852 [ 403.469490][T28683] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 403.475294][T28683] ? btrfs_remount+0x11f0/0x11f0 [ 403.480234][T28683] ? rcu_read_lock_sched_held+0x110/0x130 [ 403.485944][T28683] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 403.492180][T28683] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 403.498403][T28683] ? vfs_parse_fs_string+0x111/0x170 [ 403.503672][T28683] ? vfs_parse_fs_string+0x111/0x170 [ 403.508955][T28683] ? rcu_read_lock_sched_held+0x110/0x130 [ 403.514657][T28683] ? kfree+0x1fa/0x230 [ 403.518716][T28683] ? vfs_parse_fs_string+0x116/0x170 [ 403.523994][T28683] ? btrfs_remount+0x11f0/0x11f0 [ 403.529092][T28683] legacy_get_tree+0xf2/0x200 [ 403.533749][T28683] ? btrfs_remount+0x11f0/0x11f0 [ 403.538672][T28683] ? legacy_get_tree+0xf2/0x200 [ 403.543514][T28683] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 403.549737][T28683] vfs_get_tree+0x123/0x450 [ 403.554221][T28683] do_mount+0x1436/0x2c40 [ 403.558544][T28683] ? copy_mount_string+0x40/0x40 [ 403.563471][T28683] ? _copy_from_user+0xdd/0x150 [ 403.568332][T28683] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 403.574555][T28683] ? copy_mount_options+0x280/0x3a0 [ 403.579734][T28683] ksys_mount+0xdb/0x150 [ 403.583968][T28683] __x64_sys_mount+0xbe/0x150 [ 403.588665][T28683] do_syscall_64+0x103/0x610 [ 403.593238][T28683] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 403.599105][T28683] RIP: 0033:0x45b81a [ 403.602990][T28683] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 403.622580][T28683] RSP: 002b:00007f082125da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 403.631000][T28683] RAX: ffffffffffffffda RBX: 00007f082125db40 RCX: 000000000045b81a 14:44:11 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) [ 403.638952][T28683] RDX: 00007f082125dae0 RSI: 0000000020000000 RDI: 00007f082125db00 [ 403.646902][T28683] RBP: 0000000000000001 R08: 00007f082125db40 R09: 00007f082125dae0 [ 403.654858][T28683] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 403.662811][T28683] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:44:11 executing program 2 (fault-call:0 fault-nth:68): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:44:11 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x1000000, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:44:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1, 0x0, 0xf401}, 0x0) [ 403.918065][T28713] FAULT_INJECTION: forcing a failure. [ 403.918065][T28713] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 403.931321][T28713] CPU: 1 PID: 28713 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 403.939303][T28713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 403.949362][T28713] Call Trace: [ 403.952662][T28713] dump_stack+0x172/0x1f0 [ 403.957002][T28713] should_fail.cold+0xa/0x15 [ 403.961617][T28713] ? fault_create_debugfs_attr+0x1e0/0x1e0 14:44:11 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 403.967441][T28713] ? __lock_acquire+0x548/0x3fb0 [ 403.972400][T28713] should_fail_alloc_page+0x50/0x60 [ 403.977597][T28713] __alloc_pages_nodemask+0x1a1/0x8d0 [ 403.982969][T28713] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 403.988696][T28713] ? find_held_lock+0x35/0x130 [ 403.993472][T28713] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 403.999264][T28713] cache_grow_begin+0x9c/0x860 [ 404.004016][T28713] ? getname_kernel+0x53/0x370 [ 404.008781][T28713] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 404.015008][T28713] kmem_cache_alloc+0x62d/0x6f0 [ 404.019857][T28713] getname_kernel+0x53/0x370 [ 404.024448][T28713] kern_path+0x20/0x40 [ 404.024468][T28713] lookup_bdev.part.0+0x7b/0x1b0 [ 404.024483][T28713] ? blkdev_open+0x290/0x290 [ 404.024498][T28713] ? bd_set_size+0xb0/0xb0 [ 404.024514][T28713] ? wait_for_completion+0x440/0x440 [ 404.024535][T28713] blkdev_get_by_path+0x81/0x130 [ 404.033516][T28713] btrfs_get_bdev_and_sb+0x38/0x300 [ 404.033536][T28713] open_fs_devices+0x68e/0xbd0 [ 404.033560][T28713] ? find_fsid+0x2e0/0x2e0 [ 404.033581][T28713] ? memmove_extent_buffer.cold+0x44/0x44 [ 404.033599][T28713] btrfs_open_devices+0x147/0x170 [ 404.033622][T28713] btrfs_mount_root+0x79a/0x1220 [ 404.033644][T28713] ? btrfs_decode_error+0x70/0x70 [ 404.033665][T28713] ? rcu_read_lock_sched_held+0x110/0x130 [ 404.093522][T28713] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 404.099772][T28713] ? vfs_parse_fs_string+0x111/0x170 [ 404.105066][T28713] ? vfs_parse_fs_string+0x111/0x170 [ 404.110367][T28713] ? rcu_read_lock_sched_held+0x110/0x130 [ 404.116103][T28713] ? kfree+0x1fa/0x230 [ 404.120180][T28713] ? vfs_parse_fs_string+0x116/0x170 [ 404.125475][T28713] ? btrfs_decode_error+0x70/0x70 [ 404.130503][T28713] legacy_get_tree+0xf2/0x200 [ 404.132916][T28736] Unknown ioctl 1075359421 [ 404.135186][T28713] vfs_get_tree+0x123/0x450 [ 404.135208][T28713] fc_mount+0x17/0xc0 [ 404.135226][T28713] vfs_kern_mount.part.0+0xd8/0xf0 [ 404.135249][T28713] vfs_kern_mount+0x40/0x60 [ 404.157690][T28713] btrfs_mount+0x2b4/0x15e2 [ 404.162198][T28713] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 404.167831][T28713] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 404.174066][T28713] ? should_fail+0x1de/0x852 [ 404.178646][T28713] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 404.184441][T28713] ? btrfs_remount+0x11f0/0x11f0 [ 404.189380][T28713] ? rcu_read_lock_sched_held+0x110/0x130 [ 404.195098][T28713] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 404.201490][T28713] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 404.207766][T28713] ? vfs_parse_fs_string+0x111/0x170 [ 404.213055][T28713] ? vfs_parse_fs_string+0x111/0x170 [ 404.218356][T28713] ? rcu_read_lock_sched_held+0x110/0x130 [ 404.224054][T28713] ? kfree+0x1fa/0x230 [ 404.228122][T28713] ? vfs_parse_fs_string+0x116/0x170 [ 404.233414][T28713] ? btrfs_remount+0x11f0/0x11f0 [ 404.238346][T28713] legacy_get_tree+0xf2/0x200 [ 404.243019][T28713] ? btrfs_remount+0x11f0/0x11f0 [ 404.247959][T28713] ? legacy_get_tree+0xf2/0x200 [ 404.252800][T28713] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 404.259039][T28713] vfs_get_tree+0x123/0x450 [ 404.263526][T28713] do_mount+0x1436/0x2c40 [ 404.267840][T28713] ? copy_mount_string+0x40/0x40 [ 404.272770][T28713] ? copy_mount_options+0x198/0x3a0 [ 404.277973][T28713] ? __sanitizer_cov_trace_pc+0x26/0x50 [ 404.283502][T28713] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 404.289723][T28713] ? copy_mount_options+0x280/0x3a0 [ 404.294912][T28713] ksys_mount+0xdb/0x150 [ 404.299136][T28713] __x64_sys_mount+0xbe/0x150 [ 404.303794][T28713] do_syscall_64+0x103/0x610 [ 404.308367][T28713] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 404.314249][T28713] RIP: 0033:0x45b81a [ 404.318130][T28713] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 404.337736][T28713] RSP: 002b:00007f082125da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 404.346150][T28713] RAX: ffffffffffffffda RBX: 00007f082125db40 RCX: 000000000045b81a [ 404.355480][T28713] RDX: 00007f082125dae0 RSI: 0000000020000000 RDI: 00007f082125db00 14:44:12 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="8c53c51dda4f0ff80a965cee2b7aff80", 0x10}], 0x1, 0x0) 14:44:12 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x0, 0xff010000}, 0x0) [ 404.363445][T28713] RBP: 0000000000000001 R08: 00007f082125db40 R09: 00007f082125dae0 [ 404.371394][T28713] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 404.379345][T28713] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:44:12 executing program 2 (fault-call:0 fault-nth:69): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 404.544248][T28748] FAULT_INJECTION: forcing a failure. [ 404.544248][T28748] name failslab, interval 1, probability 0, space 0, times 0 [ 404.556959][T28748] CPU: 1 PID: 28748 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 404.564936][T28748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 404.574989][T28748] Call Trace: [ 404.578270][T28748] dump_stack+0x172/0x1f0 [ 404.582589][T28748] should_fail.cold+0xa/0x15 [ 404.587169][T28748] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 404.592965][T28748] __should_failslab+0x121/0x190 [ 404.597888][T28748] should_failslab+0x9/0x14 [ 404.602376][T28748] kmem_cache_alloc+0x47/0x6f0 [ 404.607126][T28748] ? __lock_acquire+0x548/0x3fb0 [ 404.621710][T28748] xas_alloc+0x2df/0x3d0 [ 404.625937][T28748] xas_create+0x2cd/0x1040 [ 404.630341][T28748] xas_store+0x9a/0x19b0 [ 404.634571][T28748] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 404.640790][T28748] ? xas_start+0x166/0x560 [ 404.645189][T28748] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 404.651409][T28748] ? xas_load+0x67/0x150 [ 404.655641][T28748] __add_to_page_cache_locked+0x5be/0xe70 [ 404.661346][T28748] ? file_check_and_advance_wb_err+0x3a0/0x3a0 [ 404.667484][T28748] ? __alloc_pages_nodemask+0x61d/0x8d0 [ 404.673009][T28748] ? lock_downgrade+0x880/0x880 [ 404.677844][T28748] ? count_shadow_nodes+0x500/0x500 [ 404.683025][T28748] ? find_get_entry+0x535/0x880 [ 404.687882][T28748] add_to_page_cache_lru+0x1cb/0x760 [ 404.693152][T28748] ? add_to_page_cache_locked+0x40/0x40 [ 404.698683][T28748] ? __page_cache_alloc+0x131/0x460 [ 404.703865][T28748] pagecache_get_page+0x35c/0x740 [ 404.708878][T28748] __getblk_gfp+0x27e/0x970 [ 404.713368][T28748] ? kasan_check_write+0x14/0x20 [ 404.718292][T28748] __bread_gfp+0x2f/0x300 [ 404.722608][T28748] btrfs_read_dev_one_super+0xb6/0x2a0 [ 404.728058][T28748] btrfs_read_dev_super+0x6c/0xd0 [ 404.733066][T28748] ? btrfs_read_dev_one_super+0x2a0/0x2a0 [ 404.738778][T28748] btrfs_get_bdev_and_sb+0xff/0x300 [ 404.744062][T28748] open_fs_devices+0x68e/0xbd0 [ 404.748814][T28748] ? find_fsid+0x2e0/0x2e0 [ 404.753217][T28748] ? memmove_extent_buffer.cold+0x44/0x44 [ 404.758925][T28748] btrfs_open_devices+0x147/0x170 [ 404.763935][T28748] btrfs_mount_root+0x79a/0x1220 [ 404.768875][T28748] ? btrfs_decode_error+0x70/0x70 [ 404.773897][T28748] ? rcu_read_lock_sched_held+0x110/0x130 [ 404.779611][T28748] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 404.785834][T28748] ? vfs_parse_fs_string+0x111/0x170 [ 404.791100][T28748] ? vfs_parse_fs_string+0x111/0x170 [ 404.796365][T28748] ? rcu_read_lock_sched_held+0x110/0x130 [ 404.802065][T28748] ? kfree+0x1fa/0x230 [ 404.806118][T28748] ? vfs_parse_fs_string+0x116/0x170 [ 404.811386][T28748] ? btrfs_decode_error+0x70/0x70 [ 404.816389][T28748] legacy_get_tree+0xf2/0x200 [ 404.821052][T28748] vfs_get_tree+0x123/0x450 [ 404.825543][T28748] fc_mount+0x17/0xc0 [ 404.829512][T28748] vfs_kern_mount.part.0+0xd8/0xf0 [ 404.834612][T28748] vfs_kern_mount+0x40/0x60 [ 404.839100][T28748] btrfs_mount+0x2b4/0x15e2 [ 404.843590][T28748] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 404.849204][T28748] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 404.855428][T28748] ? should_fail+0x1de/0x852 [ 404.860003][T28748] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 404.865859][T28748] ? btrfs_remount+0x11f0/0x11f0 [ 404.870785][T28748] ? rcu_read_lock_sched_held+0x110/0x130 [ 404.876484][T28748] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 404.882720][T28748] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 404.888941][T28748] ? vfs_parse_fs_string+0x111/0x170 [ 404.894207][T28748] ? vfs_parse_fs_string+0x111/0x170 [ 404.899473][T28748] ? rcu_read_lock_sched_held+0x110/0x130 [ 404.905176][T28748] ? kfree+0x1fa/0x230 [ 404.909228][T28748] ? vfs_parse_fs_string+0x116/0x170 [ 404.914496][T28748] ? btrfs_remount+0x11f0/0x11f0 [ 404.919417][T28748] legacy_get_tree+0xf2/0x200 [ 404.924077][T28748] ? btrfs_remount+0x11f0/0x11f0 [ 404.928992][T28748] ? legacy_get_tree+0xf2/0x200 [ 404.933825][T28748] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 404.940054][T28748] vfs_get_tree+0x123/0x450 [ 404.944630][T28748] do_mount+0x1436/0x2c40 [ 404.948946][T28748] ? copy_mount_string+0x40/0x40 [ 404.953871][T28748] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 404.960093][T28748] ? copy_mount_options+0x280/0x3a0 [ 404.965455][T28748] ksys_mount+0xdb/0x150 [ 404.969683][T28748] __x64_sys_mount+0xbe/0x150 [ 404.974346][T28748] do_syscall_64+0x103/0x610 [ 404.978932][T28748] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 404.984805][T28748] RIP: 0033:0x45b81a [ 404.988686][T28748] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 405.008268][T28748] RSP: 002b:00007f082125da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 405.016670][T28748] RAX: ffffffffffffffda RBX: 00007f082125db40 RCX: 000000000045b81a [ 405.024636][T28748] RDX: 00007f082125dae0 RSI: 0000000020000000 RDI: 00007f082125db00 [ 405.032588][T28748] RBP: 0000000000000001 R08: 00007f082125db40 R09: 00007f082125dae0 14:44:13 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:44:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1, 0x0, 0xfc00}, 0x0) 14:44:13 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x2000000, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:44:13 executing program 2 (fault-call:0 fault-nth:70): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 405.040548][T28748] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 405.048499][T28748] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:44:13 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x0, 0xfffff000}, 0x0) 14:44:13 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x1b5) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x2) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x41, 0x81) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r1, 0x800443d2, &(0x7f0000000280)={0x4, &(0x7f0000000200)=[{}, {}, {}, {}]}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x107002, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x2, 0x440) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f00000000c0)=[@in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e24, @multicast2}, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e24, @remote}, @in6={0xa, 0x4e24, 0x6, @mcast2, 0x4}, @in={0x2, 0x4e23, @local}, @in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e23, @multicast2}, @in={0x2, 0x4e21, @local}], 0x9c) [ 405.275441][T28765] FAULT_INJECTION: forcing a failure. [ 405.275441][T28765] name failslab, interval 1, probability 0, space 0, times 0 [ 405.292411][T28765] CPU: 1 PID: 28765 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 405.300409][T28765] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 405.310455][T28765] Call Trace: [ 405.313741][T28765] dump_stack+0x172/0x1f0 [ 405.318065][T28765] should_fail.cold+0xa/0x15 [ 405.322645][T28765] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 405.328860][T28765] ? find_held_lock+0x35/0x130 [ 405.333612][T28765] ? find_get_entry+0x50e/0x880 [ 405.338454][T28765] __should_failslab+0x121/0x190 [ 405.343379][T28765] should_failslab+0x9/0x14 [ 405.347868][T28765] kmem_cache_alloc+0x47/0x6f0 [ 405.352622][T28765] ? ___might_sleep+0x163/0x280 [ 405.357461][T28765] ? mempool_alloc+0x380/0x380 [ 405.362216][T28765] mempool_alloc_slab+0x47/0x60 [ 405.367056][T28765] mempool_alloc+0x16b/0x380 [ 405.371640][T28765] ? mempool_destroy+0x40/0x40 [ 405.376398][T28765] ? mark_held_locks+0xa4/0xf0 [ 405.381145][T28765] ? lock_downgrade+0x880/0x880 [ 405.385983][T28765] ? __find_get_block+0x9ba/0xcf0 [ 405.391017][T28765] ? __getblk_gfp+0x1b1/0x970 [ 405.395695][T28765] ? __find_get_block+0x9ba/0xcf0 [ 405.400707][T28765] ? lockdep_hardirqs_on+0x418/0x5d0 [ 405.406002][T28765] bio_alloc_bioset+0x3bf/0x680 [ 405.410837][T28765] ? __find_get_block+0x317/0xcf0 [ 405.415852][T28765] ? bvec_alloc+0x2f0/0x2f0 [ 405.420354][T28765] submit_bh_wbc+0x133/0x7f0 [ 405.424948][T28765] __bread_gfp+0x13d/0x300 [ 405.429353][T28765] btrfs_read_dev_one_super+0xb6/0x2a0 [ 405.434814][T28765] btrfs_read_dev_super+0x6c/0xd0 [ 405.439827][T28765] ? btrfs_read_dev_one_super+0x2a0/0x2a0 [ 405.445553][T28765] btrfs_get_bdev_and_sb+0xff/0x300 [ 405.450746][T28765] open_fs_devices+0x68e/0xbd0 [ 405.455510][T28765] ? find_fsid+0x2e0/0x2e0 [ 405.459919][T28765] ? memmove_extent_buffer.cold+0x44/0x44 [ 405.465626][T28765] btrfs_open_devices+0x147/0x170 [ 405.470641][T28765] btrfs_mount_root+0x79a/0x1220 [ 405.475576][T28765] ? btrfs_decode_error+0x70/0x70 [ 405.480592][T28765] ? rcu_read_lock_sched_held+0x110/0x130 [ 405.486296][T28765] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 405.492522][T28765] ? vfs_parse_fs_string+0x111/0x170 [ 405.497792][T28765] ? vfs_parse_fs_string+0x111/0x170 [ 405.503079][T28765] ? rcu_read_lock_sched_held+0x110/0x130 [ 405.508796][T28765] ? kfree+0x1fa/0x230 [ 405.512851][T28765] ? vfs_parse_fs_string+0x116/0x170 [ 405.518125][T28765] ? btrfs_decode_error+0x70/0x70 [ 405.523133][T28765] legacy_get_tree+0xf2/0x200 [ 405.527801][T28765] vfs_get_tree+0x123/0x450 [ 405.532292][T28765] fc_mount+0x17/0xc0 [ 405.536274][T28765] vfs_kern_mount.part.0+0xd8/0xf0 [ 405.541376][T28765] vfs_kern_mount+0x40/0x60 [ 405.545871][T28765] btrfs_mount+0x2b4/0x15e2 [ 405.550361][T28765] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 405.555987][T28765] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 405.562215][T28765] ? should_fail+0x1de/0x852 [ 405.566823][T28765] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 405.572620][T28765] ? btrfs_remount+0x11f0/0x11f0 [ 405.577551][T28765] ? rcu_read_lock_sched_held+0x110/0x130 [ 405.583255][T28765] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 405.589497][T28765] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 405.595749][T28765] ? vfs_parse_fs_string+0x111/0x170 [ 405.601018][T28765] ? vfs_parse_fs_string+0x111/0x170 [ 405.606288][T28765] ? rcu_read_lock_sched_held+0x110/0x130 [ 405.612004][T28765] ? kfree+0x1fa/0x230 [ 405.616061][T28765] ? vfs_parse_fs_string+0x116/0x170 [ 405.621336][T28765] ? btrfs_remount+0x11f0/0x11f0 [ 405.626363][T28765] legacy_get_tree+0xf2/0x200 [ 405.631025][T28765] ? btrfs_remount+0x11f0/0x11f0 [ 405.635946][T28765] ? legacy_get_tree+0xf2/0x200 [ 405.640879][T28765] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 405.647107][T28765] vfs_get_tree+0x123/0x450 [ 405.651597][T28765] do_mount+0x1436/0x2c40 [ 405.655920][T28765] ? copy_mount_string+0x40/0x40 [ 405.660851][T28765] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 405.667072][T28765] ? copy_mount_options+0x280/0x3a0 [ 405.672259][T28765] ksys_mount+0xdb/0x150 [ 405.676495][T28765] __x64_sys_mount+0xbe/0x150 [ 405.681165][T28765] do_syscall_64+0x103/0x610 [ 405.685745][T28765] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 405.691620][T28765] RIP: 0033:0x45b81a [ 405.695508][T28765] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 405.715094][T28765] RSP: 002b:00007f082125da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 14:44:13 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x3000000, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) [ 405.723489][T28765] RAX: ffffffffffffffda RBX: 00007f082125db40 RCX: 000000000045b81a [ 405.731443][T28765] RDX: 00007f082125dae0 RSI: 0000000020000000 RDI: 00007f082125db00 [ 405.739404][T28765] RBP: 0000000000000001 R08: 00007f082125db40 R09: 00007f082125dae0 [ 405.747365][T28765] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 405.755321][T28765] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 14:44:13 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:44:13 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) 14:44:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1, 0x0, 0xfe80}, 0x0) 14:44:14 executing program 2 (fault-call:0 fault-nth:71): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:44:14 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x4000000, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018708546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1}, 0x0) 14:44:14 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$sock_int(r0, 0x1, 0x3, &(0x7f0000000040)=0x8000, 0xfe85) 14:44:14 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x0, 0xffffff9e}, 0x0) [ 406.175313][T28804] FAULT_INJECTION: forcing a failure. [ 406.175313][T28804] name failslab, interval 1, probability 0, space 0, times 0 [ 406.220696][T28804] CPU: 1 PID: 28804 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 406.228727][T28804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 406.238787][T28804] Call Trace: [ 406.242100][T28804] dump_stack+0x172/0x1f0 [ 406.246461][T28804] should_fail.cold+0xa/0x15 [ 406.251064][T28804] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 406.256882][T28804] ? ___might_sleep+0x163/0x280 [ 406.261759][T28804] __should_failslab+0x121/0x190 [ 406.266703][T28804] should_failslab+0x9/0x14 14:44:14 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:44:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 406.271216][T28804] __kmalloc+0x2dc/0x740 [ 406.275478][T28804] ? bio_alloc_bioset+0x418/0x680 [ 406.280518][T28804] bio_alloc_bioset+0x418/0x680 [ 406.285379][T28804] ? btrfs_alloc_device+0xb4/0x720 [ 406.290491][T28804] ? bvec_alloc+0x2f0/0x2f0 [ 406.295007][T28804] ? mark_held_locks+0xa4/0xf0 [ 406.299788][T28804] btrfs_alloc_device+0xd3/0x720 [ 406.304732][T28804] ? trace_hardirqs_on+0x67/0x230 [ 406.309762][T28804] ? btrfs_find_device_by_devspec+0x5b0/0x5b0 [ 406.315853][T28804] close_fs_devices.part.0+0x1af/0x790 [ 406.321324][T28804] btrfs_close_devices+0xa0/0x200 [ 406.326366][T28804] btrfs_mount_root+0xf0c/0x1220 [ 406.331321][T28804] ? btrfs_decode_error+0x70/0x70 [ 406.336355][T28804] ? rcu_read_lock_sched_held+0x110/0x130 [ 406.342076][T28804] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 406.342094][T28804] ? vfs_parse_fs_string+0x111/0x170 [ 406.342111][T28804] ? vfs_parse_fs_string+0x111/0x170 [ 406.353615][T28804] ? rcu_read_lock_sched_held+0x110/0x130 [ 406.353634][T28804] ? kfree+0x1fa/0x230 [ 406.353651][T28804] ? vfs_parse_fs_string+0x116/0x170 [ 406.353669][T28804] ? btrfs_decode_error+0x70/0x70 [ 406.353680][T28804] legacy_get_tree+0xf2/0x200 [ 406.353697][T28804] vfs_get_tree+0x123/0x450 [ 406.353718][T28804] fc_mount+0x17/0xc0 [ 406.393270][T28804] vfs_kern_mount.part.0+0xd8/0xf0 [ 406.398388][T28804] vfs_kern_mount+0x40/0x60 [ 406.402897][T28804] btrfs_mount+0x2b4/0x15e2 [ 406.407424][T28804] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 406.413065][T28804] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 406.419316][T28804] ? should_fail+0x1de/0x852 [ 406.423932][T28804] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 406.429755][T28804] ? btrfs_remount+0x11f0/0x11f0 [ 406.434706][T28804] ? rcu_read_lock_sched_held+0x110/0x130 [ 406.440437][T28804] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 406.446685][T28804] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 406.452943][T28804] ? vfs_parse_fs_string+0x111/0x170 [ 406.458238][T28804] ? vfs_parse_fs_string+0x111/0x170 [ 406.463539][T28804] ? rcu_read_lock_sched_held+0x110/0x130 [ 406.469276][T28804] ? kfree+0x1fa/0x230 [ 406.473361][T28804] ? vfs_parse_fs_string+0x116/0x170 [ 406.478663][T28804] ? btrfs_remount+0x11f0/0x11f0 [ 406.483608][T28804] legacy_get_tree+0xf2/0x200 [ 406.488292][T28804] ? btrfs_remount+0x11f0/0x11f0 [ 406.493230][T28804] ? legacy_get_tree+0xf2/0x200 [ 406.498082][T28804] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 406.504321][T28804] vfs_get_tree+0x123/0x450 [ 406.508819][T28804] do_mount+0x1436/0x2c40 [ 406.513150][T28804] ? copy_mount_string+0x40/0x40 [ 406.518067][T28804] ? _copy_from_user+0xdd/0x150 [ 406.522921][T28804] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 406.529152][T28804] ? copy_mount_options+0x280/0x3a0 [ 406.534337][T28804] ksys_mount+0xdb/0x150 [ 406.538570][T28804] __x64_sys_mount+0xbe/0x150 [ 406.543251][T28804] do_syscall_64+0x103/0x610 [ 406.547840][T28804] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 406.553711][T28804] RIP: 0033:0x45b81a [ 406.557595][T28804] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 406.577189][T28804] RSP: 002b:00007f082125da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 406.585582][T28804] RAX: ffffffffffffffda RBX: 00007f082125db40 RCX: 000000000045b81a [ 406.593634][T28804] RDX: 00007f082125dae0 RSI: 0000000020000000 RDI: 00007f082125db00 [ 406.601585][T28804] RBP: 0000000000000001 R08: 00007f082125db40 R09: 00007f082125dae0 [ 406.609550][T28804] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 14:44:14 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) [ 406.617521][T28804] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 [ 406.633378][T28804] ------------[ cut here ]------------ [ 406.638869][T28804] kernel BUG at fs/btrfs/volumes.c:1276! [ 406.655014][T28804] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 406.661106][T28804] CPU: 1 PID: 28804 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 406.669057][T28804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 406.679102][T28804] RIP: 0010:close_fs_devices.part.0+0x5bf/0x790 [ 406.685329][T28804] Code: 3c 03 0f 8e 44 01 00 00 48 8b 45 c0 c7 80 30 01 00 00 00 00 00 00 48 83 c4 48 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 21 ad c6 fe <0f> 0b e8 1a ad c6 fe 0f 0b e8 13 ad c6 fe 0f 0b e9 16 ff ff ff e8 [ 406.704915][T28804] RSP: 0018:ffff88805564f770 EFLAGS: 00010246 [ 406.710957][T28804] RAX: 0000000000040000 RBX: ffff88808f2e80c0 RCX: ffffc9000a22d000 [ 406.718912][T28804] RDX: 0000000000040000 RSI: ffffffff82a9df8f RDI: 0000000000000007 [ 406.726859][T28804] RBP: ffff88805564f7e0 R08: ffff88805d93e600 R09: ffff88805d93eec8 [ 406.734816][T28804] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 406.742770][T28804] R13: dffffc0000000000 R14: ffff8880973ad6c0 R15: fffffffffffffff4 [ 406.750730][T28804] FS: 00007f082125e700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 406.759636][T28804] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 406.766216][T28804] CR2: 0000000000940004 CR3: 000000005304b000 CR4: 00000000001406e0 [ 406.774168][T28804] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 406.782133][T28804] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 406.790081][T28804] Call Trace: [ 406.793367][T28804] btrfs_close_devices+0xa0/0x200 [ 406.798389][T28804] btrfs_mount_root+0xf0c/0x1220 [ 406.803308][T28804] ? btrfs_decode_error+0x70/0x70 [ 406.808313][T28804] ? rcu_read_lock_sched_held+0x110/0x130 [ 406.814024][T28804] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 406.820252][T28804] ? vfs_parse_fs_string+0x111/0x170 [ 406.825514][T28804] ? vfs_parse_fs_string+0x111/0x170 [ 406.830780][T28804] ? rcu_read_lock_sched_held+0x110/0x130 [ 406.836479][T28804] ? kfree+0x1fa/0x230 [ 406.840526][T28804] ? vfs_parse_fs_string+0x116/0x170 [ 406.845791][T28804] ? btrfs_decode_error+0x70/0x70 [ 406.850793][T28804] legacy_get_tree+0xf2/0x200 [ 406.855451][T28804] vfs_get_tree+0x123/0x450 [ 406.859950][T28804] fc_mount+0x17/0xc0 [ 406.863915][T28804] vfs_kern_mount.part.0+0xd8/0xf0 [ 406.869020][T28804] vfs_kern_mount+0x40/0x60 [ 406.873532][T28804] btrfs_mount+0x2b4/0x15e2 [ 406.878037][T28804] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 406.883660][T28804] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 406.889884][T28804] ? should_fail+0x1de/0x852 [ 406.894454][T28804] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 406.900244][T28804] ? btrfs_remount+0x11f0/0x11f0 [ 406.905160][T28804] ? rcu_read_lock_sched_held+0x110/0x130 [ 406.910858][T28804] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 406.917102][T28804] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 406.923342][T28804] ? vfs_parse_fs_string+0x111/0x170 [ 406.928614][T28804] ? vfs_parse_fs_string+0x111/0x170 [ 406.933897][T28804] ? rcu_read_lock_sched_held+0x110/0x130 [ 406.939605][T28804] ? kfree+0x1fa/0x230 [ 406.943652][T28804] ? vfs_parse_fs_string+0x116/0x170 [ 406.948935][T28804] ? btrfs_remount+0x11f0/0x11f0 [ 406.953854][T28804] legacy_get_tree+0xf2/0x200 [ 406.958515][T28804] ? btrfs_remount+0x11f0/0x11f0 [ 406.963430][T28804] ? legacy_get_tree+0xf2/0x200 [ 406.968257][T28804] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 406.974478][T28804] vfs_get_tree+0x123/0x450 [ 406.978958][T28804] do_mount+0x1436/0x2c40 [ 406.983270][T28804] ? copy_mount_string+0x40/0x40 [ 406.988202][T28804] ? _copy_from_user+0xdd/0x150 [ 406.993063][T28804] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 406.999291][T28804] ? copy_mount_options+0x280/0x3a0 [ 407.004466][T28804] ksys_mount+0xdb/0x150 [ 407.008700][T28804] __x64_sys_mount+0xbe/0x150 [ 407.013373][T28804] do_syscall_64+0x103/0x610 [ 407.017957][T28804] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 407.023836][T28804] RIP: 0033:0x45b81a [ 407.027715][T28804] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 407.047298][T28804] RSP: 002b:00007f082125da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 407.055686][T28804] RAX: ffffffffffffffda RBX: 00007f082125db40 RCX: 000000000045b81a [ 407.063636][T28804] RDX: 00007f082125dae0 RSI: 0000000020000000 RDI: 00007f082125db00 14:44:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000340)=""/221, 0xdd}], 0x1) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1, 0x0, 0xfec0}, 0x0) [ 407.071583][T28804] RBP: 0000000000000001 R08: 00007f082125db40 R09: 00007f082125dae0 [ 407.079531][T28804] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 407.087479][T28804] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 [ 407.095429][T28804] Modules linked in: [ 407.102654][T28804] ---[ end trace 50fa87388d70dee4 ]--- [ 407.104453][ T3876] kobject: 'loop0' (0000000081c9eec4): kobject_uevent_env [ 407.108427][T28804] RIP: 0010:close_fs_devices.part.0+0x5bf/0x790 [ 407.131934][T28804] Code: 3c 03 0f 8e 44 01 00 00 48 8b 45 c0 c7 80 30 01 00 00 00 00 00 00 48 83 c4 48 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 21 ad c6 fe <0f> 0b e8 1a ad c6 fe 0f 0b e8 13 ad c6 fe 0f 0b e9 16 ff ff ff e8 [ 407.146091][ T3876] kobject: 'loop0' (0000000081c9eec4): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 407.159109][T28804] RSP: 0018:ffff88805564f770 EFLAGS: 00010246 [ 407.168426][T28804] RAX: 0000000000040000 RBX: ffff88808f2e80c0 RCX: ffffc9000a22d000 [ 407.176868][T28804] RDX: 0000000000040000 RSI: ffffffff82a9df8f RDI: 0000000000000007 [ 407.181321][ T3876] kobject: 'loop2' (0000000007144912): kobject_uevent_env [ 407.195752][T28804] RBP: ffff88805564f7e0 R08: ffff88805d93e600 R09: ffff88805d93eec8 [ 407.205483][ T3876] kobject: 'loop2' (0000000007144912): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 407.213073][T28804] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 14:44:15 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000140081ae00002c000500018701546fabcae598efca4f2e3315fcf773403f6a7be54f7e0592616652e285af71583c7d06a6580e8837", 0x39}], 0x1, 0x0, 0x0, 0x40030000000000}, 0x0) [ 407.231160][T28804] R13: dffffc0000000000 R14: ffff8880973ad6c0 R15: fffffffffffffff4 [ 407.233266][ T3876] kobject: 'loop5' (000000005287b9d3): kobject_uevent_env [ 407.244136][T28804] FS: 00007f082125e700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 407.255711][T28804] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 407.262559][T28804] CR2: 0000000000625208 CR3: 000000005304b000 CR4: 00000000001406e0 [ 407.270734][T28804] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 407.274542][ T3876] kobject: 'loop5' (000000005287b9d3): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 407.292569][T28804] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 407.294665][ T3876] kobject: 'loop1' (0000000030d7bd7a): kobject_uevent_env [ 407.303653][T28804] Kernel panic - not syncing: Fatal exception [ 407.310234][ T3876] kobject: 'loop1' (0000000030d7bd7a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 407.315066][T28804] Kernel Offset: disabled [ 407.329498][T28804] Rebooting in 86400 seconds..