b0, 0x0, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x20008001}, 0x48044) [ 152.209528][ T2884] new mount options do not match the existing superblock, will be ignored [ 152.247990][ T2893] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 07:10:40 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x16, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 152.273190][ T2893] incfs: Options parsing error. -22 [ 152.278130][ T2899] new mount options do not match the existing superblock, will be ignored [ 152.287200][ T2901] FAULT_INJECTION: forcing a failure. [ 152.287200][ T2901] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 152.340979][ T2901] CPU: 0 PID: 2901 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 152.351139][ T2901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 152.361182][ T2901] Call Trace: [ 152.364462][ T2901] dump_stack+0x1d8/0x24e [ 152.368770][ T2901] ? devkmsg_release+0x11c/0x11c [ 152.373684][ T2901] ? show_regs_print_info+0x12/0x12 [ 152.378858][ T2901] ? __kasan_kmalloc+0x1a3/0x1e0 [ 152.383765][ T2901] ? preempt_count_add+0x66/0x130 [ 152.388759][ T2901] ? prep_new_page+0x122/0x370 [ 152.393505][ T2901] should_fail+0x6f6/0x860 [ 152.397892][ T2901] ? setup_fault_attr+0x3d0/0x3d0 [ 152.402887][ T2901] __alloc_pages_nodemask+0x1c4/0x880 [ 152.408230][ T2901] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 152.413744][ T2901] ? kvmalloc_node+0x7e/0xf0 [ 152.418304][ T2901] push_pipe+0x3c5/0x7e0 [ 152.422515][ T2901] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 152.428116][ T2901] ? stack_trace_snprint+0x150/0x150 [ 152.433472][ T2901] ? iov_iter_get_pages+0xec0/0xec0 [ 152.438642][ T2901] default_file_splice_read+0x208/0x970 [ 152.444154][ T2901] ? splice_direct_to_actor+0x999/0xb30 [ 152.449666][ T2901] ? do_splice_direct+0x28b/0x3e0 [ 152.454658][ T2901] ? do_syscall_64+0xcb/0x1e0 [ 152.459303][ T2901] ? __ia32_sys_tee+0xa0/0xa0 [ 152.463953][ T2901] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 152.470683][ T2901] ? selinux_file_permission+0x2d0/0x520 [ 152.476299][ T2901] ? security_file_permission+0x1e9/0x300 [ 152.482006][ T2901] ? __ia32_sys_tee+0xa0/0xa0 [ 152.486651][ T2901] splice_direct_to_actor+0x3f1/0xb30 [ 152.491994][ T2901] ? do_splice_direct+0x3e0/0x3e0 [ 152.496986][ T2901] ? pipe_to_sendpage+0x300/0x300 [ 152.501982][ T2901] ? security_file_permission+0x128/0x300 [ 152.507672][ T2901] do_splice_direct+0x28b/0x3e0 [ 152.512496][ T2901] ? splice_direct_to_actor+0xb30/0xb30 [ 152.518013][ T2901] ? security_file_permission+0x128/0x300 [ 152.523702][ T2901] do_sendfile+0x8e4/0x1140 [ 152.528178][ T2901] ? compat_writev+0x3c0/0x3c0 [ 152.532912][ T2901] ? vfs_write+0x422/0x4e0 [ 152.537297][ T2901] ? check_preemption_disabled+0x154/0x330 [ 152.543069][ T2901] __x64_sys_sendfile64+0x1c4/0x220 [ 152.548235][ T2901] ? __ia32_sys_sendfile+0x240/0x240 [ 152.553490][ T2901] do_syscall_64+0xcb/0x1e0 [ 152.557964][ T2901] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 152.563824][ T2901] RIP: 0033:0x466459 [ 152.567694][ T2901] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 07:10:41 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 152.587267][ T2901] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 152.595645][ T2901] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 152.603586][ T2901] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 152.611527][ T2901] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 152.619468][ T2901] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000001 [ 152.627407][ T2901] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 07:10:41 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x17, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:41 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = getpid() perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x6, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0xffffffff80000000, 0x1000, 0x1, 0xfffffffffffffff7, 0x4}, r0, 0x2, 0xffffffffffffffff, 0x2) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000140)={'team0\x00'}) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f0000000380)='overlay\x00', 0x20000, &(0x7f00000003c0)=ANY=[@ANYBLOB='nfs_export=off,xino=auto,lowerdir=./file0/file0,xino=on,lowerdir=./bus,index=on,workdir=./bus,upperdir=./file0,xino=auto,euid=', @ANYRESDEC=r3, @ANYBLOB="2c6673635c6e746578743d73748166665f752c66756e63a74250524d68522300"/41]) preadv(r1, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}, {&(0x7f0000000000)=""/65, 0x41}], 0x2, 0x23, 0x0) openat(r1, &(0x7f00000000c0)='./file0\x00', 0x2000, 0x8) chdir(&(0x7f0000000480)='./file0\x00') r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000240)='cpuset.cpus\x00', 0x2, 0x0) writev(r5, &(0x7f0000000040)=[{&(0x7f0000000100)='0', 0x94}, {&(0x7f00000001c0)='\x00', 0x1}], 0x2) 07:10:41 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x18, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 152.705035][ T2921] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 07:10:41 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x19, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 152.757508][ T2921] incfs: Options parsing error. -22 [ 152.805469][ T2931] new mount options do not match the existing superblock, will be ignored 07:10:41 executing program 4 (fault-call:2 fault-nth:7): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) [ 152.967215][ T2951] FAULT_INJECTION: forcing a failure. [ 152.967215][ T2951] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 152.984013][ T2951] CPU: 1 PID: 2951 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 152.994280][ T2951] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 153.004330][ T2951] Call Trace: [ 153.007620][ T2951] dump_stack+0x1d8/0x24e [ 153.011931][ T2951] ? devkmsg_release+0x11c/0x11c [ 153.016936][ T2951] ? show_regs_print_info+0x12/0x12 [ 153.022104][ T2951] ? __kasan_kmalloc+0x1a3/0x1e0 [ 153.027040][ T2951] ? preempt_count_add+0x66/0x130 [ 153.032035][ T2951] ? prep_new_page+0x122/0x370 [ 153.036778][ T2951] should_fail+0x6f6/0x860 [ 153.041199][ T2951] ? setup_fault_attr+0x3d0/0x3d0 [ 153.046214][ T2951] __alloc_pages_nodemask+0x1c4/0x880 [ 153.051579][ T2951] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 153.057115][ T2951] ? kvmalloc_node+0x7e/0xf0 [ 153.061695][ T2951] ? kvmalloc_node+0x7e/0xf0 [ 153.066286][ T2951] push_pipe+0x3c5/0x7e0 [ 153.070519][ T2951] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 153.076135][ T2951] ? stack_trace_snprint+0x150/0x150 [ 153.081398][ T2951] ? iov_iter_get_pages+0xec0/0xec0 [ 153.086573][ T2951] default_file_splice_read+0x208/0x970 [ 153.092090][ T2951] ? splice_direct_to_actor+0x999/0xb30 [ 153.097602][ T2951] ? do_splice_direct+0x28b/0x3e0 [ 153.102601][ T2951] ? do_syscall_64+0xcb/0x1e0 [ 153.107246][ T2951] ? __ia32_sys_tee+0xa0/0xa0 [ 153.111899][ T2951] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 153.118629][ T2951] ? selinux_file_permission+0x2d0/0x520 [ 153.124405][ T2951] ? security_file_permission+0x1e9/0x300 [ 153.130092][ T2951] ? __ia32_sys_tee+0xa0/0xa0 [ 153.134755][ T2951] splice_direct_to_actor+0x3f1/0xb30 [ 153.140101][ T2951] ? do_splice_direct+0x3e0/0x3e0 [ 153.145093][ T2951] ? pipe_to_sendpage+0x300/0x300 [ 153.150086][ T2951] ? security_file_permission+0x128/0x300 [ 153.155773][ T2951] do_splice_direct+0x28b/0x3e0 [ 153.160598][ T2951] ? splice_direct_to_actor+0xb30/0xb30 [ 153.166113][ T2951] ? security_file_permission+0x128/0x300 [ 153.171817][ T2951] do_sendfile+0x8e4/0x1140 [ 153.176291][ T2951] ? compat_writev+0x3c0/0x3c0 [ 153.181023][ T2951] ? vfs_write+0x422/0x4e0 [ 153.185410][ T2951] ? check_preemption_disabled+0x154/0x330 [ 153.191183][ T2951] __x64_sys_sendfile64+0x1c4/0x220 [ 153.196350][ T2951] ? __ia32_sys_sendfile+0x240/0x240 [ 153.201617][ T2951] do_syscall_64+0xcb/0x1e0 [ 153.206089][ T2951] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 153.211951][ T2951] RIP: 0033:0x466459 07:10:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:41 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:10:41 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:41 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = getpid() perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x6, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0xffffffff80000000, 0x1000, 0x1, 0xfffffffffffffff7, 0x4}, r0, 0x2, 0xffffffffffffffff, 0x2) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000140)={'team0\x00'}) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f0000000380)='overlay\x00', 0x20000, &(0x7f00000003c0)=ANY=[@ANYBLOB='nfs_export=off,xino=auto,lowerdir=./file0/file0,xino=on,lowerdir=./bus,index=on,workdir=./bus,upperdir=./file0,xino=auto,euid=', @ANYRESDEC=r3, @ANYBLOB="2c6673635c6e746578743d73748166665f752c66756e63a74250524d68522300"/41]) preadv(r1, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}, {&(0x7f0000000000)=""/65, 0x41}], 0x2, 0x23, 0x0) openat(r1, &(0x7f00000000c0)='./file0\x00', 0x2000, 0x8) chdir(&(0x7f0000000480)='./file0\x00') r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000240)='cpuset.cpus\x00', 0x2, 0x0) writev(r5, &(0x7f0000000040)=[{&(0x7f0000000100)='0', 0x94}, {&(0x7f00000001c0)='\x00', 0x1}], 0x2) [ 153.215818][ T2951] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 153.235477][ T2951] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 153.243854][ T2951] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 153.251797][ T2951] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 153.259739][ T2951] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 07:10:41 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1b, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:41 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) write(r1, &(0x7f0000001240)="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", 0xef1) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800003, 0x40010, r1, 0xc00cf000) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b6030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb456431ca711fcd0cdfa146ec561750379585e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b318e2ec0e0700897a74a0091ff110026e6d2ef831ab7ea0c34f17e3ad6ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e060e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd38608b32800800000000000000000334d83239dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb698148e97b5f2c444d5021f7117a6ea0182babc18cae2ed4f4390af9a9ceafd07ed00b0000002cab154ad029a109000000278087007fc61c3c975d5aec84222fff0d7216fdb0d3a0ec4be3e563112f4b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a2a71bc85018e5ff2c910496f18afc9ffc2cc788bee1b47683db01a469398685211bbae3e2ed0a5670e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738992533ac2a9f5a699593f084419cae0b4183fb01c73f979ca9857399537f5dc2acb72c7eae993fc9eb22d130665b6341da114f08cd0509d380578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a08707671315c302fae29187d4f5c06a960fd37c10223fdae7ed0400000000d3add8eebc8619d73415eeadcda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398c88607a67e18c2977aab37d9ac4cfc1c7b4000000000000fa47742f6c5b9c4b11e7d7262a1457c39495c826b956ba859ac8e3c177b91bd7d5ca1664fe2f3ced8468911806040000005e21644db60c2499d5d16d7d915836ab26c169482008ef069dc42749289f854797f2f900c2a12d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a9e90d767671414c99d4894ee7f8249dc1e3428d2129369ee1b85afa1a5be5f6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1038debd64cbe359454a3f2239cfe35f81b7aded448859968ff0e90500d0b07c0dd00490f167e6d5c1109681739dc33f75b2042b8ff8c21ad702cca54728acad5b39eef213d1ca296d2a27798c8ce2ad20785f653b621491dc6aaee0d40973109644fb99743de0f5fcf856533c1d987591ec3db58a7bb3042ec3f771f7abd19a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae84aa09ecc4e7bfd2b276a46c491ce3e66bcbfa8cce7b893e1590bab105b0cb578af7dc7d5e87d48d376444d8de02f47c61e8e84ff828de453f34c2b08660b080efc7eae676e1fb4d5865c0ca177a4c7fbb4e62b445c00f576b0b5cc7f819abd0f885cc4806f46516f698ffe0007d68a671fc4d4d7ffb966fcf1e54f5a2d38708194cd6f496e5dee734fe7da3770845cf442d488afdc0e13604271d76d273713b0562ac1e0d98ba3aed998c488f7e4ea80a82627ae1f204edcfa20de20fe06a36c08f83fc5efbe42535e50368dba0421a01677756819fe76bf588c1011ab40453e189d9b7677e6f4836cdf5a6236547a25136099d19165a1be4f3563626e485f9907620067ee13a3f3deb2e9f2807fda110aa069c1750b5f9532f"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000100)="b9ff03006044238cb89e14f008001bffffff00004000632f77fbac141431e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0xfe, 0x60000000}, 0x2c) 07:10:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:41 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1c, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 153.267681][ T2951] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000001 [ 153.275620][ T2951] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 [ 153.298004][ T2959] incfs: Options parsing error. -22 07:10:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:41 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = getpid() perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x6, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0xffffffff80000000, 0x1000, 0x1, 0xfffffffffffffff7, 0x4}, r0, 0x2, 0xffffffffffffffff, 0x2) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000140)={'team0\x00'}) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f0000000380)='overlay\x00', 0x20000, &(0x7f00000003c0)=ANY=[@ANYBLOB='nfs_export=off,xino=auto,lowerdir=./file0/file0,xino=on,lowerdir=./bus,index=on,workdir=./bus,upperdir=./file0,xino=auto,euid=', @ANYRESDEC=r3, @ANYBLOB="2c6673635c6e746578743d73748166665f752c66756e63a74250524d68522300"/41]) preadv(r1, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}, {&(0x7f0000000000)=""/65, 0x41}], 0x2, 0x23, 0x0) openat(r1, &(0x7f00000000c0)='./file0\x00', 0x2000, 0x8) chdir(&(0x7f0000000480)='./file0\x00') r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000000240)='cpuset.cpus\x00', 0x2, 0x0) [ 153.357540][ T2967] new mount options do not match the existing superblock, will be ignored 07:10:41 executing program 4 (fault-call:2 fault-nth:8): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:10:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:41 executing program 1: ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0xa2, 0x0, 0x0, 0x0, 0x0, 0x205, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0185879, &(0x7f0000000080)) 07:10:41 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1d, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:41 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:10:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:42 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:42 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1e, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 153.443502][ T2956] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 153.473941][ T2998] new mount options do not match the existing superblock, will be ignored 07:10:42 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = getpid() perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x6, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0xffffffff80000000, 0x1000, 0x1, 0xfffffffffffffff7, 0x4}, r0, 0x2, 0xffffffffffffffff, 0x2) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000140)={'team0\x00'}) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f0000000380)='overlay\x00', 0x20000, &(0x7f00000003c0)=ANY=[@ANYBLOB='nfs_export=off,xino=auto,lowerdir=./file0/file0,xino=on,lowerdir=./bus,index=on,workdir=./bus,upperdir=./file0,xino=auto,euid=', @ANYRESDEC=r3, @ANYBLOB="2c6673635c6e746578743d73748166665f752c66756e63a74250524d68522300"/41]) preadv(r1, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}, {&(0x7f0000000000)=""/65, 0x41}], 0x2, 0x23, 0x0) openat(r1, &(0x7f00000000c0)='./file0\x00', 0x2000, 0x8) chdir(&(0x7f0000000480)='./file0\x00') r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000000240)='cpuset.cpus\x00', 0x2, 0x0) 07:10:42 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:42 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x21, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:42 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x50000, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@aname={'aname', 0x3d, '9p\x00'}}, {@cache_mmap='cache=mmap'}, {@loose='loose'}, {@cache_none='cache=none'}, {@version_L='version=9p2000.L'}, {@access_client='access=client'}, {@access_client='access=client'}, {@cache_none='cache=none'}, {@cachetag={'cachetag', 0x3d, '9p\x00'}}], [{@smackfsfloor={'smackfsfloor', 0x3d, '9p\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x66, 0x30, 0x34, 0x39, 0x35, 0x32, 0x65], 0x2d, [0x38, 0x65, 0x66, 0x35], 0x2d, [0x30, 0x38, 0x66, 0x34], 0x2d, [0x61, 0x65, 0x62, 0x61], 0x2d, [0x36, 0x33, 0x66, 0x38, 0x39, 0x33, 0x35, 0x50]}}}, {@uid_gt={'uid>', 0xee01}}, {@fsmagic={'fsmagic', 0x3d, 0x7f}}, {@audit='audit'}]}}) write$P9_RVERSION(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff097b000008003950323030302e4c"], 0x15) r3 = dup(r1) write$FUSE_BMAP(r3, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137) r4 = socket$nl_route(0x10, 0x3, 0x0) signalfd4(r4, 0x0, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=@newlink={0x68, 0x10, 0x401, 0xfffffffe, 0x0, {}, [@IFLA_LINKINFO={0x40, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x8, 0x3, @initdev={0xac, 0x1e, 0x0, 0x0}}, @IFLA_IPTUN_6RD_PREFIX={0x14, 0xb, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @IFLA_IPTUN_6RD_PREFIX={0x14, 0xb, @private1={0xfc, 0x1, [], 0x1}}]}}}, @IFLA_MASTER={0x8}]}, 0x68}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000440)='./file1\x00', &(0x7f0000000480)='9p\x00', 0x20404, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@privport='privport'}, {@version_u='version=9p2000.u'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@fsname={'fsname', 0x3d, 'version=9p2000.L'}}, {@dont_appraise='dont_appraise'}]}}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d664aaa9e53eea2943a3ac91c2dcb9c3a6e3bcfc7d34c023297dab23d308bdb505b656e047a7304e4816ea8454eb711e7f2db4d9f4019b883e06749587810f6f738b6eeb7c9acba5cef00"/112, @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESDEC=r1, @ANYBLOB=',aname=?']) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) mknodat$null(r5, &(0x7f00000001c0)='./file1\x00', 0x0, 0x103) [ 153.532723][ T3014] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 153.544788][ T3013] FAULT_INJECTION: forcing a failure. [ 153.544788][ T3013] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 153.609144][ T3013] CPU: 0 PID: 3013 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 153.612529][ T3036] new mount options do not match the existing superblock, will be ignored [ 153.619308][ T3013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 153.619312][ T3013] Call Trace: [ 153.619330][ T3013] dump_stack+0x1d8/0x24e [ 153.619352][ T3013] ? devkmsg_release+0x11c/0x11c [ 153.650399][ T3013] ? show_regs_print_info+0x12/0x12 [ 153.655600][ T3013] ? __kasan_kmalloc+0x1a3/0x1e0 [ 153.660523][ T3013] ? preempt_count_add+0x66/0x130 [ 153.665539][ T3013] ? prep_new_page+0x122/0x370 [ 153.670732][ T3041] 9pnet: Insufficient options for proto=fd [ 153.670988][ T3013] should_fail+0x6f6/0x860 [ 153.679244][ T3041] 9pnet: Insufficient options for proto=fd [ 153.681599][ T3013] ? setup_fault_attr+0x3d0/0x3d0 [ 153.681617][ T3013] __alloc_pages_nodemask+0x1c4/0x880 [ 153.690295][ T3041] 9pnet: Insufficient options for proto=fd [ 153.692395][ T3013] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 153.692411][ T3013] ? kvmalloc_node+0x7e/0xf0 [ 153.698579][ T3043] 9pnet: Insufficient options for proto=fd [ 153.703528][ T3013] push_pipe+0x3c5/0x7e0 [ 153.703543][ T3013] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 153.720626][ T3014] incfs: Options parsing error. -22 [ 153.723621][ T3013] ? stack_trace_snprint+0x150/0x150 [ 153.739652][ T3013] ? iov_iter_get_pages+0xec0/0xec0 [ 153.744903][ T3013] default_file_splice_read+0x208/0x970 [ 153.750419][ T3013] ? splice_direct_to_actor+0x999/0xb30 [ 153.755929][ T3013] ? do_splice_direct+0x28b/0x3e0 [ 153.760921][ T3013] ? do_syscall_64+0xcb/0x1e0 [ 153.765569][ T3013] ? __ia32_sys_tee+0xa0/0xa0 [ 153.770218][ T3013] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 153.776959][ T3013] ? selinux_file_permission+0x2d0/0x520 [ 153.782565][ T3013] ? security_file_permission+0x1e9/0x300 [ 153.788253][ T3013] ? __ia32_sys_tee+0xa0/0xa0 [ 153.792900][ T3013] splice_direct_to_actor+0x3f1/0xb30 [ 153.798245][ T3013] ? do_splice_direct+0x3e0/0x3e0 [ 153.803240][ T3013] ? pipe_to_sendpage+0x300/0x300 [ 153.808622][ T3013] ? security_file_permission+0x128/0x300 [ 153.814320][ T3013] do_splice_direct+0x28b/0x3e0 [ 153.819657][ T3013] ? splice_direct_to_actor+0xb30/0xb30 [ 153.825351][ T3013] ? security_file_permission+0x128/0x300 [ 153.831049][ T3013] do_sendfile+0x8e4/0x1140 [ 153.835525][ T3013] ? compat_writev+0x3c0/0x3c0 [ 153.840258][ T3013] ? vfs_write+0x422/0x4e0 [ 153.844658][ T3013] ? check_preemption_disabled+0x154/0x330 [ 153.850436][ T3013] __x64_sys_sendfile64+0x1c4/0x220 [ 153.855608][ T3013] ? __ia32_sys_sendfile+0x240/0x240 [ 153.860949][ T3013] do_syscall_64+0xcb/0x1e0 [ 153.865422][ T3013] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 153.871293][ T3013] RIP: 0033:0x466459 [ 153.875155][ T3013] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 153.894727][ T3013] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 07:10:42 executing program 4 (fault-call:2 fault-nth:9): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:10:42 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:42 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x22, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:42 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000600)='./file1\x00', 0x5, 0x3, &(0x7f0000000640)=[{&(0x7f0000000c40)="b3b505bfdaa844e33ddd30540e4578e346f933f1c73ac6a3f19a12d8770bbff14ba30755425331d74282d942d0abbbdc8ec746bce87d673e0bff2d985d216385cf747d7a347708336e8a1a60f54e34a11e753da73ebb5180bea2e2a4671c6b7165dec7b216fb0180939c9e3b7466b8a5225741d24cf14f1e987a9db66c3d6378ac5654105ab1aa42bccac8b6bc273187954f56c72d467047a02bdb146907465786c5069927fcb1d702ad99578be9ee6eb9cb81df2243dcc0724647813112273404", 0xc1, 0x3}, {0x0, 0x0, 0x9}, {&(0x7f00000008c0)="7337fffca3ec40b7cbcc155ad053f0f67d4582e9abfa5f4d2fe0210c41dc9f41afde4e1b81de25bbf9fc5761355cb3d6f8a9b0552c011f496f2539a6d86518bd1f4d38c5b47579827a7723b10b6d065b474546b32bb8b9bbf2da0f0f20057af83b8dd77323012bd4746f28ca4edda10cebdd8faaa5c5f2c9e64cceaf98938255fbb229658c04778a61f7d6bb450b35ab1b024573c9921b1d41bb901daf5a0a", 0x9f}], 0x3231419, &(0x7f0000000a40)=ANY=[@ANYBLOB="6e6f6175746f5f64615f616c6c6f632c62617227bc2d87ad1ea765cd366d4c726965722c64696f726561645ff68f592b2c7573", @ANYRESDEC=0xee01, @ANYBLOB=',seclabel,fowner<', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=0x0, @ANYBLOB=',uid<', @ANYRESDEC=0xee01, @ANYBLOB="f444"]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80, 0x0, 0x0, 0x7, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) io_setup(0x27f, &(0x7f0000000000)=0x0) socket$nl_xfrm(0x10, 0x3, 0x6) renameat(0xffffffffffffffff, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffffff, &(0x7f0000000000)='./file0\x00') io_submit(r0, 0x0, &(0x7f0000000e80)) r1 = memfd_create(&(0x7f0000000900)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf!\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c!\x0f/\xb8o8\xb9\x8d\x19\xe2\xca\x01y\x83\xe7\ng\x87\xd930x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f0000000380)='overlay\x00', 0x20000, &(0x7f00000003c0)=ANY=[@ANYBLOB='nfs_export=off,xino=auto,lowerdir=./file0/file0,xino=on,lowerdir=./bus,index=on,workdir=./bus,upperdir=./file0,xino=auto,euid=', @ANYRESDEC=r3, @ANYBLOB="2c6673635c6e746578743d73748166665f752c66756e63a74250524d68522300"/41]) preadv(r1, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}, {&(0x7f0000000000)=""/65, 0x41}], 0x2, 0x23, 0x0) openat(r1, &(0x7f00000000c0)='./file0\x00', 0x2000, 0x8) chdir(&(0x7f0000000480)='./file0\x00') r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000000240)='cpuset.cpus\x00', 0x2, 0x0) 07:10:42 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x23, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:42 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 154.216428][ T3052] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 154.236012][ T3052] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 154.244389][ T3052] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 154.252357][ T3052] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 154.260296][ T3052] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 154.268236][ T3052] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 07:10:42 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:10:42 executing program 4 (fault-call:2 fault-nth:10): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:10:42 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:10:42 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = getpid() perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x6, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0xffffffff80000000, 0x1000, 0x1, 0xfffffffffffffff7, 0x4}, r0, 0x2, 0xffffffffffffffff, 0x2) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000140)={'team0\x00'}) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f0000000380)='overlay\x00', 0x20000, &(0x7f00000003c0)=ANY=[@ANYBLOB='nfs_export=off,xino=auto,lowerdir=./file0/file0,xino=on,lowerdir=./bus,index=on,workdir=./bus,upperdir=./file0,xino=auto,euid=', @ANYRESDEC=r3, @ANYBLOB="2c6673635c6e746578743d73748166665f752c66756e63a74250524d68522300"/41]) preadv(r1, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}, {&(0x7f0000000000)=""/65, 0x41}], 0x2, 0x23, 0x0) openat(r1, &(0x7f00000000c0)='./file0\x00', 0x2000, 0x8) chdir(&(0x7f0000000480)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 07:10:42 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:10:42 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 154.276186][ T3052] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 [ 154.306855][ T3062] new mount options do not match the existing superblock, will be ignored 07:10:42 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 154.410161][ T3078] FAULT_INJECTION: forcing a failure. [ 154.410161][ T3078] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 154.423806][ T3082] EXT4-fs (loop0): unsupported descriptor size 0 [ 154.431030][ T3078] CPU: 1 PID: 3078 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 154.441177][ T3078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 154.447182][ T3084] new mount options do not match the existing superblock, will be ignored [ 154.451234][ T3078] Call Trace: [ 154.451252][ T3078] dump_stack+0x1d8/0x24e [ 154.451262][ T3078] ? devkmsg_release+0x11c/0x11c [ 154.451271][ T3078] ? show_regs_print_info+0x12/0x12 [ 154.451277][ T3078] ? __kasan_kmalloc+0x1a3/0x1e0 [ 154.451290][ T3078] ? preempt_count_add+0x66/0x130 [ 154.489370][ T3078] ? prep_new_page+0x122/0x370 [ 154.494156][ T3078] should_fail+0x6f6/0x860 [ 154.498543][ T3078] ? setup_fault_attr+0x3d0/0x3d0 [ 154.503536][ T3078] __alloc_pages_nodemask+0x1c4/0x880 [ 154.505708][ T3086] incfs: Options parsing error. -22 [ 154.508886][ T3078] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 154.508898][ T3078] ? kvmalloc_node+0x7e/0xf0 [ 154.508912][ T3078] push_pipe+0x3c5/0x7e0 [ 154.528381][ T3078] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 154.533982][ T3078] ? stack_trace_snprint+0x150/0x150 [ 154.539316][ T3078] ? iov_iter_get_pages+0xec0/0xec0 [ 154.544501][ T3078] default_file_splice_read+0x208/0x970 [ 154.550056][ T3078] ? splice_direct_to_actor+0x999/0xb30 [ 154.555571][ T3078] ? do_splice_direct+0x28b/0x3e0 [ 154.560596][ T3078] ? do_syscall_64+0xcb/0x1e0 [ 154.565249][ T3078] ? __ia32_sys_tee+0xa0/0xa0 [ 154.569924][ T3078] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 154.576668][ T3078] ? selinux_file_permission+0x2d0/0x520 [ 154.582292][ T3078] ? security_file_permission+0x1e9/0x300 [ 154.587991][ T3078] ? __ia32_sys_tee+0xa0/0xa0 [ 154.592651][ T3078] splice_direct_to_actor+0x3f1/0xb30 [ 154.597997][ T3078] ? do_splice_direct+0x3e0/0x3e0 [ 154.603029][ T3078] ? pipe_to_sendpage+0x300/0x300 [ 154.608029][ T3078] ? security_file_permission+0x128/0x300 [ 154.613720][ T3078] do_splice_direct+0x28b/0x3e0 [ 154.618544][ T3078] ? splice_direct_to_actor+0xb30/0xb30 [ 154.624058][ T3078] ? security_file_permission+0x128/0x300 [ 154.629746][ T3078] do_sendfile+0x8e4/0x1140 [ 154.634247][ T3078] ? compat_writev+0x3c0/0x3c0 [ 154.638979][ T3078] ? vfs_write+0x422/0x4e0 [ 154.643458][ T3078] ? check_preemption_disabled+0x154/0x330 [ 154.649244][ T3078] __x64_sys_sendfile64+0x1c4/0x220 [ 154.654411][ T3078] ? __ia32_sys_sendfile+0x240/0x240 [ 154.659667][ T3078] do_syscall_64+0xcb/0x1e0 [ 154.664143][ T3078] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 154.670010][ T3078] RIP: 0033:0x466459 [ 154.673883][ T3078] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 154.693471][ T3078] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 154.701857][ T3078] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 07:10:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000000280)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)=@delchain={0x220, 0x65, 0x300, 0x70bd28, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x10, 0xd}, {0x0, 0xf}, {0xfff1, 0xb}}, [@TCA_RATE={0x6, 0x5, {0x1, 0x3}}, @TCA_RATE={0x6, 0x5, {0x5, 0x8}}, @filter_kind_options=@f_fw={{0x7, 0x1, 'fw\x00'}, {0x2c, 0x2, [@TCA_FW_INDEV={0x14, 0x3, 'veth0\x00'}, @TCA_FW_INDEV={0x14, 0x3, 'syzkaller1\x00'}]}}, @filter_kind_options=@f_flow={{0x9, 0x1, 'flow\x00'}, {0x1ac, 0x2, [@TCA_FLOW_RSHIFT={0x8}, @TCA_FLOW_BASECLASS={0x8, 0x3, {0xfff3, 0x3}}, @TCA_FLOW_EMATCHES={0x190, 0xb, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x78, 0x2, 0x0, 0x1, [@TCF_EM_IPSET={0x10, 0x2, 0x0, 0x0, {{0x7, 0x8, 0x1}, {0x0, 0x2, 0x2}}}, @TCF_EM_IPT={0x3c, 0x3, 0x0, 0x0, {{0x3f}, [@TCA_EM_IPT_NFPROTO={0x5, 0x4, 0xa}, @TCA_EM_IPT_MATCH_REVISION={0x5, 0x3, 0x4}, @TCA_EM_IPT_MATCH_NAME={0xb, 0x2, 'policy\x00'}, @TCA_EM_IPT_MATCH_NAME={0xb, 0x2, 'policy\x00'}, @TCA_EM_IPT_MATCH_REVISION={0x5, 0x3, 0xf5}]}}, @TCF_EM_IPSET={0x10, 0x3ffe, 0x0, 0x0, {{0xff, 0x8, 0x1}, {0xffffffffffffffff, 0x5, 0x1}}}, @TCF_EM_CMP={0x18, 0x3, 0x0, 0x0, {{0x1000, 0x1, 0x20}, {0x3, 0x3, 0x6, 0x4, 0x8, 0x2, 0x1}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x6}}, @TCA_EMATCH_TREE_LIST={0x104, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0x38, 0x1, 0x0, 0x0, {{0x4, 0x0, 0xff01}, "2d4b5a09feccf66f63928e6be6e3919491df8bfb95f183827062acf3419ca6b2072c22bb5263427e93"}}, @TCF_EM_CONTAINER={0x28, 0x1, 0x0, 0x0, {{0x800, 0x0, 0x1}, "6f55528cdbe4af15655c209a895af9a0677538c28b739224ce2a11b9"}}, @TCF_EM_CMP={0x18, 0x2, 0x0, 0x0, {{0x7f, 0x1, 0x1}, {0xfffffc00, 0x87a, 0x6, 0x6, 0x5, 0x2, 0x2}}}, @TCF_EM_NBYTE={0x14, 0x3, 0x0, 0x0, {{0x332, 0x2, 0x1}, {0x3, 0x2, 0x1, "808d"}}}, @TCF_EM_IPSET={0x10, 0x2, 0x0, 0x0, {{0x81, 0x8, 0xcc}, {0x3, 0x3}}}, @TCF_EM_NBYTE={0x14, 0x1, 0x0, 0x0, {{0x2c3, 0x2, 0xe41}, {0x101, 0x1, 0x1, "ab"}}}, @TCF_EM_NBYTE={0x18, 0x3, 0x0, 0x0, {{0xe42, 0x2, 0xd0}, {0x1ff, 0x5, 0x1, "6f3a2d37ec"}}}, @TCF_EM_META={0x14, 0x2, 0x0, 0x0, {{0xffff, 0x4, 0x4}, [@TCA_EM_META_RVALUE={0x8, 0x3, [@TCF_META_TYPE_INT=0x2]}]}}, @TCF_EM_IPSET={0x10, 0x3, 0x0, 0x0, {{0xffff, 0x8, 0x7}, {0x0, 0x3, 0x4}}}, @TCF_EM_NBYTE={0x14, 0x3, 0x0, 0x0, {{0x4, 0x2, 0x3}, {0x7, 0x1, 0x2, "ab"}}}]}, @TCA_EMATCH_TREE_HDR={0x8}]}, @TCA_FLOW_MODE={0x8, 0x2, 0x1}]}}]}, 0x220}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) 07:10:43 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x2a, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:43 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:43 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = getpid() perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x6, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0xffffffff80000000, 0x1000, 0x1, 0xfffffffffffffff7, 0x4}, r0, 0x2, 0xffffffffffffffff, 0x2) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000140)={'team0\x00'}) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f0000000380)='overlay\x00', 0x20000, &(0x7f00000003c0)=ANY=[@ANYBLOB='nfs_export=off,xino=auto,lowerdir=./file0/file0,xino=on,lowerdir=./bus,index=on,workdir=./bus,upperdir=./file0,xino=auto,euid=', @ANYRESDEC=r3, @ANYBLOB="2c6673635c6e746578743d73748166665f752c66756e63a74250524d68522300"/41]) preadv(r1, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}, {&(0x7f0000000000)=""/65, 0x41}], 0x2, 0x23, 0x0) openat(r1, &(0x7f00000000c0)='./file0\x00', 0x2000, 0x8) chdir(&(0x7f0000000480)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 07:10:43 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:10:43 executing program 4 (fault-call:2 fault-nth:11): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:10:43 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x2b, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 154.709797][ T3078] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 154.717737][ T3078] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 154.725679][ T3078] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 154.733622][ T3078] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 07:10:43 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 154.805341][ T3093] FAULT_INJECTION: forcing a failure. [ 154.805341][ T3093] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 154.822268][ T3093] CPU: 1 PID: 3093 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 154.832436][ T3093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 154.834967][ T3100] new mount options do not match the existing superblock, will be ignored [ 154.842478][ T3093] Call Trace: [ 154.842539][ T3093] dump_stack+0x1d8/0x24e [ 154.842561][ T3093] ? devkmsg_release+0x11c/0x11c [ 154.842571][ T3093] ? show_regs_print_info+0x12/0x12 [ 154.842579][ T3093] ? __kasan_kmalloc+0x1a3/0x1e0 [ 154.842588][ T3093] ? preempt_count_add+0x66/0x130 [ 154.842597][ T3093] ? prep_new_page+0x122/0x370 [ 154.842607][ T3093] should_fail+0x6f6/0x860 [ 154.842616][ T3093] ? setup_fault_attr+0x3d0/0x3d0 [ 154.842627][ T3093] __alloc_pages_nodemask+0x1c4/0x880 [ 154.842637][ T3093] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 154.842649][ T3093] ? kvmalloc_node+0x7e/0xf0 [ 154.842658][ T3093] push_pipe+0x3c5/0x7e0 [ 154.842669][ T3093] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 154.842677][ T3093] ? stack_trace_snprint+0x150/0x150 [ 154.842686][ T3093] ? iov_iter_get_pages+0xec0/0xec0 [ 154.842697][ T3093] default_file_splice_read+0x208/0x970 [ 154.842705][ T3093] ? splice_direct_to_actor+0x999/0xb30 [ 154.842712][ T3093] ? do_splice_direct+0x28b/0x3e0 [ 154.842731][ T3093] ? do_syscall_64+0xcb/0x1e0 [ 154.842741][ T3093] ? __ia32_sys_tee+0xa0/0xa0 07:10:43 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = getpid() perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x6, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0xffffffff80000000, 0x1000, 0x1, 0xfffffffffffffff7, 0x4}, r0, 0x2, 0xffffffffffffffff, 0x2) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000140)={'team0\x00'}) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f0000000380)='overlay\x00', 0x20000, &(0x7f00000003c0)=ANY=[@ANYBLOB='nfs_export=off,xino=auto,lowerdir=./file0/file0,xino=on,lowerdir=./bus,index=on,workdir=./bus,upperdir=./file0,xino=auto,euid=', @ANYRESDEC=r3, @ANYBLOB="2c6673635c6e746578743d73748166665f752c66756e63a74250524d68522300"/41]) preadv(r1, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}, {&(0x7f0000000000)=""/65, 0x41}], 0x2, 0x23, 0x0) openat(r1, &(0x7f00000000c0)='./file0\x00', 0x2000, 0x8) chdir(&(0x7f0000000480)='./file0\x00') 07:10:43 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:43 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@newlink={0x64, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @private1}, @IFLA_IPTUN_LINK={0x8}]}}}]}, 0x64}}, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@empty, @in6=@local, 0x4e24, 0x1, 0x4e20, 0x5, 0x0, 0x90, 0x20, 0xc, 0x0, 0xee00}, {0x5dd5dbd3, 0x9, 0x0, 0x8, 0x9, 0x4c7, 0x10000000000, 0x4}, {0x30, 0x100000001, 0x4, 0x6}, 0x8, 0x6e6bb0, 0x2, 0x1, 0x1, 0x3}, {{@in6=@empty, 0x4d5, 0xff}, 0xa, @in=@loopback, 0x3506, 0x4, 0x6, 0x80, 0x9, 0x3, 0x4}}, 0xe8) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x6}, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) statx(r3, 0x0, 0x100, 0x100, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x2, &(0x7f0000000440)=ANY=[@ANYBLOB="78696e6fcecc88aaa25c9dbd6f3d0eeaf4464dc96975746f2c6d65745f747970653d737461747573002c7569643e000000000000", @ANYRESDEC=r4, @ANYBLOB=',\x00']) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='status\x00') vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) preadv(r5, &(0x7f00000017c0), 0x375, 0x0, 0x0) 07:10:43 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x2c, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:43 executing program 4 (fault-call:2 fault-nth:12): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:10:43 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x2d, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 154.842756][ T3093] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 154.842766][ T3093] ? selinux_file_permission+0x2d0/0x520 [ 154.842775][ T3093] ? security_file_permission+0x1e9/0x300 [ 154.842782][ T3093] ? __ia32_sys_tee+0xa0/0xa0 [ 154.842791][ T3093] splice_direct_to_actor+0x3f1/0xb30 [ 154.842803][ T3093] ? do_splice_direct+0x3e0/0x3e0 [ 154.842811][ T3093] ? pipe_to_sendpage+0x300/0x300 [ 154.842820][ T3093] ? security_file_permission+0x128/0x300 [ 154.842829][ T3093] do_splice_direct+0x28b/0x3e0 07:10:43 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x2e, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:43 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x2f, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 154.842838][ T3093] ? splice_direct_to_actor+0xb30/0xb30 [ 154.842847][ T3093] ? security_file_permission+0x128/0x300 [ 154.842856][ T3093] do_sendfile+0x8e4/0x1140 [ 154.842867][ T3093] ? compat_writev+0x3c0/0x3c0 [ 154.842875][ T3093] ? vfs_write+0x422/0x4e0 [ 154.842885][ T3093] ? check_preemption_disabled+0x154/0x330 [ 154.842893][ T3093] __x64_sys_sendfile64+0x1c4/0x220 [ 154.842901][ T3093] ? __ia32_sys_sendfile+0x240/0x240 [ 154.842910][ T3093] do_syscall_64+0xcb/0x1e0 [ 154.842919][ T3093] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 154.842927][ T3093] RIP: 0033:0x466459 [ 154.842935][ T3093] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 154.842940][ T3093] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 154.842948][ T3093] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 154.842952][ T3093] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 154.842956][ T3093] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 154.842961][ T3093] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 154.842966][ T3093] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 [ 154.859485][ T3096] EXT4-fs (loop0): unsupported descriptor size 0 [ 155.058270][ T3121] incfs: Options parsing error. -22 [ 155.074795][ T3123] FAULT_INJECTION: forcing a failure. [ 155.074795][ T3123] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 155.151741][ T3123] CPU: 0 PID: 3123 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 155.161877][ T3123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 155.171904][ T3123] Call Trace: [ 155.175180][ T3123] dump_stack+0x1d8/0x24e [ 155.179486][ T3123] ? devkmsg_release+0x11c/0x11c [ 155.184394][ T3123] ? show_regs_print_info+0x12/0x12 [ 155.189560][ T3123] ? __kasan_kmalloc+0x1a3/0x1e0 [ 155.194473][ T3123] ? preempt_count_add+0x66/0x130 [ 155.199469][ T3123] ? prep_new_page+0x122/0x370 [ 155.204205][ T3123] should_fail+0x6f6/0x860 [ 155.208600][ T3123] ? setup_fault_attr+0x3d0/0x3d0 [ 155.213595][ T3123] __alloc_pages_nodemask+0x1c4/0x880 [ 155.218938][ T3123] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 155.224453][ T3123] ? kvmalloc_node+0x7e/0xf0 [ 155.229017][ T3123] ? kvmalloc_node+0x7e/0xf0 [ 155.233575][ T3123] push_pipe+0x3c5/0x7e0 [ 155.237794][ T3123] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 155.243395][ T3123] ? stack_trace_snprint+0x150/0x150 [ 155.248650][ T3123] ? iov_iter_get_pages+0xec0/0xec0 [ 155.253821][ T3123] default_file_splice_read+0x208/0x970 [ 155.259335][ T3123] ? splice_direct_to_actor+0x999/0xb30 [ 155.264849][ T3123] ? do_splice_direct+0x28b/0x3e0 [ 155.269841][ T3123] ? do_syscall_64+0xcb/0x1e0 [ 155.274486][ T3123] ? __ia32_sys_tee+0xa0/0xa0 [ 155.279137][ T3123] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 155.285868][ T3123] ? selinux_file_permission+0x2d0/0x520 [ 155.291476][ T3123] ? security_file_permission+0x1e9/0x300 [ 155.297424][ T3123] ? __ia32_sys_tee+0xa0/0xa0 [ 155.302070][ T3123] splice_direct_to_actor+0x3f1/0xb30 [ 155.307414][ T3123] ? do_splice_direct+0x3e0/0x3e0 [ 155.312408][ T3123] ? pipe_to_sendpage+0x300/0x300 [ 155.317400][ T3123] ? security_file_permission+0x128/0x300 [ 155.323087][ T3123] do_splice_direct+0x28b/0x3e0 [ 155.327908][ T3123] ? splice_direct_to_actor+0xb30/0xb30 [ 155.333422][ T3123] ? security_file_permission+0x128/0x300 [ 155.339108][ T3123] do_sendfile+0x8e4/0x1140 [ 155.343581][ T3123] ? compat_writev+0x3c0/0x3c0 [ 155.348314][ T3123] ? vfs_write+0x422/0x4e0 [ 155.352702][ T3123] ? check_preemption_disabled+0x154/0x330 [ 155.358478][ T3123] __x64_sys_sendfile64+0x1c4/0x220 [ 155.363644][ T3123] ? __ia32_sys_sendfile+0x240/0x240 [ 155.368899][ T3123] do_syscall_64+0xcb/0x1e0 [ 155.373372][ T3123] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 155.379242][ T3123] RIP: 0033:0x466459 [ 155.383108][ T3123] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 155.402691][ T3123] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 155.411067][ T3123] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 155.419010][ T3123] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000003 [ 155.426950][ T3123] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 155.434899][ T3123] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 155.442843][ T3123] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 07:10:44 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:44 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 155.505320][ T3147] overlayfs: unrecognized mount option "xinoÎ̈ª¢\½o=êôFMÉiuto" or missing value 07:10:44 executing program 4 (fault-call:2 fault-nth:13): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:10:44 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x30, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 155.641336][ T3155] new mount options do not match the existing superblock, will be ignored [ 155.658006][ T3159] EXT4-fs (loop0): unsupported descriptor size 0 [ 155.660873][ T3162] FAULT_INJECTION: forcing a failure. [ 155.660873][ T3162] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 155.685660][ T3162] CPU: 0 PID: 3162 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 155.695805][ T3162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 155.705834][ T3162] Call Trace: [ 155.709097][ T3162] dump_stack+0x1d8/0x24e [ 155.713400][ T3162] ? devkmsg_release+0x11c/0x11c [ 155.718312][ T3162] ? show_regs_print_info+0x12/0x12 [ 155.723571][ T3162] ? __kasan_kmalloc+0x1a3/0x1e0 [ 155.728477][ T3162] ? preempt_count_add+0x66/0x130 [ 155.733470][ T3162] ? prep_new_page+0x122/0x370 [ 155.738204][ T3162] should_fail+0x6f6/0x860 [ 155.742592][ T3162] ? setup_fault_attr+0x3d0/0x3d0 [ 155.747585][ T3162] __alloc_pages_nodemask+0x1c4/0x880 [ 155.752934][ T3162] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 155.758450][ T3162] ? kvmalloc_node+0x7e/0xf0 [ 155.763046][ T3162] push_pipe+0x3c5/0x7e0 [ 155.767257][ T3162] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 155.772860][ T3162] ? stack_trace_snprint+0x150/0x150 [ 155.778113][ T3162] ? iov_iter_get_pages+0xec0/0xec0 [ 155.783303][ T3162] default_file_splice_read+0x208/0x970 [ 155.788818][ T3162] ? splice_direct_to_actor+0x999/0xb30 [ 155.794329][ T3162] ? do_splice_direct+0x28b/0x3e0 [ 155.799327][ T3162] ? do_syscall_64+0xcb/0x1e0 [ 155.803993][ T3162] ? __ia32_sys_tee+0xa0/0xa0 [ 155.808641][ T3162] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 155.815373][ T3162] ? selinux_file_permission+0x2d0/0x520 [ 155.820976][ T3162] ? security_file_permission+0x1e9/0x300 [ 155.826678][ T3162] ? __ia32_sys_tee+0xa0/0xa0 [ 155.831324][ T3162] splice_direct_to_actor+0x3f1/0xb30 [ 155.836729][ T3162] ? do_splice_direct+0x3e0/0x3e0 [ 155.841726][ T3162] ? pipe_to_sendpage+0x300/0x300 [ 155.846756][ T3162] ? security_file_permission+0x128/0x300 [ 155.852447][ T3162] do_splice_direct+0x28b/0x3e0 [ 155.857270][ T3162] ? splice_direct_to_actor+0xb30/0xb30 [ 155.862787][ T3162] ? security_file_permission+0x128/0x300 [ 155.868518][ T3162] do_sendfile+0x8e4/0x1140 [ 155.872996][ T3162] ? compat_writev+0x3c0/0x3c0 [ 155.877730][ T3162] ? vfs_write+0x422/0x4e0 [ 155.882119][ T3162] ? check_preemption_disabled+0x154/0x330 [ 155.887893][ T3162] __x64_sys_sendfile64+0x1c4/0x220 [ 155.893065][ T3162] ? __ia32_sys_sendfile+0x240/0x240 [ 155.898320][ T3162] do_syscall_64+0xcb/0x1e0 [ 155.902791][ T3162] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 155.908652][ T3162] RIP: 0033:0x466459 [ 155.912537][ T3162] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 155.932122][ T3162] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 07:10:44 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = getpid() perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x6, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0xffffffff80000000, 0x1000, 0x1, 0xfffffffffffffff7, 0x4}, r0, 0x2, 0xffffffffffffffff, 0x2) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000140)={'team0\x00'}) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f0000000380)='overlay\x00', 0x20000, &(0x7f00000003c0)=ANY=[@ANYBLOB='nfs_export=off,xino=auto,lowerdir=./file0/file0,xino=on,lowerdir=./bus,index=on,workdir=./bus,upperdir=./file0,xino=auto,euid=', @ANYRESDEC=r3, @ANYBLOB="2c6673635c6e746578743d73748166665f752c66756e63a74250524d68522300"/41]) preadv(r1, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}, {&(0x7f0000000000)=""/65, 0x41}], 0x2, 0x23, 0x0) openat(r1, &(0x7f00000000c0)='./file0\x00', 0x2000, 0x8) 07:10:44 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 155.940505][ T3162] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 155.948444][ T3162] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 155.956390][ T3162] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 155.964354][ T3162] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 155.972382][ T3162] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 07:10:44 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x2) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = signalfd4(r1, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000400)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000000c0)=0xe8) read$FUSE(r2, &(0x7f0000002140)={0x2020}, 0x2020) sendmsg$IPSET_CMD_TEST(r2, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)={0xb8, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_ADT={0x74, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa, 0x11, @remote}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP2={0xc, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @multicast2}}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0xf9}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PROTO={0x5, 0x7, 0x8}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x1}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_NAME={0x9, 0x12, 'syz2\x00'}}, {0x1c, 0x7, 0x0, 0x1, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @mcast1}}}]}, @IPSET_ATTR_ADT={0x24, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0xffffffffffffbd7e}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBMARK={0xc, 0x1b, 0x1, 0x0, 0x8}}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0xb8}}, 0x4000015) dup(r2) [ 155.990223][ T3171] incfs: Options parsing error. -22 07:10:44 executing program 4 (fault-call:2 fault-nth:14): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:10:44 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x31, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:44 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:10:44 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:44 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 156.031996][ T3176] overlayfs: unrecognized mount option "xinoÎ̈ª¢\½o=êôFMÉiuto" or missing value [ 156.052050][ T3175] new mount options do not match the existing superblock, will be ignored [ 156.081011][ T3187] FAULT_INJECTION: forcing a failure. [ 156.081011][ T3187] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 156.099270][ T3185] EXT4-fs (loop0): unsupported descriptor size 0 [ 156.105962][ T3187] CPU: 0 PID: 3187 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 156.116106][ T3187] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 156.126139][ T3187] Call Trace: [ 156.129422][ T3187] dump_stack+0x1d8/0x24e [ 156.133812][ T3187] ? devkmsg_release+0x11c/0x11c [ 156.138737][ T3187] ? show_regs_print_info+0x12/0x12 [ 156.143910][ T3187] ? __kasan_kmalloc+0x1a3/0x1e0 [ 156.148815][ T3187] ? preempt_count_add+0x66/0x130 [ 156.153992][ T3187] ? prep_new_page+0x122/0x370 [ 156.158722][ T3187] should_fail+0x6f6/0x860 [ 156.164677][ T3187] ? setup_fault_attr+0x3d0/0x3d0 [ 156.169690][ T3187] __alloc_pages_nodemask+0x1c4/0x880 [ 156.175031][ T3187] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 156.180545][ T3187] ? kvmalloc_node+0x7e/0xf0 [ 156.185101][ T3187] push_pipe+0x3c5/0x7e0 [ 156.189312][ T3187] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 156.194911][ T3187] ? stack_trace_snprint+0x150/0x150 [ 156.200164][ T3187] ? iov_iter_get_pages+0xec0/0xec0 [ 156.205329][ T3187] default_file_splice_read+0x208/0x970 [ 156.210841][ T3187] ? splice_direct_to_actor+0x999/0xb30 [ 156.216365][ T3187] ? do_splice_direct+0x28b/0x3e0 [ 156.221356][ T3187] ? do_syscall_64+0xcb/0x1e0 [ 156.226001][ T3187] ? __ia32_sys_tee+0xa0/0xa0 [ 156.230649][ T3187] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 156.237377][ T3187] ? selinux_file_permission+0x2d0/0x520 [ 156.242975][ T3187] ? security_file_permission+0x1e9/0x300 [ 156.248661][ T3187] ? __ia32_sys_tee+0xa0/0xa0 [ 156.253305][ T3187] splice_direct_to_actor+0x3f1/0xb30 [ 156.258648][ T3187] ? do_splice_direct+0x3e0/0x3e0 [ 156.263639][ T3187] ? pipe_to_sendpage+0x300/0x300 [ 156.268630][ T3187] ? security_file_permission+0x128/0x300 [ 156.274318][ T3187] do_splice_direct+0x28b/0x3e0 [ 156.279135][ T3187] ? splice_direct_to_actor+0xb30/0xb30 [ 156.284648][ T3187] ? security_file_permission+0x128/0x300 [ 156.290332][ T3187] do_sendfile+0x8e4/0x1140 [ 156.294804][ T3187] ? compat_writev+0x3c0/0x3c0 [ 156.299537][ T3187] ? vfs_write+0x422/0x4e0 [ 156.303921][ T3187] ? check_preemption_disabled+0x154/0x330 [ 156.309694][ T3187] __x64_sys_sendfile64+0x1c4/0x220 [ 156.314862][ T3187] ? __ia32_sys_sendfile+0x240/0x240 [ 156.320113][ T3187] do_syscall_64+0xcb/0x1e0 [ 156.324585][ T3187] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 156.330444][ T3187] RIP: 0033:0x466459 [ 156.334319][ T3187] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 156.353889][ T3187] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 156.362265][ T3187] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 156.370206][ T3187] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 07:10:44 executing program 1: r0 = socket(0x10, 0x803, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = dup2(r1, r0) getsockopt$SO_BINDTODEVICE(r0, 0x6, 0xb, &(0x7f0000000000), 0x20a154cc) getsockname$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, &(0x7f0000000080)=0x10) 07:10:44 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = getpid() perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x6, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0xffffffff80000000, 0x1000, 0x1, 0xfffffffffffffff7, 0x4}, r0, 0x2, 0xffffffffffffffff, 0x2) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000140)={'team0\x00'}) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f0000000380)='overlay\x00', 0x20000, &(0x7f00000003c0)=ANY=[@ANYBLOB='nfs_export=off,xino=auto,lowerdir=./file0/file0,xino=on,lowerdir=./bus,index=on,workdir=./bus,upperdir=./file0,xino=auto,euid=', @ANYRESDEC=r3, @ANYBLOB="2c6673635c6e746578743d73748166665f752c66756e63a74250524d68522300"/41]) preadv(r1, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}, {&(0x7f0000000000)=""/65, 0x41}], 0x2, 0x23, 0x0) 07:10:44 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x32, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:44 executing program 4 (fault-call:2 fault-nth:15): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:10:44 executing program 1: r0 = socket(0x10, 0x803, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = dup2(r1, r0) getsockopt$SO_BINDTODEVICE(r0, 0x6, 0xb, &(0x7f0000000000), 0x20a154cc) getsockname$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, &(0x7f0000000080)=0x10) [ 156.378145][ T3187] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 156.387266][ T3187] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 156.397475][ T3187] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 07:10:44 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:10:44 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:44 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x40001e2, 0x0, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ptrace$getsig(0x4202, 0x0, 0x8, &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000180)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = creat(&(0x7f0000000100)='./bus\x00', 0x1fb978507dcbbbd6) ftruncate(r4, 0x800) lseek(r4, 0x0, 0x2) writev(0xffffffffffffffff, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000080)='./bus\x00', &(0x7f0000000140)='security.ima\x00', &(0x7f00000003c0)=ANY=[], 0xd1, 0x0) r5 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8400fffffffa) creat(&(0x7f00000000c0)='./bus\x00', 0x0) [ 156.433854][ T3196] incfs: Options parsing error. -22 07:10:45 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:45 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x33, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:45 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = getpid() perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x6, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0xffffffff80000000, 0x1000, 0x1, 0xfffffffffffffff7, 0x4}, r0, 0x2, 0xffffffffffffffff, 0x2) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000140)={'team0\x00'}) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) preadv(r1, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}, {&(0x7f0000000000)=""/65, 0x41}], 0x2, 0x23, 0x0) [ 156.469264][ T3207] FAULT_INJECTION: forcing a failure. [ 156.469264][ T3207] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 156.502535][ T3211] EXT4-fs (loop0): unsupported descriptor size 0 [ 156.504502][ T3205] new mount options do not match the existing superblock, will be ignored [ 156.522716][ T3207] CPU: 1 PID: 3207 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 156.533056][ T3207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 156.543130][ T3207] Call Trace: [ 156.546421][ T3207] dump_stack+0x1d8/0x24e [ 156.550738][ T3207] ? devkmsg_release+0x11c/0x11c [ 156.555760][ T3207] ? show_regs_print_info+0x12/0x12 [ 156.560976][ T3207] ? __kasan_kmalloc+0x1a3/0x1e0 [ 156.565925][ T3207] ? preempt_count_add+0x66/0x130 [ 156.570922][ T3207] ? prep_new_page+0x122/0x370 [ 156.575661][ T3207] should_fail+0x6f6/0x860 [ 156.580050][ T3207] ? setup_fault_attr+0x3d0/0x3d0 [ 156.588527][ T3207] __alloc_pages_nodemask+0x1c4/0x880 [ 156.593879][ T3207] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 156.596620][ T3219] incfs: Options parsing error. -22 [ 156.601056][ T3207] ? kvmalloc_node+0x7e/0xf0 [ 156.601064][ T3207] ? kvmalloc_node+0x7e/0xf0 [ 156.601073][ T3207] push_pipe+0x3c5/0x7e0 [ 156.601087][ T3207] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 156.625417][ T3207] ? stack_trace_snprint+0x150/0x150 [ 156.630696][ T3207] ? iov_iter_get_pages+0xec0/0xec0 [ 156.635929][ T3207] default_file_splice_read+0x208/0x970 [ 156.641466][ T3207] ? splice_direct_to_actor+0x999/0xb30 [ 156.646999][ T3207] ? do_splice_direct+0x28b/0x3e0 [ 156.652016][ T3207] ? do_syscall_64+0xcb/0x1e0 [ 156.656688][ T3207] ? __ia32_sys_tee+0xa0/0xa0 [ 156.661359][ T3207] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 156.668112][ T3207] ? selinux_file_permission+0x2d0/0x520 [ 156.673736][ T3207] ? security_file_permission+0x1e9/0x300 [ 156.679465][ T3207] ? __ia32_sys_tee+0xa0/0xa0 [ 156.684159][ T3207] splice_direct_to_actor+0x3f1/0xb30 [ 156.689567][ T3207] ? do_splice_direct+0x3e0/0x3e0 [ 156.694567][ T3207] ? pipe_to_sendpage+0x300/0x300 [ 156.699565][ T3207] ? security_file_permission+0x128/0x300 [ 156.705277][ T3207] do_splice_direct+0x28b/0x3e0 [ 156.710105][ T3207] ? splice_direct_to_actor+0xb30/0xb30 [ 156.715625][ T3207] ? security_file_permission+0x128/0x300 [ 156.721319][ T3207] do_sendfile+0x8e4/0x1140 [ 156.725811][ T3207] ? compat_writev+0x3c0/0x3c0 [ 156.730549][ T3207] ? vfs_write+0x422/0x4e0 [ 156.734941][ T3207] ? check_preemption_disabled+0x154/0x330 [ 156.740718][ T3207] __x64_sys_sendfile64+0x1c4/0x220 [ 156.745958][ T3207] ? __ia32_sys_sendfile+0x240/0x240 [ 156.751486][ T3207] do_syscall_64+0xcb/0x1e0 [ 156.756026][ T3207] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 156.761893][ T3207] RIP: 0033:0x466459 07:10:45 executing program 4 (fault-call:2 fault-nth:16): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) [ 156.765771][ T3207] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 156.785349][ T3207] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 156.793733][ T3207] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 156.801677][ T3207] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 156.809641][ T3207] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 07:10:45 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:10:45 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:45 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x35, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 156.817684][ T3207] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 156.826073][ T3207] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 [ 156.894854][ T3232] FAULT_INJECTION: forcing a failure. [ 156.894854][ T3232] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 156.914006][ T3237] EXT4-fs (loop0): unsupported descriptor size 0 [ 156.918067][ T3234] new mount options do not match the existing superblock, will be ignored [ 156.922753][ T3237] incfs: Options parsing error. -22 07:10:45 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 156.950589][ T3232] CPU: 0 PID: 3232 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 156.960745][ T3232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 156.970783][ T3232] Call Trace: [ 156.974049][ T3232] dump_stack+0x1d8/0x24e [ 156.978349][ T3232] ? devkmsg_release+0x11c/0x11c [ 156.983257][ T3232] ? show_regs_print_info+0x12/0x12 [ 156.988453][ T3232] ? __kasan_kmalloc+0x1a3/0x1e0 [ 156.993366][ T3232] ? preempt_count_add+0x66/0x130 [ 156.998412][ T3232] ? prep_new_page+0x122/0x370 [ 157.003160][ T3232] should_fail+0x6f6/0x860 [ 157.007562][ T3232] ? setup_fault_attr+0x3d0/0x3d0 [ 157.012560][ T3232] __alloc_pages_nodemask+0x1c4/0x880 [ 157.018000][ T3232] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 157.023545][ T3232] ? kvmalloc_node+0x7e/0xf0 [ 157.028105][ T3232] push_pipe+0x3c5/0x7e0 [ 157.032318][ T3232] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 157.037938][ T3232] ? stack_trace_snprint+0x150/0x150 [ 157.043193][ T3232] ? iov_iter_get_pages+0xec0/0xec0 [ 157.048361][ T3232] default_file_splice_read+0x208/0x970 [ 157.053969][ T3232] ? splice_direct_to_actor+0x999/0xb30 [ 157.061329][ T3232] ? do_splice_direct+0x28b/0x3e0 [ 157.066322][ T3232] ? do_syscall_64+0xcb/0x1e0 [ 157.070968][ T3232] ? __ia32_sys_tee+0xa0/0xa0 [ 157.075614][ T3232] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 157.082354][ T3232] ? selinux_file_permission+0x2d0/0x520 [ 157.087970][ T3232] ? security_file_permission+0x1e9/0x300 [ 157.093657][ T3232] ? __ia32_sys_tee+0xa0/0xa0 [ 157.098303][ T3232] splice_direct_to_actor+0x3f1/0xb30 [ 157.103646][ T3232] ? do_splice_direct+0x3e0/0x3e0 [ 157.108637][ T3232] ? pipe_to_sendpage+0x300/0x300 [ 157.113629][ T3232] ? security_file_permission+0x128/0x300 [ 157.119336][ T3232] do_splice_direct+0x28b/0x3e0 [ 157.124156][ T3232] ? splice_direct_to_actor+0xb30/0xb30 [ 157.129672][ T3232] ? security_file_permission+0x128/0x300 [ 157.135360][ T3232] do_sendfile+0x8e4/0x1140 [ 157.139834][ T3232] ? compat_writev+0x3c0/0x3c0 [ 157.144583][ T3232] ? vfs_write+0x422/0x4e0 [ 157.148988][ T3232] ? check_preemption_disabled+0x154/0x330 [ 157.154761][ T3232] __x64_sys_sendfile64+0x1c4/0x220 [ 157.159926][ T3232] ? __ia32_sys_sendfile+0x240/0x240 [ 157.165961][ T3232] do_syscall_64+0xcb/0x1e0 [ 157.170434][ T3232] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 157.176321][ T3232] RIP: 0033:0x466459 [ 157.180187][ T3232] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 07:10:45 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724", 0x10, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:10:45 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = getpid() perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x6, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0xffffffff80000000, 0x1000, 0x1, 0xfffffffffffffff7, 0x4}, r0, 0x2, 0xffffffffffffffff, 0x2) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000140)={'team0\x00'}) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) preadv(r1, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}, {&(0x7f0000000000)=""/65, 0x41}], 0x2, 0x23, 0x0) 07:10:45 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x36, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 157.199761][ T3232] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 157.208138][ T3232] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 157.216078][ T3232] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 157.224029][ T3232] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 157.232010][ T3232] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 157.239973][ T3232] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 07:10:45 executing program 1: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = getpid() perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x6, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0xffffffff80000000, 0x1000, 0x1, 0xfffffffffffffff7, 0x4}, r0, 0x2, 0xffffffffffffffff, 0x2) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000140)={'team0\x00'}) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) preadv(r1, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}, {&(0x7f0000000000)=""/65, 0x41}], 0x2, 0x23, 0x0) 07:10:45 executing program 4 (fault-call:2 fault-nth:17): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:10:45 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x37, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:45 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:45 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724", 0x10, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:10:45 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = getpid() perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x6, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0xffffffff80000000, 0x1000, 0x1, 0xfffffffffffffff7, 0x4}, r0, 0x2, 0xffffffffffffffff, 0x2) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000140)={'team0\x00'}) socket(0x10, 0x2, 0x0) preadv(r1, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}, {&(0x7f0000000000)=""/65, 0x41}], 0x2, 0x23, 0x0) [ 157.310605][ T3252] EXT4-fs (loop0): unsupported descriptor size 0 [ 157.314423][ T3250] new mount options do not match the existing superblock, will be ignored [ 157.330144][ T3252] incfs: Options parsing error. -22 07:10:45 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 157.391096][ T3265] FAULT_INJECTION: forcing a failure. [ 157.391096][ T3265] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 157.398707][ T3263] new mount options do not match the existing superblock, will be ignored [ 157.412991][ T3262] EXT4-fs (loop0): unsupported descriptor size 0 [ 157.419804][ T3265] CPU: 0 PID: 3265 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 157.429942][ T3265] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 157.439985][ T3265] Call Trace: [ 157.443269][ T3265] dump_stack+0x1d8/0x24e [ 157.447590][ T3265] ? devkmsg_release+0x11c/0x11c [ 157.452304][ T3267] new mount options do not match the existing superblock, will be ignored [ 157.452517][ T3265] ? show_regs_print_info+0x12/0x12 [ 157.452532][ T3265] ? __kasan_kmalloc+0x1a3/0x1e0 [ 157.471798][ T3265] ? preempt_count_add+0x66/0x130 [ 157.476819][ T3265] ? prep_new_page+0x122/0x370 [ 157.481576][ T3265] should_fail+0x6f6/0x860 [ 157.485982][ T3265] ? setup_fault_attr+0x3d0/0x3d0 [ 157.491001][ T3265] __alloc_pages_nodemask+0x1c4/0x880 [ 157.496366][ T3265] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 157.501899][ T3265] ? kvmalloc_node+0x7e/0xf0 [ 157.506462][ T3265] push_pipe+0x3c5/0x7e0 [ 157.510705][ T3265] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 157.516325][ T3265] ? stack_trace_snprint+0x150/0x150 [ 157.521580][ T3265] ? iov_iter_get_pages+0xec0/0xec0 [ 157.526822][ T3265] default_file_splice_read+0x208/0x970 [ 157.532339][ T3265] ? splice_direct_to_actor+0x999/0xb30 [ 157.537854][ T3265] ? do_splice_direct+0x28b/0x3e0 [ 157.542848][ T3265] ? do_syscall_64+0xcb/0x1e0 [ 157.547498][ T3265] ? __ia32_sys_tee+0xa0/0xa0 [ 157.552147][ T3265] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 157.558882][ T3265] ? selinux_file_permission+0x2d0/0x520 [ 157.564516][ T3265] ? security_file_permission+0x1e9/0x300 [ 157.570206][ T3265] ? __ia32_sys_tee+0xa0/0xa0 [ 157.574874][ T3265] splice_direct_to_actor+0x3f1/0xb30 [ 157.580219][ T3265] ? do_splice_direct+0x3e0/0x3e0 [ 157.585214][ T3265] ? pipe_to_sendpage+0x300/0x300 [ 157.590246][ T3265] ? security_file_permission+0x128/0x300 [ 157.595935][ T3265] do_splice_direct+0x28b/0x3e0 [ 157.600757][ T3265] ? splice_direct_to_actor+0xb30/0xb30 [ 157.606285][ T3265] ? security_file_permission+0x128/0x300 [ 157.611974][ T3265] do_sendfile+0x8e4/0x1140 [ 157.616464][ T3265] ? compat_writev+0x3c0/0x3c0 [ 157.621197][ T3265] ? vfs_write+0x422/0x4e0 [ 157.625587][ T3265] ? check_preemption_disabled+0x154/0x330 [ 157.631361][ T3265] __x64_sys_sendfile64+0x1c4/0x220 [ 157.636550][ T3265] ? __ia32_sys_sendfile+0x240/0x240 [ 157.641808][ T3265] do_syscall_64+0xcb/0x1e0 [ 157.646284][ T3265] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 157.652147][ T3265] RIP: 0033:0x466459 [ 157.656013][ T3265] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 157.675591][ T3265] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 157.684018][ T3265] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 07:10:46 executing program 1: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = getpid() perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x6, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0xffffffff80000000, 0x1000, 0x1, 0xfffffffffffffff7, 0x4}, r0, 0x2, 0xffffffffffffffff, 0x2) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000140)={'team0\x00'}) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) preadv(r1, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}, {&(0x7f0000000000)=""/65, 0x41}], 0x2, 0x23, 0x0) 07:10:46 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x38, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:46 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = getpid() perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x6, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0xffffffff80000000, 0x1000, 0x1, 0xfffffffffffffff7, 0x4}, r0, 0x2, 0xffffffffffffffff, 0x2) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000140)={'team0\x00'}) preadv(r1, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}, {&(0x7f0000000000)=""/65, 0x41}], 0x2, 0x23, 0x0) [ 157.691964][ T3265] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 157.699909][ T3265] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 157.707862][ T3265] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 157.715825][ T3265] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 [ 157.737045][ T3273] incfs: Options parsing error. -22 07:10:46 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724", 0x10, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:10:46 executing program 4 (fault-call:2 fault-nth:18): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:10:46 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x39, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 157.743349][ T3275] new mount options do not match the existing superblock, will be ignored 07:10:46 executing program 1: accept4$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) signalfd4(r1, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=@newlink={0x68, 0x10, 0x401, 0xfffffffe, 0x0, {}, [@IFLA_LINKINFO={0x40, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x8, 0x3, @initdev={0xac, 0x1e, 0x0, 0x0}}, @IFLA_IPTUN_6RD_PREFIX={0x14, 0xb, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @IFLA_IPTUN_6RD_PREFIX={0x14, 0xb, @private1={0xfc, 0x1, [], 0x1}}]}}}, @IFLA_MASTER={0x8}]}, 0x68}}, 0x0) sendmmsg$inet(r1, &(0x7f0000001e00)=[{{&(0x7f0000000340)={0x2, 0x4e24, @loopback}, 0x10, &(0x7f00000016c0)=[{&(0x7f0000000380)="d8a80088ed4bd9f063ff21ced83c7155ddd2dd615f8b9677c31f6ca9253ef948708ad48d31188596c9dd638fbf5cf3469e1bde22025b3da33c749db3c7bb093e3a2a2b7d926b95a8e712fa653951dc0423188d46d78c012b3cde18297cffcffe2c3ef7008d4e82e2f0d5f10e94ad8ddf771d89667bf590b98c46daefebb6499ffd5cd9e337f2037d5a3c60000c9d2d4bf98e1e84dc86ea8834b5e33b28ffae532416143b11a017c77a51d340c9fa58504964389a124a3d417167d0e4c857289f386e6d510c5a28024f2f68b11305729c9cd296c23e3ccbf4d8f2a30cf56408795ea46f57c83b93417d13b068c5f2e4568958e1", 0xf3}, {&(0x7f0000000480)="59b7e8287fb7829a51f497d0d3c828c7d913ceb61f1f6a284b12e13afb49b878a36789da896ea931b03f5048b8aec48f265110d6fa395a09635dac4f957357f07b5a3caf711c5a1ca1967a14e72f17d331376e5bd6c06c5ee8bfeb16373983f106ecf6fdd287d88e4c4da216ccf61adaa6f94f93f315e9512a3e294f17ff2882276b9661ae2b31fa56f6e02bea0fe5588f35197b3d3bed3967bdbcecdcb70d22f757c8862fa3", 0xa6}, {&(0x7f0000000540)="68c05d8cf5fbc889766095c815e131d2dab61f7024801c34d3e1d627053894acb696777eab1fa0ebd64d2bdc10707676e000b107e3e1c81eb56ea64e54aa53643580b82548aac1da41a323e216c7a4c387974805d93ff6e2d20b5e29ba35fb24610eb2e32178d19c29f098b5c3998ebe2d4a7ba648d5e37a15a0b32cad5bac4bfbac445ce5708b2c2f312ad572ad02551ea62c003c08bf19e7c1e064e186b887130850d3221e19564b614a772705d513a4c08f7c0b17ca1062af9677a8e23051c068ec9f24845ce269eb17cbaac34ae32a1f80782b81b1526a", 0xd9}, {&(0x7f0000000640)="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", 0x1000}, {&(0x7f0000001640)="0599087edaa9693ac2da533f6f9645c63b92ae07c65782fdb7f9281a7f101c3db3d1df9ef96feb3f6dfbdb0bd8f67c9247f8a25df13e7f5cddca26380fde82b8a5f66711b6115b80627c064046f79736cd03e944cdd77c0badb9742bcab35751", 0x60}], 0x5, &(0x7f0000001740)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r0, @remote, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x2c}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r0, @loopback, @loopback}}}], 0x58}}, {{&(0x7f00000017c0)={0x2, 0x4e20, @broadcast}, 0x10, &(0x7f0000001d80)=[{&(0x7f0000001800)="10aebf91e280496c4c013d38c2d4886dec82593c260028cdaf81c75ba9177e6db0f463314f92f427c6f27f64c48e72ade5424f44f7bc3eb978", 0x39}, {&(0x7f0000001840)="8c8faa8f04adcf5a8dbc29ab911e83d60e188bcf3ceec5aeee937c8d93ff058b9f83855003da5ff339657d4f902c946c0d144a01139eeb1790abd3fbb7c5a45dda39b3583e5b0272843f421c1d53ba436698d5660c461492b272bcb2f6ee95afe860d46e6c7e3852eec8e47a57fde890b525452e8c1bfc3defe2e3a3d90925466342d14734f6e1e5dc3b6a97e81e3bd392dfa08b506cf29be20bdc8a20cd51a60962ee2206f186bcd014d1718844739463ec7e44d8258823ea14c4b3d41c0d7867aaf9dfd5f20e4f57837d987b15028cce794dc31a852ff5a01c648eaadece48766d74e8c782b21ff3f10412550a3a85ddd9171b98ac97", 0xf7}, {&(0x7f0000001940)="779deaaa8c544ab1385b92a708f23bd1be0acdccc2b44fe83d2589eb23de6c8ee9de2041d604dbf1d0dcd25a33600673fff1e9f83e29f0f82d1e50f692d66708cbe8eedf6fb9be03148a1853fd033e6fb2843a4f38389a547b9fb1eb089d7883f48ba53d0a9d1c56d7", 0x69}, {&(0x7f00000019c0)="0ba7d4d5a6aea76e9cf8d29d553790f73b26072e464495ef129e68748d8e423ef4d1b2bb91fe19716302a669dcd9c50ea04a1f9f16bed657b48099ce724e9316c374989a0504a5a0de6ee3bd33cec0ff6072fc3d0fad7c603aef26aae420a2ca630780", 0x63}, {&(0x7f0000001a40)="ece4fa8f310da060f08b0369cfbaff83d8c20c99c39c7c3708e85cab004dd5d9b974912699fbd9b48a20b9fdb2f9491a269346b27bbe37d39db5023f3bbc3ed4cf8a94a745d2ca3bd9f4ea151ff939063c53c472703b214dd4487c065eb5fa35df5d7a99d9645fbc5e2b975a612e41af73b053e7406e65de12b428e2695c2f91da6e43334830b0f9cc6897f5bf7c282aeec946c5c845e4804c81469559a12f85a9291319b6a826136bd212fa3b50633aadadfa3c7b57ee5911f0ea758b847dd6702a5c20b2b375a02d2d56857c86b749c3bdce3e3c5ac21a34c880248a62bb3312919b1b196f347f94a8", 0xea}, {&(0x7f0000001b40)="544cfbf23a4fc7ceb82ba04df8524f3ae0b867aa65f1ef156bd9713c9f0752e9636bb8f4112b5ed20254d557d271e0a53a51e7a113959f796328cda3fa843eb7dcd7f6a60b1a9a88881de0a611dd8912846ad15e9927aa9efa030ff825d9ec54006f13f1dd02fb513eb29f2de74442989c91b51b3fe093ebbdfe3cd2033d1c22c343a513aea5f1064e4d273f114a8b4b664197b9ad3630c1588afe8aa9bcaf4be1f9193c67c28de4808c43a1d45ad3c67e87f6f7b07d96ad056a6e6b7060b22442804fc7802def0a8685f86e9e33186d3a414c32ebd6ea35a8763f50a4c7527e566c6cb5dfe31a", 0xe7}, {&(0x7f0000001c40)="8df32b3094f52e0af299fcf56993b8fa74053d65f9a87eed60701c2fb872f0eb41e2a04f7d4b8d03f46a8f32216424efbc97891e597d81244d56bd035a", 0x3d}, {&(0x7f0000001c80)="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", 0xfa}], 0x8}}], 0x2, 0x40004) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000001e80)=ANY=[@ANYBLOB="280000001900000429bd7000fbdbdf2580001003fe00c808002000000c00090005000101", @ANYRES32=r0, @ANYBLOB="40c6c425c910e2641ca7f33aee0bb9db7241f7"], 0x28}, 0x1, 0x0, 0x0, 0x840}, 0x20000000) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000180)=[{&(0x7f0000000200)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000000050000", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000000c0)={[{@delalloc='delalloc'}]}) 07:10:46 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:46 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x3a, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:46 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:46 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5", 0x18, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 157.817169][ T3286] FAULT_INJECTION: forcing a failure. [ 157.817169][ T3286] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 157.836883][ T3283] EXT4-fs (loop0): unsupported descriptor size 0 [ 157.857333][ T3285] new mount options do not match the existing superblock, will be ignored [ 157.873015][ T3283] incfs: Options parsing error. -22 [ 157.906590][ T3286] CPU: 1 PID: 3286 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 157.916752][ T3286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 157.926963][ T3286] Call Trace: [ 157.930236][ T3286] dump_stack+0x1d8/0x24e [ 157.934540][ T3286] ? devkmsg_release+0x11c/0x11c [ 157.939453][ T3286] ? show_regs_print_info+0x12/0x12 [ 157.944623][ T3286] ? __kasan_kmalloc+0x1a3/0x1e0 [ 157.949535][ T3286] ? preempt_count_add+0x66/0x130 [ 157.954532][ T3286] ? prep_new_page+0x122/0x370 [ 157.959270][ T3286] should_fail+0x6f6/0x860 [ 157.963661][ T3286] ? setup_fault_attr+0x3d0/0x3d0 [ 157.968660][ T3286] __alloc_pages_nodemask+0x1c4/0x880 [ 157.974005][ T3286] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 157.979525][ T3286] ? kvmalloc_node+0x7e/0xf0 [ 157.984101][ T3286] ? kvmalloc_node+0x7e/0xf0 [ 157.988664][ T3286] push_pipe+0x3c5/0x7e0 [ 157.992881][ T3286] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 157.998484][ T3286] ? stack_trace_snprint+0x150/0x150 [ 158.003739][ T3286] ? iov_iter_get_pages+0xec0/0xec0 [ 158.008910][ T3286] default_file_splice_read+0x208/0x970 [ 158.014425][ T3286] ? splice_direct_to_actor+0x999/0xb30 [ 158.019943][ T3286] ? do_splice_direct+0x28b/0x3e0 [ 158.024941][ T3286] ? do_syscall_64+0xcb/0x1e0 [ 158.029588][ T3286] ? __ia32_sys_tee+0xa0/0xa0 [ 158.034244][ T3286] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 158.040976][ T3286] ? selinux_file_permission+0x2d0/0x520 [ 158.046583][ T3286] ? security_file_permission+0x1e9/0x300 [ 158.052360][ T3286] ? __ia32_sys_tee+0xa0/0xa0 [ 158.057011][ T3286] splice_direct_to_actor+0x3f1/0xb30 [ 158.062357][ T3286] ? do_splice_direct+0x3e0/0x3e0 [ 158.067353][ T3286] ? pipe_to_sendpage+0x300/0x300 [ 158.072365][ T3286] ? security_file_permission+0x128/0x300 [ 158.078159][ T3286] do_splice_direct+0x28b/0x3e0 [ 158.082981][ T3286] ? splice_direct_to_actor+0xb30/0xb30 [ 158.088497][ T3286] ? security_file_permission+0x128/0x300 [ 158.094186][ T3286] do_sendfile+0x8e4/0x1140 [ 158.098665][ T3286] ? compat_writev+0x3c0/0x3c0 [ 158.103400][ T3286] ? vfs_write+0x422/0x4e0 [ 158.107793][ T3286] ? check_preemption_disabled+0x154/0x330 [ 158.113571][ T3286] __x64_sys_sendfile64+0x1c4/0x220 [ 158.118742][ T3286] ? __ia32_sys_sendfile+0x240/0x240 [ 158.123997][ T3286] do_syscall_64+0xcb/0x1e0 [ 158.128472][ T3286] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 158.134336][ T3286] RIP: 0033:0x466459 [ 158.138220][ T3286] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 07:10:46 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:46 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x3b, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:46 executing program 1: ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000000)=""/185) ioctl$TIOCL_SETVESABLANK(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x35, &(0x7f0000000100)="3f5dc80ac0a8e925822181ef66df0153abfeacf208234e8c793df8db9ea7a6a7cc6046124fe94d7bce83175eb5a0032a500dabd00a", 0xf4, 0x0, &(0x7f0000000140)="059882abc48b0e53331f55a09183f56e9144fa8847a36234b69470e4981132b028d212a9c725af9c87f7acd81862df505ee76e991451a93a766ec419e6a4b655fef7011c27cb17b774416be69172f5470d08c50ffbf99b784f0156ef92cda573d57c014b670d755bcd027c4b6636537a9bab1c4bb85d2137612a0927fece4d485ec526e19b5f27e893e49d8ae34ce6b30a29e374192163e907b06ba640f42ef58cd33fdecce099507dec41b44aa588b69bbc911ea3153782f512ee1378abed922e90b14777bf18103c343db815180070c54623fabe85c78233981920e7a0af6dfe4843b3d799788ba10082c798e37f7be62d71e3"}) [ 158.157883][ T3286] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 158.166281][ T3286] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 158.174223][ T3286] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 158.182182][ T3286] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 158.190125][ T3286] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 158.198068][ T3286] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 07:10:46 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = getpid() perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x6, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0xffffffff80000000, 0x1000, 0x1, 0xfffffffffffffff7, 0x4}, r0, 0x2, 0xffffffffffffffff, 0x2) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r1, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}, {&(0x7f0000000000)=""/65, 0x41}], 0x2, 0x23, 0x0) 07:10:46 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x3c, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:46 executing program 4 (fault-call:2 fault-nth:19): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:10:46 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0xe, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x101800, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x400) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) read$FUSE(0xffffffffffffffff, &(0x7f0000002140)={0x2020}, 0x2020) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)={0xb8, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_ADT={0x74, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa, 0x11, @remote}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP2={0xc, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @multicast2}}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0xf9}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PROTO={0x5, 0x7, 0x8}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x1}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_NAME={0x9, 0x12, 'syz2\x00'}}, {0x1c, 0x7, 0x0, 0x1, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @mcast1}}}]}, @IPSET_ATTR_ADT={0x24, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0xffffffffffffbd7e}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBMARK={0xc, 0x1b, 0x1, 0x0, 0x8}}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0xb8}}, 0x4000015) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x9, 0x9, 0x20, 0x7, 0x0, 0x7, 0x0, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x4, @perf_config_ext={0xb8, 0x80}, 0x3062, 0x9, 0xd599, 0x2, 0xffffffffffff0000, 0x5, 0x401}, r1, 0xc, 0xffffffffffffffff, 0x2) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x4e22, @local}, 0x10) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) sendfile(r5, r3, 0x0, 0x800100020001) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f00000000c0)={0x5, 0x5}) creat(&(0x7f0000000100)='./bus\x00', 0x0) 07:10:46 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 158.216674][ T3312] incfs: Options parsing error. -22 07:10:46 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x3e, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 158.254886][ T3309] EXT4-fs (loop0): unsupported descriptor size 0 07:10:46 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5", 0x18, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:10:46 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x41, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 158.319247][ T3334] FAULT_INJECTION: forcing a failure. [ 158.319247][ T3334] name failslab, interval 1, probability 0, space 0, times 0 [ 158.372600][ T3347] EXT4-fs (loop0): unsupported descriptor size 0 [ 158.387935][ T3334] CPU: 1 PID: 3334 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 158.398264][ T3334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 158.408305][ T3334] Call Trace: [ 158.411586][ T3334] dump_stack+0x1d8/0x24e [ 158.415906][ T3334] ? devkmsg_release+0x11c/0x11c [ 158.420828][ T3334] ? show_regs_print_info+0x12/0x12 [ 158.425130][ T3346] new mount options do not match the existing superblock, will be ignored [ 158.426013][ T3334] ? stack_trace_save+0x120/0x1f0 [ 158.426021][ T3334] ? stack_trace_snprint+0x150/0x150 [ 158.426039][ T3334] should_fail+0x6f6/0x860 [ 158.449199][ T3334] ? setup_fault_attr+0x3d0/0x3d0 [ 158.454226][ T3334] ? __kasan_kmalloc+0x1a3/0x1e0 [ 158.459159][ T3334] ? preempt_count_add+0x66/0x130 [ 158.464165][ T3334] ? prep_new_page+0x122/0x370 [ 158.468538][ T3354] incfs: Options parsing error. -22 [ 158.468908][ T3334] ? kmalloc_array+0x2b/0x40 [ 158.468918][ T3334] should_failslab+0x5/0x20 [ 158.468931][ T3334] __kmalloc+0x5f/0x2f0 [ 158.487273][ T3334] ? get_page_from_freelist+0x56c/0x890 [ 158.492794][ T3334] kmalloc_array+0x2b/0x40 [ 158.497248][ T3334] rw_copy_check_uvector+0xb1/0x2f0 [ 158.502430][ T3334] import_iovec+0x10d/0x380 [ 158.507220][ T3334] ? dup_iter+0x110/0x110 [ 158.511522][ T3334] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 158.517129][ T3334] vfs_readv+0x11d/0x1e0 [ 158.521548][ T3334] ? do_iter_write+0x570/0x570 [ 158.526288][ T3334] ? stack_trace_snprint+0x150/0x150 [ 158.531547][ T3334] ? iov_iter_get_pages+0xec0/0xec0 [ 158.536719][ T3334] default_file_splice_read+0x62b/0x970 [ 158.542245][ T3334] ? splice_direct_to_actor+0x999/0xb30 [ 158.547769][ T3334] ? do_splice_direct+0x28b/0x3e0 [ 158.552799][ T3334] ? __ia32_sys_tee+0xa0/0xa0 [ 158.557462][ T3334] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 158.564204][ T3334] ? selinux_file_permission+0x2d0/0x520 [ 158.569851][ T3334] ? security_file_permission+0x1e9/0x300 [ 158.575542][ T3334] ? __ia32_sys_tee+0xa0/0xa0 [ 158.580225][ T3334] splice_direct_to_actor+0x3f1/0xb30 [ 158.585594][ T3334] ? do_splice_direct+0x3e0/0x3e0 [ 158.590594][ T3334] ? pipe_to_sendpage+0x300/0x300 [ 158.595596][ T3334] ? security_file_permission+0x128/0x300 [ 158.601291][ T3334] do_splice_direct+0x28b/0x3e0 [ 158.606116][ T3334] ? splice_direct_to_actor+0xb30/0xb30 [ 158.611651][ T3334] ? security_file_permission+0x128/0x300 [ 158.617350][ T3334] do_sendfile+0x8e4/0x1140 [ 158.621836][ T3334] ? compat_writev+0x3c0/0x3c0 [ 158.626578][ T3334] ? vfs_write+0x422/0x4e0 [ 158.630984][ T3334] ? check_preemption_disabled+0x154/0x330 [ 158.636782][ T3334] __x64_sys_sendfile64+0x1c4/0x220 [ 158.641951][ T3334] ? __ia32_sys_sendfile+0x240/0x240 [ 158.647213][ T3334] do_syscall_64+0xcb/0x1e0 [ 158.651717][ T3334] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 158.657624][ T3334] RIP: 0033:0x466459 07:10:47 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = getpid() perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x6, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0xffffffff80000000, 0x1000, 0x1, 0xfffffffffffffff7, 0x4}, r0, 0x2, 0xffffffffffffffff, 0x2) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}, {&(0x7f0000000000)=""/65, 0x41}], 0x2, 0x23, 0x0) 07:10:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x42, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 158.661498][ T3334] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 158.681161][ T3334] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 158.689589][ T3334] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 158.697685][ T3334] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 158.706155][ T3334] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 158.714109][ T3334] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 07:10:47 executing program 4 (fault-call:2 fault-nth:20): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:10:47 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5", 0x18, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:10:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 158.722054][ T3334] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 07:10:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x43, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 158.790710][ T3363] EXT4-fs (loop0): unsupported descriptor size 0 [ 158.800539][ T3360] FAULT_INJECTION: forcing a failure. [ 158.800539][ T3360] name failslab, interval 1, probability 0, space 0, times 0 [ 158.805718][ T3363] incfs: Options parsing error. -22 [ 158.817146][ T3362] new mount options do not match the existing superblock, will be ignored [ 158.841954][ T3360] CPU: 0 PID: 3360 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 158.852114][ T3360] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 158.862683][ T3360] Call Trace: [ 158.865954][ T3360] dump_stack+0x1d8/0x24e [ 158.870261][ T3360] ? devkmsg_release+0x11c/0x11c [ 158.875284][ T3360] ? show_regs_print_info+0x12/0x12 [ 158.880455][ T3360] ? __kasan_kmalloc+0x1a3/0x1e0 [ 158.885541][ T3360] should_fail+0x6f6/0x860 [ 158.889932][ T3360] ? setup_fault_attr+0x3d0/0x3d0 [ 158.894927][ T3360] ? do_syscall_64+0xcb/0x1e0 [ 158.899577][ T3360] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 158.905616][ T3360] ? kvmalloc_node+0x7e/0xf0 [ 158.910177][ T3360] should_failslab+0x5/0x20 [ 158.914650][ T3360] __kmalloc+0x5f/0x2f0 [ 158.918779][ T3360] ? mutex_trylock+0xb0/0xb0 [ 158.923340][ T3360] kvmalloc_node+0x7e/0xf0 [ 158.927728][ T3360] seq_read+0x217/0xd10 [ 158.931855][ T3360] ? memset+0x1f/0x40 [ 158.935808][ T3360] ? prep_new_page+0x122/0x370 [ 158.940543][ T3360] ? seq_open+0x150/0x150 [ 158.944865][ T3360] proc_reg_read+0x225/0x350 [ 158.949430][ T3360] ? proc_reg_llseek+0x320/0x320 [ 158.954339][ T3360] ? security_file_permission+0x1e9/0x300 [ 158.960040][ T3360] do_iter_read+0x41b/0x5c0 [ 158.964518][ T3360] vfs_readv+0x154/0x1e0 [ 158.968732][ T3360] ? kvmalloc_node+0x7e/0xf0 [ 158.973295][ T3360] ? do_iter_write+0x570/0x570 [ 158.978030][ T3360] ? stack_trace_snprint+0x150/0x150 [ 158.983287][ T3360] ? iov_iter_get_pages+0xec0/0xec0 [ 158.988457][ T3360] default_file_splice_read+0x62b/0x970 [ 158.993974][ T3360] ? splice_direct_to_actor+0x999/0xb30 [ 158.999489][ T3360] ? do_splice_direct+0x28b/0x3e0 [ 159.004484][ T3360] ? __ia32_sys_tee+0xa0/0xa0 [ 159.009568][ T3360] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 159.016299][ T3360] ? selinux_file_permission+0x2d0/0x520 [ 159.021914][ T3360] ? security_file_permission+0x1e9/0x300 [ 159.027603][ T3360] ? __ia32_sys_tee+0xa0/0xa0 [ 159.032253][ T3360] splice_direct_to_actor+0x3f1/0xb30 [ 159.037619][ T3360] ? do_splice_direct+0x3e0/0x3e0 [ 159.042614][ T3360] ? pipe_to_sendpage+0x300/0x300 [ 159.047631][ T3360] ? security_file_permission+0x128/0x300 [ 159.053323][ T3360] do_splice_direct+0x28b/0x3e0 [ 159.058147][ T3360] ? splice_direct_to_actor+0xb30/0xb30 [ 159.063663][ T3360] ? security_file_permission+0x128/0x300 [ 159.069442][ T3360] do_sendfile+0x8e4/0x1140 [ 159.073925][ T3360] ? compat_writev+0x3c0/0x3c0 [ 159.078672][ T3360] ? vfs_write+0x422/0x4e0 [ 159.083167][ T3360] ? check_preemption_disabled+0x154/0x330 [ 159.088983][ T3360] __x64_sys_sendfile64+0x1c4/0x220 [ 159.094151][ T3360] ? __ia32_sys_sendfile+0x240/0x240 [ 159.099405][ T3360] do_syscall_64+0xcb/0x1e0 [ 159.103879][ T3360] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 159.109851][ T3360] RIP: 0033:0x466459 [ 159.113714][ T3360] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 159.133290][ T3360] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 07:10:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="18020000000000000000000000000020850000002c0000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f0000001400)=""/4106, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x18) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="340000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="00004c7c0000010060dc2ef5c2414f257c48e50340021e9c9cd57809360f6eb9f6ec35296352cf116c3c89542ad0ff04067cf6a71f1ecbabf8e1b13f49307c37d79e363de6caba3e73bec4f39accfcd895677f8769f195a7fafcf5934394a4f4da19d0285340dce2b6d3ba56f9c0618b473a39b88c6290c2f39fc3816ef0f7afc54c00d6f4c0b023d3a80ad5807977d3b220a403a7dd819e0e6640a511bda97cdf20e3719036aeb6a157d5bf1008c01684b6742d2e622d1d3800"/197, @ANYRES32=r1, @ANYBLOB="08001b0000000000"], 0x34}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:10:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:47 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = getpid() perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x6, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0xffffffff80000000, 0x1000, 0x1, 0xfffffffffffffff7, 0x4}, r0, 0x2, 0xffffffffffffffff, 0x2) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}, {&(0x7f0000000000)=""/65, 0x41}], 0x2, 0x23, 0x0) 07:10:47 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378", 0x1c, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:10:47 executing program 4 (fault-call:2 fault-nth:21): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:10:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x46, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 159.141669][ T3360] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 159.149699][ T3360] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 159.157667][ T3360] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 159.165609][ T3360] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 159.173553][ T3360] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 07:10:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x48, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:47 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378", 0x1c, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:10:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 159.264487][ T3384] EXT4-fs (loop0): unsupported descriptor size 0 [ 159.267163][ T3385] FAULT_INJECTION: forcing a failure. [ 159.267163][ T3385] name failslab, interval 1, probability 0, space 0, times 0 [ 159.270974][ T3382] new mount options do not match the existing superblock, will be ignored [ 159.293799][ T3384] incfs: Options parsing error. -22 [ 159.311128][ T3393] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 159.323255][ T3385] CPU: 1 PID: 3385 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 159.327155][ T3393] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 159.333401][ T3385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 159.333404][ T3385] Call Trace: [ 159.333420][ T3385] dump_stack+0x1d8/0x24e [ 159.333431][ T3385] ? devkmsg_release+0x11c/0x11c [ 159.333439][ T3385] ? show_regs_print_info+0x12/0x12 [ 159.333449][ T3385] ? check_preemption_disabled+0x154/0x330 [ 159.333457][ T3385] ? stack_trace_save+0x1f0/0x1f0 [ 159.333472][ T3385] should_fail+0x6f6/0x860 [ 159.385558][ T3385] ? setup_fault_attr+0x3d0/0x3d0 [ 159.390567][ T3385] ? is_bpf_text_address+0x280/0x2a0 [ 159.395824][ T3385] ? __alloc_skb+0x75/0x4d0 [ 159.400309][ T3385] should_failslab+0x5/0x20 [ 159.404784][ T3385] kmem_cache_alloc+0x36/0x290 [ 159.409519][ T3385] ? unwind_get_return_address+0x48/0x80 [ 159.415121][ T3385] __alloc_skb+0x75/0x4d0 [ 159.419423][ T3385] alloc_skb_with_frags+0xad/0x5a0 [ 159.424507][ T3385] ? stack_trace_snprint+0x150/0x150 [ 159.429764][ T3385] sock_alloc_send_pskb+0x86d/0xcb0 [ 159.434937][ T3385] ? do_sendfile+0x8e4/0x1140 [ 159.439673][ T3385] ? sock_kzfree_s+0x50/0x50 [ 159.444236][ T3385] ? _raw_spin_lock+0xa3/0x1b0 [ 159.448970][ T3385] ? _raw_spin_trylock_bh+0x1a0/0x1a0 [ 159.454313][ T3385] ? check_preemption_disabled+0x154/0x330 [ 159.460192][ T3385] unix_stream_sendpage+0x753/0x12d0 [ 159.465454][ T3385] ? unix_stream_recvmsg+0x1e0/0x1e0 [ 159.470718][ T3385] ? iov_iter_advance+0xc60/0xee0 [ 159.475800][ T3385] ? unix_stream_recvmsg+0x1e0/0x1e0 [ 159.481055][ T3385] sock_sendpage+0xd0/0x120 [ 159.485531][ T3385] pipe_to_sendpage+0x23b/0x300 [ 159.490351][ T3385] ? sock_fasync+0xf0/0xf0 [ 159.494739][ T3385] ? generic_splice_sendpage+0x210/0x210 [ 159.500345][ T3385] ? __ia32_sys_tee+0xa0/0xa0 [ 159.504993][ T3385] __splice_from_pipe+0x2d3/0x870 [ 159.509992][ T3385] ? generic_splice_sendpage+0x210/0x210 [ 159.515595][ T3385] generic_splice_sendpage+0x181/0x210 [ 159.521043][ T3385] ? iter_file_splice_write+0xf20/0xf20 [ 159.526579][ T3385] ? direct_splice_actor+0x25/0x120 [ 159.531762][ T3385] splice_direct_to_actor+0x4b4/0xb30 [ 159.537105][ T3385] ? do_splice_direct+0x3e0/0x3e0 [ 159.542101][ T3385] ? pipe_to_sendpage+0x300/0x300 [ 159.547272][ T3385] ? security_file_permission+0x128/0x300 [ 159.552973][ T3385] do_splice_direct+0x28b/0x3e0 [ 159.557800][ T3385] ? splice_direct_to_actor+0xb30/0xb30 [ 159.563320][ T3385] ? security_file_permission+0x128/0x300 [ 159.569012][ T3385] do_sendfile+0x8e4/0x1140 [ 159.573489][ T3385] ? compat_writev+0x3c0/0x3c0 [ 159.578224][ T3385] ? vfs_write+0x422/0x4e0 [ 159.582638][ T3385] ? check_preemption_disabled+0x154/0x330 [ 159.588590][ T3385] __x64_sys_sendfile64+0x1c4/0x220 [ 159.593761][ T3385] ? __ia32_sys_sendfile+0x240/0x240 [ 159.599042][ T3385] do_syscall_64+0xcb/0x1e0 [ 159.603517][ T3385] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 159.609384][ T3385] RIP: 0033:0x466459 07:10:48 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = getpid() perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x6, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0xffffffff80000000, 0x1000, 0x1, 0xfffffffffffffff7, 0x4}, r0, 0x2, 0xffffffffffffffff, 0x2) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}, {&(0x7f0000000000)=""/65, 0x41}], 0x2, 0x23, 0x0) [ 159.613251][ T3385] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 159.632835][ T3385] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 159.641226][ T3385] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 159.649176][ T3385] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 159.657129][ T3385] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 07:10:48 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x49, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:48 executing program 1: r0 = perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x5, 0x1, 0x5, 0x68, 0x0, 0xfffffffffffffff9, 0x80002, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x8000000000000000}, 0x0, 0x400, 0x0, 0x9, 0xffffffffffff8000, 0x4, 0x4}, r1, 0xffffffffffffffff, r0, 0x2) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) mkdir(&(0x7f00000002c0)='./file1\x00', 0x0) mount$overlay(0x0, 0x0, 0x0, 0x100002, 0x0) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = gettid() sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@cred={{0x1c, 0x1, 0x2, {r3, 0x0, r2}}}], 0x20}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f0000000140)='./bus/file0\x00', 0x40, 0x2, &(0x7f0000000380)=[{&(0x7f0000000480)="4a7508bc83510878179b19a4b991bb919b1ac0f80ea110a50c25687c90b3abec22c77e08273271c7f1fbb0591d7be195efea5840f809af1b6d6224bd5ec5cbf7c2e5e967b541fc64df9502a4c62f66801ee346edf8ddea7a4fc88bf724b3e3b743b9e9a6c8fcb9cee6c8ca581ff5749320464aa4f66614139b73ffcaf5154e", 0x7f}, {&(0x7f00000006c0)="2c00a2ce65f9a63c17117c84c6bdf8513cc942ec92f408f5bcd081e9ea73357b008172c0b3bbe8714c786574c3fcbefa0308e42a187b4e219be1c85a4391a211848d3418b6aae125c1c3c23534e976d9e981b74f7516af4696d91e7268337acfd8166cff6588011fa825e35f3b509ad87e4e0bc029e29c8077708fdab8b25dbc77abbe483d1189dbf672f9109af14c7a0985fc58fc20375bdd5a5da1", 0x9c, 0x8}], 0x1004000, &(0x7f00000008c0)=ANY=[@ANYBLOB='huge=within_size,gid=', @ANYRESHEX=0xee01, @ANYBLOB="2c6d706f6c3d696e7465726c656176653d7374617469632c6769643dd9c4304f1cb3e5f399bd8ccba2e240513094da9e9de853d1320a79712f020c8cb3a6cfa226228faa6b58c0c6e7b968ac16b5535b82ede3d72b77789f1e70c8878885b5e29b0ad1ac1e0e22a5de1f555c31d228ce6293f37aeb2f52a1168bff2bf82fc0d7c98c7f69dc0c17202b2f0da955686e6d", @ANYRESHEX=r2, @ANYBLOB=',huge=never,gid=', @ANYRESHEX=0xee01, @ANYBLOB=',huge=advise,rootcontext=sysadm_u,subj_role=overlay\x00,\x00']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000680)='./bus/file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000640)=@v2={0x2000000, [{0x2, 0x8}]}, 0x14, 0x0) chdir(&(0x7f00000001c0)='./bus\x00') truncate(&(0x7f0000000340)='./bus/file0\x00', 0xf0) 07:10:48 executing program 4 (fault-call:2 fault-nth:22): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) [ 159.665106][ T3385] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 159.673057][ T3385] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 [ 159.681334][ C1] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! 07:10:48 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378", 0x1c, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:10:48 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x4a, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:48 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = getpid() perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x6, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0xffffffff80000000, 0x1000, 0x1, 0xfffffffffffffff7, 0x4}, r0, 0x2, 0xffffffffffffffff, 0x2) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r1, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}, {&(0x7f0000000000)=""/65, 0x41}], 0x2, 0x23, 0x0) 07:10:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 159.722940][ T3403] EXT4-fs (loop0): unsupported descriptor size 0 [ 159.732999][ T3403] incfs: Options parsing error. -22 [ 159.755336][ T3407] new mount options do not match the existing superblock, will be ignored [ 159.776794][ T3417] FAULT_INJECTION: forcing a failure. [ 159.776794][ T3417] name failslab, interval 1, probability 0, space 0, times 0 [ 159.793795][ T3420] EXT4-fs (loop0): unsupported descriptor size 0 [ 159.801187][ T3417] CPU: 0 PID: 3417 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 159.811355][ T3417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 159.822094][ T3417] Call Trace: 07:10:48 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = getpid() perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x6, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0xffffffff80000000, 0x1000, 0x1, 0xfffffffffffffff7, 0x4}, r0, 0x2, 0xffffffffffffffff, 0x2) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r1, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}, {&(0x7f0000000000)=""/65, 0x41}], 0x2, 0x23, 0x0) [ 159.825567][ T3417] dump_stack+0x1d8/0x24e [ 159.831899][ T3417] ? devkmsg_release+0x11c/0x11c [ 159.836833][ T3417] ? show_regs_print_info+0x12/0x12 [ 159.841415][ T3425] new mount options do not match the existing superblock, will be ignored [ 159.844154][ T3417] should_fail+0x6f6/0x860 [ 159.844166][ T3417] ? setup_fault_attr+0x3d0/0x3d0 [ 159.844177][ T3417] ? alloc_skb_with_frags+0xad/0x5a0 [ 159.844185][ T3417] should_failslab+0x5/0x20 [ 159.844202][ T3417] __kmalloc_track_caller+0x5d/0x2e0 [ 159.877292][ T3417] ? kmem_cache_alloc+0x115/0x290 [ 159.882323][ T3417] ? unwind_get_return_address+0x48/0x80 [ 159.887946][ T3417] ? alloc_skb_with_frags+0xad/0x5a0 [ 159.893311][ T3417] __alloc_skb+0xaf/0x4d0 [ 159.896193][ T3415] overlayfs: overlapping lowerdir path [ 159.897629][ T3417] alloc_skb_with_frags+0xad/0x5a0 [ 159.897639][ T3417] ? stack_trace_snprint+0x150/0x150 [ 159.897655][ T3417] sock_alloc_send_pskb+0x86d/0xcb0 [ 159.919055][ T3417] ? do_sendfile+0x8e4/0x1140 07:10:48 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5277033780100", 0x1e, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 159.923721][ T3417] ? sock_kzfree_s+0x50/0x50 [ 159.928303][ T3417] ? _raw_spin_lock+0xa3/0x1b0 [ 159.933055][ T3417] ? _raw_spin_trylock_bh+0x1a0/0x1a0 [ 159.941976][ T3417] ? check_preemption_disabled+0x154/0x330 [ 159.942293][ T3415] overlayfs: 'file0' not a directory [ 159.947769][ T3417] unix_stream_sendpage+0x753/0x12d0 [ 159.947783][ T3417] ? unix_stream_recvmsg+0x1e0/0x1e0 [ 159.947793][ T3417] ? iov_iter_advance+0xc60/0xee0 [ 159.947809][ T3417] ? unix_stream_recvmsg+0x1e0/0x1e0 07:10:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:48 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5277033780100", 0x1e, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:10:48 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x4b, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 159.969519][ T3415] overlayfs: filesystem on './bus' not supported as upperdir [ 159.970172][ T3417] sock_sendpage+0xd0/0x120 [ 159.970188][ T3417] pipe_to_sendpage+0x23b/0x300 [ 159.970199][ T3417] ? sock_fasync+0xf0/0xf0 [ 159.984110][ T3420] incfs: Options parsing error. -22 [ 159.987319][ T3417] ? generic_splice_sendpage+0x210/0x210 [ 159.987327][ T3417] ? __ia32_sys_tee+0xa0/0xa0 [ 159.987341][ T3417] __splice_from_pipe+0x2d3/0x870 [ 160.017058][ T3417] ? generic_splice_sendpage+0x210/0x210 [ 160.022732][ T3417] generic_splice_sendpage+0x181/0x210 07:10:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 160.028192][ T3417] ? iter_file_splice_write+0xf20/0xf20 [ 160.033739][ T3417] ? direct_splice_actor+0x25/0x120 [ 160.038930][ T3417] splice_direct_to_actor+0x4b4/0xb30 [ 160.044295][ T3417] ? do_splice_direct+0x3e0/0x3e0 [ 160.049310][ T3417] ? pipe_to_sendpage+0x300/0x300 [ 160.054328][ T3417] ? security_file_permission+0x128/0x300 [ 160.060039][ T3417] do_splice_direct+0x28b/0x3e0 [ 160.064884][ T3417] ? splice_direct_to_actor+0xb30/0xb30 [ 160.070421][ T3417] ? security_file_permission+0x128/0x300 [ 160.076125][ T3417] do_sendfile+0x8e4/0x1140 [ 160.080623][ T3417] ? compat_writev+0x3c0/0x3c0 [ 160.085384][ T3417] ? vfs_write+0x422/0x4e0 [ 160.089792][ T3417] ? check_preemption_disabled+0x154/0x330 [ 160.095691][ T3417] __x64_sys_sendfile64+0x1c4/0x220 [ 160.100883][ T3417] ? __ia32_sys_sendfile+0x240/0x240 [ 160.106163][ T3417] do_syscall_64+0xcb/0x1e0 [ 160.110665][ T3417] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 160.116548][ T3417] RIP: 0033:0x466459 07:10:48 executing program 1: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = getpid() perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x6, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0xffffffff80000000, 0x1000, 0x1, 0xfffffffffffffff7, 0x4}, r0, 0x2, 0xffffffffffffffff, 0x2) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r1, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}, {&(0x7f0000000000)=""/65, 0x41}], 0x2, 0x23, 0x0) [ 160.120439][ T3417] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 160.140020][ T3417] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 160.148405][ T3417] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 160.156380][ T3417] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 160.165977][ T3417] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 07:10:48 executing program 4 (fault-call:2 fault-nth:23): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:10:48 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5277033780100", 0x1e, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:10:48 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x4c, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:48 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = getpid() perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x6, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0xffffffff80000000, 0x1000, 0x1, 0xfffffffffffffff7, 0x4}, r0, 0x2, 0xffffffffffffffff, 0x2) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r1, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}, {&(0x7f0000000000)=""/65, 0x41}], 0x2, 0x23, 0x0) [ 160.173922][ T3417] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 160.181969][ T3417] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 07:10:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 160.243582][ T3450] EXT4-fs (loop0): unsupported descriptor size 0 [ 160.254108][ T3458] FAULT_INJECTION: forcing a failure. [ 160.254108][ T3458] name failslab, interval 1, probability 0, space 0, times 0 [ 160.279952][ T3450] incfs: Options parsing error. -22 07:10:48 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) getpid() r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}, {&(0x7f0000000000)=""/65, 0x41}], 0x2, 0x23, 0x0) [ 160.290940][ T3457] new mount options do not match the existing superblock, will be ignored [ 160.297341][ T3458] CPU: 1 PID: 3458 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 160.309578][ T3458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 160.319657][ T3458] Call Trace: [ 160.322939][ T3458] dump_stack+0x1d8/0x24e [ 160.327260][ T3458] ? devkmsg_release+0x11c/0x11c [ 160.332190][ T3458] ? show_regs_print_info+0x12/0x12 [ 160.337542][ T3458] ? refcount_add_not_zero_checked+0x18b/0x250 [ 160.343735][ T3458] ? _raw_spin_lock+0xa3/0x1b0 [ 160.348512][ T3458] should_fail+0x6f6/0x860 [ 160.352900][ T3458] ? setup_fault_attr+0x3d0/0x3d0 [ 160.357897][ T3458] ? unix_stream_sendpage+0x106a/0x12d0 [ 160.363414][ T3458] ? kvmalloc_node+0x7e/0xf0 [ 160.367978][ T3458] should_failslab+0x5/0x20 [ 160.372454][ T3458] __kmalloc+0x5f/0x2f0 [ 160.376589][ T3458] kvmalloc_node+0x7e/0xf0 [ 160.380978][ T3458] iov_iter_get_pages_alloc+0xb7f/0x1070 [ 160.386589][ T3458] ? iov_iter_get_pages+0xec0/0xec0 [ 160.391762][ T3458] ? unix_stream_recvmsg+0x1e0/0x1e0 [ 160.397021][ T3458] default_file_splice_read+0x208/0x970 [ 160.402554][ T3458] ? sock_fasync+0xf0/0xf0 [ 160.406955][ T3458] ? __ia32_sys_tee+0xa0/0xa0 [ 160.411607][ T3458] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 160.418342][ T3458] ? selinux_file_permission+0x2d0/0x520 [ 160.424059][ T3458] ? security_file_permission+0x1e9/0x300 [ 160.429762][ T3458] ? __ia32_sys_tee+0xa0/0xa0 [ 160.434408][ T3458] splice_direct_to_actor+0x3f1/0xb30 [ 160.439753][ T3458] ? do_splice_direct+0x3e0/0x3e0 [ 160.444749][ T3458] ? pipe_to_sendpage+0x300/0x300 [ 160.449770][ T3458] ? security_file_permission+0x128/0x300 [ 160.455556][ T3458] do_splice_direct+0x28b/0x3e0 [ 160.460380][ T3458] ? splice_direct_to_actor+0xb30/0xb30 [ 160.465897][ T3458] ? security_file_permission+0x128/0x300 [ 160.471602][ T3458] do_sendfile+0x8e4/0x1140 [ 160.476077][ T3458] ? compat_writev+0x3c0/0x3c0 [ 160.480811][ T3458] ? vfs_write+0x422/0x4e0 [ 160.485198][ T3458] ? check_preemption_disabled+0x154/0x330 [ 160.490974][ T3458] __x64_sys_sendfile64+0x1c4/0x220 [ 160.496142][ T3458] ? __ia32_sys_sendfile+0x240/0x240 [ 160.501400][ T3458] do_syscall_64+0xcb/0x1e0 [ 160.505875][ T3458] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 160.511738][ T3458] RIP: 0033:0x466459 [ 160.515602][ T3458] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 160.535174][ T3458] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 07:10:49 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:10:49 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x81, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000008c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10003, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528aa05}], 0x1, 0x0) sched_setattr(r0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x80800) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x1, 0xfe, 0x7, 0x0, 0x0, 0x0, 0x33002, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0), 0x8}, 0x9110, 0x8, 0x0, 0x5, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x2) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f00000004c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x2, 0x6, 0xffffffffffffffff, &(0x7f0000000500)="14c71e93ed191835efcf06bc46607defcdf3f7c6c6f6b8650e554d9da8dd5cb5af93ef10dd38876d7544f8b4ed528b42480607cea96620f79e3d66b528be1d01ad88dd52d5972e52e0b60d51db84b8d146c1201fe2aa1e477ab8e50051a0d0a73d1b09347ce35c4799d35c2fd6fd8a4f9a86ba046ff87fce07a8973c9e6335ed6571684a5c4dca6bfcf6382069f7d4e385c0daea78", 0x95, 0x8000000, 0x0, 0x1, r3}]) r5 = socket$inet(0x2, 0x2, 0x2) bind$inet(r5, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) setsockopt$SO_TIMESTAMP(r5, 0x1, 0x1d, &(0x7f0000000280)=0xfffffffe, 0x4) connect$inet(r5, &(0x7f00000002c0)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x20000840, 0x0, 0x14) recvmmsg(r5, &(0x7f0000003c80), 0x38e, 0x62, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xb, 0x10, r4, 0xd44fe000) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x4e22, 0x100, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@multicast1, @in6=@dev={0xfe, 0x80, [], 0x10}, 0x4e20, 0x8, 0x4e20, 0x0, 0x2, 0x0, 0x0, 0x21, 0x0, 0xffffffffffffffff}, {0xfffffffffffffff9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x3}, {0xffffffff, 0x0, 0x40000000ffff, 0xfffffffffffffffe}, 0x0, 0x0, 0x80000000000001, 0x1, 0x0, 0x3}, {{@in=@multicast2, 0x4d5, 0xff}, 0xa, @in=@rand_addr=0x64010102, 0x100000, 0x1, 0x0, 0xfb}}, 0xe8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'veth1_vlan\x00'}) 07:10:49 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x4d, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:49 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:49 executing program 4 (fault-call:2 fault-nth:24): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:10:49 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x4e, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 160.543561][ T3458] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 160.552112][ T3458] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 160.560076][ T3458] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 160.568020][ T3458] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 160.575964][ T3458] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 07:10:49 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}, {&(0x7f0000000000)=""/65, 0x41}], 0x2, 0x23, 0x0) 07:10:49 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:49 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x2, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 160.648326][ T3476] EXT4-fs (loop0): unsupported descriptor size 0 [ 160.665951][ T3481] FAULT_INJECTION: forcing a failure. [ 160.665951][ T3481] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 160.681463][ T3481] CPU: 1 PID: 3481 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 160.691605][ T3481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 160.701633][ T3481] Call Trace: [ 160.704900][ T3481] dump_stack+0x1d8/0x24e [ 160.709209][ T3481] ? devkmsg_release+0x11c/0x11c [ 160.714315][ T3481] ? show_regs_print_info+0x12/0x12 [ 160.719488][ T3481] ? __kasan_kmalloc+0x1a3/0x1e0 [ 160.724503][ T3481] ? __kmalloc+0x174/0x2f0 [ 160.728908][ T3481] ? kvmalloc_node+0x7e/0xf0 [ 160.733471][ T3481] ? iov_iter_get_pages_alloc+0xb7f/0x1070 [ 160.739249][ T3481] ? default_file_splice_read+0x208/0x970 [ 160.744942][ T3481] should_fail+0x6f6/0x860 [ 160.749331][ T3481] ? setup_fault_attr+0x3d0/0x3d0 [ 160.754369][ T3481] __alloc_pages_nodemask+0x1c4/0x880 [ 160.759728][ T3481] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 160.765264][ T3481] ? kvmalloc_node+0x7e/0xf0 [ 160.769836][ T3481] push_pipe+0x3c5/0x7e0 [ 160.774059][ T3481] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 160.779670][ T3481] ? iov_iter_get_pages+0xec0/0xec0 [ 160.784847][ T3481] ? unix_stream_recvmsg+0x1e0/0x1e0 [ 160.790108][ T3481] default_file_splice_read+0x208/0x970 [ 160.795665][ T3481] ? sock_fasync+0xf0/0xf0 [ 160.800054][ T3481] ? __ia32_sys_tee+0xa0/0xa0 [ 160.804708][ T3481] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 160.811463][ T3481] ? selinux_file_permission+0x2d0/0x520 [ 160.817074][ T3481] ? security_file_permission+0x1e9/0x300 [ 160.822764][ T3481] ? __ia32_sys_tee+0xa0/0xa0 [ 160.827429][ T3481] splice_direct_to_actor+0x3f1/0xb30 [ 160.832799][ T3481] ? do_splice_direct+0x3e0/0x3e0 [ 160.837899][ T3481] ? pipe_to_sendpage+0x300/0x300 [ 160.843235][ T3481] ? security_file_permission+0x128/0x300 [ 160.849107][ T3481] do_splice_direct+0x28b/0x3e0 [ 160.853934][ T3481] ? splice_direct_to_actor+0xb30/0xb30 [ 160.859543][ T3481] ? security_file_permission+0x128/0x300 [ 160.865235][ T3481] do_sendfile+0x8e4/0x1140 [ 160.869728][ T3481] ? compat_writev+0x3c0/0x3c0 [ 160.874475][ T3481] ? vfs_write+0x422/0x4e0 [ 160.878983][ T3481] ? check_preemption_disabled+0x154/0x330 [ 160.884761][ T3481] __x64_sys_sendfile64+0x1c4/0x220 [ 160.889947][ T3481] ? __ia32_sys_sendfile+0x240/0x240 [ 160.895219][ T3481] do_syscall_64+0xcb/0x1e0 [ 160.899697][ T3481] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 160.905570][ T3481] RIP: 0033:0x466459 [ 160.909437][ T3481] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 160.929099][ T3481] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 160.937490][ T3481] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 07:10:49 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:10:49 executing program 4 (fault-call:2 fault-nth:25): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:10:49 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) r2 = gettid() setns(r1, 0x40000000) perf_event_open(0x0, r2, 0x0, r0, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x80100, 0x0) r4 = getpid() perf_event_open(0x0, r4, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x70d79c87c2598c01, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0x6, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x5}, 0x8, 0x10, &(0x7f00000003c0)={0x1, 0x9, 0x9}, 0x10}, 0x78) fcntl$setstatus(r5, 0x4, 0x0) r6 = signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000140)=0x107) read$FUSE(r6, &(0x7f0000002140)={0x2020}, 0x2020) sendmsg$IPSET_CMD_TEST(r6, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)={0xa8, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_ADT={0x64, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa, 0x11, @remote}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP2={0xc, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @multicast2}}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0xf9}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PROTO={0x5, 0x7, 0x8}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x1}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_NAME={0x9, 0x12, 'syz2\x00'}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PROTO={0x5, 0x7, 0x32}}]}, @IPSET_ATTR_ADT={0x24, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0xffffffffffffbd7e}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBMARK={0xc, 0x1b, 0x1, 0x0, 0x8}}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0xa8}}, 0x4000015) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3, 0x6, 0x8, 0x99, 0x0, 0x100000001, 0x75000, 0x4, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x10000, 0x1, @perf_config_ext={0xff, 0x200}, 0x2532, 0x0, 0x7, 0x5, 0x8, 0x0, 0x20}, 0x0, 0x0, r6, 0xb) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000ec0)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000043fe0000070200002ee60000bf050000000000001f650000000000006507000002000000270700004c0000001f75000000000000bf5400000000002e9464da3eb1a70007040000f0fff8ffad430100000000009500000000000000050000000000000095000000000000001c0a7900009d3c2792432a4faee994a5642c6b940fb102879f60000000000000637e60bd5db64b6792de991371274fdff6e79fc722f15659a7c85615c1b88bc894123cfe2314e887efecdcb7381ef4932cb0dcebea6d90e9c1677ffefd35893d883a2c559b7a34db461b1974af360eace66cec40d92706d0bbcc5bf6fec345ae9606c3c1a348f9b395592c1018e5e4b41b13000c94df1f2db24c67d4c7ba9ec035883e2791e9e9dff3e8bfc7d1be000080820102b19000000000000000000000001e3a3412086dee84efd375f0645f0008f55d3b9efdfbed9b430bcf0418e100bdff1c8bcfc0c229874bc3d2418bab997c8bef9aa55841caa572ddff9220c67c9e17bee524c3dc747445763ecb0a7f2cd12bc34b0fc0271124cfb5279195f701000000f77c71294bbfd85078726ce8eb89f722e38397996271700241454d272dd8b754b2dd36d44f92991a7817450bc7921dd372e621dd447b86e7ffd1bdc198deb495cac0995ca3ef6c1affb693ae366b0f11db6ee4830db4713e5ce6cac6ad7e292271b8e9f172000800000000000018be45c50b3fc005fa7b134dfc948f6015e0389d7f34cb9c02cf517c8ed797b6159c1446ef1c2ccff2bde95aa860ed9b836d6b8fcab7663d9bd8215e6f90fdb007b8f3e08de30c1df1147c9f5013c82fc98604bd70cd56609a6b73943748a90002d9cf81bcb1d262845762f6b0a284cc46de42492bab0f7b25895cc3ba8bf0b5e0fc018463d01b73fa85429725545128b0e9b550a13d0dd35092250bbce4f618cad2375a34c7f15c3096f300004468cf1aba4a6f21ed0eb36a1c696320251b7eab79ad8b126500419e25a94ce13a7a96deac79c903000000000000000d814f230f954eec940b84ebda9fb397c51f23b12f761c4a0335cce4fbe7baafc8d0a6c6d8d0ebc2a2e97f0629999534273e023fd6c300000000000000000000000000000000000000000000058353fee6651171c6a6a9209e92300d9f02421e594a545517a2445b2305d459b968643bbb803a6de96b60353a4b8bf389a1944288d07f7b044ba919f8fa52e6dd542b743cc24ba42f85395cb271d2e27cd0f807713b871e276c1b636cebd9e84a081ba873afbb1e1ed6296c475874c2f78378aa7c5b9bd86fbf999fb3115a587e63d9dee88ddf7aef0fe20000000000000036082fce082ce2b233fae7a8f6d2c4535d31012a4a52ea150f235f9c364bb0c7a9fd03b243f060751cb57e0013264551b9de12b9f047da59fb71315b79b208cfde99f1f23171ac2378e839fa3739e9a1d015e3ac123e24318b271e68dc33f4a2a7a15aef7af231c4fb78b87ae7e72d315680addb801ea25be7d81c21ec5ca36e9fa5470a6d315b19b7d23f7e9c1fc5cccf341ed0"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x3f00) 07:10:49 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}, {&(0x7f0000000000)=""/65, 0x41}], 0x2, 0x23, 0x0) 07:10:49 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x7fffffe, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 160.945436][ T3481] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 160.953379][ T3481] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 160.961338][ T3481] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 160.969292][ T3481] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 [ 160.992531][ T3489] incfs: Options parsing error. -22 07:10:49 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:49 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) write(r1, &(0x7f0000001240)="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", 0xef1) mmap(&(0x7f000060d000/0x2000)=nil, 0x2000, 0x1, 0x4000010, r1, 0x1dcef000) r2 = socket(0x10, 0x80002, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='oom_score\x00') r4 = signalfd4(r3, &(0x7f00000001c0)={[0x8001]}, 0x8, 0x80000) r5 = fsmount(r4, 0x1, 0xf4) r6 = fsmount(r0, 0x1, 0x2) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r6, &(0x7f0000000040)={0x10000011}) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="4000000010000507000000000000000003000000", @ANYRES32=0x0, @ANYBLOB="0035580000000000200012800e0001000f42366772487461700000000c0002800600028000000000114387724be4ba0d8ad63eca893adf74a6443794b74de4325837cfc3c68ddb90d413bdfc6436ead45d2cd85bb18005c644be8bbbcf115638bb4b841ed3ee236c0d5196089af4ec4033ecc2eba339d1f79e2f69d30a4d31f315d2aa309d79a8ffcbf306efc27337d7b056ad95e40be257ca6ef47f47e335"], 0x40}}, 0x0) 07:10:49 executing program 2: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}, {&(0x7f0000000000)=""/65, 0x41}], 0x2, 0x23, 0x0) 07:10:49 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 161.051022][ T3501] EXT4-fs (loop0): unsupported descriptor size 0 [ 161.072374][ T3504] FAULT_INJECTION: forcing a failure. [ 161.072374][ T3504] name fail_page_alloc, interval 1, probability 0, space 0, times 0 07:10:49 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 161.105846][ T3501] incfs: Options parsing error. -22 [ 161.130349][ T3504] CPU: 1 PID: 3504 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 161.140516][ T3504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 161.150563][ T3504] Call Trace: [ 161.153852][ T3504] dump_stack+0x1d8/0x24e [ 161.158188][ T3504] ? devkmsg_release+0x11c/0x11c [ 161.163123][ T3504] ? show_regs_print_info+0x12/0x12 [ 161.168320][ T3504] ? __kasan_kmalloc+0x1a3/0x1e0 [ 161.173249][ T3504] ? preempt_count_add+0x66/0x130 [ 161.178261][ T3504] ? prep_new_page+0x122/0x370 [ 161.183006][ T3504] should_fail+0x6f6/0x860 [ 161.187420][ T3504] ? setup_fault_attr+0x3d0/0x3d0 [ 161.192421][ T3504] __alloc_pages_nodemask+0x1c4/0x880 [ 161.197766][ T3504] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 161.203289][ T3504] ? kvmalloc_node+0x7e/0xf0 [ 161.207852][ T3504] push_pipe+0x3c5/0x7e0 [ 161.212788][ T3504] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 161.218393][ T3504] ? iov_iter_get_pages+0xec0/0xec0 [ 161.223563][ T3504] ? unix_stream_recvmsg+0x1e0/0x1e0 [ 161.228820][ T3504] default_file_splice_read+0x208/0x970 [ 161.234337][ T3504] ? sock_fasync+0xf0/0xf0 [ 161.238729][ T3504] ? __ia32_sys_tee+0xa0/0xa0 [ 161.243382][ T3504] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 161.250115][ T3504] ? selinux_file_permission+0x2d0/0x520 [ 161.255719][ T3504] ? security_file_permission+0x1e9/0x300 [ 161.261412][ T3504] ? __ia32_sys_tee+0xa0/0xa0 [ 161.266060][ T3504] splice_direct_to_actor+0x3f1/0xb30 [ 161.271407][ T3504] ? do_splice_direct+0x3e0/0x3e0 [ 161.276401][ T3504] ? pipe_to_sendpage+0x300/0x300 [ 161.281918][ T3504] ? security_file_permission+0x128/0x300 [ 161.288401][ T3504] do_splice_direct+0x28b/0x3e0 [ 161.293222][ T3504] ? splice_direct_to_actor+0xb30/0xb30 [ 161.298740][ T3504] ? security_file_permission+0x128/0x300 [ 161.304430][ T3504] do_sendfile+0x8e4/0x1140 [ 161.308907][ T3504] ? compat_writev+0x3c0/0x3c0 [ 161.313640][ T3504] ? vfs_write+0x422/0x4e0 [ 161.318028][ T3504] ? check_preemption_disabled+0x154/0x330 [ 161.323806][ T3504] __x64_sys_sendfile64+0x1c4/0x220 [ 161.329497][ T3504] ? __ia32_sys_sendfile+0x240/0x240 [ 161.334753][ T3504] do_syscall_64+0xcb/0x1e0 [ 161.339228][ T3504] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 161.345091][ T3504] RIP: 0033:0x466459 [ 161.348989][ T3504] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 161.368565][ T3504] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 07:10:49 executing program 2: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}, {&(0x7f0000000000)=""/65, 0x41}], 0x2, 0x23, 0x0) 07:10:49 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x5, 0x70, 0x55, 0x2, 0x5, 0x1, 0x0, 0x678, 0x2a0a8, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000040), 0x3}, 0x210, 0x1, 0x800, 0x5, 0x5, 0x3f, 0x3}, 0xffffffffffffffff, 0x9, r0, 0xa) read$FUSE(0xffffffffffffffff, &(0x7f0000002140)={0x2020}, 0x2020) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYBLOB="b80000000b06010200000000000000000000000074000880100007800a001100aaaaaaaaaabb0000100007800c00148008000140e00000020c00078006001d4000f900000cdf068005000700080000000c00078006001d4000010000100007800900120073797a32000000001c0007801800028014000000000000000000000000000124000880100007800c001840ffffffffffffbd7e100007800c001b4000000000000000080900020073797a3200000000"], 0xb8}}, 0x4000015) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="4df001ff28020006000000007ac20000040000000000000003000000000000000007002e2f66696c653100030000000300a65fef530000a500000000000000060b002e2f6275732f66696c6530"], 0x4d) mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x108) mkdir(&(0x7f0000000240)='./file0/file0\x00', 0x0) creat(&(0x7f0000000080)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000440)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) open$dir(0x0, 0x0, 0x10) flock(0xffffffffffffffff, 0x7) rmdir(&(0x7f00000000c0)='./bus/file0\x00') mount$overlay(0x0, &(0x7f0000000300)='./file2\x00', 0x0, 0x1804802, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000100)=0x5) [ 161.377990][ T3504] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 161.386048][ T3504] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 161.393992][ T3504] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 161.401961][ T3504] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 161.409925][ T3504] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 07:10:49 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, 0x0, 0x0) 07:10:49 executing program 4 (fault-call:2 fault-nth:26): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:10:49 executing program 2: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}, {&(0x7f0000000000)=""/65, 0x41}], 0x2, 0x23, 0x0) [ 161.447923][ T3532] incfs: Options parsing error. -22 07:10:50 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, 0x0, 0x0) [ 161.497281][ T3538] FAULT_INJECTION: forcing a failure. [ 161.497281][ T3538] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 161.554449][ T3538] CPU: 0 PID: 3538 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 161.564715][ T3538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 161.574771][ T3538] Call Trace: [ 161.578057][ T3538] dump_stack+0x1d8/0x24e [ 161.582376][ T3538] ? devkmsg_release+0x11c/0x11c [ 161.587299][ T3538] ? show_regs_print_info+0x12/0x12 [ 161.592487][ T3538] ? __kasan_kmalloc+0x1a3/0x1e0 [ 161.597418][ T3538] ? preempt_count_add+0x66/0x130 [ 161.602434][ T3538] ? prep_new_page+0x122/0x370 [ 161.607194][ T3538] should_fail+0x6f6/0x860 [ 161.611601][ T3538] ? setup_fault_attr+0x3d0/0x3d0 [ 161.616615][ T3538] __alloc_pages_nodemask+0x1c4/0x880 [ 161.622164][ T3538] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 161.627707][ T3538] ? kvmalloc_node+0x7e/0xf0 [ 161.632287][ T3538] ? kvmalloc_node+0x7e/0xf0 [ 161.636951][ T3538] push_pipe+0x3c5/0x7e0 [ 161.641185][ T3538] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 161.646802][ T3538] ? iov_iter_get_pages+0xec0/0xec0 [ 161.651995][ T3538] ? unix_stream_recvmsg+0x1e0/0x1e0 [ 161.657301][ T3538] default_file_splice_read+0x208/0x970 [ 161.662833][ T3538] ? sock_fasync+0xf0/0xf0 [ 161.667243][ T3538] ? __ia32_sys_tee+0xa0/0xa0 [ 161.672009][ T3538] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 161.678763][ T3538] ? selinux_file_permission+0x2d0/0x520 [ 161.684386][ T3538] ? security_file_permission+0x1e9/0x300 [ 161.690088][ T3538] ? __ia32_sys_tee+0xa0/0xa0 [ 161.694752][ T3538] splice_direct_to_actor+0x3f1/0xb30 [ 161.700143][ T3538] ? do_splice_direct+0x3e0/0x3e0 [ 161.705163][ T3538] ? pipe_to_sendpage+0x300/0x300 [ 161.710243][ T3538] ? security_file_permission+0x128/0x300 [ 161.715957][ T3538] do_splice_direct+0x28b/0x3e0 [ 161.720796][ T3538] ? splice_direct_to_actor+0xb30/0xb30 [ 161.726354][ T3538] ? security_file_permission+0x128/0x300 [ 161.732065][ T3538] do_sendfile+0x8e4/0x1140 [ 161.736561][ T3538] ? compat_writev+0x3c0/0x3c0 [ 161.741313][ T3538] ? vfs_write+0x422/0x4e0 [ 161.745720][ T3538] ? check_preemption_disabled+0x154/0x330 [ 161.751540][ T3538] __x64_sys_sendfile64+0x1c4/0x220 [ 161.756731][ T3538] ? __ia32_sys_sendfile+0x240/0x240 [ 161.762004][ T3538] do_syscall_64+0xcb/0x1e0 [ 161.766508][ T3538] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 161.772391][ T3538] RIP: 0033:0x466459 [ 161.776288][ T3538] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 161.795885][ T3538] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 161.804299][ T3538] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 161.810519][ T3546] overlayfs: upperdir is in-use as upperdir/workdir of another mount, accessing files from both mounts will result in undefined behavior. [ 161.812263][ T3538] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 161.834250][ T3538] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 161.842243][ T3538] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 161.847952][ T3546] overlayfs: workdir is in-use as upperdir/workdir of another mount, accessing files from both mounts will result in undefined behavior. [ 161.850211][ T3538] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 [ 161.877207][ T3525] EXT4-fs (loop0): unsupported descriptor size 0 07:10:50 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x8000000, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:50 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, 0x0, 0x0) 07:10:50 executing program 2: syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}, {&(0x7f0000000000)=""/65, 0x41}], 0x2, 0x23, 0x0) 07:10:50 executing program 4 (fault-call:2 fault-nth:27): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:10:50 executing program 1: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_ADD_NAN_FUNCTION(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r0, 0x100, 0x70bd2a, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_NAN_FUNC={0xc, 0xf0, 0x0, 0x1, [@NL80211_NAN_FUNC_TTL={0x8, 0xa, 0x7}]}, @NL80211_ATTR_NAN_FUNC={0x8, 0xf0, 0x0, 0x1, [@NL80211_NAN_FUNC_CLOSE_RANGE={0x4}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x280c0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2, 0x6031, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r2 = socket$netlink(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x7fffffff) 07:10:50 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:10:50 executing program 2: syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}, {&(0x7f0000000000)=""/65, 0x41}], 0x2, 0x23, 0x0) [ 162.017523][ T3561] FAULT_INJECTION: forcing a failure. [ 162.017523][ T3561] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 162.035477][ T3565] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 162.061993][ T3565] incfs: Options parsing error. -22 [ 162.070386][ T3561] CPU: 1 PID: 3561 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 162.080556][ T3561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 162.090619][ T3561] Call Trace: [ 162.094086][ T3561] dump_stack+0x1d8/0x24e [ 162.098416][ T3561] ? devkmsg_release+0x11c/0x11c [ 162.103350][ T3561] ? show_regs_print_info+0x12/0x12 [ 162.108541][ T3561] ? __kasan_kmalloc+0x1a3/0x1e0 [ 162.113476][ T3561] ? preempt_count_add+0x66/0x130 [ 162.118504][ T3561] ? prep_new_page+0x122/0x370 [ 162.123264][ T3561] should_fail+0x6f6/0x860 [ 162.127673][ T3561] ? setup_fault_attr+0x3d0/0x3d0 [ 162.132719][ T3561] __alloc_pages_nodemask+0x1c4/0x880 [ 162.138091][ T3561] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 162.143630][ T3561] ? kvmalloc_node+0x7e/0xf0 [ 162.148207][ T3561] push_pipe+0x3c5/0x7e0 [ 162.152444][ T3561] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 162.158068][ T3561] ? iov_iter_get_pages+0xec0/0xec0 [ 162.163259][ T3561] ? unix_stream_recvmsg+0x1e0/0x1e0 [ 162.168537][ T3561] default_file_splice_read+0x208/0x970 [ 162.174070][ T3561] ? sock_fasync+0xf0/0xf0 [ 162.178477][ T3561] ? __ia32_sys_tee+0xa0/0xa0 [ 162.183155][ T3561] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 162.189945][ T3561] ? selinux_file_permission+0x2d0/0x520 [ 162.195568][ T3561] ? security_file_permission+0x1e9/0x300 [ 162.201280][ T3561] ? __ia32_sys_tee+0xa0/0xa0 [ 162.205949][ T3561] splice_direct_to_actor+0x3f1/0xb30 [ 162.211327][ T3561] ? do_splice_direct+0x3e0/0x3e0 [ 162.216366][ T3561] ? pipe_to_sendpage+0x300/0x300 [ 162.221387][ T3561] ? security_file_permission+0x128/0x300 [ 162.227102][ T3561] do_splice_direct+0x28b/0x3e0 [ 162.231977][ T3561] ? splice_direct_to_actor+0xb30/0xb30 [ 162.237522][ T3561] ? security_file_permission+0x128/0x300 [ 162.243237][ T3561] do_sendfile+0x8e4/0x1140 [ 162.247737][ T3561] ? compat_writev+0x3c0/0x3c0 [ 162.252493][ T3561] ? vfs_write+0x422/0x4e0 [ 162.257424][ T3561] ? check_preemption_disabled+0x154/0x330 [ 162.263226][ T3561] __x64_sys_sendfile64+0x1c4/0x220 [ 162.268418][ T3561] ? __ia32_sys_sendfile+0x240/0x240 [ 162.273702][ T3561] do_syscall_64+0xcb/0x1e0 [ 162.278199][ T3561] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 162.284085][ T3561] RIP: 0033:0x466459 [ 162.287989][ T3561] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 07:10:50 executing program 2: syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}, {&(0x7f0000000000)=""/65, 0x41}], 0x2, 0x23, 0x0) 07:10:50 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:10:50 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 162.307578][ T3561] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 162.315965][ T3561] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 162.323925][ T3561] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 162.331873][ T3561] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 162.339837][ T3561] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 162.348320][ T3561] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 07:10:50 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, 0x0, 0x0, 0x23, 0x0) 07:10:50 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) [ 162.405739][ T3576] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 162.475173][ T3576] incfs: Options parsing error. -22 07:10:51 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:51 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x81ff, 0x0) r2 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fcntl$setsig(r2, 0xa, 0x11) fcntl$setlease(r2, 0x400, 0x1) fcntl$setlease(r1, 0x400, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/timers\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00', r3) sendmsg$TIPC_NL_BEARER_ENABLE(r4, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x64, r5, 0x1, 0x70bd27, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xaabdb7e}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xc7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}]}, @TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xcf5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x982}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x8800}, 0x82) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) close(r2) 07:10:51 executing program 3 (fault-call:4 fault-nth:0): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:10:51 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:10:51 executing program 4 (fault-call:2 fault-nth:28): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:10:51 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, 0x0, 0x0, 0x23, 0x0) 07:10:51 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, 0x0, 0x0, 0x23, 0x0) 07:10:51 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x1fffffbf, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:10:51 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x0) [ 162.756635][ T3599] FAULT_INJECTION: forcing a failure. [ 162.756635][ T3599] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 162.792605][ T3598] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 162.809629][ T3598] incfs: Options parsing error. -22 [ 162.811244][ T3599] CPU: 0 PID: 3599 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 162.824974][ T3599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 162.835031][ T3599] Call Trace: [ 162.838329][ T3599] dump_stack+0x1d8/0x24e [ 162.842658][ T3599] ? devkmsg_release+0x11c/0x11c [ 162.847593][ T3599] ? show_regs_print_info+0x12/0x12 [ 162.852784][ T3599] ? __kasan_kmalloc+0x1a3/0x1e0 [ 162.857722][ T3599] ? preempt_count_add+0x66/0x130 [ 162.862741][ T3599] ? prep_new_page+0x122/0x370 [ 162.867496][ T3599] should_fail+0x6f6/0x860 [ 162.871903][ T3599] ? setup_fault_attr+0x3d0/0x3d0 [ 162.879876][ T3599] __alloc_pages_nodemask+0x1c4/0x880 [ 162.885249][ T3599] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 162.890795][ T3599] ? kvmalloc_node+0x7e/0xf0 [ 162.895385][ T3599] push_pipe+0x3c5/0x7e0 [ 162.899621][ T3599] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 162.905242][ T3599] ? iov_iter_get_pages+0xec0/0xec0 [ 162.910425][ T3599] ? unix_stream_recvmsg+0x1e0/0x1e0 [ 162.915703][ T3599] default_file_splice_read+0x208/0x970 [ 162.921237][ T3599] ? sock_fasync+0xf0/0xf0 [ 162.925642][ T3599] ? __ia32_sys_tee+0xa0/0xa0 [ 162.930320][ T3599] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 162.937073][ T3599] ? selinux_file_permission+0x2d0/0x520 [ 162.942694][ T3599] ? security_file_permission+0x1e9/0x300 [ 162.948399][ T3599] ? __ia32_sys_tee+0xa0/0xa0 [ 162.953241][ T3599] splice_direct_to_actor+0x3f1/0xb30 [ 162.958606][ T3599] ? do_splice_direct+0x3e0/0x3e0 [ 162.963618][ T3599] ? pipe_to_sendpage+0x300/0x300 [ 162.968629][ T3599] ? security_file_permission+0x128/0x300 [ 162.974336][ T3599] do_splice_direct+0x28b/0x3e0 [ 162.979177][ T3599] ? splice_direct_to_actor+0xb30/0xb30 [ 162.984715][ T3599] ? security_file_permission+0x128/0x300 [ 162.990424][ T3599] do_sendfile+0x8e4/0x1140 [ 162.994918][ T3599] ? compat_writev+0x3c0/0x3c0 [ 162.999683][ T3599] ? vfs_write+0x422/0x4e0 [ 163.004091][ T3599] ? check_preemption_disabled+0x154/0x330 [ 163.009887][ T3599] __x64_sys_sendfile64+0x1c4/0x220 [ 163.015077][ T3599] ? __ia32_sys_sendfile+0x240/0x240 [ 163.020352][ T3599] do_syscall_64+0xcb/0x1e0 [ 163.024844][ T3599] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 163.030719][ T3599] RIP: 0033:0x466459 [ 163.034595][ T3599] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 07:10:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x6, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:10:51 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:10:51 executing program 4 (fault-call:2 fault-nth:29): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:10:51 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080), 0x0, 0x23, 0x0) [ 163.054205][ T3599] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 163.064442][ T3599] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 163.072420][ T3599] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 163.080386][ T3599] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 163.088450][ T3599] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 163.096512][ T3599] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 07:10:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x2, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:10:51 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:10:51 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080), 0x0, 0x23, 0x0) [ 163.184503][ T3623] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 163.209183][ T3629] FAULT_INJECTION: forcing a failure. [ 163.209183][ T3629] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 163.224495][ T3623] incfs: Options parsing error. -22 [ 163.254188][ T3629] CPU: 0 PID: 3629 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 163.264349][ T3629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 163.274401][ T3629] Call Trace: [ 163.277684][ T3629] dump_stack+0x1d8/0x24e [ 163.282018][ T3629] ? devkmsg_release+0x11c/0x11c [ 163.286949][ T3629] ? show_regs_print_info+0x12/0x12 [ 163.292135][ T3629] ? __kasan_kmalloc+0x1a3/0x1e0 [ 163.297061][ T3629] ? preempt_count_add+0x66/0x130 [ 163.302078][ T3629] ? prep_new_page+0x122/0x370 [ 163.306831][ T3629] should_fail+0x6f6/0x860 [ 163.311253][ T3629] ? setup_fault_attr+0x3d0/0x3d0 [ 163.316266][ T3629] __alloc_pages_nodemask+0x1c4/0x880 [ 163.321630][ T3629] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 163.327167][ T3629] ? kvmalloc_node+0x7e/0xf0 [ 163.331745][ T3629] push_pipe+0x3c5/0x7e0 [ 163.335983][ T3629] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 163.341607][ T3629] ? iov_iter_get_pages+0xec0/0xec0 [ 163.346794][ T3629] ? unix_stream_recvmsg+0x1e0/0x1e0 [ 163.352067][ T3629] default_file_splice_read+0x208/0x970 [ 163.357598][ T3629] ? sock_fasync+0xf0/0xf0 [ 163.362027][ T3629] ? __ia32_sys_tee+0xa0/0xa0 [ 163.366692][ T3629] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 163.373444][ T3629] ? selinux_file_permission+0x2d0/0x520 [ 163.379069][ T3629] ? security_file_permission+0x1e9/0x300 [ 163.384779][ T3629] ? __ia32_sys_tee+0xa0/0xa0 [ 163.389440][ T3629] splice_direct_to_actor+0x3f1/0xb30 [ 163.394796][ T3629] ? do_splice_direct+0x3e0/0x3e0 [ 163.399815][ T3629] ? pipe_to_sendpage+0x300/0x300 [ 163.404832][ T3629] ? security_file_permission+0x128/0x300 [ 163.410544][ T3629] do_splice_direct+0x28b/0x3e0 [ 163.415385][ T3629] ? splice_direct_to_actor+0xb30/0xb30 [ 163.420922][ T3629] ? security_file_permission+0x128/0x300 [ 163.426635][ T3629] do_sendfile+0x8e4/0x1140 [ 163.431131][ T3629] ? compat_writev+0x3c0/0x3c0 [ 163.435878][ T3629] ? vfs_write+0x422/0x4e0 [ 163.440285][ T3629] ? check_preemption_disabled+0x154/0x330 [ 163.446073][ T3629] __x64_sys_sendfile64+0x1c4/0x220 [ 163.451256][ T3629] ? __ia32_sys_sendfile+0x240/0x240 [ 163.456531][ T3629] do_syscall_64+0xcb/0x1e0 [ 163.461023][ T3629] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 163.466899][ T3629] RIP: 0033:0x466459 [ 163.470779][ T3629] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 163.490370][ T3629] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 07:10:51 executing program 1: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x9ee, 0x200000) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDGETLED(r0, 0x4b31, &(0x7f0000000000)) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = signalfd4(r1, 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r7 = gettid() sendmsg$netlink(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@cred={{0x1c, 0x1, 0x2, {r7, 0x0, r6}}}], 0x20}, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r12 = gettid() sendmsg$netlink(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@cred={{0x1c, 0x1, 0x2, {r12, 0x0, r11}}}], 0x20}, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000440)=ANY=[@ANYBLOB="02000000010001000000000002000200", @ANYRES32, @ANYBLOB="02000400", @ANYRES32=0xee01, @ANYBLOB="00000000f6fd50b5f583ab417c2b5bd95b6bc3e2905310b812607d94405dee6ad488f89757c60f5388ad7d1dfe98a176c4f4fd00f98fb2a15f64a861ca52843337d3ade229", @ANYRESHEX, @ANYBLOB="026115", @ANYRES32=0xee01, @ANYBLOB="02000400", @ANYRESDEC=r2, @ANYBLOB="02000a00", @ANYRES32=0x0, @ANYBLOB="040001000000000008000400", @ANYRES32=r6, @ANYRESOCT=r10, @ANYRES32=r11, @ANYBLOB="88000200", @ANYRES32=r5, @ANYBLOB="10000400000000002000040000000000"], 0x6c, 0x2) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="6800000031bf0000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000004000128008000100736974003400028008000300ac1e000114000b002001000000000000000000000000000214000b00fc01000000000000000000000000000108000a00", @ANYRES32=0x0, @ANYBLOB="bea2eb561d61063f0b877b3bf33e968f72d29ddab59950c321bd89839b77608bb5ef317f4ee918925bf905545eae95a10d61faf706d3a7"], 0x68}}, 0x0) close(r1) 07:10:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x3, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) [ 163.498773][ T3629] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 163.506733][ T3629] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 163.514699][ T3629] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 163.522659][ T3629] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 163.530618][ T3629] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 [ 163.571213][ T3637] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 163.589087][ T3640] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=48945 sclass=netlink_route_socket pid=3640 comm=syz-executor.1 [ 163.602942][ T3637] incfs: Options parsing error. -22 [ 163.657178][ T3649] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=48945 sclass=netlink_route_socket pid=3649 comm=syz-executor.1 07:10:52 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x20000990, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080), 0x0, 0x23, 0x0) 07:10:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x4, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:10:52 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:10:52 executing program 1: ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x10400, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000100)={@private, @private, 0x0}, &(0x7f0000000140)=0xc) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x88000016}, 0xc, &(0x7f0000000300)={&(0x7f0000000180)={0x158, 0x0, 0x1, 0x70bd25, 0x25dfdbfd, {}, [{{0x8, 0x1, r1}, {0x13c, 0x2, 0x0, 0x1, [{0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x14, 0x4, [{0x8, 0x0, 0x2b, 0x80000001}, {0x9, 0x8, 0x0, 0x6}]}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r2}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r1}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r1}}}]}}]}, 0x158}, 0x1, 0x0, 0x0, 0xc4}, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000400)="90134dd706000f2e7ab4dbe3a7bce758597c1d04b8f10b335f06b54d27153faab27c48ee441e8e2f14746f9438e37d3ba8b499c299ac76d43663b09c86db2e06", 0x40}, {&(0x7f0000000440)="32fa37984d90b18757c1f5532a76ed69d53380d17a02276cd904996ba5f2925d4816bcb8cae066df4966fae426bb298848976022e481482492b6f7fb42378d31c6eaf532644e03b4a5fde61c572f54ed8faed78a21e7d4d4c6ce52942f87f9af5145139bdd5782b096333d1fcd0bc7b9", 0x70}, {&(0x7f00000004c0)="023ac2bdb4b3bab45316b092dc7c5cf49d84558c80fbef3af7cf5fd7ba40bbf4fc7b6d88f34d547ec4b145feb4c0c86e679e6694c174ac2859a8f1bc6fa67a36e527b7dbf183dde3b44ac6575641fead5431a25c139fccb0d06a6bd765501f3692956eedfa652ec77085cd6f9135e71288592ebd41648996a3d265ac78aab49926f5cc85b1ee09cff9ecdb1ea797697188237bb821946e0ed7485d7a26848be708fc035c51decf7ded60f797caff00477cafb7db727f3af9d467efbd9dcd013276d3eadc1a052a71ce23cfed8a4c55be6949be0f1d41e23d19141bc85cb238c00cae55c6a20c8fe1c51711", 0xeb}, {&(0x7f00000005c0)="3c36f5bbd7c19e3e5390772d40357470899b6ecacf85a98e11da05e710570bf41e5ba5813af30563addf1350491518c4283c9834206622eb922b0ca487a89e3806d018fa428f52933a990d060628b4e8bf8d8517236c741d7f78014028ffb3729a485f1c97c7c197b44cc53835c912d3da7669b091dfd28105527a75448d370c51819bade65aa504dbe15caa", 0x8c}, {&(0x7f0000000680)="29b8886cb1bc7f88f1cabfbba797d4161c611ef30ed82cc7648e2c6b8aacdbcbab1370a30504371cbf9c794e675baa512d849a1682b1de3ff99ab7d547dd159b82f10c7bdbb66c28999579a487e337ace2eb90618a48597153e8a8ac76d868b024f8cb93a0ad6faca31c11431cc28bfb56e9d00d9c60dd1e6301e20c", 0x7c}, {&(0x7f0000000700)="99c90d0eb0f7e2439ba3d8bf366abf9e7e8a2d41664e30aece1088f500c011989fa254413f26c95f86bb5ba8224ade7bdb02ba5aa0e738d50b1fd2af823bf975384c0f91f200ce175521e5cec99400b57af9fb5b6add99d302a85a9e450c08e14cec5d9c8322d94b7b7b4b076276cb12456fc878fbbf3c11dac2bb", 0x7b}], 0x6, &(0x7f0000000800)=[{0xb8, 0x117, 0x2ff, "a8d6fa45971f26d3467df435192368ac63067b90534646aae9cab0a448437732e2031dca5968a2456218d7e86f6ce4ba3fc1fb716316308470ab446ec00a3da3b66e4a82957a65a998f7d0b230394b09345be1617b12852e10f9477a22e19487947f00199581ee0e59ce031ab2f359a196e80f873ef2cd11f8b2bbede1ef4303d3cf7b991189be68d255c3d59dac2625275d6b7fbca315502b4ab3f9815719d0ae9b"}, {0x80, 0x3a, 0x1, "f975bc3d133a2d14c3c709f5addae29a0197c694ff8f017482044cc9c16c56a9b25dfc09ca742603956a253a62436214836086556413d66b47021dbe15deaf285b5f58ac8be3d76eab61ad1c255efd6dedc8a2aa83eb37d4c219483f98896ce29390a699ca5dbfbad2"}], 0x138}, 0x0) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)={0x1c, 0x0, 0x400, 0x70bd2b, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000880}, 0x44001) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000ac0)='batadv\x00', r0) sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, r3, 0x10, 0x70bd2b, 0x25dfdbfb}, 0x14}}, 0x40000) r4 = syz_open_dev$vcsn(&(0x7f0000000bc0)='/dev/vcs#\x00', 0xb23ba18, 0x400) setsockopt$inet_opts(r4, 0x0, 0xd, &(0x7f0000000c00)="68e9c7bba748ff5345fbb856e83153eb0a842197ee03b62aac8729e71d9b9a0bd17da9362766e691c94c48e5f230", 0x2e) setsockopt$IP_VS_SO_SET_DEL(r4, 0x0, 0x484, &(0x7f0000000c40)={0x3c, @empty, 0x4e24, 0x4, 'lblc\x00', 0x21, 0x7, 0x5}, 0x2c) r5 = syz_mount_image$fuse(&(0x7f0000000c80)='fuse\x00', &(0x7f0000000cc0)='./file0\x00', 0x0, 0x0, 0x0, 0x8, &(0x7f0000000d00)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@max_read={'max_read', 0x3d, 0x3}}, {@max_read={'max_read', 0x3d, 0x9}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x7}}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@pcr={'pcr', 0x3d, 0x26}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}}) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000006, 0x1010, r5, 0x33e84000) r6 = fsmount(r4, 0x1, 0x84) write$FUSE_NOTIFY_RETRIEVE(r6, &(0x7f0000000e80)={0x30, 0x5, 0x0, {0x0, 0x0, 0x81, 0x2}}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000f00)={{{@in6=@private1, @in6=@ipv4={[], [], @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@private0}}, &(0x7f0000001000)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000ec0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001300)={&(0x7f0000001040)={0x29c, 0x0, 0x100, 0x70bd25, 0x25dfdbff, {}, [{{0x8, 0x1, r2}, {0xf8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}]}}, {{0x8, 0x1, r1}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r7}}, {0x8}}}]}}, {{0x8, 0x1, r1}, {0x134, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r2}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x80}}}]}}]}, 0x29c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) r8 = open_tree(0xffffffffffffff9c, &(0x7f0000001380)='./file0\x00', 0xfa30b3ff4182bae0) getsockopt$inet_mreqn(r8, 0x0, 0x24, &(0x7f00000013c0)={@private, @initdev}, &(0x7f0000001400)=0xc) 07:10:52 executing program 4 (fault-call:2 fault-nth:30): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:10:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{0x0}], 0x1, 0x23, 0x0) 07:10:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x5, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:10:52 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0xc8, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 163.829415][ T3660] fuse: Bad value for 'group_id' [ 163.835882][ T3663] FAULT_INJECTION: forcing a failure. [ 163.835882][ T3663] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 163.846038][ T3666] fuse: Bad value for 'group_id' [ 163.849876][ T3663] CPU: 0 PID: 3663 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 163.864153][ T3663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 163.864156][ T3663] Call Trace: 07:10:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{0x0}], 0x1, 0x23, 0x0) 07:10:52 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x5, 0x0, 0x10000000, 0x9, 0x0, 0x6, 0x0, 0x400}, 0x0) waitid(0x2, 0x0, 0x0, 0x80000000, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, 0x0, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000380)="8daa0b7a42941ab3915ce1dd0f39ba9aed21c9300ed000726af5160afe625a063936464031f96f8e06d4dfe42f0200167895bc1b3b77ffabf913d36e276311e798ffb602b97287c7a84711671000766340962a54b03a735b62d37412f48917685b6b41b68e5567822000d6bfea35c232fdba3dad86c148620a874e5d47596384f58b496575bb726d7bf1bb814c9d3ec41fa2b1786e5a274548330ef2045fde7c32268d60ca65d7293fa0aa19fed6e402a54018b07a0000000000000000", 0xbd) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x2, 0x0, 0x200006, 0x3, 0x0, 0x2}, 0x0) write$P9_RLINK(0xffffffffffffffff, 0x0, 0xfffffffffffffcec) getxattr(0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x8) getpid() r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(0xffffffffffffffff) bind$inet6(r3, &(0x7f0000000600)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000180)='./bus\x00', 0x100000169042, 0x0) ftruncate(r4, 0x10099b8) sendfile(r3, r4, 0x0, 0x8000fffffffe) r5 = open(&(0x7f0000000140)='./bus\x00', 0x141442, 0x156) ftruncate(r5, 0x87fff) 07:10:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x6, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) [ 163.864173][ T3663] dump_stack+0x1d8/0x24e [ 163.864184][ T3663] ? devkmsg_release+0x11c/0x11c [ 163.864193][ T3663] ? show_regs_print_info+0x12/0x12 [ 163.864202][ T3663] ? __kasan_kmalloc+0x1a3/0x1e0 [ 163.864211][ T3663] ? preempt_count_add+0x66/0x130 [ 163.864221][ T3663] ? prep_new_page+0x122/0x370 [ 163.864230][ T3663] should_fail+0x6f6/0x860 [ 163.864238][ T3663] ? setup_fault_attr+0x3d0/0x3d0 [ 163.864248][ T3663] __alloc_pages_nodemask+0x1c4/0x880 [ 163.864260][ T3663] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 163.864272][ T3663] ? kvmalloc_node+0x7e/0xf0 [ 163.864282][ T3663] ? kvmalloc_node+0x7e/0xf0 [ 163.864291][ T3663] push_pipe+0x3c5/0x7e0 [ 163.864302][ T3663] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 163.864312][ T3663] ? iov_iter_get_pages+0xec0/0xec0 [ 163.864321][ T3663] ? unix_stream_recvmsg+0x1e0/0x1e0 [ 163.864331][ T3663] default_file_splice_read+0x208/0x970 [ 163.864339][ T3663] ? sock_fasync+0xf0/0xf0 [ 163.864348][ T3663] ? __ia32_sys_tee+0xa0/0xa0 [ 163.864363][ T3663] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 07:10:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{0x0}], 0x1, 0x23, 0x0) 07:10:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x0, 0x0) 07:10:52 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x278, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 163.864373][ T3663] ? selinux_file_permission+0x2d0/0x520 [ 163.864383][ T3663] ? security_file_permission+0x1e9/0x300 [ 163.864391][ T3663] ? __ia32_sys_tee+0xa0/0xa0 [ 163.864400][ T3663] splice_direct_to_actor+0x3f1/0xb30 [ 163.864412][ T3663] ? do_splice_direct+0x3e0/0x3e0 [ 163.864421][ T3663] ? pipe_to_sendpage+0x300/0x300 [ 163.864429][ T3663] ? security_file_permission+0x128/0x300 [ 163.864437][ T3663] do_splice_direct+0x28b/0x3e0 [ 163.864451][ T3663] ? splice_direct_to_actor+0xb30/0xb30 [ 163.864462][ T3663] ? security_file_permission+0x128/0x300 [ 163.864472][ T3663] do_sendfile+0x8e4/0x1140 [ 163.864483][ T3663] ? compat_writev+0x3c0/0x3c0 [ 163.864492][ T3663] ? vfs_write+0x422/0x4e0 [ 163.864503][ T3663] ? check_preemption_disabled+0x154/0x330 [ 163.864510][ T3663] __x64_sys_sendfile64+0x1c4/0x220 [ 163.864518][ T3663] ? __ia32_sys_sendfile+0x240/0x240 [ 163.864528][ T3663] do_syscall_64+0xcb/0x1e0 [ 163.864536][ T3663] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 163.864544][ T3663] RIP: 0033:0x466459 [ 163.864553][ T3663] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 163.864557][ T3663] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 163.864566][ T3663] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 163.864571][ T3663] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 163.864576][ T3663] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 07:10:52 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:10:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x8, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:10:52 executing program 4 (fault-call:2 fault-nth:31): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:10:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x0, 0x0) 07:10:52 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x3a0, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:52 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0xc8, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0xb, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) [ 163.864581][ T3663] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 163.864586][ T3663] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 [ 163.870600][ T3662] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 163.953742][ T3683] incfs: Options parsing error. -22 [ 164.194215][ T3715] FAULT_INJECTION: forcing a failure. [ 164.194215][ T3715] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 164.214519][ T3715] CPU: 0 PID: 3715 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 164.224666][ T3715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 164.234706][ T3715] Call Trace: [ 164.237991][ T3715] dump_stack+0x1d8/0x24e [ 164.242315][ T3715] ? devkmsg_release+0x11c/0x11c [ 164.247245][ T3715] ? show_regs_print_info+0x12/0x12 [ 164.252430][ T3715] ? __kasan_kmalloc+0x1a3/0x1e0 [ 164.257360][ T3715] ? preempt_count_add+0x66/0x130 [ 164.262374][ T3715] ? prep_new_page+0x122/0x370 [ 164.267139][ T3715] should_fail+0x6f6/0x860 [ 164.271547][ T3715] ? setup_fault_attr+0x3d0/0x3d0 [ 164.275116][ T3710] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 164.276561][ T3715] __alloc_pages_nodemask+0x1c4/0x880 [ 164.288383][ T3715] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 164.293920][ T3715] ? kvmalloc_node+0x7e/0xf0 [ 164.298497][ T3715] push_pipe+0x3c5/0x7e0 [ 164.302722][ T3715] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 164.308323][ T3715] ? iov_iter_get_pages+0xec0/0xec0 [ 164.313531][ T3715] ? unix_stream_recvmsg+0x1e0/0x1e0 [ 164.318819][ T3715] default_file_splice_read+0x208/0x970 [ 164.324336][ T3715] ? sock_fasync+0xf0/0xf0 [ 164.328717][ T3715] ? __ia32_sys_tee+0xa0/0xa0 [ 164.333377][ T3715] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 164.340105][ T3715] ? selinux_file_permission+0x2d0/0x520 [ 164.345714][ T3715] ? security_file_permission+0x1e9/0x300 [ 164.351410][ T3715] ? __ia32_sys_tee+0xa0/0xa0 [ 164.356065][ T3715] splice_direct_to_actor+0x3f1/0xb30 [ 164.361677][ T3715] ? do_splice_direct+0x3e0/0x3e0 [ 164.366668][ T3715] ? pipe_to_sendpage+0x300/0x300 [ 164.371657][ T3715] ? security_file_permission+0x128/0x300 [ 164.377340][ T3715] do_splice_direct+0x28b/0x3e0 [ 164.382170][ T3715] ? splice_direct_to_actor+0xb30/0xb30 [ 164.387690][ T3715] ? security_file_permission+0x128/0x300 [ 164.393373][ T3715] do_sendfile+0x8e4/0x1140 [ 164.397844][ T3715] ? compat_writev+0x3c0/0x3c0 [ 164.402575][ T3715] ? vfs_write+0x422/0x4e0 [ 164.406958][ T3715] ? check_preemption_disabled+0x154/0x330 [ 164.412728][ T3715] __x64_sys_sendfile64+0x1c4/0x220 [ 164.417891][ T3715] ? __ia32_sys_sendfile+0x240/0x240 [ 164.423141][ T3715] do_syscall_64+0xcb/0x1e0 [ 164.427612][ T3715] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 164.433470][ T3715] RIP: 0033:0x466459 [ 164.437333][ T3715] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 164.456901][ T3715] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 164.465275][ T3715] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 164.473214][ T3715] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 164.481154][ T3715] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 164.489096][ T3715] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 164.497034][ T3715] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 [ 164.508224][ T3726] incfs: Options parsing error. -22 07:10:53 executing program 1: syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x200000000011000}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') creat(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x1e3542, 0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x50) creat(&(0x7f0000000080)='./file1\x00', 0x0) creat(&(0x7f0000000000)='./file1\x00', 0x0) 07:10:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x278, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:53 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x0, 0x0) 07:10:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x10, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:10:53 executing program 4 (fault-call:2 fault-nth:32): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:10:53 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:10:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x3a0, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x11, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:10:53 executing program 2 (fault-call:1 fault-nth:0): r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x0) 07:10:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x12, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) [ 164.827516][ T3741] FAULT_INJECTION: forcing a failure. [ 164.827516][ T3741] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 164.853520][ T3740] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 164.865861][ T3752] FAULT_INJECTION: forcing a failure. [ 164.865861][ T3752] name failslab, interval 1, probability 0, space 0, times 0 [ 164.880089][ T3752] CPU: 0 PID: 3752 Comm: syz-executor.2 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 164.890230][ T3752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 164.900371][ T3752] Call Trace: [ 164.903647][ T3752] dump_stack+0x1d8/0x24e [ 164.907954][ T3752] ? devkmsg_release+0x11c/0x11c [ 164.912888][ T3752] ? check_preemption_disabled+0x9e/0x330 [ 164.918594][ T3752] ? show_regs_print_info+0x12/0x12 [ 164.923762][ T3752] ? __unwind_start+0x72f/0x8e0 [ 164.928585][ T3752] ? debug_smp_processor_id+0x20/0x20 [ 164.933934][ T3752] should_fail+0x6f6/0x860 [ 164.938328][ T3752] ? setup_fault_attr+0x3d0/0x3d0 [ 164.943324][ T3752] ? __kernel_text_address+0x93/0x100 [ 164.948667][ T3752] ? unwind_get_return_address+0x48/0x80 [ 164.954272][ T3752] ? arch_stack_walk+0xf8/0x140 [ 164.959097][ T3752] ? kvmalloc_node+0x7e/0xf0 [ 164.963662][ T3752] should_failslab+0x5/0x20 [ 164.968136][ T3752] __kmalloc+0x5f/0x2f0 [ 164.972280][ T3752] kvmalloc_node+0x7e/0xf0 [ 164.976669][ T3752] traverse+0xfb/0x540 [ 164.980711][ T3752] ? mutex_trylock+0xb0/0xb0 [ 164.985275][ T3752] ? kstrtouint_from_user+0x20f/0x2a0 [ 164.990708][ T3752] seq_read+0xc1e/0xd10 [ 164.994835][ T3752] ? memset+0x1f/0x40 [ 164.998789][ T3752] ? seq_open+0x150/0x150 [ 165.003090][ T3752] proc_reg_read+0x225/0x350 [ 165.007651][ T3752] ? proc_reg_llseek+0x320/0x320 [ 165.012565][ T3752] ? security_file_permission+0x1e9/0x300 [ 165.018266][ T3752] do_iter_read+0x41b/0x5c0 [ 165.022743][ T3752] do_preadv+0x20d/0x350 [ 165.026958][ T3752] ? do_writev+0x5a0/0x5a0 [ 165.031354][ T3752] ? fput_many+0x42/0x1a0 [ 165.035654][ T3752] ? check_preemption_disabled+0x154/0x330 [ 165.041443][ T3752] do_syscall_64+0xcb/0x1e0 [ 165.045935][ T3752] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 165.051811][ T3752] RIP: 0033:0x466459 [ 165.055676][ T3752] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 165.075250][ T3752] RSP: 002b:00007f7bfcc06188 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 165.083631][ T3752] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 165.091575][ T3752] RDX: 0000000000000001 RSI: 0000000020000080 RDI: 0000000000000003 [ 165.099519][ T3752] RBP: 00007f7bfcc061d0 R08: 0000000000000000 R09: 0000000000000000 [ 165.107462][ T3752] R10: 0000000000000023 R11: 0000000000000246 R12: 0000000000000001 [ 165.115405][ T3752] R13: 00007ffc3f8dfedf R14: 00007f7bfcc06300 R15: 0000000000022000 07:10:53 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x81, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x5, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000008c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003c00)=""/200, 0xc8}, 0x9}], 0x1, 0x10003, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x80000) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x12400, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x7}, 0x0, 0x8, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x0, &(0x7f00000001c0)) r4 = socket$inet(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000180)=0x7fffffff, 0x4) connect$inet(r4, &(0x7f00000002c0)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xffffffffffffff51, 0x20040080, 0x0, 0x0) ioctl$INCFS_IOC_CREATE_FILE(0xffffffffffffffff, 0xc058671e, 0x0) recvmmsg(r4, &(0x7f0000003c80), 0x38e, 0x62, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmmsg(r5, &(0x7f0000008440)=[{{0x0, 0x536, 0x0}}], 0x400000000000107, 0xff00) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'veth1_vlan\x00'}) [ 165.123370][ T3741] CPU: 1 PID: 3741 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 165.133507][ T3741] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 165.143546][ T3741] Call Trace: [ 165.146837][ T3741] dump_stack+0x1d8/0x24e [ 165.151159][ T3741] ? devkmsg_release+0x11c/0x11c [ 165.154811][ T3762] incfs: Options parsing error. -22 [ 165.156083][ T3741] ? show_regs_print_info+0x12/0x12 [ 165.156090][ T3741] ? __kasan_kmalloc+0x1a3/0x1e0 [ 165.156111][ T3741] ? preempt_count_add+0x66/0x130 [ 165.176343][ T3741] ? prep_new_page+0x122/0x370 [ 165.181098][ T3741] should_fail+0x6f6/0x860 [ 165.185487][ T3741] ? setup_fault_attr+0x3d0/0x3d0 [ 165.190489][ T3741] __alloc_pages_nodemask+0x1c4/0x880 [ 165.195838][ T3741] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 165.201359][ T3741] ? kvmalloc_node+0x7e/0xf0 [ 165.205920][ T3741] push_pipe+0x3c5/0x7e0 [ 165.210132][ T3741] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 165.215756][ T3741] ? iov_iter_get_pages+0xec0/0xec0 [ 165.220925][ T3741] ? unix_stream_recvmsg+0x1e0/0x1e0 [ 165.226198][ T3741] default_file_splice_read+0x208/0x970 [ 165.231724][ T3741] ? sock_fasync+0xf0/0xf0 [ 165.236112][ T3741] ? __ia32_sys_tee+0xa0/0xa0 [ 165.240760][ T3741] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 165.247501][ T3741] ? selinux_file_permission+0x2d0/0x520 [ 165.253119][ T3741] ? security_file_permission+0x1e9/0x300 [ 165.258811][ T3741] ? __ia32_sys_tee+0xa0/0xa0 [ 165.263465][ T3741] splice_direct_to_actor+0x3f1/0xb30 [ 165.268811][ T3741] ? do_splice_direct+0x3e0/0x3e0 [ 165.273806][ T3741] ? pipe_to_sendpage+0x300/0x300 [ 165.278801][ T3741] ? security_file_permission+0x128/0x300 [ 165.284490][ T3741] do_splice_direct+0x28b/0x3e0 [ 165.289309][ T3741] ? splice_direct_to_actor+0xb30/0xb30 [ 165.294821][ T3741] ? security_file_permission+0x128/0x300 [ 165.300508][ T3741] do_sendfile+0x8e4/0x1140 [ 165.304983][ T3741] ? compat_writev+0x3c0/0x3c0 [ 165.309716][ T3741] ? vfs_write+0x422/0x4e0 [ 165.314118][ T3741] ? check_preemption_disabled+0x154/0x330 [ 165.319892][ T3741] __x64_sys_sendfile64+0x1c4/0x220 [ 165.325060][ T3741] ? __ia32_sys_sendfile+0x240/0x240 [ 165.330313][ T3741] do_syscall_64+0xcb/0x1e0 [ 165.334785][ T3741] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 165.340644][ T3741] RIP: 0033:0x466459 [ 165.344507][ T3741] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 165.364078][ T3741] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 07:10:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:53 executing program 2 (fault-call:1 fault-nth:1): r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x0) 07:10:53 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000014ff5)='GPL\x00', 0x2, 0x103a, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2a3}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000200)="e460cdfbef2408000000119386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500242b098805d320d98a61a90021c9bf", 0x0, 0x401}, 0x28) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = signalfd4(r1, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000400)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000000c0)=0xe8) read$FUSE(r2, &(0x7f0000002140)={0x2020}, 0x2020) sendmsg$IPSET_CMD_TEST(r2, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)={0xb8, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_ADT={0x74, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa, 0x11, @remote}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP2={0xc, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @multicast2}}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0xf9}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PROTO={0x5, 0x7, 0x8}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x1}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_NAME={0x9, 0x12, 'syz2\x00'}}, {0x1c, 0x7, 0x0, 0x1, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @mcast1}}}]}, @IPSET_ATTR_ADT={0x24, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0xffffffffffffbd7e}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBMARK={0xc, 0x1b, 0x1, 0x0, 0x8}}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0xb8}}, 0x4000015) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x12, 0x8, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000ffff0000000000000800000018160000", @ANYRES32=0x1, @ANYBLOB="0000000000f1a2002082090001000100850000002500000000410002060000009500000000010000"], &(0x7f0000000080)='GPL\x00', 0x1, 0xa1, &(0x7f0000000140)=""/161, 0x41100, 0x10, [], 0x0, 0xf, r2, 0x8, &(0x7f0000000280)={0x4, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x3, 0x3f, 0x5}, 0x10, 0xffffffffffffffff}, 0x78) 07:10:53 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:10:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x13, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) [ 165.372460][ T3741] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 165.380401][ T3741] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 165.388343][ T3741] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 165.396282][ T3741] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 165.404223][ T3741] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 07:10:54 executing program 4 (fault-call:2 fault-nth:33): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:10:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x2, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x0) 07:10:54 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:10:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdfeffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x3}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30002}], 0x0, &(0x7f00000000c0)=ANY=[]) r2 = creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000040)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000002c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x2}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) 07:10:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x15, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:10:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x3, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x73}], 0x1, 0x23, 0x0) [ 165.493989][ T3780] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 165.503941][ T3780] incfs: Options parsing error. -22 07:10:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x4, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:54 executing program 1: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000440)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, 0x0) r4 = socket$inet6(0xa, 0x802, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1, 0x7}, 0x1c) sendmmsg(r4, &(0x7f0000002cc0), 0x1a3, 0x0) 07:10:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x20000246}], 0x1, 0x23, 0x0) [ 165.555739][ T3794] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 165.567164][ T3800] FAULT_INJECTION: forcing a failure. [ 165.567164][ T3800] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 165.587007][ T3794] incfs: Options parsing error. -22 [ 165.610784][ T3800] CPU: 1 PID: 3800 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 165.620934][ T3800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 165.631066][ T3800] Call Trace: [ 165.634349][ T3800] dump_stack+0x1d8/0x24e [ 165.638672][ T3800] ? devkmsg_release+0x11c/0x11c [ 165.643589][ T3800] ? show_regs_print_info+0x12/0x12 [ 165.648758][ T3800] ? __kasan_kmalloc+0x1a3/0x1e0 [ 165.653665][ T3800] ? preempt_count_add+0x66/0x130 [ 165.658673][ T3800] ? prep_new_page+0x122/0x370 [ 165.663459][ T3800] should_fail+0x6f6/0x860 [ 165.667862][ T3800] ? setup_fault_attr+0x3d0/0x3d0 [ 165.672866][ T3800] __alloc_pages_nodemask+0x1c4/0x880 [ 165.678264][ T3800] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 165.683789][ T3800] ? kvmalloc_node+0x7e/0xf0 [ 165.688351][ T3800] push_pipe+0x3c5/0x7e0 [ 165.692566][ T3800] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 165.698178][ T3800] ? iov_iter_get_pages+0xec0/0xec0 [ 165.703351][ T3800] ? unix_stream_recvmsg+0x1e0/0x1e0 [ 165.708613][ T3800] default_file_splice_read+0x208/0x970 [ 165.714131][ T3800] ? sock_fasync+0xf0/0xf0 [ 165.718532][ T3800] ? __ia32_sys_tee+0xa0/0xa0 [ 165.723184][ T3800] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 165.729941][ T3800] ? selinux_file_permission+0x2d0/0x520 [ 165.735544][ T3800] ? security_file_permission+0x1e9/0x300 [ 165.741243][ T3800] ? __ia32_sys_tee+0xa0/0xa0 [ 165.745910][ T3800] splice_direct_to_actor+0x3f1/0xb30 [ 165.751269][ T3800] ? do_splice_direct+0x3e0/0x3e0 [ 165.756275][ T3800] ? pipe_to_sendpage+0x300/0x300 [ 165.761280][ T3800] ? security_file_permission+0x128/0x300 [ 165.766994][ T3800] do_splice_direct+0x28b/0x3e0 [ 165.771836][ T3800] ? splice_direct_to_actor+0xb30/0xb30 [ 165.777351][ T3800] ? security_file_permission+0x128/0x300 [ 165.783039][ T3800] do_sendfile+0x8e4/0x1140 [ 165.787515][ T3800] ? compat_writev+0x3c0/0x3c0 [ 165.792247][ T3800] ? vfs_write+0x422/0x4e0 [ 165.796647][ T3800] ? check_preemption_disabled+0x154/0x330 [ 165.802419][ T3800] __x64_sys_sendfile64+0x1c4/0x220 [ 165.807585][ T3800] ? __ia32_sys_sendfile+0x240/0x240 [ 165.812843][ T3800] do_syscall_64+0xcb/0x1e0 [ 165.817329][ T3800] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 165.823248][ T3800] RIP: 0033:0x466459 [ 165.827117][ T3800] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 165.846699][ T3800] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 07:10:54 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:10:54 executing program 4 (fault-call:2 fault-nth:34): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:10:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x16, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:10:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x7ffff000}], 0x1, 0x23, 0x0) [ 165.855082][ T3800] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 165.863033][ T3800] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 165.870989][ T3800] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 165.878972][ T3800] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 165.886924][ T3800] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 07:10:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x8, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0xffffffffffffffff}], 0x1, 0x23, 0x0) [ 165.941776][ T3826] FAULT_INJECTION: forcing a failure. [ 165.941776][ T3826] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 165.956580][ T3826] CPU: 1 PID: 3826 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 165.966725][ T3826] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 165.976767][ T3826] Call Trace: [ 165.980051][ T3826] dump_stack+0x1d8/0x24e [ 165.984378][ T3826] ? devkmsg_release+0x11c/0x11c 07:10:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x10, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x8, 0x23, 0x0) 07:10:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x15, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 165.989306][ T3826] ? show_regs_print_info+0x12/0x12 [ 165.994491][ T3826] ? __kasan_kmalloc+0x1a3/0x1e0 [ 165.999427][ T3826] ? preempt_count_add+0x66/0x130 [ 166.004444][ T3826] ? prep_new_page+0x122/0x370 [ 166.009197][ T3826] should_fail+0x6f6/0x860 [ 166.013603][ T3826] ? setup_fault_attr+0x3d0/0x3d0 [ 166.018620][ T3826] __alloc_pages_nodemask+0x1c4/0x880 [ 166.024242][ T3826] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 166.029779][ T3826] ? kvmalloc_node+0x7e/0xf0 [ 166.034362][ T3826] ? kvmalloc_node+0x7e/0xf0 07:10:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x300, 0x23, 0x0) [ 166.039031][ T3826] push_pipe+0x3c5/0x7e0 [ 166.043263][ T3826] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 166.048883][ T3826] ? iov_iter_get_pages+0xec0/0xec0 [ 166.054078][ T3826] ? unix_stream_recvmsg+0x1e0/0x1e0 [ 166.059357][ T3826] default_file_splice_read+0x208/0x970 [ 166.064893][ T3826] ? sock_fasync+0xf0/0xf0 [ 166.069301][ T3826] ? __ia32_sys_tee+0xa0/0xa0 [ 166.073975][ T3826] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 166.080737][ T3826] ? selinux_file_permission+0x2d0/0x520 [ 166.086358][ T3826] ? security_file_permission+0x1e9/0x300 [ 166.092105][ T3826] ? __ia32_sys_tee+0xa0/0xa0 [ 166.096773][ T3826] splice_direct_to_actor+0x3f1/0xb30 [ 166.102142][ T3826] ? do_splice_direct+0x3e0/0x3e0 [ 166.107159][ T3826] ? pipe_to_sendpage+0x300/0x300 [ 166.112171][ T3826] ? security_file_permission+0x128/0x300 [ 166.117884][ T3826] do_splice_direct+0x28b/0x3e0 [ 166.122723][ T3826] ? splice_direct_to_actor+0xb30/0xb30 [ 166.128263][ T3826] ? security_file_permission+0x128/0x300 [ 166.133973][ T3826] do_sendfile+0x8e4/0x1140 [ 166.138469][ T3826] ? compat_writev+0x3c0/0x3c0 [ 166.143224][ T3826] ? vfs_write+0x422/0x4e0 [ 166.147630][ T3826] ? check_preemption_disabled+0x154/0x330 [ 166.153423][ T3826] __x64_sys_sendfile64+0x1c4/0x220 [ 166.158609][ T3826] ? __ia32_sys_sendfile+0x240/0x240 [ 166.163882][ T3826] do_syscall_64+0xcb/0x1e0 [ 166.168373][ T3826] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 166.174244][ T3826] RIP: 0033:0x466459 [ 166.178111][ T3826] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 166.197687][ T3826] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 166.206069][ T3826] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 166.214011][ T3826] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 166.221952][ T3826] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 166.229896][ T3826] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 166.237837][ T3826] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 [ 166.263833][ T3825] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 166.267951][ T3858] incfs: Options parsing error. -22 07:10:55 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000340)) mount$overlay(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f00000002c0)='overlay\x00', 0x10, &(0x7f0000000400)={[{@nfs_export_off='nfs_export=off'}, {@xino_on='xino=on'}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'overlay\x00'}}, {@smackfshat={'smackfshat'}}, {@dont_measure='dont_measure'}]}) mount$overlay(0x0, 0x0, &(0x7f0000000200)='overlay\x00', 0x51062, &(0x7f0000000a00)=ANY=[@ANYBLOB='default_permissions,xino=off,workdir=./file1,lowerdir=./file0,metacopy=off,index=on,fscontext=root,seclabel,dont_appraise,euid', @ANYRESDEC, @ANYBLOB=',audit,smackfsroot=system.posix_\bcl_def', @ANYRESDEC, @ANYBLOB="2c6f626a5f726f6c653d2c00434f6ba629c4747bdc0b27e1054d71ea71e30fcddb65ab316d74effbfb05d1542250161cfba28dfe6ed67f52f16163075b4ec3d39e57527cd0fef0f4a38ca7cb7e949bbcbf5dece13c6ca59979ae813a88f4e80f3cafef6d373a9ea31de9a22e6777f3cfc795e3a269ccf7c7119e5610ae9509a5df1aee9c7adb721bd543b5e479b7b75f786943bde2d1b1b34ba9351a5106c87789b9ab4981ac8ba601af14c1df6622b29519a3c0a345716678a9c8c3b6033a262ae010db01ae124d299e13a76c"]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000380)={0x50, 0xb, 0x0, {0x7, 0x21, 0x1, 0x800, 0x3f, 0xffff, 0x0, 0x4}}, 0x50) connect(0xffffffffffffffff, &(0x7f0000000740)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000040008000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="100000000000000020"], 0x5c, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000480)=@l2={0x1f, 0xce, @fixed={[], 0x11}, 0x1130, 0x1}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000300)="d6d1bd30079a", 0x6}, {&(0x7f0000000500)="ac90762a517e2ce765b82c7bf467e162eabddce37d6eb374bf542df4f588999dfcfd3c38ec9b94e9537be2248e1ebf97d7dadd0d92343526e36cb0987abb", 0x3e}], 0x2, &(0x7f0000000600)=[{0x60, 0x1, 0x1000000, "9dae97fa495eb6482081c2794d01e03d787fc6050b2223768312ebbc21969211662ab0b46b0a3a4cb31db60cb71a3df7bcaa64330d7fa56ad83530872a533afc4cc919e51bd84afa6aba"}], 0x60}, 0x20040000) mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mount$overlay(0x40000d, &(0x7f0000000000)='./file1\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000007c0)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@upperdir={'upperdir', 0x3d, './file1'}}, {@nfs_export_on='nfs_export=on', 0x5c}], [{@seclabel='seclabel'}], 0xf603000000000000}) creat(&(0x7f0000000080)='./file1\x00', 0x124) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 07:10:55 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x16, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:55 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0xfa2, 0x23, 0x0) 07:10:55 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x17, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:10:55 executing program 4 (fault-call:2 fault-nth:35): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:10:55 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:10:55 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0xfa4, 0x23, 0x0) 07:10:55 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x1e, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 166.548175][ T3875] FAULT_INJECTION: forcing a failure. [ 166.548175][ T3875] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 166.555443][ T3873] overlayfs: unrecognized mount option "nfs_export=on\seclabel" or missing value [ 166.578854][ T3874] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 07:10:55 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x18, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) [ 166.593463][ T3873] overlayfs: unrecognized mount option "smackfstransmute=overlay" or missing value [ 166.598001][ T3875] CPU: 0 PID: 3875 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 166.609424][ T3889] overlayfs: unrecognized mount option "nfs_export=on\seclabel" or missing value [ 166.612901][ T3875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 166.612905][ T3875] Call Trace: [ 166.612921][ T3875] dump_stack+0x1d8/0x24e [ 166.612938][ T3875] ? devkmsg_release+0x11c/0x11c [ 166.644676][ T3875] ? show_regs_print_info+0x12/0x12 [ 166.649847][ T3875] ? __kasan_kmalloc+0x1a3/0x1e0 [ 166.654758][ T3875] ? preempt_count_add+0x66/0x130 [ 166.659757][ T3875] ? prep_new_page+0x122/0x370 [ 166.664492][ T3875] should_fail+0x6f6/0x860 [ 166.668886][ T3875] ? setup_fault_attr+0x3d0/0x3d0 [ 166.673883][ T3875] __alloc_pages_nodemask+0x1c4/0x880 [ 166.679226][ T3875] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 166.684742][ T3875] ? kvmalloc_node+0x7e/0xf0 [ 166.689303][ T3875] ? kvmalloc_node+0x7e/0xf0 [ 166.693879][ T3875] push_pipe+0x3c5/0x7e0 [ 166.698095][ T3875] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 166.703699][ T3875] ? iov_iter_get_pages+0xec0/0xec0 [ 166.708866][ T3875] ? unix_stream_recvmsg+0x1e0/0x1e0 [ 166.714120][ T3875] default_file_splice_read+0x208/0x970 [ 166.719634][ T3875] ? sock_fasync+0xf0/0xf0 [ 166.724020][ T3875] ? __ia32_sys_tee+0xa0/0xa0 [ 166.728667][ T3875] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 166.735399][ T3875] ? selinux_file_permission+0x2d0/0x520 [ 166.741006][ T3875] ? security_file_permission+0x1e9/0x300 [ 166.746691][ T3875] ? __ia32_sys_tee+0xa0/0xa0 [ 166.751338][ T3875] splice_direct_to_actor+0x3f1/0xb30 [ 166.756730][ T3875] ? do_splice_direct+0x3e0/0x3e0 [ 166.761731][ T3875] ? pipe_to_sendpage+0x300/0x300 [ 166.766729][ T3875] ? security_file_permission+0x128/0x300 [ 166.773286][ T3875] do_splice_direct+0x28b/0x3e0 [ 166.778132][ T3875] ? splice_direct_to_actor+0xb30/0xb30 [ 166.783650][ T3875] ? security_file_permission+0x128/0x300 [ 166.789338][ T3875] do_sendfile+0x8e4/0x1140 [ 166.793813][ T3875] ? compat_writev+0x3c0/0x3c0 [ 166.798546][ T3875] ? vfs_write+0x422/0x4e0 [ 166.802936][ T3875] ? check_preemption_disabled+0x154/0x330 [ 166.808729][ T3875] __x64_sys_sendfile64+0x1c4/0x220 [ 166.813895][ T3875] ? __ia32_sys_sendfile+0x240/0x240 [ 166.819151][ T3875] do_syscall_64+0xcb/0x1e0 [ 166.823624][ T3875] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 166.829484][ T3875] RIP: 0033:0x466459 07:10:55 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@mpls_getnetconf={0x24, 0x52, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x8000001}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x6}]}, 0x24}}, 0x891) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000100)={'raw\x00', 0x3, [{}, {}, {}]}, 0x58) 07:10:55 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0xfa6, 0x23, 0x0) 07:10:55 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x2c, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:55 executing program 4 (fault-call:2 fault-nth:36): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) [ 166.833347][ T3875] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 166.853185][ T3875] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 166.861565][ T3875] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 166.869508][ T3875] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 166.877568][ T3875] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 166.885508][ T3875] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 07:10:55 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:10:55 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000d00)='nl80211\x00', 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00', 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r1, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000d00)={0x62c, r2, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_PEERS={0x5e0, 0x8, 0x0, 0x1, [{0x5c, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "20800750a382c8c53d2b23a0efe8d1de5c0b8d84bb2f9e69de053386cade094a"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg='\xdb\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff'}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_FLAGS={0x8}]}, {0x1a4, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg='\xdb\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff'}, @WGPEER_A_ALLOWEDIPS={0x12c, 0x9, 0x0, 0x1, [{0x34, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}]}]}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "b0c6fb7c1a682d02b0bbcaa7d46f4804b6fdd208b896edfbeefe3ab627412e12"}, @WGPEER_A_FLAGS={0x8}]}, {0x3bc, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "63ac1b367835defebea1b82796decd902110fef530e687b8898c483010df2af6"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @mcast2}}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ALLOWEDIPS={0x338, 0x9, 0x0, 0x1, [{0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}, {0x10c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0xfd}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}, {0xdc, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}]}]}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g='\x97\\\x9d\x81\xc9\x83\xc8 \x9e\xe7\x81%K\x89\x9f\x8e\xd9%\xae\x9f\t#\xc2 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 07:10:55 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x400c00) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r4 = accept4$vsock_stream(r0, &(0x7f0000000100)={0x28, 0x0, 0x0, @local}, 0x10, 0xc0000) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) r7 = getpid() sched_setattr(r7, &(0x7f0000000300)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r8 = getpid() sched_setattr(r8, &(0x7f0000000300)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r9 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000002cc0)=0xffffffffffffffff, 0x4) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000002e00)={{{@in=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@initdev}}, &(0x7f0000000080)=0xe8) sched_setattr(0x0, &(0x7f0000002280)={0x38, 0x2, 0xf1, 0x3, 0x97b, 0x4, 0x6, 0x2, 0x8}, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000050c0)=0x0) r12 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000005580)='/proc/self/attr/fscreate\x00', 0x2, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f00000055c0)=0x0) sendmsg$netlink(r2, &(0x7f0000007c80)={&(0x7f0000000000)=@proc={0x10, 0x0, 0x25dfdbfb, 0x80}, 0xc, &(0x7f0000007bc0)=[{&(0x7f0000000240)={0x2020, 0x36, 0x6, 0x70bd28, 0x25dfdbff, "", [@nested={0x1004, 0x45, 0x0, 0x1, [@generic="ffdc520c4d3ef452ff2e1905abc8f1da4f66764d2e75d570a38dbfa8f7e39a5f6c9b71f1d22a9a9ef5569264dd124fad2f0dc6afbf127695d8ce83d8edd90b41a4d45add3dde4fd9aba5c2df35502bf01ad0f732be26a892ad7fc86cf4c77cc48dd3fa5a46f42e2d02b6dd37c39ae4424096f04539c3dbe0a9d82a0dbd00dad1fb83a85e6dfd12664e50fb6e1d493ad422c6a020b627dbebed6b1cd36937e6fc68469c0a7464317594db069a4e40b1328fc42e40df9ebba479c4a3bf4f583887b4dab78648151b009dd31bfa03dfbfb4428d78a17729b35dac340b8c1381a75e77fddf9f5dfa98bcbf3aa442ebb1e79983be508638121253443041c2e86f08b8d281965b97f07cd0e87e31912eec0ca13f323d9e4278f298b3e70a1569fcf2112a7ef65ae51c98a9421cd3dd86bb8401d4b847f084d08bfafae038b095ab30bd59bde07933ac8f17c6ea4ac9bc35a6c73403a95dc105a60b721c03dd8914a9803e576a763751da6211280be26e96ab2fb87e4fe961c8086df11dfc063f5a57a478c6abb6e602250fe99aac22dc49a9727fe72bfa0b00783fdf7088871789b85be51ed3d0c5da939848545ce62907f9f43ae4d57b1efc4a4849370e7a43a947bda6b56988946e951571dcda1229308615b6e51c62e96578df53d035b58c50850a898c892e4c31b6ae8c505c8598d8b3c644df3fefc77a08ef50795f9c598d30041332be7feb386415f4a700e6706febf221fb9e628460944b997d59f7d18d9003f3bb93d52632eab2cc8d04d28f439c5405cf56ca187395d1bf516069b14a0ae0548f415f685a1e48dae39edd608b70dc732151e74a7fb9cebc1dc8e1cc0f7da5a48610f69bb557a6398b22aea57beef9e6b4a598eb0cc17eefd0d103c609f618cb29702213fc66fdc38382da188f0887b23e756bc85d97fdde6d729afbe88b4e47d9c469d85bda23e4a150bed8427ad32cdd5192f76e6c411711c050ada5cc86c8353e1b704c2a4dfe266fd21427ec875497fba34c6f4e3fed9cea9712040182995e43895ffbcbc72f4e3e52fec725a7d02aac4055271da419a923c6bd7fd41b0de1e9b354f9f09ccb5714aedc0abfc0c942729d1da6dcddda97674f3fa8f69fcdd981e7779f61321eb4785cd79042d2916c5c0affd99097e7d71a185436a11451e46eb4c4b12f550c63944c1a99e38d9ea5157a717aae63791ba5874d6843435e097ce9d8c64fa24ceeaef7ced8b1bdd8e124526f8e4d0b8d44a18bab988c1978dc0f8ab484b6039ac3ae58be4b0bcad0121af5f29ff660ddfc341886494d614593b8a91858745ee829372fd0a2b0bf51f036856f7e664c40e87fd9d282c3b92b965388e3d1d07e6922f42fe759d58505171e9fe378ba1b6bfb2caf2c6ccc644e004de1a5717e38da99bec7e1bc778069c5594e8ad83aaa37b8d656dcb7230bc6a4fa711ae9bf65f8768f4dcdb6730e00e25d08af9f4239d4dad2575723c8667632ca060cb3bc4ebab4aa9080c6bead84e93b6b4cf07eb402536904ad5d9bcc5e1b9aa83cb6871ce8435db3f008fce6f390d4352fcda180ce6b00edd94a9df7bf5c2401b2d690a30a790216f6395b653efc6b00496c12e91fa5e680855edca5786bb64a855a411999921730ce47ed91e8cfa728fe4a567555fa2c60a2c82b5f5a1272825011e7d1437bda95a3f626c182967a0228d226317bb00a043f4d48544561e6d23bc725a0d862972555c17ba96ed02e3f95a44fc04e3b26bb39de72a0ae753a329b4a757d9eeed6453f34f37ea3c46c163f3d6f5da64d33baaf6c0abe5a2e2e31a964fc1f4c8776af99578b4fe81836f1e0872ad777b9c73df3993d3c433efecd55d9ed415f43ace77f43ab1cfd71d516755bf3a9eaa54cbc958248570bc8739b6717b7ad0341a668ccd3056bf60b5cefd0595aa1c50c091a32c52409c8dd44292f1f696cd7e21addf7980b673932fa42a88fb36a3a71c941beedd9293ec0e4e39fab9e309e9702be10c8306e11d576b62415f128f1b4aa6b676f5c3e7656836cd92e9f62d9e94746f98656c905708de4fdfe7561ede90227fde73a84cafe7f53c9787473202aa8d8dcf10a20356ab4566089d3b2e57aed42bde1daf4867d5be2c44ba8ea83fc94e40644a943b3c96b2cd192ab5379d3065c8f8c9638115b6e856eb49b5786dd7c035c5f2c5caf90b49eb010b13c08cc6149315d10b6e53ba119c3b00594f96be9af97c81e425462dee1460ff5583c8cf3d9534ba8f91d4b527b88f494cd42a96c2e790d03b21c6416fd74a2c2ee65da988220efdecb0ff17d77d990bf52175559d7d0a6d324ec25e6f4c871593e47a93a7201c0ff8199043906f664de6e1fe5024a077d9a5e127a2c30d31e60a184089caf1bac948f89ac7eb36cab32da6c4e679b73635550cf4b8cb2397aae6dced9d62091977e15252a7140ba8da17fdaeffff960594c798136ffc9bfdb61941806aa2e37b997838cecb439b0a1a36c45fcaabb8aaa73c3c32ea55a2c1ac1fde5af5c37ac31a30355264bbb3eb963efce5468aa53b54d18cf8c5e975795e5170891e1bc51a5b371be9563ef65d5b0899f9ff1b60bac067e87137b36be137054cf2026228d0969cdb88e947a2cbc8d934612d2320e47ca4bbd896291b8f7523a1a76631c9a84cb5de14b96c06170c20e75dc8931d9ab3ec6e446e25dff0367360cdf924c700de21763eaf33bceb6b3b982f390b9b5acddfcf26f1baf62ea0dc8136ba298cc50d4a626851694488acc63e22a70688220178b9ae69b4e0cc64df8e676699a60976d1d2d1374bcd2a3e78650e8b6ceb99dfeb7481f6c1acf6ef8dcf1a430bee63a828b3a65199f745e0bff2b1bc4bbf66727a95803a2d84fa2ca9521ef68112be7e9e91a479a7f88cc7c9ae62cf656bd02faa973e30a49b9b31a50d8d17b66918d3a18174edf270fcc080542b06abeae5bc6e9dc72ecc379398896048ce2af98e6a18dfce3f63f8267fdf35164042c66364c1c9623bb650dd70f07674d6f62bfa480dca72b0ed145544fd917977ac07cc7e07aee95e947d013adcadad726ba8eea6223028560a60d049761a2f68e2a158f50367941cc394bc30eef4675cde4055ea5fa4845eaa3a4f6b750727f991ba5cf03f10a3d828a370a79323e7aad915761ec277c175d75dfcb19654d3f4d394034bb594313083d2e2ce12e308b5ab78eb81e98bc8126637eaddc18c1f4ee383c809895066795edbdd4ff9007c8cadf678af7b155d6b70e84817c36e3888bdb758137b835a6f9d3f9373a4a74bd4c87ee3c1820d3e523c4d65a33f440d8cbdcbfde07bc4e16189f027060210ceddea17745df53d590ac9c651ca6cd92ae486c5a0ba964bba13d23594464e2a3ae9bb15e0a3aa242e2def91f70c6de5bcff8c2170cbd4f6806c266662b6c576bf954cb6530389f1051854f1c819d4c69cc8d31679568ea377dbc1eb97e596781c9191b337e5c08c40ebcf8f6d857550218a7db2bcfaa6384aad7a29bf630d2c7d69b34a0712ce43ca1fde4faf918ef0fc7ac873d9528d06e5f745c7847022644e08bbe47234c1f43364fd6f3e1e56322c04410646cb41007d730894d8c76ef84638dba881026be1a1cfbde788a38e2ba78304d007f159197f125c3d4d27962ac4d22ec73e29f64cca963cc76e1bd8a322a8b0524edf3614040fff232cf3625997197b116426a412168b58dfd0e708b3cd0a8d5099eee37567869fb3f2fb1c7bdfbc0745443f5c3ab5520c5efd5de4b0e990559b458b4ae854d2b97ad39c19fb0d7358a4f5225d59e482dd2326f31ae08d5b702272c191411fc15fe88a518a1d84b7b2517082365cd2dbc3f85b672aacb86f57f52809af32b7f74c9cf05e0bea3717a667fabab528e937b1df7ead0486a429618fb80ec1a7926e8cef8a8c3f3c635823b71a0b92b55ce05826110a9a41cd20aa14d975ac6600f709a9902d02bd9efa5496e0966fd55f27bd57f05dde96e1e7f33898b0231fb9da632e8f1bc765c680988afeca792a9f566048fee38c7a2f98663202f3ce278d4e791f8580fed168ce21abd4385b0e267a47ea00ee7f81a87a9d332aed770a8b7557362fd9e785307b01060004f430e0e87ee7dbb65954f48d735f58bfc2a6aa5291afc291f52085b21f395cc798793a81102f2e12e01777bb4f568560e74ebb6e7304292913d9be7772e47067fefa5be997a1b2e72aa5021b8d630c06dde060b511583ea9915586737548a8d23ddd50a79933a96e43b8d9b3392733dfa145851f9e14863423b41be0dfc48341ffc6cff76055095f42dc05466e9d1da8af0a811edbe00ba772b6d35ee3e1faaa01fd41d086773f157d34480cad018186ceaa72d9516cbb0d8a4bf0a521fa4b66f3fd3f882a12b01e1cb3e09ef461dd7bc15f11d52de4b92147ca72eb7ce876d4e7f19c7aada72debc31ae5a9c468672538d8713f0f10a17fe6c5ba74132e4596df28da395cdfd9adf59f08455b0907592e73533d15bc1f61e12e272344a1894f0c9d4cd719ffbbab4527d946046e0892eb9c8929b44d12906c7720f2dca37d39830dca144e53eb31ece0e44bc80cd363ed6670fbad8aacdf530a610950c1a2684183427d140eb6135a7ae5dc1ebac3e3ba92a01a227ccfb359413c32583e59812995c85232c517a114a10f8c03529614931f981fefeab6836cd783c797df2f43f581d65507375726443b163b541bfba9dcb9f48e6d76c53affa44bfe74a7cc46afb7e224a8c019bf842e656224ea090d1e965bbc77a4aeff5a700c04461e7d70212e3f6a0b3eef436304fb2cf0565e133af8f8a6244dc420a952053a30b50ed6fa97f02e870f7e7006d8adadbcbbee68b689033d67dbfba113bc2fa0c049d37083bdc9b38614af9bdc00c69d6557a5477689dbb5e6af80ba7cadf60ae1e89653910206c103c53b921204f1ce25f790e4340e73114a6e2dd2b72d5be551c811d7a4de4eefe3794106345787d468b971650efbd5d42ce6a0bb33e03d05156b826c6ce523c039408fbfdac0fc7b88edaf30dfe5043b566bfe2b7ad318727083ca851eff093fc192d1d1386ee3112aa3e5fd346646f7bd35d0f88bdabe9b740cee39773d618db216d518f3d9678525a8777d8c34c770493ef43d73900f4536a83c08d3de8dcc117103e1db5fc67a9153b72c7ab23d1b5a06d661fa4653ef0eeaf050107cc97f1d63534164e16eb24bc24bdd816d61518b420d08cc077ddf97f822d265e6112d5027fa0854f44b1412adb594cf9592e7983f35e7665efc3375ec2c9d491304895d049b43c55257ca63590ddf3c024105e1b5451257cc8914ec7b9e601d0e47dfe1241c1371cf72b6fe5921304af80b64ac02eb22246b8adc75f2088df25bd2ffd3e881f5d31d2631631e0e6df8e61ee81d5bd0ec270bc3c92ef617323e99f9428f419ddb0c6f2ed08f43f7a7eb9ffaa6ca6e7234eb997843e2cd1c377076e35b0673593b7371b6cd4647f098cc274783fa81da3e5a200bbfc37f39910354870a3550d018de732c1297cccccf187bfe6db6c7f460b95f175e59c097bcae51174442b13d2aad1081b7fb0a84cd1a050b36f5e29e52f5a0dfd35a1818fb8563921a11a50181273169a2b991053178c1a288d1ff27448861089122801de6c30f0f9e268782a8ec617bec99d3ff578641c938d7213534a5da9c887f723008773c30d81550355beb057a35c0cae444f9104bbfbbdcc52fdf916032f0c1d9a4fe14bb81794b9eb732eb08f0342b497f07de01b9af5492fea3d918081a09719f700"]}, @nested={0x4, 0x59}, @generic="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", @typed={0x8, 0x34, 0x0, 0x0, @ipv4=@local}]}, 0x2020}, {&(0x7f0000007cc0)={0x11f4, 0x3a, 0x200, 0x70bd27, 0x25dfdbfc, "", [@generic="0d3d8f8e5f16de0444a828a8ffcdd4cbd71cfa75fc1a5ed3fe11582808f0653a37f778217abc72a454bbe85193be6a9033e285ef9f31943b54827dd1411973007ab531d0ce62ddae1e7aa69e22ea8d6c0186d76f054231f2cb6ac4a15f73b125ff1dc7eac39adedd69bcba033b2ac97d10d026a97f758f03cb67efaebf9669e422dee4d9cb703c60ff70fd841142208602acf0293b605dc6585038cde6a98723fab22fcc30a6ec1a3c3cd2c1", @typed={0x8, 0x3, 0x0, 0x0, @fd}, @nested={0x1010, 0x47, 0x0, 0x1, [@typed={0x4, 0x40}, @typed={0x7, 0x5, 0x0, 0x0, @str=':-\x00'}, @generic="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"]}, @nested={0xd6, 0x6f, 0x0, 0x1, [@typed={0x8, 0x59, 0x0, 0x0, @fd=r4}, @generic="ffa25475960ff23eb276d73ca439be51260b9096a3c95188c23fcdd1e7688f131b724e1958a834b0a4f0d3efed907ba453d59c5e40513882eaca9b15a7de920a96ed9a4481df518e2d7a385014083ab823cc3d5f2b401c94a07edb9e64c4f858f2ef911d95d4de0c8512720430c4d016cbd23baa0773926a69ded9b14709001c7ca46ebadd8abf99c71cd15f9d32a7e2d2f64d024ec61a0cf868786c98e656938fc8376bdda2", @typed={0x8, 0x74, 0x0, 0x0, @uid=r6}, @typed={0x8, 0x9, 0x0, 0x0, @pid=r7}, @typed={0x14, 0x49, 0x0, 0x0, @ipv6=@private1={0xfc, 0x1, [], 0x1}}]}, @generic="8b919942074ca92b04822c61873110c6bc31f7da2f6f85a3a23dd3fec479d49ad3b7a7449af579cb034a7dfff5b6547a715f1b600b99eae3a9dffd340267407f7a09a2f307687d"]}, 0x11f4}, {&(0x7f00000027c0)={0x174, 0x32, 0x200, 0x70bd26, 0x25dfdbfc, "", [@nested={0x92, 0x24, 0x0, 0x1, [@generic="c868e8f46daff65ed518c7f8a3ce238723f4f29d26", @typed={0x8, 0x65, 0x0, 0x0, @fd=r2}, @typed={0x4, 0x7d}, @typed={0x12, 0x1c, 0x0, 0x0, @str='memory.events\x00'}, @generic="0d789493dde35417dafe19921f2bdadb1f8ffdc984e16395c8735a472a5a80a8b6cadcbc9b3908fcea5798ebba5323ccaccdbc9615c74aae2fdbffb047960d69f9fde3b860b18c65c53aceea2744304f7e90ac47360add8586"]}, @typed={0x12, 0x21, 0x0, 0x0, @str='memory.events\x00'}, @typed={0x8, 0x1e, 0x0, 0x0, @uid=0xee00}, @typed={0x8, 0x8f, 0x0, 0x0, @pid=r8}, @nested={0x28, 0x6f, 0x0, 0x1, [@typed={0x14, 0x6f, 0x0, 0x0, @ipv6=@mcast2}, @typed={0x8, 0x43, 0x0, 0x0, @ipv4=@empty}, @typed={0x5, 0x79, 0x0, 0x0, @str='@'}]}, @generic, @nested={0x48, 0x25, 0x0, 0x1, [@generic="21c3fdbdee6702b28084301cc065ed983e65405a8ffba862d83db63c25a7c9eda7786d9683377dd5a4cab8b3be42df8a0e01662b98c3c6aa337b0d01fcec68625073c0a8"]}, @typed={0x14, 0x16, 0x0, 0x0, @ipv6=@private0}, @generic="d534e81fa2403915de8e4de410ef58d53e8346ccc9a7c743a6884e67e07d979c1401d779799ef0"]}, 0x174}, {&(0x7f0000002a40)=ANY=[@ANYBLOB="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"], 0x260}, {&(0x7f0000002d00)=ANY=[@ANYBLOB="dc000000380000022cbd7000ffdbdf2508004f00", @ANYRES32=r9, @ANYBLOB="ba00668053431afa459deed50991446e60ac3470462766f6b9fde74e2ef0a9929b0b019aad33f1d02cc08963d8b9e1e50ceabd050fc084f9b0dd1d12ad38bf75379faa3ce64e3fae43cb4e51207c12f09334cfd1737b33f14b37cd0510d85764286e771c2d85df47374595c0d5b5d52c5d3710de81d6d1f27d42a1d684340c9ef12e81ef30286461d79eb840e4afe9da9be8c7c017b4e08e8d3b946c441df7fceb958ed6e4b9120043006d656d6f72792e6576656e74730000000000e233b8c7adc2df7a"], 0xdc}, {&(0x7f0000002f40)={0x214c, 0x1a, 0x10, 0x70bd25, 0x25dfdbff, "", [@typed={0x8, 0x10, 0x0, 0x0, @pid=0xffffffffffffffff}, @nested={0x20dd, 0x35, 0x0, 0x1, [@typed={0x1004, 0x55, 0x0, 0x0, @binary="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"}, @generic="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", @typed={0x8, 0x40, 0x0, 0x0, @uid=r10}, @typed={0x8, 0x4c, 0x0, 0x0, @ipv4=@loopback}, @generic="f98d4dc84dfda9af02ec6e8e328f1599ea085d5df837fc8f2d6540c1953e0abe63b953463dc0049967efdb3d24a6955ddf3bdb9915455f738693d553a15723c854388173e13dbff381f390e0327f758154450fce514a4b1579fd7a135cc1dd459a4bdab053879bd3ec8836bc68661fa379cfe80a65046e71e9d52cf3992c71cce90b275b9917164831d8552ef2b332cdfe813e6756d4e7515bc977994ab71eae64141b1d3d065d900ad115d911bf04f855b3b64b81", @typed={0x8, 0x8f, 0x0, 0x0, @pid}, @typed={0x8, 0x80, 0x0, 0x0, @fd=r1}]}, @nested={0x51, 0x94, 0x0, 0x1, [@generic="8416db923ae682064c8c20c95f2839678f5cf844b9ad61c09a2e765c653d3bbf8ec7ebcdb56aad1ad8d97376de5b48130b8f2789a78d4002adbb2087a7d150645fc7b63ffc0ebd203e0a5efc01"]}]}, 0x214c}, {&(0x7f0000005100)={0x460, 0x41, 0x1, 0x70bd2b, 0x25dfdbfd, "", [@generic="19d4f6c1501449309e4f52998acb67dd6432d37522f9bd4b1f85f8d7e1a90b4d3ff444f814525cd08511515761ee595222f10ea4a08394f7f512cc6521beaad8a972708c0a11a387ac2db56adee747f0319f3a05b6133496eaac3d20e899f095384b0a64f3481b8e79e8846f2ccc2ff4419236a756e5ad278a8e283b1890818a7e8d1886196ac06ec67a6797fb03f903e414c9f124fd6936a2f7f19e5a2ef6050525ff0f7a4c5a", @nested={0x25e, 0x2f, 0x0, 0x1, [@generic="a69c58896025a1ed0ea708f34d333887b30dba49b4822be345f83aa1018658f6147af8b0fb4b6979c2a4d16a91ee9f34771b13ea678f453b35b795f54368965ab212d62085e8b4f938348a39af66bc17c5c711211ef192a18db17132f4167da5c43c82d7632e64eb849228c5d59b2f63a288397ee05d8fb73b9bfd528b00f8de60032d99f42ca7ae379dcaf2676751822a3459e8984d3595b9593f1dbae731630efea284b92ba237bf23f616417beb4f7fb38e48f3ac8983bb3373a1e9c0e6dd517c7ed8f6e00728e9fbb4395a4600a8912c12a0c0b6fff52423b8dc2496a3", @generic="c0ee607aad35957c416159b9fb1b4ded7503815916a0026f4913420c828f194b6133ba553cfdc109370d0fa6bff5f69b409af4cc446668635b236f47c1fabfc59d34e31c1215ac7cb9c867b97c96289061c2b21370481d13bbe2b815047bc7b10195f0b31c660495e0ce5dd2c48f9e6cbf38e120162b559d72c6f83e2ea7e57b31bf3bf6ca06186b0cba45ffa6a52f6bcac3da11ea85722b63792a3563e5a39f96f69f1e68eeb33c653a35bf7363ba291c76d768313002c3956b1158532c1c5719d2d084e159b9230059f1b0a88178572e40d30bc52d0227015a4815f10e483cfeadcdeb836b2cc681b3962db9fb30ad4c", @generic="376916424dd62b69eba12b262408b28d1b21b3cffc624e9523ae725b796c1b16e58b1cdd6c720094bfb22f81845fafbe7afe39f304825e4c7076d735d9db1c3ec569c9f1fe79a0", @generic="dba4c2ca281c075cf7e9eed9b087ceda657f3364ae4b", @typed={0x8, 0x62, 0x0, 0x0, @pid=r11}, @generic="7fc7225a97cef52073e7c7238daa79b26b2bf6f5205e830d24d25d91bffa30c5e1b59fc5e5"]}, @generic="0c0d409ef6bb1f281cc50f438aac2a4496f568c96adb00b789fd86e4599ea64831a9a2cc192675904aa25e8c6269648cfc45d1cd7018f32d7837c362266f0a2b56f46f6f566dbefb2f926f37f749bf2becd7", @typed={0x60, 0x62, 0x0, 0x0, @binary="a2be0729190cb38f0b1aff5d46413091f66f07e034b53e7deb16d5840ebd56e822d57af3edb64a80f932ac14df3398be4da4af12f3aeeeece33e65bdc9770b39423532ac94ee43452ac1f3560dd0bc2466ae647d2b58c0a1eee042ed"}, @typed={0xc, 0x39, 0x0, 0x0, @u64=0x5c}, @generic="5a06d958d74cf88d0994485dd144b439c0275bcd8b463fcb295614ec0bf2e17d1fd43334696fa9066b91e9eca2e975872d810007bc2b85a653d3a802547d868bb81b73c7bc351e4b81eaced87f8ca8bfe5274e0b6d45328d024d7ab1a34b5e3486168f7c675bb89234c92cc274b7b707d653f583ff75559424edb42e8e693eda17e59cf4161486d888"]}, 0x460}, {&(0x7f0000005600)={0x24f8, 0x3c, 0x300, 0x70bd2b, 0x25dfdbfe, "", [@generic="1eaa62c1f9329d4c460d91a9076def57de413742dcf97b4cdf67f302718adb54b23e5deb50ccb06d3cc4e0fa2c7b646b96628fa56ffcb4602a1cfc405a6f3f5af718f48e7df0b15457c1ab421a0666f5f8109d49c6fb7c1214a894035ae145928aa9c3e79d27f6cd076e178a7c7911684407d8d07da73e4386a83d011e74a5057253b274bbd37b98757a837f4a4dc836ba06f3ffe05f76073188d5969105d9b782f4b661962c0b57f7a5725dc9b01385a5728a4a02bcd8a62f0630ec0c55e7991b6fd11633255714c0082ed386af885527afd099891598964d2649e12af4590a2f1c099d6791e725263aead134aef54ecd4d2e06e6ae0b180de077355dd3bc2a003e5813f19e2c16071be64d67568ebe31aa0ccb25852fe21e137eaa9c35e6271b4168a74d074f70bc4fbe60c06cb96dc3ea36a7ab7bb98764b43d7390af364477f3044dac9915c113b927163fb8b5818b880e63955e256792d5adc1189f14244be03372c4b9e9335d95a1c6af6ec1792a48f76897b01ba4bcf35156f0394289747e4a0d022a3c2d86cbd3fff4748275c197ba61d839ffd458166863c237934cb7e319207f9025897886715b63b6736d95de75ffebf132e5afcff26aebd2445ce376b63f83c3e43474ba4c6fb836abfc862761b39352fa8b482a77d8d9f2407241c9994621b796989d0951ce877dc8020c839a8f2920ac5aece370091db599c3264dd9d6c6ccd55a237b25aac2602036dba38ab64778b5bb936f779ee09c1fba80a661c3d2fcd925651e89d33ec1229b56a9aaa78164ecec65d3644438492bc3111da6a01cce21d094be115aa6bd289042ec3e5a4819fe648d3aabed5a5b8bd42bed49079632aa6c75247eb52f07f6f36683230f6c4006c99a509713508bc373b788344734471e57699ced7ed154a4d9eb0324b909b78a6649820c2d6e34ce7a8eb62537518a8d569604588269292c8b5d552ddf1bfca339310c89cc3da948fd1759c61327e1be3953c7596ee4fc3b8963bb4734e7c2066adcb2bc6ae45d3c1e4f399b1c860feb7005ccaac226a228fb7935c879a597bec82173a0e2d461354bf6c2e530bb3577a4005f4039b9313a3f36b197db929e720460536832ffaafa3ca5acbabddc9f8c76c4c242fe4e68f1476a503febd96b92264bafffb4c797cb52b85f4712396889122650a498f32d97f9103f238d4e28e72eb00bf36f2e63e829cf9aff30f97430057f73881344e819bd7f37b96f8dc615c87ff3ce1beb162f1135ce2a7016bcb0c31858b058800af9875eed30e0c2edcf820ba6107e2e08991bccf051d0531e789e2070984be524b55a029c19bb9577f1202b43c671227e4d786c90c8f199052f00cfd3d3393bfe2273460ec15dc442867b2da51d49a82785af07aec8495f23ef8c36afb1b0de66d3fdb50a9a745585e343866e2f6cf9b9eee0de9255480aca20374e92ce049947ceca296cc2d021ee1a2773f2ca2b0cfe8d1db6ecf11b9e77d2e7bfadc32069aaa68163065f4e0fd72bd5a03c9a1cf08fdb3310039661a26f032f309d7e8632909ad7d552ee7032e5c376f59759c24e8df1be46e916e95924820aaad6b5b6cf4f9ac3cd595147a8ae30c375f61268af64a39963e1fb8c6b66eb7ae609c60ddc0eb185bae075acd403a815967c9de9a1abcd0aa4058e4caee3be63401d00b73c5798db080b4b99ea518205d9cc5ef3a771f9e1484ca4afed40e36744aaf9f5781872b3fc8f9f3432a0ceca5066e624c4fe72dafc7b55f6a5e299ef171a24ef9e4c0071b32b67d101e98a380f42dd20e5ade161b3db41ecffe2dc7948dff1999626454b350b727144ae045243d85f0cade245e624f080e9b1e0286deecc61af284887f1d9fd21d8dea5e1af997b17a87da5c9f6baff23e65dfa4731a14afec0be198a5468d87d3cf8613725a2d18052e767db909abb82aaa5aa8ac4d635d012f389cc2770ddc5a887cc29e35e1209b460ca8b3f7087172ee73524f485b8f561d1a1ab0deaa3ccd4f7fe8d362ae5bd8ea5a86069e402f2ae155e15cf653b14911739a4dd4ac892dd7596126e6f338c2e1a24806876073b440e1a57027961dfa3dbc02e781901bc32760309635a12c6e40ba82aa7822600b6f0e263e62300be662ebd86d0c82c5c18e47464a595279952f73768cc6104fcbaf07988aaa9a88ec3449b07e3fecd96d763f00307bd0e501317e39fb1dcfdfd0c7774afd32517129a0ad0568cf4e54e442c385b55130c1509d6aef78e9fa14780fccd31185e4a2cf60e51a37e005473786c413ecd9fd0b7f87aadf969e7be208707199986b871d51999b63205fd5d8ba499c0d1fdb6a161dd1180a7821461f9641f5ab3e8902232725f064bef46d0d62605120ac4311fd4e5f0acd4bb1081046f44fb2ebed3a86cef1e3f7f36bbd3722594d8d40b66bffd631e08f7ebc660b1ec01f8a0bc4524e95c7db4e84dc2c74fe4f23eddccf98cc98f077e5a925a148e2899617eef6c2020a2f2bd2de588f7d3d4b999f7fa63c1ea6012fbc82bd556790afca2d7a5c396ded5a9901370d7ad9ee60c737f6176089b35343e7c5030a37d8418475747b1b703c92c8a979b417c312fac453eff3a0b3bd6997caa52084adcf327c627727037fbb356d61fabba0773486a8606415b3b6b12a4f0b2575a4240725b48bb86ad916a4d1ebff82e745a2f65360b6bdc5f177d83fbdf9c56f57d473d84c12dc0c9185089259872807f3539d70901094c64a8cab01828fd05ef69b633214c44ab0f2fe092fe7a013c948dbdfdd17c20d18f53fa5356f9d01af13e7e18d01f9cab4137d2f1eceb3067c88c0939b92adbffcf4ed94a2609f458d5d9f5361917336284eeed9b30b28b443626e985262798a8d52aafc54a532712e77ba6e832cf685d3578520199b6d812f36833eea00e1146d94fc5f9f929f8897813f1ad006375f9c356ab76f663b69652edd5f38721abb25a779b0f71563219c241322212102c6100f97269941f4d727f6462c0688c6cbd9a0989f3ebbfa381b0b6c264c1f230b0e9e9feb0adacd3b024f119a4635e4f7895fda48131bd71d52c7266a7d9e5df90f371b18853526c913c44c27375df1741ccdf2126371d271121c6b536a53b196897919ed901bba7fd5a62e22375601ae37cc7275a3ff8e3e8fbb515c4166a03d942656d940a88fecd777de217d8a11c534ca214e372936e45c9c1f029936d136b2102c1395172f93b29abfffb4823dc658258d4de47046e9cc63b962e8155e56c504119cd04ca89e3e65aa13bc107dbce1c33db710991a19f73a45535e641cb566bc3ac43aee177bb51c7f7e4ecde2f6e868ce5b2f550f610aae0156e54051018d37a1a8ecd9f3bba119516ecbb0a0a8f22ea5984645d4b22c9f86f5e633f312f5379df3283fe2f7b2e4e9dced74153a7b8841f33ee29fc0453a27531ecbba6013099c6d00cc858b3515ea213ec17e51a9c2e484a04fea474db1837e9399c528778c79377fd57c8e119950f20bcab7c74a403a342c9b412023f9ad53d6b30e7c775e614461a382658422b1b4bd0824762f0c0e96973a6dff44bbeba66d90661e66b9c2b3a7be414ed7a0399f92a9dba7813ebb2d9624e78e8a4dfdf21478dcfeb9562ebd3584841032a833868aaa22675c04a9570c7d4e57b216472715a5db31c06ee25c85d3af96a2b7cdd0e5fc2409ba5450dd34ca23a4d9447fd11fb2040b45d7428156581952c3794663c96edade642823f65e2f4b12336b87d49bc2467400775ecf33b3d703e8bfde7106d74860a7f1973d95c7c88a88e20fc9d314d3a16fe64fa1597a5bf4ef12995fd53976d0079cba838273ee11bf58480b4231979e5130e98dd6a517123d93ed99f76a55aed9101ba7e36a0d87998dbf9d112ed5c655ea2b350ef9d6537f3593e399cbba97cc5196846048c0e52cba9d2f431b0133bd4a1483cbbe0371b380e322f46f1472ec58dc36357a2f635b430393e3544055209b2c4b494094bd24b8703558162704cb3bdbd2bcb3c313cb83f484fd2ad7b69db2ddf9ff8c5a25df8047c4b1377b1ffbf1bd1975bcb7fc22c1ba5717b732d619d667e5e4545dd63f994424635d785c30d31526f19d31d5b67cec3e7917b59fe275c4f44306bd7977dd7f33e5197f28374e2e6f684dcdce3e3e132ce5139caf1cd2b5c21bad337d96f8604e87b61bcc0a3e316f0668db66a2e0798ea0363b0407b945a75d763f9f3b00c703cbe2ea89bd06c93fc3ab5743a1c489d3cdfa7d4ae6671333e7d661b07c835aad012669514e97dd6a27aeba1b9d9688b2bf543bdd9158bea740e5d405fb16dbcbf0c16caaf6a1dec4d3b6054133470f86bcc9979bff55905c0ba20830fcac350f5eab1b9a955adf58d68a70c8b6c20c56e856829e633c803d864f2947367d38b19d21a106b29c4975246d8baed1bb36a5652755d1d9bea554c7b70b8fac5c515cf0f36eb414d5040e0acbd2d8243d9b58ad304c31a26f805aab85ad647dfa0366d8ab7f11949bdcc161816e7f9fcf0484e9c04b3f9729aaa44307d47085fc1ef929092d57037daffa9c3f520cb206d97ff08bc161935ccf87c71fbbaeeff95442ed7b04af3c3bafa3c6a88862fab2e552c60256fb011bc5fce39abf3003804590ab065b153c7d94a8fba050eaa27c4d2dc1e4d7d9378e4936d473a3993e26e66dec2634336a5bec312b3f07835e33121e0d885fcdebe02fa569fac842e510d106e1126860bc1b0d83b61929a1cebc49463e24617184c08fee42acddeffe5ab5a61292fe4efff9c0e076472455f1d3ac8bcc9e555e40d720152337ef3f2fb4de2b1479aa323aa5f4eadef71a56d2afe034a141588f5f31104d4eaf88f780a462e36ec445176d7e324d0e7ea978f8728f0091b0521cd47285cc5dcba73e0fd793c5cc64e0372144431060faf3f732405336b05bef472d7b53844efa1591a5f63b4ccd78d80234b873c12508f5722bcc27dd5aa30af724f12ff2ba8422004069f6da6c453a9e492f8b2e4ab168ed7e16bd2ab447b577e7f24fa0563f2df7e302bac4e3eda0d21768fd5f9fbfda5689b7a58694273a4bfcbff349b75ace32841546ee00f8021cd4a51fe350b13e7a076ee4af015e6d5ec7cf4ef55a27d9962519594a7c9785b019523ab78cfcc86b76870d650a5e609fa7aea111c65a4d1f6cdd9f9d4d39495bf02f9bf3cb287912863f4b9af4ac15a987caf1f08cd738170317bf3edfccebfdda2e89f6d7cf684fc99cfb5b49f162a853fdbbb88c27b5efe631341c3232b714a91de7ba39d96a88e9368cf8ed1236b9f5d6990ad76c8aa05393ad542a1f1ff41c31796e5021d249cf315ed88d19ba8a61c5031f46c26d737c3f330078d9b4af82f1b2917418f3b1df54fee0aab784c1c7e3d3ce361f21fee98d1fd623d19ec8e597ecdbefa84be00ecc72bb40b54f443ed6e0b46f5b5eca5fedfa8301a8c66677ac63b9e23fcdb8e579781ce067e30338aaa1f38e1ff1420a4cff9fb55c73a9cc6c684a95bb127c0262471b3f4460bd4e52991f2b309606926ce4f99b3e81daeb83efcc40cdddab527eeb9d15ad07253c2fd505ee936b6e2367362cad6d0cc1b4954eb809b678f6c35c6ded63413e60be6a0cdc93b5af669a8f431dee384052a214de320fb07db7b382cd00ba879107ebd9230ae219189a4dc75191729744615feab16801f1c35d4033c84e9572ae6f352c8ec81dd92962ee3214cd9cd22127f8a402119de03b65f5fb3fc4b0cae6991218ce005d2b46f389631abb458afeb6160b0444b93a16643", @nested={0x1157, 0x61, 0x0, 0x1, [@generic="bc60539e1e63a19302428b783fca29815bd64cd7a8687bb55361c9feb57a79f1e4e04401e22dc53e4522b063c32b3d8fca4f6fd6f58b777b3e77ad45b9c0c1cce79c3a2f58ecd372b08d02688164ba228cf05972fce37f37910c58a8e9aeecd97271ef061b0996cfc8517c9dbda4c0335c72d0d72cd1806377b1abbd480f38aa8dfd35cae001ca6da84e8f147c2f91199c96c2125eda7e44d6c5ec7e8014326948c5cdfda8543101a3a03e3912787dcfe336b2b9ed98962563d8830dc2c51eb4e4f3a0", @typed={0xc, 0x16, 0x0, 0x0, @u64=0x5}, @typed={0x8, 0x8f, 0x0, 0x0, @fd=r12}, @typed={0x8, 0x6d, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @typed={0x8, 0x72, 0x0, 0x0, @pid=r13}, @generic="5029649eea329490fc1eed82ae849a9c988343efabc22ed1a39032731c61f6321bcfe9bd6fcce2016720f0bd6e5d6fc688d9b8", @generic="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", @generic="68a39d1bdfd3085fc8f45c7456aa172bd7e3ef48a8a61ad5fba25c2cc1fb45dfe0bc74b279", @typed={0x8, 0x6f, 0x0, 0x0, @u32=0x3}, @typed={0xc, 0xc, 0x0, 0x0, @u64}]}, @generic="47aec4c2fb7f9ac1cbf74e34184d0d58efb3bd1b19b7ff91b02614abf03fe5acb4fd9ac09f2cdbb654971cda113c7d7ce9a10d1e46752a6f457003aa60e2cc960bb0550703af96c5246a51e7da5ab51cfe974362388c7b47304f4ec86e8bbacfd374e61b2fc7e0746f0f3008d6c7325ef7558a7bbf70841bf79601653bb657c89e1601fa4441a3f7e128dd7cc06cde99303be6313154f635bd9506a33e05c5e00ccca0674d677d33a52e1d81165089f971d52c6b8c4da95c5732bce1b32729ae3be699506e63a76602240444dbdd48f86749bd4aae125ed38371d6c103a3897cd73d9af237b3e8310cda184d4eb8a1e9e290080b964d5fd4d6608dfe", @nested={0x292, 0x6a, 0x0, 0x1, [@typed={0x14, 0x17, 0x0, 0x0, @ipv6=@remote}, @generic="c72d016fc4c293d7cd493f0a0d772d8492667d024583948858a53b53ff7a5b074398cb3512952269909f4f4f5d3347dba31279b8730ed3ff8b775073efb11eb9b5b13814f70827272c7b50795fff3765cbf474e34c18b915e92cf6731e0865fd5395666d13d8d26cf501a3506daddfb9cd106256f058d03f8d3ed53c879bc3691a4c74a0a5aa1d8a3600286f595910c284813d4a565834379335a5b74d85a5a76be947cd9c812ae5d621c41906e90c356bd46de2e1bf", @generic="c3f940ce3c3b00ac7a2056eca2033b64776175b3373bc4ffd484d95c2e74de26da9d874ad75d5cbaaa959488644713d28217f3a8df66d7891bdb18570dbdfae0a383fdff00f39bab27d79e155971d622f54d4aa4ddfce25f6e48d76b671ebf98c88f1eebc9ece0feb0dee34468f43bfee4f4e8662788bacab42a56da120f5cff14b7ce0266e62090dcac09e5ab70", @generic="251536eb31b87a81a886491055347f1b2f0d9479b637f77c1a888f3d579fc19e2a9133be3541b4a82c8248251450e9dea2b16fb3230a2912816501513a9cd599ee2b438b4a592f3fb6c6887f04d2a735976cd292e58b09b4d18b13c5e4ef0667aa8bd37d4c851cdaf978d573485d43ce764e95c5599150636b6e481d75bc852dd9fb3b137edff88ea2fed3ad0ee1d495b248a7e58b32f9bd698a7c9a3339bf32a73eef983eda905fd8b2159fb5d00d4357435f352d1034e14d98fa0b35e7a81b891c4e6e649a02ad4cdbe3f137bace8a3f0b", @typed={0x8, 0x8a, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0x8, 0x2d, 0x0, 0x0, @uid}, @generic="5e125f25d7ac142482323aefcf29101e4777bb221b9f1f21cfa2f9e67cf16d48dce7227ebf263c84c2fe499e757f600b23c5af44fcf1290c8fc578da7fdd3e176b8ea5ef382d00e5b78fc61ca3cbf474d550c613"]}]}, 0x24f8}, {&(0x7f0000007b00)={0xc0, 0x3d, 0x400, 0x70bd2a, 0x25dfdbfc, "", [@generic="1a82480d51a8df3d5ee71ee4fc757e26a2b2b95cc7185c03fa5a696196fe7c992b6c2f47a8f03845e1fd050ba1b7a710b43608bfe3b0d1c76f64eaf5c3943faac4d72d753340848bf1d15d5e2c6c6a98e5a1c32f575ec7c3aaa25c5759896f11152204387ee62d9b313000f243d117f02e3abc3b4d0c4d3082d9f750016e7f377fa79e135c78a5f2183cd51ddc5bd4fe036bb96cc61258f203a8d4ac15181d", @typed={0xc, 0x4a, 0x0, 0x0, @u64=0x3c}, @typed={0x4, 0x91}]}, 0xc0}], 0x9, 0x0, 0x0, 0x40}, 0x20040804) 07:10:55 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0xfb5, 0x23, 0x0) 07:10:55 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) [ 167.295086][ T3904] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 167.303472][ T3904] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 167.311426][ T3904] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 167.319366][ T3904] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 167.327333][ T3904] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 167.335272][ T3904] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 07:10:55 executing program 4 (fault-call:2 fault-nth:37): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:10:55 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:10:55 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0xfbe, 0x23, 0x0) 07:10:55 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0xd2, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 167.351269][ T3937] incfs: Options parsing error. -22 07:10:55 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1b, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:10:55 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0xf6, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:55 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0xfc7, 0x23, 0x0) 07:10:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x3}, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r1, r0, 0x0, 0x7ffff000) r2 = dup2(r0, r1) ptrace$setopts(0x4206, 0x0, 0x0, 0x807f0000) ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, &(0x7f0000000100)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000001c0)=0x0) ioctl$TCFLSH(r2, 0x540b, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SEQ_ADJ_ORIG={0x14, 0xf, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_BEFORE={0x5}, @CTA_SEQADJ_CORRECTION_POS={0x8}]}]}, 0x78}}, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r5, 0x0, 0x32600) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xff, 0x74, 0x85, 0x0, 0x0, 0x8, 0x4e, 0x9, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000080), 0x5}, 0x12011, 0xc7f, 0x6, 0x2, 0x8001, 0x1}, r3, 0xa, 0xffffffffffffffff, 0xa) sendfile(r1, r4, 0x0, 0xffffffffffff881b) [ 167.423398][ T3951] FAULT_INJECTION: forcing a failure. [ 167.423398][ T3951] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 167.455572][ T3951] CPU: 1 PID: 3951 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 07:10:56 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x12e, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:56 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0xfca, 0x23, 0x0) [ 167.465822][ T3951] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 167.475865][ T3951] Call Trace: [ 167.479158][ T3951] dump_stack+0x1d8/0x24e [ 167.483482][ T3951] ? devkmsg_release+0x11c/0x11c [ 167.488412][ T3951] ? show_regs_print_info+0x12/0x12 [ 167.493601][ T3951] ? __kasan_kmalloc+0x1a3/0x1e0 [ 167.498529][ T3951] ? preempt_count_add+0x66/0x130 [ 167.503543][ T3951] ? prep_new_page+0x122/0x370 [ 167.508296][ T3951] should_fail+0x6f6/0x860 [ 167.512700][ T3951] ? setup_fault_attr+0x3d0/0x3d0 [ 167.517715][ T3951] __alloc_pages_nodemask+0x1c4/0x880 07:10:56 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x146, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 167.523521][ T3951] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 167.529058][ T3951] ? kvmalloc_node+0x7e/0xf0 [ 167.533729][ T3951] ? kvmalloc_node+0x7e/0xf0 [ 167.538311][ T3951] push_pipe+0x3c5/0x7e0 [ 167.542551][ T3951] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 167.548174][ T3951] ? iov_iter_get_pages+0xec0/0xec0 [ 167.553366][ T3951] ? unix_stream_recvmsg+0x1e0/0x1e0 [ 167.554477][ T3975] incfs: Options parsing error. -22 [ 167.558829][ T3951] default_file_splice_read+0x208/0x970 [ 167.558839][ T3951] ? sock_fasync+0xf0/0xf0 07:10:56 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0xfd3, 0x23, 0x0) [ 167.558847][ T3951] ? __ia32_sys_tee+0xa0/0xa0 [ 167.558860][ T3951] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 167.558876][ T3951] ? selinux_file_permission+0x2d0/0x520 [ 167.558885][ T3951] ? security_file_permission+0x1e9/0x300 [ 167.558892][ T3951] ? __ia32_sys_tee+0xa0/0xa0 [ 167.558900][ T3951] splice_direct_to_actor+0x3f1/0xb30 [ 167.558911][ T3951] ? do_splice_direct+0x3e0/0x3e0 [ 167.558918][ T3951] ? pipe_to_sendpage+0x300/0x300 [ 167.558927][ T3951] ? security_file_permission+0x128/0x300 [ 167.558935][ T3951] do_splice_direct+0x28b/0x3e0 [ 167.558944][ T3951] ? splice_direct_to_actor+0xb30/0xb30 [ 167.558953][ T3951] ? security_file_permission+0x128/0x300 [ 167.558962][ T3951] do_sendfile+0x8e4/0x1140 [ 167.558972][ T3951] ? compat_writev+0x3c0/0x3c0 [ 167.558986][ T3951] ? vfs_write+0x422/0x4e0 [ 167.592704][ T3981] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 167.596752][ T3951] ? check_preemption_disabled+0x154/0x330 [ 167.596762][ T3951] __x64_sys_sendfile64+0x1c4/0x220 07:10:56 executing program 4 (fault-call:2 fault-nth:38): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) [ 167.596770][ T3951] ? __ia32_sys_sendfile+0x240/0x240 [ 167.596780][ T3951] do_syscall_64+0xcb/0x1e0 [ 167.596789][ T3951] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 167.596797][ T3951] RIP: 0033:0x466459 [ 167.596805][ T3951] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 167.596810][ T3951] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 167.596817][ T3951] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 167.596822][ T3951] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 167.596826][ T3951] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 167.596831][ T3951] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 167.596835][ T3951] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 [ 167.610381][ T3953] EXT4-fs (loop0): invalid first ino: 0 [ 167.731933][ T3991] FAULT_INJECTION: forcing a failure. [ 167.731933][ T3991] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 167.783517][ T3991] CPU: 0 PID: 3991 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 167.793645][ T3991] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 167.803674][ T3991] Call Trace: [ 167.806943][ T3991] dump_stack+0x1d8/0x24e [ 167.811245][ T3991] ? devkmsg_release+0x11c/0x11c [ 167.816153][ T3991] ? show_regs_print_info+0x12/0x12 [ 167.821339][ T3991] ? __kasan_kmalloc+0x1a3/0x1e0 [ 167.826249][ T3991] ? preempt_count_add+0x66/0x130 [ 167.831246][ T3991] ? prep_new_page+0x122/0x370 [ 167.835982][ T3991] should_fail+0x6f6/0x860 [ 167.840369][ T3991] ? setup_fault_attr+0x3d0/0x3d0 [ 167.845363][ T3991] __alloc_pages_nodemask+0x1c4/0x880 [ 167.850705][ T3991] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 167.856221][ T3991] ? kvmalloc_node+0x7e/0xf0 [ 167.860779][ T3991] ? kvmalloc_node+0x7e/0xf0 [ 167.865337][ T3991] push_pipe+0x3c5/0x7e0 [ 167.869551][ T3991] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 167.875151][ T3991] ? iov_iter_get_pages+0xec0/0xec0 [ 167.880333][ T3991] ? unix_stream_recvmsg+0x1e0/0x1e0 [ 167.885586][ T3991] default_file_splice_read+0x208/0x970 [ 167.891102][ T3991] ? sock_fasync+0xf0/0xf0 [ 167.895492][ T3991] ? __ia32_sys_tee+0xa0/0xa0 [ 167.900142][ T3991] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 167.906871][ T3991] ? selinux_file_permission+0x2d0/0x520 [ 167.912472][ T3991] ? security_file_permission+0x1e9/0x300 [ 167.918161][ T3991] ? __ia32_sys_tee+0xa0/0xa0 [ 167.922807][ T3991] splice_direct_to_actor+0x3f1/0xb30 [ 167.928150][ T3991] ? do_splice_direct+0x3e0/0x3e0 [ 167.933143][ T3991] ? pipe_to_sendpage+0x300/0x300 [ 167.938147][ T3991] ? security_file_permission+0x128/0x300 [ 167.943834][ T3991] do_splice_direct+0x28b/0x3e0 [ 167.948655][ T3991] ? splice_direct_to_actor+0xb30/0xb30 [ 167.954169][ T3991] ? security_file_permission+0x128/0x300 [ 167.959856][ T3991] do_sendfile+0x8e4/0x1140 [ 167.964330][ T3991] ? compat_writev+0x3c0/0x3c0 [ 167.969061][ T3991] ? vfs_write+0x422/0x4e0 [ 167.973458][ T3991] ? check_preemption_disabled+0x154/0x330 [ 167.979232][ T3991] __x64_sys_sendfile64+0x1c4/0x220 [ 167.984400][ T3991] ? __ia32_sys_sendfile+0x240/0x240 [ 167.989656][ T3991] do_syscall_64+0xcb/0x1e0 [ 167.994129][ T3991] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 167.999989][ T3991] RIP: 0033:0x466459 [ 168.003854][ T3991] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 07:10:56 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:10:56 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1c, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:10:56 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x168, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:56 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0xfdc, 0x23, 0x0) 07:10:56 executing program 4 (fault-call:2 fault-nth:39): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:10:56 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x172, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 168.023425][ T3991] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 168.031804][ T3991] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 168.039757][ T3991] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 168.047699][ T3991] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 168.055640][ T3991] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 168.063928][ T3991] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 [ 168.120115][ T4003] FAULT_INJECTION: forcing a failure. [ 168.120115][ T4003] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 168.135652][ T4007] EXT4-fs (loop0): fragment/cluster size (65536) != block size (4096) [ 168.155413][ T4003] CPU: 0 PID: 4003 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 168.166107][ T4003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 168.176259][ T4003] Call Trace: [ 168.179539][ T4003] dump_stack+0x1d8/0x24e [ 168.183851][ T4003] ? devkmsg_release+0x11c/0x11c [ 168.188768][ T4003] ? show_regs_print_info+0x12/0x12 [ 168.193934][ T4003] ? __kasan_kmalloc+0x1a3/0x1e0 [ 168.198844][ T4003] ? preempt_count_add+0x66/0x130 [ 168.203839][ T4003] ? prep_new_page+0x122/0x370 [ 168.208570][ T4003] should_fail+0x6f6/0x860 [ 168.212954][ T4003] ? setup_fault_attr+0x3d0/0x3d0 [ 168.217949][ T4003] __alloc_pages_nodemask+0x1c4/0x880 [ 168.223291][ T4003] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 168.228807][ T4003] ? kvmalloc_node+0x7e/0xf0 [ 168.233364][ T4003] push_pipe+0x3c5/0x7e0 [ 168.237577][ T4003] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 168.243176][ T4003] ? iov_iter_get_pages+0xec0/0xec0 [ 168.248341][ T4003] ? unix_stream_recvmsg+0x1e0/0x1e0 [ 168.253610][ T4003] default_file_splice_read+0x208/0x970 [ 168.259149][ T4003] ? sock_fasync+0xf0/0xf0 [ 168.263535][ T4003] ? __ia32_sys_tee+0xa0/0xa0 [ 168.268183][ T4003] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 168.274918][ T4003] ? selinux_file_permission+0x2d0/0x520 [ 168.280528][ T4003] ? security_file_permission+0x1e9/0x300 [ 168.286215][ T4003] ? __ia32_sys_tee+0xa0/0xa0 [ 168.290861][ T4003] splice_direct_to_actor+0x3f1/0xb30 [ 168.296221][ T4003] ? do_splice_direct+0x3e0/0x3e0 [ 168.301214][ T4003] ? pipe_to_sendpage+0x300/0x300 [ 168.306206][ T4003] ? security_file_permission+0x128/0x300 [ 168.311892][ T4003] do_splice_direct+0x28b/0x3e0 [ 168.316727][ T4003] ? splice_direct_to_actor+0xb30/0xb30 [ 168.322360][ T4003] ? security_file_permission+0x128/0x300 [ 168.328049][ T4003] do_sendfile+0x8e4/0x1140 [ 168.332524][ T4003] ? compat_writev+0x3c0/0x3c0 [ 168.337256][ T4003] ? vfs_write+0x422/0x4e0 [ 168.341644][ T4003] ? check_preemption_disabled+0x154/0x330 [ 168.347417][ T4003] __x64_sys_sendfile64+0x1c4/0x220 [ 168.352583][ T4003] ? __ia32_sys_sendfile+0x240/0x240 [ 168.357839][ T4003] do_syscall_64+0xcb/0x1e0 [ 168.362313][ T4003] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 168.368186][ T4003] RIP: 0033:0x466459 [ 168.372065][ T4003] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 168.391636][ T4003] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 168.400015][ T4003] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 168.407956][ T4003] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 168.415924][ T4003] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 168.423863][ T4003] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 168.431812][ T4003] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 [ 168.441408][ T4015] incfs: Options parsing error. -22 07:10:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x3}, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r1, r0, 0x0, 0x7ffff000) r2 = dup2(r0, r1) ptrace$setopts(0x4206, 0x0, 0x0, 0x807f0000) ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, &(0x7f0000000100)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000001c0)=0x0) ioctl$TCFLSH(r2, 0x540b, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SEQ_ADJ_ORIG={0x14, 0xf, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_BEFORE={0x5}, @CTA_SEQADJ_CORRECTION_POS={0x8}]}]}, 0x78}}, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r5, 0x0, 0x32600) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xff, 0x74, 0x85, 0x0, 0x0, 0x8, 0x4e, 0x9, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000080), 0x5}, 0x12011, 0xc7f, 0x6, 0x2, 0x8001, 0x1}, r3, 0xa, 0xffffffffffffffff, 0xa) sendfile(r1, r4, 0x0, 0xffffffffffff881b) 07:10:57 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0xfdf, 0x23, 0x0) 07:10:57 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1d, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:10:57 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x196, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:57 executing program 4 (fault-call:2 fault-nth:40): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:10:57 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:10:57 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x1b5, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:57 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0xfe4, 0x23, 0x0) 07:10:57 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x1d8, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 168.499557][ T4017] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 168.517343][ C0] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! 07:10:57 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1e, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:10:57 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x203, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:57 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0xfed, 0x23, 0x0) [ 168.563470][ T4033] FAULT_INJECTION: forcing a failure. [ 168.563470][ T4033] name failslab, interval 1, probability 0, space 0, times 0 [ 168.582019][ T4034] EXT4-fs (loop0): fragment/cluster size (65536) != block size (4096) [ 168.594690][ T4033] CPU: 0 PID: 4033 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 168.604825][ T4033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 168.606737][ T4051] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 168.614858][ T4033] Call Trace: [ 168.614875][ T4033] dump_stack+0x1d8/0x24e [ 168.614886][ T4033] ? devkmsg_release+0x11c/0x11c [ 168.614900][ T4033] ? show_regs_print_info+0x12/0x12 [ 168.640598][ T4033] ? stack_trace_save+0x120/0x1f0 [ 168.645606][ T4033] ? stack_trace_snprint+0x150/0x150 [ 168.650868][ T4033] should_fail+0x6f6/0x860 [ 168.655257][ T4033] ? setup_fault_attr+0x3d0/0x3d0 [ 168.660258][ T4033] ? __kasan_kmalloc+0x1a3/0x1e0 [ 168.661199][ T4052] incfs: Options parsing error. -22 [ 168.665181][ T4033] ? preempt_count_add+0x66/0x130 [ 168.665191][ T4033] ? prep_new_page+0x122/0x370 [ 168.665204][ T4033] ? kmalloc_array+0x2b/0x40 [ 168.684677][ T4033] should_failslab+0x5/0x20 [ 168.689256][ T4033] __kmalloc+0x5f/0x2f0 [ 168.693383][ T4033] ? get_page_from_freelist+0x56c/0x890 [ 168.698897][ T4033] kmalloc_array+0x2b/0x40 [ 168.703282][ T4033] rw_copy_check_uvector+0xb1/0x2f0 [ 168.708452][ T4033] import_iovec+0x10d/0x380 [ 168.712931][ T4033] ? dup_iter+0x110/0x110 [ 168.717262][ T4033] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 168.722777][ T4033] vfs_readv+0x11d/0x1e0 [ 168.726988][ T4033] ? kvmalloc_node+0x7e/0xf0 [ 168.731575][ T4033] ? do_iter_write+0x570/0x570 [ 168.736308][ T4033] ? iov_iter_get_pages+0xec0/0xec0 [ 168.741473][ T4033] ? unix_stream_recvmsg+0x1e0/0x1e0 [ 168.746729][ T4033] default_file_splice_read+0x62b/0x970 [ 168.752244][ T4033] ? __ia32_sys_tee+0xa0/0xa0 [ 168.756893][ T4033] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 168.763626][ T4033] ? selinux_file_permission+0x2d0/0x520 [ 168.769229][ T4033] ? security_file_permission+0x1e9/0x300 [ 168.774916][ T4033] ? __ia32_sys_tee+0xa0/0xa0 [ 168.779587][ T4033] splice_direct_to_actor+0x3f1/0xb30 [ 168.784936][ T4033] ? do_splice_direct+0x3e0/0x3e0 [ 168.789969][ T4033] ? pipe_to_sendpage+0x300/0x300 [ 168.794966][ T4033] ? security_file_permission+0x128/0x300 [ 168.800654][ T4033] do_splice_direct+0x28b/0x3e0 [ 168.805475][ T4033] ? splice_direct_to_actor+0xb30/0xb30 [ 168.811001][ T4033] ? security_file_permission+0x128/0x300 [ 168.816694][ T4033] do_sendfile+0x8e4/0x1140 [ 168.821167][ T4033] ? compat_writev+0x3c0/0x3c0 [ 168.825965][ T4033] ? vfs_write+0x422/0x4e0 [ 168.830360][ T4033] ? check_preemption_disabled+0x154/0x330 [ 168.836142][ T4033] __x64_sys_sendfile64+0x1c4/0x220 [ 168.841312][ T4033] ? __ia32_sys_sendfile+0x240/0x240 [ 168.846566][ T4033] do_syscall_64+0xcb/0x1e0 [ 168.851062][ T4033] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 168.856937][ T4033] RIP: 0033:0x466459 [ 168.860803][ T4033] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 168.880986][ T4033] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 168.889365][ T4033] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 168.897307][ T4033] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 168.905247][ T4033] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 168.913201][ T4033] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 168.921144][ T4033] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 07:10:57 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:10:57 executing program 4 (fault-call:2 fault-nth:41): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:10:57 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x212, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:57 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0xff2, 0x23, 0x0) 07:10:57 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000002c0)=@req={0x3fc, 0x0, 0x2, 0x7}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x8000000000000b0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004100)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000000440)=""/15, 0xf}, {0x0}], 0x2}}], 0x1, 0x10003, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = signalfd4(r1, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000400)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000000c0)=0xe8) read$FUSE(r2, &(0x7f0000002140)={0x2020}, 0x2020) sendmsg$IPSET_CMD_TEST(r2, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)={0xb8, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_ADT={0x74, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa, 0x11, @remote}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP2={0xc, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @multicast2}}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0xf9}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PROTO={0x5, 0x7, 0x8}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x1}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_NAME={0x9, 0x12, 'syz2\x00'}}, {0x1c, 0x7, 0x0, 0x1, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @mcast1}}}]}, @IPSET_ATTR_ADT={0x24, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0xffffffffffffbd7e}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBMARK={0xc, 0x1b, 0x1, 0x0, 0x8}}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0xb8}}, 0x4000015) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x4c}, 0x1, 0x0, 0x0, 0x4010}, 0x20000000) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f00000002c0)=@req={0x3fc, 0x0, 0x2}, 0x10) r4 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f00000002c0)=@req={0x3fc, 0x0, 0x2}, 0x10) 07:10:57 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x21, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:10:57 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x96, 0x0) 07:10:57 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x256, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:57 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x22, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:10:57 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:10:57 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x298, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 169.312256][ T4070] FAULT_INJECTION: forcing a failure. [ 169.312256][ T4070] name failslab, interval 1, probability 0, space 0, times 0 [ 169.325020][ T4073] EXT4-fs (loop0): fragment/cluster size (65536) != block size (4096) [ 169.336375][ T4073] incfs: Options parsing error. -22 07:10:57 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x29c, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:57 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x2a4, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 169.399791][ T4070] CPU: 1 PID: 4070 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 169.409953][ T4070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 169.419996][ T4070] Call Trace: [ 169.423288][ T4070] dump_stack+0x1d8/0x24e [ 169.427610][ T4070] ? devkmsg_release+0x11c/0x11c [ 169.432540][ T4070] ? show_regs_print_info+0x12/0x12 [ 169.437728][ T4070] ? refcount_add_not_zero_checked+0x18b/0x250 [ 169.443872][ T4070] ? selinux_socket_getpeersec_stream+0x3c0/0x3c0 [ 169.450279][ T4070] ? asan.module_dtor+0x20/0x20 [ 169.455129][ T4070] should_fail+0x6f6/0x860 [ 169.459538][ T4070] ? setup_fault_attr+0x3d0/0x3d0 [ 169.464585][ T4070] ? unix_stream_sendpage+0x106a/0x12d0 [ 169.470134][ T4070] ? kvmalloc_node+0x7e/0xf0 [ 169.474711][ T4070] should_failslab+0x5/0x20 [ 169.479189][ T4070] __kmalloc+0x5f/0x2f0 [ 169.483321][ T4070] kvmalloc_node+0x7e/0xf0 [ 169.487709][ T4070] iov_iter_get_pages_alloc+0xb7f/0x1070 [ 169.493313][ T4070] ? iov_iter_get_pages+0xec0/0xec0 [ 169.498483][ T4070] ? unix_stream_recvmsg+0x1e0/0x1e0 [ 169.503752][ T4070] default_file_splice_read+0x208/0x970 [ 169.509274][ T4070] ? sock_fasync+0xf0/0xf0 [ 169.513659][ T4070] ? __ia32_sys_tee+0xa0/0xa0 [ 169.518309][ T4070] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 169.525038][ T4070] ? selinux_file_permission+0x2d0/0x520 [ 169.530639][ T4070] ? security_file_permission+0x1e9/0x300 [ 169.536327][ T4070] ? __ia32_sys_tee+0xa0/0xa0 [ 169.540972][ T4070] splice_direct_to_actor+0x3f1/0xb30 [ 169.546324][ T4070] ? do_splice_direct+0x3e0/0x3e0 [ 169.551316][ T4070] ? pipe_to_sendpage+0x300/0x300 [ 169.556310][ T4070] ? security_file_permission+0x128/0x300 [ 169.561996][ T4070] do_splice_direct+0x28b/0x3e0 [ 169.566817][ T4070] ? splice_direct_to_actor+0xb30/0xb30 [ 169.572331][ T4070] ? security_file_permission+0x128/0x300 [ 169.578016][ T4070] do_sendfile+0x8e4/0x1140 [ 169.582489][ T4070] ? compat_writev+0x3c0/0x3c0 [ 169.587219][ T4070] ? vfs_write+0x422/0x4e0 [ 169.591605][ T4070] ? check_preemption_disabled+0x154/0x330 [ 169.597382][ T4070] __x64_sys_sendfile64+0x1c4/0x220 [ 169.602550][ T4070] ? __ia32_sys_sendfile+0x240/0x240 [ 169.607804][ T4070] do_syscall_64+0xcb/0x1e0 [ 169.612277][ T4070] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 169.618137][ T4070] RIP: 0033:0x466459 [ 169.622003][ T4070] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 169.641573][ T4070] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 07:10:58 executing program 4 (fault-call:2 fault-nth:42): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:10:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x2a6, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:58 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0xffffffff, 0x0) 07:10:58 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000002c0)=@req={0x3fc, 0x0, 0x2, 0x7}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x8000000000000b0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004100)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000000440)=""/15, 0xf}, {0x0}], 0x2}}], 0x1, 0x10003, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = signalfd4(r1, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000400)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000000c0)=0xe8) read$FUSE(r2, &(0x7f0000002140)={0x2020}, 0x2020) sendmsg$IPSET_CMD_TEST(r2, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)={0xb8, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_ADT={0x74, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa, 0x11, @remote}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP2={0xc, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @multicast2}}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0xf9}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PROTO={0x5, 0x7, 0x8}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x1}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_NAME={0x9, 0x12, 'syz2\x00'}}, {0x1c, 0x7, 0x0, 0x1, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @mcast1}}}]}, @IPSET_ATTR_ADT={0x24, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0xffffffffffffbd7e}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBMARK={0xc, 0x1b, 0x1, 0x0, 0x8}}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0xb8}}, 0x4000015) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x4c}, 0x1, 0x0, 0x0, 0x4010}, 0x20000000) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f00000002c0)=@req={0x3fc, 0x0, 0x2}, 0x10) r4 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f00000002c0)=@req={0x3fc, 0x0, 0x2}, 0x10) 07:10:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x23, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:10:58 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 169.649962][ T4070] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 169.657913][ T4070] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 169.665882][ T4070] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 169.673835][ T4070] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 169.681776][ T4070] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 [ 169.690250][ T4100] incfs: Options parsing error. -22 07:10:58 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x0) 07:10:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x2ba, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x2a, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) [ 169.706282][ T4115] EXT4-fs (loop0): fragment/cluster size (65536) != block size (4096) 07:10:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x2b, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:10:58 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x2) 07:10:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x2fa, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 169.820060][ T4135] FAULT_INJECTION: forcing a failure. [ 169.820060][ T4135] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 169.835843][ T4137] EXT4-fs (loop0): fragment/cluster size (65536) != block size (4096) [ 169.847874][ T4135] CPU: 0 PID: 4135 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 169.858029][ T4135] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 169.868075][ T4135] Call Trace: [ 169.871360][ T4135] dump_stack+0x1d8/0x24e [ 169.875683][ T4135] ? devkmsg_release+0x11c/0x11c [ 169.880611][ T4135] ? show_regs_print_info+0x12/0x12 [ 169.885800][ T4135] ? __kasan_kmalloc+0x1a3/0x1e0 [ 169.890728][ T4135] ? __kmalloc+0x174/0x2f0 [ 169.895131][ T4135] ? kvmalloc_node+0x7e/0xf0 [ 169.899740][ T4135] ? iov_iter_get_pages_alloc+0xb7f/0x1070 [ 169.905538][ T4135] ? default_file_splice_read+0x208/0x970 [ 169.911237][ T4135] should_fail+0x6f6/0x860 [ 169.915631][ T4135] ? setup_fault_attr+0x3d0/0x3d0 [ 169.917156][ T4155] incfs: Options parsing error. -22 [ 169.920632][ T4135] __alloc_pages_nodemask+0x1c4/0x880 [ 169.920644][ T4135] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 169.920660][ T4135] ? kvmalloc_node+0x7e/0xf0 [ 169.941245][ T4135] push_pipe+0x3c5/0x7e0 [ 169.945459][ T4135] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 169.951075][ T4135] ? iov_iter_get_pages+0xec0/0xec0 [ 169.956242][ T4135] ? unix_stream_recvmsg+0x1e0/0x1e0 [ 169.961499][ T4135] default_file_splice_read+0x208/0x970 [ 169.967013][ T4135] ? sock_fasync+0xf0/0xf0 [ 169.971414][ T4135] ? __ia32_sys_tee+0xa0/0xa0 [ 169.976063][ T4135] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 169.982798][ T4135] ? selinux_file_permission+0x2d0/0x520 [ 169.988403][ T4135] ? security_file_permission+0x1e9/0x300 [ 169.994105][ T4135] ? __ia32_sys_tee+0xa0/0xa0 [ 169.998749][ T4135] splice_direct_to_actor+0x3f1/0xb30 [ 170.004090][ T4135] ? do_splice_direct+0x3e0/0x3e0 [ 170.009081][ T4135] ? pipe_to_sendpage+0x300/0x300 [ 170.014073][ T4135] ? security_file_permission+0x128/0x300 [ 170.019759][ T4135] do_splice_direct+0x28b/0x3e0 [ 170.024581][ T4135] ? splice_direct_to_actor+0xb30/0xb30 [ 170.030093][ T4135] ? security_file_permission+0x128/0x300 [ 170.035780][ T4135] do_sendfile+0x8e4/0x1140 [ 170.040258][ T4135] ? compat_writev+0x3c0/0x3c0 [ 170.044989][ T4135] ? vfs_write+0x422/0x4e0 [ 170.049372][ T4135] ? check_preemption_disabled+0x154/0x330 [ 170.055144][ T4135] __x64_sys_sendfile64+0x1c4/0x220 [ 170.060311][ T4135] ? __ia32_sys_sendfile+0x240/0x240 [ 170.065568][ T4135] do_syscall_64+0xcb/0x1e0 [ 170.070040][ T4135] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 170.075906][ T4135] RIP: 0033:0x466459 [ 170.079771][ T4135] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 170.099341][ T4135] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 170.107723][ T4135] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 07:10:58 executing program 4 (fault-call:2 fault-nth:43): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:10:58 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x3) 07:10:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x300, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 170.115670][ T4135] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 170.123611][ T4135] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 170.131550][ T4135] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 170.139498][ T4135] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 [ 170.194949][ T4163] FAULT_INJECTION: forcing a failure. [ 170.194949][ T4163] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 170.223249][ T4163] CPU: 0 PID: 4163 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 170.233410][ T4163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 170.243451][ T4163] Call Trace: [ 170.246726][ T4163] dump_stack+0x1d8/0x24e [ 170.251029][ T4163] ? devkmsg_release+0x11c/0x11c [ 170.255939][ T4163] ? show_regs_print_info+0x12/0x12 [ 170.261132][ T4163] ? __kasan_kmalloc+0x1a3/0x1e0 [ 170.266070][ T4163] ? preempt_count_add+0x66/0x130 [ 170.271066][ T4163] ? prep_new_page+0x122/0x370 [ 170.275802][ T4163] should_fail+0x6f6/0x860 [ 170.280187][ T4163] ? setup_fault_attr+0x3d0/0x3d0 [ 170.285180][ T4163] __alloc_pages_nodemask+0x1c4/0x880 [ 170.290521][ T4163] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 170.296036][ T4163] ? kvmalloc_node+0x7e/0xf0 [ 170.300594][ T4163] push_pipe+0x3c5/0x7e0 [ 170.304808][ T4163] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 170.310410][ T4163] ? iov_iter_get_pages+0xec0/0xec0 [ 170.315576][ T4163] ? unix_stream_recvmsg+0x1e0/0x1e0 [ 170.320831][ T4163] default_file_splice_read+0x208/0x970 [ 170.326357][ T4163] ? sock_fasync+0xf0/0xf0 [ 170.330742][ T4163] ? __ia32_sys_tee+0xa0/0xa0 [ 170.335391][ T4163] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 170.342121][ T4163] ? selinux_file_permission+0x2d0/0x520 [ 170.347731][ T4163] ? security_file_permission+0x1e9/0x300 [ 170.353457][ T4163] ? __ia32_sys_tee+0xa0/0xa0 [ 170.358106][ T4163] splice_direct_to_actor+0x3f1/0xb30 [ 170.363450][ T4163] ? do_splice_direct+0x3e0/0x3e0 [ 170.368446][ T4163] ? pipe_to_sendpage+0x300/0x300 [ 170.373441][ T4163] ? security_file_permission+0x128/0x300 [ 170.379130][ T4163] do_splice_direct+0x28b/0x3e0 [ 170.383959][ T4163] ? splice_direct_to_actor+0xb30/0xb30 [ 170.389496][ T4163] ? security_file_permission+0x128/0x300 [ 170.395182][ T4163] do_sendfile+0x8e4/0x1140 [ 170.399656][ T4163] ? compat_writev+0x3c0/0x3c0 [ 170.404386][ T4163] ? vfs_write+0x422/0x4e0 [ 170.408775][ T4163] ? check_preemption_disabled+0x154/0x330 [ 170.414547][ T4163] __x64_sys_sendfile64+0x1c4/0x220 [ 170.419714][ T4163] ? __ia32_sys_sendfile+0x240/0x240 [ 170.424968][ T4163] do_syscall_64+0xcb/0x1e0 [ 170.429440][ T4163] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 170.435301][ T4163] RIP: 0033:0x466459 [ 170.439171][ T4163] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 170.458746][ T4163] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 170.467126][ T4163] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 170.475073][ T4163] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 170.483012][ T4163] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 170.490966][ T4163] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 170.498906][ T4163] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 07:10:59 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000002c0)=@req={0x3fc, 0x0, 0x2, 0x7}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x8000000000000b0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004100)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000000440)=""/15, 0xf}, {0x0}], 0x2}}], 0x1, 0x10003, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = signalfd4(r1, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000400)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000000c0)=0xe8) read$FUSE(r2, &(0x7f0000002140)={0x2020}, 0x2020) sendmsg$IPSET_CMD_TEST(r2, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)={0xb8, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_ADT={0x74, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa, 0x11, @remote}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP2={0xc, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @multicast2}}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0xf9}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PROTO={0x5, 0x7, 0x8}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x1}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_NAME={0x9, 0x12, 'syz2\x00'}}, {0x1c, 0x7, 0x0, 0x1, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @mcast1}}}]}, @IPSET_ATTR_ADT={0x24, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0xffffffffffffbd7e}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBMARK={0xc, 0x1b, 0x1, 0x0, 0x8}}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0xb8}}, 0x4000015) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="300527bd7000fedbdf25010000000a0009000180c2000200000008003100010000800500380004000000060028000300000008003900030000000a0009007ee35369508300009e6c014d0f641919c5d0c45b9742ac85e31efdc8c9340c05914cb47925fbbbbfdc6ff939d959cd6315c5d6f5a7848e23b1ff70e48240880869107cb32cd074df588fd61eca249746407d185276224827e50d79301e882bbaf0feece4d8c593c778d9a8a2ae823b4c2148444f48c1f7576a975194928e5c2f8893de528874f204e0c8c5ce448d5305be8eada5a542625ba30be95c634898bf1936ce4fcd528dbc84046efaf7831eca4e34ca5a05cb82e394e0d78a"], 0x4c}, 0x1, 0x0, 0x0, 0x4010}, 0x20000000) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f00000002c0)=@req={0x3fc, 0x0, 0x2}, 0x10) r4 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f00000002c0)=@req={0x3fc, 0x0, 0x2}, 0x10) 07:10:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x2c, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:10:59 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:10:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x302, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:59 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x4) 07:10:59 executing program 4 (fault-call:2 fault-nth:44): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:10:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x2d, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:10:59 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x5) 07:10:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x2e, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:10:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x324, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:59 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:10:59 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x6) [ 170.627842][ T4182] EXT4-fs (loop0): fragment/cluster size (65536) != block size (4096) [ 170.631415][ T4181] FAULT_INJECTION: forcing a failure. [ 170.631415][ T4181] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 170.658507][ T4182] incfs: Options parsing error. -22 [ 170.708097][ T4181] CPU: 0 PID: 4181 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 170.718523][ T4181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 170.728567][ T4181] Call Trace: [ 170.731851][ T4181] dump_stack+0x1d8/0x24e [ 170.736168][ T4181] ? devkmsg_release+0x11c/0x11c [ 170.741095][ T4181] ? show_regs_print_info+0x12/0x12 [ 170.746278][ T4181] ? __kasan_kmalloc+0x1a3/0x1e0 [ 170.751203][ T4181] ? preempt_count_add+0x66/0x130 [ 170.756216][ T4181] ? prep_new_page+0x122/0x370 [ 170.760970][ T4181] should_fail+0x6f6/0x860 [ 170.765381][ T4181] ? setup_fault_attr+0x3d0/0x3d0 [ 170.770487][ T4181] __alloc_pages_nodemask+0x1c4/0x880 [ 170.775851][ T4181] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 170.781386][ T4181] ? kvmalloc_node+0x7e/0xf0 [ 170.786053][ T4181] push_pipe+0x3c5/0x7e0 [ 170.790287][ T4181] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 170.795913][ T4181] ? iov_iter_get_pages+0xec0/0xec0 [ 170.801105][ T4181] ? unix_stream_recvmsg+0x1e0/0x1e0 [ 170.806380][ T4181] default_file_splice_read+0x208/0x970 [ 170.811912][ T4181] ? sock_fasync+0xf0/0xf0 [ 170.816314][ T4181] ? __ia32_sys_tee+0xa0/0xa0 [ 170.820971][ T4181] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 170.827707][ T4181] ? selinux_file_permission+0x2d0/0x520 [ 170.833310][ T4181] ? security_file_permission+0x1e9/0x300 [ 170.839007][ T4181] ? __ia32_sys_tee+0xa0/0xa0 [ 170.843661][ T4181] splice_direct_to_actor+0x3f1/0xb30 [ 170.849006][ T4181] ? do_splice_direct+0x3e0/0x3e0 [ 170.854001][ T4181] ? pipe_to_sendpage+0x300/0x300 [ 170.858995][ T4181] ? security_file_permission+0x128/0x300 [ 170.864685][ T4181] do_splice_direct+0x28b/0x3e0 [ 170.869509][ T4181] ? splice_direct_to_actor+0xb30/0xb30 [ 170.875028][ T4181] ? security_file_permission+0x128/0x300 [ 170.880719][ T4181] do_sendfile+0x8e4/0x1140 [ 170.885308][ T4181] ? compat_writev+0x3c0/0x3c0 [ 170.890055][ T4181] ? vfs_write+0x422/0x4e0 [ 170.894446][ T4181] ? check_preemption_disabled+0x154/0x330 [ 170.900237][ T4181] __x64_sys_sendfile64+0x1c4/0x220 [ 170.905405][ T4181] ? __ia32_sys_sendfile+0x240/0x240 [ 170.910666][ T4181] do_syscall_64+0xcb/0x1e0 [ 170.915142][ T4181] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 170.921009][ T4181] RIP: 0033:0x466459 [ 170.924880][ T4181] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 170.944458][ T4181] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 07:10:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x368, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:59 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x7) 07:10:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x2f, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:10:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000040c0)={0x0, 0x0, &(0x7f0000004080)={&(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0xfac}, 0x1, 0x0, 0x0, 0x20000}, 0x44) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = signalfd4(r1, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=@newlink={0x68, 0x10, 0x401, 0xfffffffe, 0x0, {}, [@IFLA_LINKINFO={0x40, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x8, 0x3, @initdev={0xac, 0x1e, 0x0, 0x0}}, @IFLA_IPTUN_6RD_PREFIX={0x14, 0xb, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @IFLA_IPTUN_6RD_PREFIX={0x14, 0xb, @private1={0xfc, 0x1, [], 0x1}}]}}}, @IFLA_MASTER={0x8}]}, 0x68}}, 0x0) fsync(r1) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x6, 0xd5, 0x88, 0x1, 0x0, 0x101, 0x8408, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x41061, 0x7ff, 0x400, 0x4, 0x8, 0x9, 0xee3}, 0x0, 0x5, r2, 0x1) sendmsg$NLBL_MGMT_C_LISTALL(r3, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10202800}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00022abd7000fedbdf250300000008000c000000000008000700ac1414bb080001007369740014000600ff02000000ff020000040000000000000000000001"], 0x54}}, 0x8004) 07:10:59 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x8) [ 170.952838][ T4181] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 170.960781][ T4181] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 170.968733][ T4181] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 170.976846][ T4181] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 170.984787][ T4181] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 07:10:59 executing program 4 (fault-call:2 fault-nth:45): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:10:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x38c, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x30, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) [ 171.006818][ T4212] incfs: Options parsing error. -22 07:10:59 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000300)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000600)=0x6) write$cgroup_int(r2, &(0x7f0000000040), 0x43) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000061100000000000001a00000000000000088324ebad9946feef442f66ff93e69af3ac52892b5d0f8afa414b46fc9d5f2447a46f"], &(0x7f0000000140)='GPL\x00', 0xfffffffd, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x21, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_tracing={0x1a, 0xa, &(0x7f0000000640)=ANY=[@ANYBLOB="1800000002000000000000000500000018150000", @ANYRES32=r4, @ANYBLOB="00000000000011205620143aaf9c0000181ab435", @ANYRES32=r1, @ANYBLOB="00000000000000001800000000000000000000000101000085000000190000009500000000000000"], &(0x7f0000000340)='GPL\x00', 0xffffffff, 0xf6, &(0x7f0000000380)=""/246, 0x41000, 0x4, [], 0x0, 0x17, r1, 0x8, &(0x7f0000000480)={0x6, 0x2}, 0x8, 0x10, &(0x7f00000004c0)={0x2, 0x2, 0x4, 0x3ff}, 0x10, 0x3e03, r0}, 0x78) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000280)='devices.allow\x00', 0x2, 0x0) perf_event_open(&(0x7f00000006c0)={0x5, 0x70, 0x2, 0x40, 0x1, 0x2d, 0x0, 0x5, 0x4100, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000002c0), 0x8}, 0x8000, 0xfffffffffffffffe, 0x400, 0x1, 0x9, 0x20, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x1) write$cgroup_subtree(r3, 0x0, 0x6) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 07:10:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x38e, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:59 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:10:59 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x9) [ 171.038400][ T4205] EXT4-fs (loop0): fragment/cluster size (65536) != block size (4096) 07:10:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x3a0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:10:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x31, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:10:59 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0xa) [ 171.122455][ T4242] FAULT_INJECTION: forcing a failure. [ 171.122455][ T4242] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 171.151909][ T4244] EXT4-fs (loop0): fragment/cluster size (65536) != block size (4096) [ 171.178593][ T4242] CPU: 0 PID: 4242 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 171.188749][ T4242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 171.198792][ T4242] Call Trace: [ 171.202075][ T4242] dump_stack+0x1d8/0x24e [ 171.206395][ T4242] ? devkmsg_release+0x11c/0x11c [ 171.211324][ T4242] ? show_regs_print_info+0x12/0x12 [ 171.216511][ T4242] ? __kasan_kmalloc+0x1a3/0x1e0 [ 171.221470][ T4242] ? preempt_count_add+0x66/0x130 [ 171.226485][ T4242] ? prep_new_page+0x122/0x370 [ 171.231236][ T4242] should_fail+0x6f6/0x860 [ 171.235646][ T4242] ? setup_fault_attr+0x3d0/0x3d0 [ 171.240664][ T4242] __alloc_pages_nodemask+0x1c4/0x880 [ 171.246026][ T4242] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 171.251711][ T4242] ? kvmalloc_node+0x7e/0xf0 [ 171.256284][ T4242] ? kvmalloc_node+0x7e/0xf0 [ 171.260856][ T4242] push_pipe+0x3c5/0x7e0 [ 171.265070][ T4242] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 171.270671][ T4242] ? iov_iter_get_pages+0xec0/0xec0 [ 171.275926][ T4242] ? unix_stream_recvmsg+0x1e0/0x1e0 [ 171.281182][ T4242] default_file_splice_read+0x208/0x970 [ 171.286701][ T4242] ? sock_fasync+0xf0/0xf0 [ 171.291091][ T4242] ? __ia32_sys_tee+0xa0/0xa0 [ 171.295739][ T4242] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 171.302469][ T4242] ? selinux_file_permission+0x2d0/0x520 [ 171.308070][ T4242] ? security_file_permission+0x1e9/0x300 [ 171.313755][ T4242] ? __ia32_sys_tee+0xa0/0xa0 [ 171.318400][ T4242] splice_direct_to_actor+0x3f1/0xb30 [ 171.323764][ T4242] ? do_splice_direct+0x3e0/0x3e0 [ 171.328770][ T4242] ? pipe_to_sendpage+0x300/0x300 [ 171.333781][ T4242] ? security_file_permission+0x128/0x300 [ 171.341118][ T4242] do_splice_direct+0x28b/0x3e0 [ 171.345939][ T4242] ? splice_direct_to_actor+0xb30/0xb30 [ 171.351454][ T4242] ? security_file_permission+0x128/0x300 [ 171.357157][ T4242] do_sendfile+0x8e4/0x1140 [ 171.361629][ T4242] ? compat_writev+0x3c0/0x3c0 [ 171.366361][ T4242] ? vfs_write+0x422/0x4e0 [ 171.370747][ T4242] ? check_preemption_disabled+0x154/0x330 [ 171.376522][ T4242] __x64_sys_sendfile64+0x1c4/0x220 [ 171.381687][ T4242] ? __ia32_sys_sendfile+0x240/0x240 [ 171.386939][ T4242] do_syscall_64+0xcb/0x1e0 [ 171.391411][ T4242] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 171.397286][ T4242] RIP: 0033:0x466459 [ 171.401151][ T4242] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 171.420720][ T4242] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 07:10:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x32, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:10:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x3bc, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 171.429100][ T4242] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 171.437065][ T4242] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 171.445022][ T4242] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 171.452963][ T4242] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 171.460920][ T4242] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 07:11:00 executing program 4 (fault-call:2 fault-nth:46): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:11:00 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0xb) 07:11:00 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0xffffffffffffffff}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000007b80)=[{{0x0, 0x0, &(0x7f0000000780)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000029c0)=""/4096, 0x1000}, {&(0x7f0000000500)=""/42, 0x2a}], 0x5, &(0x7f0000000580)=""/153, 0x99}, 0x20}, {{0x0, 0x0, &(0x7f0000003f00)=[{&(0x7f0000005880)=""/53, 0x35}, {&(0x7f00000039c0)=""/212, 0xd4}, {&(0x7f0000003ac0)=""/168, 0xa8}, {0x0}, {0x0}, {&(0x7f0000003e00)=""/157, 0x9d}, {&(0x7f0000003ec0)=""/4, 0x4}], 0x7, &(0x7f0000003f80)=""/159, 0x9f}}, {{&(0x7f0000004040)=@nl=@proc, 0x80, 0x0, 0x0, &(0x7f0000004180)=""/93, 0x5d}}, {{&(0x7f0000004200)=@caif=@util, 0x80, &(0x7f00000044c0)=[{0x0}, {&(0x7f0000004340)=""/71, 0x47}], 0x2, &(0x7f0000004500)=""/13, 0xd}, 0x9}, {{&(0x7f0000004540)=@tipc, 0x80, &(0x7f0000005b80)=[{0x0}, {&(0x7f0000005640)=""/65, 0x41}, {0x0}, {0x0}, {&(0x7f0000005900)=""/213, 0xd5}, {0x0}, {0x0}], 0x7}, 0x5}, {{&(0x7f0000005d00), 0x80, &(0x7f0000005e40)=[{0x0}], 0x1}}, {{0x0, 0x0, &(0x7f0000007340), 0x0, &(0x7f0000000440)=""/10, 0xa}, 0x5}, {{&(0x7f0000007400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, &(0x7f0000007540)=""/183, 0xb7}, 0x6}, {{0x0, 0x0, &(0x7f0000007b00)=[{0x0}], 0x1}}], 0x9, 0x12120, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x1, 0x8000000000001}, 0x0) r4 = open(&(0x7f0000000480)='./bus\x00', 0x161042, 0xa0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) r5 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6800) lseek(r5, 0x4200, 0x2) r6 = creat(&(0x7f0000000000)='./bus\x00', 0xda) io_setup(0x1ff, &(0x7f0000000400)=0x0) r8 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) ioctl$FS_IOC_RESVSP(r8, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000001}) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f00000002c0)="da455864eeb9167c1ec76189e57e50c68e739ea84e4043521453c701ff8f874b7856a5a7434f6091814e0c7f4f80d24902643c3d4076752752ef6d2b215fa2a85b69f7e26f3abbc9a62fa52d09fd1f96d8ef9bb84710faa5b92bf6c168c6c46c66ee6c8e3fe567dd749027291261984989f79cee47a0d6f29044bbb70ef418a052f1dfe9aab165af7d3b7f7cd5e21cd5b2b3e62b7223290a2aaa95a4045fc2e6247ff36502396ca21c18a60fe6f4699dc563d8b40c84269a24486af086b392ce38e2c573d683282f3a9a345c8dcc7483eda3a26183108d8b16b0c4c651625c833462f9b5ad5e6b276ef0f6b2dadc5e48bc2f736a1e97e4496b770d515271e0c1a32713988e3e6086ca4694973913d27316b6e1d324b155314b217f991a23e3c04cdc00b1e6bf2a912d88", 0xa9f9, 0x7}]) r9 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) sendfile(r5, r9, 0x0, 0x8400fffffffb) 07:11:00 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:11:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x33, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) [ 171.476241][ T4265] incfs: Options parsing error. -22 07:11:00 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0xc) 07:11:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x3c2, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 171.538748][ T4277] FAULT_INJECTION: forcing a failure. [ 171.538748][ T4277] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 171.560404][ T4276] EXT4-fs (loop0): fragment/cluster size (65536) != block size (4096) [ 171.568448][ T4277] CPU: 0 PID: 4277 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 171.578687][ T4277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 171.579172][ T4276] incfs: Options parsing error. -22 [ 171.588726][ T4277] Call Trace: [ 171.588743][ T4277] dump_stack+0x1d8/0x24e [ 171.588755][ T4277] ? devkmsg_release+0x11c/0x11c [ 171.588768][ T4277] ? show_regs_print_info+0x12/0x12 [ 171.611690][ T4277] ? __kasan_kmalloc+0x1a3/0x1e0 [ 171.616616][ T4277] ? preempt_count_add+0x66/0x130 [ 171.621630][ T4277] ? prep_new_page+0x122/0x370 [ 171.626383][ T4277] should_fail+0x6f6/0x860 [ 171.630787][ T4277] ? setup_fault_attr+0x3d0/0x3d0 [ 171.635803][ T4277] __alloc_pages_nodemask+0x1c4/0x880 [ 171.641166][ T4277] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 171.646704][ T4277] ? kvmalloc_node+0x7e/0xf0 [ 171.651288][ T4277] ? kvmalloc_node+0x7e/0xf0 [ 171.655873][ T4277] push_pipe+0x3c5/0x7e0 [ 171.660117][ T4277] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 171.665740][ T4277] ? iov_iter_get_pages+0xec0/0xec0 [ 171.671048][ T4277] ? unix_stream_recvmsg+0x1e0/0x1e0 [ 171.676327][ T4277] default_file_splice_read+0x208/0x970 [ 171.681861][ T4277] ? sock_fasync+0xf0/0xf0 [ 171.686316][ T4277] ? __ia32_sys_tee+0xa0/0xa0 [ 171.690986][ T4277] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 171.697735][ T4277] ? selinux_file_permission+0x2d0/0x520 [ 171.703358][ T4277] ? security_file_permission+0x1e9/0x300 [ 171.709062][ T4277] ? __ia32_sys_tee+0xa0/0xa0 [ 171.713735][ T4277] splice_direct_to_actor+0x3f1/0xb30 [ 171.719092][ T4277] ? do_splice_direct+0x3e0/0x3e0 [ 171.724097][ T4277] ? pipe_to_sendpage+0x300/0x300 [ 171.729097][ T4277] ? security_file_permission+0x128/0x300 [ 171.734786][ T4277] do_splice_direct+0x28b/0x3e0 [ 171.739609][ T4277] ? splice_direct_to_actor+0xb30/0xb30 [ 171.745136][ T4277] ? security_file_permission+0x128/0x300 [ 171.750839][ T4277] do_sendfile+0x8e4/0x1140 [ 171.755317][ T4277] ? compat_writev+0x3c0/0x3c0 [ 171.760052][ T4277] ? vfs_write+0x422/0x4e0 [ 171.764442][ T4277] ? check_preemption_disabled+0x154/0x330 [ 171.770218][ T4277] __x64_sys_sendfile64+0x1c4/0x220 [ 171.775384][ T4277] ? __ia32_sys_sendfile+0x240/0x240 [ 171.780639][ T4277] do_syscall_64+0xcb/0x1e0 07:11:00 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0xd) 07:11:00 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0xe) 07:11:00 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x10) 07:11:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x3d2, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 171.785113][ T4277] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 171.790985][ T4277] RIP: 0033:0x466459 [ 171.794851][ T4277] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 171.814425][ T4277] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 171.822816][ T4277] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 171.830757][ T4277] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 07:11:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x35, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:11:00 executing program 4 (fault-call:2 fault-nth:47): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:11:00 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 171.838707][ T4277] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 171.846652][ T4277] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 171.854595][ T4277] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 [ 171.928086][ T4309] EXT4-fs (loop0): fragment/cluster size (65536) != block size (4096) [ 171.933438][ T4315] FAULT_INJECTION: forcing a failure. [ 171.933438][ T4315] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 171.949702][ T4315] CPU: 0 PID: 4315 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 171.959838][ T4315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 171.969873][ T4315] Call Trace: [ 171.973137][ T4315] dump_stack+0x1d8/0x24e [ 171.977493][ T4315] ? devkmsg_release+0x11c/0x11c [ 171.982526][ T4315] ? show_regs_print_info+0x12/0x12 [ 171.987698][ T4315] ? __kasan_kmalloc+0x1a3/0x1e0 [ 171.992612][ T4315] ? preempt_count_add+0x66/0x130 [ 171.997647][ T4315] ? prep_new_page+0x122/0x370 [ 172.002382][ T4315] should_fail+0x6f6/0x860 [ 172.006769][ T4315] ? setup_fault_attr+0x3d0/0x3d0 [ 172.011800][ T4315] __alloc_pages_nodemask+0x1c4/0x880 [ 172.016115][ T4317] incfs: Options parsing error. -22 [ 172.017152][ T4315] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 172.017165][ T4315] ? kvmalloc_node+0x7e/0xf0 [ 172.017178][ T4315] push_pipe+0x3c5/0x7e0 [ 172.037004][ T4315] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 172.042607][ T4315] ? iov_iter_get_pages+0xec0/0xec0 [ 172.047774][ T4315] ? unix_stream_recvmsg+0x1e0/0x1e0 [ 172.053031][ T4315] default_file_splice_read+0x208/0x970 [ 172.058546][ T4315] ? sock_fasync+0xf0/0xf0 [ 172.062935][ T4315] ? __ia32_sys_tee+0xa0/0xa0 [ 172.067593][ T4315] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 172.074351][ T4315] ? selinux_file_permission+0x2d0/0x520 [ 172.079980][ T4315] ? security_file_permission+0x1e9/0x300 [ 172.085668][ T4315] ? __ia32_sys_tee+0xa0/0xa0 [ 172.090315][ T4315] splice_direct_to_actor+0x3f1/0xb30 [ 172.095658][ T4315] ? do_splice_direct+0x3e0/0x3e0 [ 172.100653][ T4315] ? pipe_to_sendpage+0x300/0x300 [ 172.105652][ T4315] ? security_file_permission+0x128/0x300 [ 172.111356][ T4315] do_splice_direct+0x28b/0x3e0 [ 172.116175][ T4315] ? splice_direct_to_actor+0xb30/0xb30 [ 172.121690][ T4315] ? security_file_permission+0x128/0x300 [ 172.127376][ T4315] do_sendfile+0x8e4/0x1140 [ 172.131856][ T4315] ? compat_writev+0x3c0/0x3c0 [ 172.136588][ T4315] ? vfs_write+0x422/0x4e0 [ 172.140977][ T4315] ? check_preemption_disabled+0x154/0x330 [ 172.146763][ T4315] __x64_sys_sendfile64+0x1c4/0x220 [ 172.151930][ T4315] ? __ia32_sys_sendfile+0x240/0x240 [ 172.157197][ T4315] do_syscall_64+0xcb/0x1e0 [ 172.161680][ T4315] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 172.167546][ T4315] RIP: 0033:0x466459 [ 172.171409][ T4315] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 172.190996][ T4315] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 172.199387][ T4315] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 172.207329][ T4315] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 172.215299][ T4315] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 172.223244][ T4315] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 172.231198][ T4315] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 07:11:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x3de, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:11:00 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x11) 07:11:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x36, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:11:00 executing program 4 (fault-call:2 fault-nth:48): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:11:00 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x30, 0x0, 0x0, 0xfffff00c}, {0x6}]}, 0x10) getsockopt$packet_buf(r0, 0x107, 0x1, &(0x7f0000000040)=""/106, &(0x7f0000000180)=0x6a) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e20, @multicast2}, 0x10) connect$inet(r1, &(0x7f00000004c0)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000140)='|', 0x1, 0x0, 0x0, 0x0) 07:11:00 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:11:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x3f8, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:11:01 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x12) 07:11:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x37, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:11:01 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:11:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x1202, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:11:01 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x23) [ 172.510831][ T4325] EXT4-fs (loop0): fragment/cluster size (65536) != block size (4096) [ 172.513050][ T4323] FAULT_INJECTION: forcing a failure. [ 172.513050][ T4323] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 172.539082][ T4325] incfs: Options parsing error. -22 07:11:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x38, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:11:01 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r3, &(0x7f0000000000), 0x40000000000024a, 0x0) r4 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x10000, 0x8301) bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0x1a, 0x88b, 0x80000000, 0x8, 0x886, 0xffffffffffffffff, 0x8, [], 0x0, r4, 0x5, 0x5, 0x4}, 0x40) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r5, @ANYBLOB="0000400000000002280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r5, @ANYBLOB="08000400ffffffff08000200e0"], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x8, 0x2, @local}]}, 0x20}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000480)=ANY=[@ANYBLOB="200000010100008780b434ad8f928f34ecbd312971d342efba623818cadba4315372993bbdb4da4e053b1dbd54290e56d08380692fad50b1aa00"/70, @ANYRES32=r5, @ANYBLOB="0800c0858a8d3376"], 0x20}}, 0x0) r7 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000500)='NLBL_CIPSOv4\x00', 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x1c, r7, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000004}, 0x4) [ 172.602588][ T4323] CPU: 1 PID: 4323 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 172.612754][ T4323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 172.622818][ T4323] Call Trace: [ 172.626103][ T4323] dump_stack+0x1d8/0x24e [ 172.630424][ T4323] ? devkmsg_release+0x11c/0x11c [ 172.635355][ T4323] ? show_regs_print_info+0x12/0x12 [ 172.640539][ T4323] ? __kasan_kmalloc+0x1a3/0x1e0 [ 172.645462][ T4323] ? preempt_count_add+0x66/0x130 [ 172.650483][ T4323] ? prep_new_page+0x122/0x370 [ 172.655238][ T4323] should_fail+0x6f6/0x860 [ 172.659644][ T4323] ? setup_fault_attr+0x3d0/0x3d0 [ 172.664656][ T4323] __alloc_pages_nodemask+0x1c4/0x880 [ 172.670010][ T4323] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 172.675664][ T4323] ? kvmalloc_node+0x7e/0xf0 [ 172.680236][ T4323] push_pipe+0x3c5/0x7e0 [ 172.684464][ T4323] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 172.690081][ T4323] ? iov_iter_get_pages+0xec0/0xec0 [ 172.695559][ T4323] ? unix_stream_recvmsg+0x1e0/0x1e0 [ 172.700828][ T4323] default_file_splice_read+0x208/0x970 [ 172.706358][ T4323] ? sock_fasync+0xf0/0xf0 [ 172.710756][ T4323] ? __ia32_sys_tee+0xa0/0xa0 [ 172.715443][ T4323] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 172.722183][ T4323] ? selinux_file_permission+0x2d0/0x520 [ 172.727796][ T4323] ? security_file_permission+0x1e9/0x300 [ 172.733491][ T4323] ? __ia32_sys_tee+0xa0/0xa0 [ 172.738147][ T4323] splice_direct_to_actor+0x3f1/0xb30 [ 172.743585][ T4323] ? do_splice_direct+0x3e0/0x3e0 [ 172.748588][ T4323] ? pipe_to_sendpage+0x300/0x300 [ 172.753591][ T4323] ? security_file_permission+0x128/0x300 [ 172.759290][ T4323] do_splice_direct+0x28b/0x3e0 [ 172.764122][ T4323] ? splice_direct_to_actor+0xb30/0xb30 [ 172.769646][ T4323] ? security_file_permission+0x128/0x300 [ 172.775341][ T4323] do_sendfile+0x8e4/0x1140 [ 172.779827][ T4323] ? compat_writev+0x3c0/0x3c0 [ 172.784571][ T4323] ? vfs_write+0x422/0x4e0 [ 172.788991][ T4323] ? check_preemption_disabled+0x154/0x330 [ 172.794771][ T4323] __x64_sys_sendfile64+0x1c4/0x220 [ 172.799953][ T4323] ? __ia32_sys_sendfile+0x240/0x240 [ 172.805221][ T4323] do_syscall_64+0xcb/0x1e0 [ 172.809703][ T4323] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 172.815570][ T4323] RIP: 0033:0x466459 [ 172.819443][ T4323] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 172.839034][ T4323] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 07:11:01 executing program 4 (fault-call:2 fault-nth:49): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:11:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x1500, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 172.847555][ T4323] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 172.855512][ T4323] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 172.863464][ T4323] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 172.871419][ T4323] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 172.879374][ T4323] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 07:11:01 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:11:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x39, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) [ 172.907685][ T4356] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 172.932686][ T4353] EXT4-fs (loop0): fragment/cluster size (65536) != block size (4096) [ 172.946693][ T4367] FAULT_INJECTION: forcing a failure. [ 172.946693][ T4367] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 172.963784][ T4367] CPU: 0 PID: 4367 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 172.973934][ T4367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 172.983974][ T4367] Call Trace: [ 172.987282][ T4367] dump_stack+0x1d8/0x24e [ 172.991600][ T4367] ? devkmsg_release+0x11c/0x11c [ 172.996518][ T4367] ? show_regs_print_info+0x12/0x12 [ 173.001703][ T4367] ? __kasan_kmalloc+0x1a3/0x1e0 [ 173.006622][ T4367] ? preempt_count_add+0x66/0x130 [ 173.011627][ T4367] ? prep_new_page+0x122/0x370 [ 173.016369][ T4367] should_fail+0x6f6/0x860 [ 173.020764][ T4367] ? setup_fault_attr+0x3d0/0x3d0 [ 173.025770][ T4367] __alloc_pages_nodemask+0x1c4/0x880 [ 173.031123][ T4367] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 173.036649][ T4367] ? kvmalloc_node+0x7e/0xf0 [ 173.041216][ T4367] push_pipe+0x3c5/0x7e0 [ 173.045440][ T4367] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 173.051052][ T4367] ? iov_iter_get_pages+0xec0/0xec0 [ 173.056240][ T4367] ? unix_stream_recvmsg+0x1e0/0x1e0 [ 173.061502][ T4367] default_file_splice_read+0x208/0x970 [ 173.067026][ T4367] ? sock_fasync+0xf0/0xf0 [ 173.071420][ T4367] ? __ia32_sys_tee+0xa0/0xa0 [ 173.076080][ T4367] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 173.082819][ T4367] ? selinux_file_permission+0x2d0/0x520 [ 173.088428][ T4367] ? security_file_permission+0x1e9/0x300 [ 173.094134][ T4367] ? __ia32_sys_tee+0xa0/0xa0 [ 173.098795][ T4367] splice_direct_to_actor+0x3f1/0xb30 [ 173.104156][ T4367] ? do_splice_direct+0x3e0/0x3e0 [ 173.109160][ T4367] ? pipe_to_sendpage+0x300/0x300 [ 173.114170][ T4367] ? security_file_permission+0x128/0x300 [ 173.119866][ T4367] do_splice_direct+0x28b/0x3e0 [ 173.124697][ T4367] ? splice_direct_to_actor+0xb30/0xb30 [ 173.130222][ T4367] ? security_file_permission+0x128/0x300 [ 173.135922][ T4367] do_sendfile+0x8e4/0x1140 [ 173.140409][ T4367] ? compat_writev+0x3c0/0x3c0 [ 173.145152][ T4367] ? vfs_write+0x422/0x4e0 [ 173.149549][ T4367] ? check_preemption_disabled+0x154/0x330 [ 173.155337][ T4367] __x64_sys_sendfile64+0x1c4/0x220 [ 173.160511][ T4367] ? __ia32_sys_sendfile+0x240/0x240 [ 173.165775][ T4367] do_syscall_64+0xcb/0x1e0 [ 173.170257][ T4367] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 173.176226][ T4367] RIP: 0033:0x466459 [ 173.180100][ T4367] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 173.199681][ T4367] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 07:11:01 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x48) 07:11:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x1600, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:11:01 executing program 4 (fault-call:2 fault-nth:50): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:11:01 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x4c) [ 173.208067][ T4367] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 173.216015][ T4367] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 173.223965][ T4367] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 173.231913][ T4367] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 173.239873][ T4367] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 07:11:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x3a, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:11:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x1e00, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:11:01 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r3, &(0x7f0000000000), 0x40000000000024a, 0x0) r4 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x10000, 0x8301) bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0x1a, 0x88b, 0x80000000, 0x8, 0x886, 0xffffffffffffffff, 0x8, [], 0x0, r4, 0x5, 0x5, 0x4}, 0x40) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r5, @ANYBLOB="0000400000000002280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r5, @ANYBLOB="08000400ffffffff08000200e0"], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x8, 0x2, @local}]}, 0x20}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000480)=ANY=[@ANYBLOB="200000010100008780b434ad8f928f34ecbd312971d342efba623818cadba4315372993bbdb4da4e053b1dbd54290e56d08380692fad50b1aa00"/70, @ANYRES32=r5, @ANYBLOB="0800c0858a8d3376"], 0x20}}, 0x0) r7 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000500)='NLBL_CIPSOv4\x00', 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x1c, r7, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000004}, 0x4) [ 173.295872][ T4356] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 173.316435][ T4386] FAULT_INJECTION: forcing a failure. [ 173.316435][ T4386] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 173.333182][ T4387] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 173.342349][ T4386] CPU: 1 PID: 4386 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 173.352493][ T4386] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 173.362531][ T4386] Call Trace: [ 173.365813][ T4386] dump_stack+0x1d8/0x24e [ 173.370132][ T4386] ? devkmsg_release+0x11c/0x11c [ 173.375060][ T4386] ? show_regs_print_info+0x12/0x12 [ 173.380239][ T4386] ? __kasan_kmalloc+0x1a3/0x1e0 [ 173.385159][ T4386] ? preempt_count_add+0x66/0x130 [ 173.390249][ T4386] ? prep_new_page+0x122/0x370 [ 173.395003][ T4386] should_fail+0x6f6/0x860 [ 173.399576][ T4386] ? setup_fault_attr+0x3d0/0x3d0 [ 173.404581][ T4386] __alloc_pages_nodemask+0x1c4/0x880 [ 173.409932][ T4386] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 173.415473][ T4386] ? kvmalloc_node+0x7e/0xf0 [ 173.420042][ T4386] push_pipe+0x3c5/0x7e0 [ 173.424268][ T4386] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 173.429877][ T4386] ? iov_iter_get_pages+0xec0/0xec0 [ 173.435061][ T4386] ? unix_stream_recvmsg+0x1e0/0x1e0 [ 173.440324][ T4386] default_file_splice_read+0x208/0x970 [ 173.445846][ T4386] ? sock_fasync+0xf0/0xf0 [ 173.450240][ T4386] ? __ia32_sys_tee+0xa0/0xa0 [ 173.454898][ T4386] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 173.461636][ T4386] ? selinux_file_permission+0x2d0/0x520 [ 173.467247][ T4386] ? security_file_permission+0x1e9/0x300 [ 173.472943][ T4386] ? __ia32_sys_tee+0xa0/0xa0 [ 173.477600][ T4386] splice_direct_to_actor+0x3f1/0xb30 [ 173.482954][ T4386] ? do_splice_direct+0x3e0/0x3e0 [ 173.487952][ T4386] ? pipe_to_sendpage+0x300/0x300 [ 173.492952][ T4386] ? security_file_permission+0x128/0x300 [ 173.498656][ T4386] do_splice_direct+0x28b/0x3e0 [ 173.503482][ T4386] ? splice_direct_to_actor+0xb30/0xb30 [ 173.509003][ T4386] ? security_file_permission+0x128/0x300 [ 173.514700][ T4386] do_sendfile+0x8e4/0x1140 [ 173.519183][ T4386] ? compat_writev+0x3c0/0x3c0 [ 173.523923][ T4386] ? vfs_write+0x422/0x4e0 [ 173.528318][ T4386] ? check_preemption_disabled+0x154/0x330 [ 173.534099][ T4386] __x64_sys_sendfile64+0x1c4/0x220 [ 173.539273][ T4386] ? __ia32_sys_sendfile+0x240/0x240 [ 173.544537][ T4386] do_syscall_64+0xcb/0x1e0 [ 173.549107][ T4386] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 173.554980][ T4386] RIP: 0033:0x466459 [ 173.558853][ T4386] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 173.578433][ T4386] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 173.586818][ T4386] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 07:11:02 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x68) 07:11:02 executing program 4 (fault-call:2 fault-nth:51): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) [ 173.594767][ T4386] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 173.602714][ T4386] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 173.610673][ T4386] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 173.618631][ T4386] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 07:11:02 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:11:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x3b, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:11:02 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x2403, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 173.642783][ T4399] incfs: Options parsing error. -22 [ 173.665235][ T4398] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 07:11:02 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x6c) [ 173.702416][ T4409] FAULT_INJECTION: forcing a failure. [ 173.702416][ T4409] name fail_page_alloc, interval 1, probability 0, space 0, times 0 07:11:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x3c, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:11:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[], &(0x7f0000000200)=""/213, 0x40, 0xd5, 0x1}, 0x20) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) pipe2(&(0x7f0000000300)={0xffffffffffffffff}, 0x800) bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x6, 0x1003, 0x9, 0x1, 0xc42, 0x1, 0x6, [], 0x0, r1, 0x1000004, 0x4, 0x2}, 0x40) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="8046262186f9a69a7cc543f6ab3b2ca514dc8cf8108d167d876d67f2f5562a8f8f169d5b53e9e20d0304820fe208e2b6ce9e162d2d440324d77bc27113e690699bcda580d22d799b68afc0600ccf614b740f8243c21cee5f3c0060c1f9dc35de048ac0c1b395e5036f190b4fa700f3a2d74165d286a84adae347606ac533c54f5b0b3a5c27fb7e88539526ca2675f2c7431c0bcc8f9622789b55263446b85dbfeda793c844c9d34bb53231f6484331510466201c1ad98c7abc37920bc9e5b7142d1add733ed1ff4be97693088a0d5135149c8b2e6d90452cc271cabfd9b140957691c9f56c", 0xe5}], 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x7, @fixed={[], 0x12}, 0x6}, 0xe) ptrace$setregs(0xf, 0xffffffffffffffff, 0x100, &(0x7f0000000380)="6276f49339ca694274568aaa06b48be64a716b444d5be5a6d536a810ce1ff63983b21988bd835a6da7173901b6bdd4a11c1f1e35748d27ece39ec0751e2fe551f39e45a2cad8678f41220a1e72b89d492d2835dd5d15d7adc53488ff53b9546b2927be5bf141a0425157bdf7bbc411d8496d54bd11ff53afc620d0156691c7f9cffa7fba0d3735e6a8d1d03c99f5079cfd229c20") r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = signalfd4(r2, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000400)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000000c0)=0xe8) read$FUSE(r3, &(0x7f0000002140)={0x2020}, 0x2020) sendmsg$IPSET_CMD_TEST(r3, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)={0xb8, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_ADT={0x74, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa, 0x11, @remote}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP2={0xc, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @multicast2}}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0xf9}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PROTO={0x5, 0x7, 0x8}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x1}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_NAME={0x9, 0x12, 'syz2\x00'}}, {0x1c, 0x7, 0x0, 0x1, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @mcast1}}}]}, @IPSET_ATTR_ADT={0x24, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0xffffffffffffbd7e}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBMARK={0xc, 0x1b, 0x1, 0x0, 0x8}}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0xb8}}, 0x4000015) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r3, &(0x7f0000000440)="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"}, 0x20) 07:11:02 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x2c00, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 173.753434][ T4414] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 173.770868][ T4409] CPU: 1 PID: 4409 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 173.781031][ T4409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 173.791109][ T4409] Call Trace: [ 173.794394][ T4409] dump_stack+0x1d8/0x24e [ 173.798721][ T4409] ? devkmsg_release+0x11c/0x11c [ 173.803650][ T4409] ? show_regs_print_info+0x12/0x12 [ 173.808835][ T4409] ? __kasan_kmalloc+0x1a3/0x1e0 [ 173.813764][ T4409] ? preempt_count_add+0x66/0x130 [ 173.818778][ T4409] ? prep_new_page+0x122/0x370 [ 173.823528][ T4409] should_fail+0x6f6/0x860 [ 173.827934][ T4409] ? setup_fault_attr+0x3d0/0x3d0 [ 173.832957][ T4409] __alloc_pages_nodemask+0x1c4/0x880 [ 173.838321][ T4409] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 173.843973][ T4409] ? kvmalloc_node+0x7e/0xf0 [ 173.844336][ T4430] incfs: Options parsing error. -22 [ 173.848545][ T4409] push_pipe+0x3c5/0x7e0 [ 173.848555][ T4409] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 173.848569][ T4409] ? iov_iter_get_pages+0xec0/0xec0 [ 173.868733][ T4409] ? unix_stream_recvmsg+0x1e0/0x1e0 [ 173.874006][ T4409] default_file_splice_read+0x208/0x970 [ 173.879539][ T4409] ? sock_fasync+0xf0/0xf0 [ 173.883949][ T4409] ? __ia32_sys_tee+0xa0/0xa0 [ 173.888621][ T4409] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 173.895372][ T4409] ? selinux_file_permission+0x2d0/0x520 [ 173.900996][ T4409] ? security_file_permission+0x1e9/0x300 [ 173.906705][ T4409] ? __ia32_sys_tee+0xa0/0xa0 [ 173.911370][ T4409] splice_direct_to_actor+0x3f1/0xb30 [ 173.916737][ T4409] ? do_splice_direct+0x3e0/0x3e0 [ 173.921809][ T4409] ? pipe_to_sendpage+0x300/0x300 [ 173.926812][ T4409] ? security_file_permission+0x128/0x300 [ 173.932509][ T4409] do_splice_direct+0x28b/0x3e0 [ 173.937341][ T4409] ? splice_direct_to_actor+0xb30/0xb30 [ 173.943027][ T4409] ? security_file_permission+0x128/0x300 [ 173.948722][ T4409] do_sendfile+0x8e4/0x1140 [ 173.953286][ T4409] ? compat_writev+0x3c0/0x3c0 [ 173.958045][ T4409] ? vfs_write+0x422/0x4e0 [ 173.962432][ T4409] ? check_preemption_disabled+0x154/0x330 [ 173.968222][ T4409] __x64_sys_sendfile64+0x1c4/0x220 [ 173.973396][ T4409] ? __ia32_sys_sendfile+0x240/0x240 [ 173.978651][ T4409] do_syscall_64+0xcb/0x1e0 [ 173.983124][ T4409] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 173.988983][ T4409] RIP: 0033:0x466459 07:11:02 executing program 1: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x458, 0x5019, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1dc}}}}]}}]}}, 0x0) syz_usb_connect(0x1, 0xdce, &(0x7f0000000380)={{0x12, 0x1, 0x201, 0x61, 0xbf, 0x91, 0x10, 0x403, 0xff1c, 0x720a, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0xdbc, 0x4, 0x0, 0x7f, 0x100, 0x6, [{{0x9, 0x4, 0x71, 0x0, 0xb, 0xe3, 0x19, 0x0, 0x3, [@hid_hid={0x9, 0x21, 0x0, 0xd6, 0x1, {0x22, 0x5de}}], [{{0x9, 0x5, 0x2, 0x10, 0x400, 0x9, 0x1, 0x4}}, {{0x9, 0x5, 0x7, 0x8, 0x8, 0x40, 0x6, 0x0, [@uac_iso={0x7, 0x25, 0x1, 0x1, 0xfe, 0x7}, @uac_iso={0x7, 0x25, 0x1, 0x1, 0x40, 0xe7}]}}, {{0x9, 0x5, 0xe, 0x4, 0x400, 0x6, 0x1f, 0x1, [@generic={0xb6, 0x4, "912c5b1c4f518010e651940a77906d44f220690e696ee4e39d5a7c8968dd8962ebdbcb591fb2b1a69f3554ca6c1d6d941c473e7987aa7e75d2d8a8de309e96a2ed102fecdd2874a85496a83fd3f19ab57f8ca16bda2b81e6123dd5a878f73758c7712da377fe16ba6a06fbb430d1d8e37d4a6265fafba399c425213e12fd3df00f763b868e23222b7624f08155c279b20ac0ab68098fff0ee0c8322c7d009fb38850793a394cb8ee4a45eb30898a60dba75bf5e3"}, @generic={0x25, 0x31, "5148752f80547ebe1c054ed4c6a0e2c94ed282d6708bb1c38215ba4760a4d63fdd29b0"}]}}, {{0x9, 0x5, 0x0, 0x0, 0x28, 0x0, 0x1f, 0x79, [@generic={0xd8, 0xc, "d305ee8f9a1ade08a734d8a910637928123f2754866143a7bddcd88875d95570373d0ac9ce709e71b00e3cc019b3a6f74a7781646ee992832f554690dec7375901886c4bf714d76660541ed698786b015d4c1433400741ba667c007ee39f1a5871afe0a8272842feb061e8eecba3871e41dfd72623d9db3c551236c4377f8576a0a4f3790e62b7c163ad20d207504517dfa808a77c5ad1075d192d76818ca445d5246991c3728338f6960df71b47823dfc5dd31f2b5bcf6e4842ae28af52e89500ece638f78bed751a979fb00fadb76b5ce00087126e"}]}}, {{0x9, 0x5, 0x80, 0xc, 0x400, 0x1, 0xff, 0xf8, [@generic={0xa4, 0xe, "6726eb0929f2ea5780e2676bb989a4a158a42e26f1a7ddedd0ba0c06f4c89beec558872407b3441f667894d687be53e4b0f449199c2c8f286d5fa7db5b1eef15c43eb02844210a2253a852097d3149a8e2def1c262c8b9e27a6bcc30f8d09a83cb2344066369bf6b7478236187475d7d0c6acdcf7d0b13e100a6eb5d4df9fc81b96df3a8d8b147ae7253c8189bcea40af7955447d55294f1b1f20a29efb9b930797f"}, @uac_iso={0x7, 0x25, 0x1, 0x1, 0x1}]}}, {{0x9, 0x5, 0x0, 0x4, 0x20, 0x9, 0x1, 0x0, [@uac_iso={0x7, 0x25, 0x1, 0x2, 0x3, 0x5}, @generic={0xb3, 0x9, "e44b352c82a0b568935e2b4876ceb017617eba141c99f85e37a6b034b2105166b0ce77f5159edafb63e5b6f86de0997d9b1a03f721b31a2e7be136cddf9a0565d29cdde841675190ba9f8eabdb9a8199725d99be64dd8bf2c4899648e5009d1f6042c0108a3136a31df3230ee454dfb2cdf65997e1a39710515016b69ad2c642e2f4ba9221b759134140a8fbcd7b3cbf30a2b282ed2ff7e6cf2e1aa78ee831b10a2b782850cc378c7fb10fb483879fe9a1"}]}}, {{0x9, 0x5, 0x80, 0x3, 0x8, 0x9, 0x1, 0x81}}, {{0x9, 0x5, 0xf, 0x1, 0x10, 0x1, 0x2, 0xb8, [@generic={0x23, 0x21, "9d1c7367dddf1ceaaf19a200e738c87e935c6a3ae2fe69bdd0aaed95e8b9709fbd"}, @uac_iso={0x7, 0x25, 0x1, 0x2, 0x4, 0x1}]}}, {{0x9, 0x5, 0x2, 0x0, 0x4312ecbafa1c84a0, 0x7, 0x7f, 0x8}}, {{0x9, 0x5, 0x7, 0xc, 0x200, 0xc0, 0x4, 0x3f, [@generic={0x4e, 0x21, "b1c77719f832ad7a50098a24e6b2520a43de2d37d63e3632b05dc5506b483968f57e3da841b0b3129c00c087e95348d99ac7cd0380c05c26a8378809ac82dc96c3773443bb78591e6ad35483"}]}}, {{0x9, 0x5, 0x9, 0xc, 0x10, 0x80, 0x62, 0x80, [@generic={0xda, 0x2, "3df390ccc34f5825c4bfcb4a33eb68cfc24e75fc2cd7245d1820c878fac5c98fbcffce30eff62bb36bc17e5e733363c001ad94b1d942f16d4c169ab36153b9420e9da8dda58daac4b90f80700a526329b4f9c01a8d57dbfa179972d64ec569ff9588f0a820d5c96fdd29a5373b5a8fa9634ce6705ee3da13e80ec28fd02f934527d3e96297dee82e08cba3dd5dc12a4f65ae689bdbf18daecc02fd3101e57a876b5fe27cf2461f28fee11538c13c4c0dd054da5036a87e796b99c41a9fc35dd7ada78250ef854128d8790de76846a367851a32babf669c65"}]}}]}}, {{0x9, 0x4, 0x79, 0x7, 0x4, 0xff, 0xd9, 0xf8, 0xff, [@cdc_ecm={{0x5}, {0x5, 0x24, 0x0, 0x7}, {0xd, 0x24, 0xf, 0x1, 0x7a, 0x0, 0x7}}, @generic={0xad, 0x9, "a87820fc23337f453c881daa8ffa65da7a51007359a1745427f095a4a07a87af49502ea5a07e2bb00a3c6210cbeaa9275f440ebf43e4aee0805b63488a30a9e227ed6866e8d3d542090d12f8d89e0a5c0a9ebdaf7fabe09d76ff41d62745f606d0201e53241ebb3872e5e3450785532509a84b63341e38dd76377d22f0c0f88eff3d32bdbca2d2369b2e41416c2dd29501bd659703c7766824d5a394d07d1b6142ddeaa55b933750752c51"}], [{{0x9, 0x5, 0x5, 0x10, 0x8, 0xf7, 0x1f, 0x1f, [@uac_iso={0x7, 0x25, 0x1, 0x82, 0x1f, 0x1000}]}}, {{0x9, 0x5, 0xf, 0x0, 0x3ff, 0x67, 0x0, 0x3f, [@uac_iso={0x7, 0x25, 0x1, 0x1, 0x8, 0x9}, @generic={0x37, 0x1, "bfa7ede1f1e2eb802fed5096bb98b447b73e53dd3ff74400dce08e5fdd10220ba5c564e0f933ac222e67cdcddd420b89732bccec33"}]}}, {{0x9, 0x5, 0x7, 0x5, 0x200, 0x81, 0x1, 0x80, [@generic={0x58, 0xf, "52633b6e166a1f438460d865da4e7c6800bf5356f7fd8ded45c1471580929cb5264d10c15d39abc817c82262c626a0129fade071da350848c73960e9d63d1600b88207432851f1dea72c91b54a0b4870c4909e254d45"}, @uac_iso={0x7, 0x25, 0x1, 0x83, 0x7, 0xc6}]}}, {{0x9, 0x5, 0x8, 0x0, 0x8, 0xfd, 0x0, 0x7, [@generic={0xb0, 0x22, "7f4541a978cc64d6c2a5416337533e971b8a5965e9d73dc239b0a5977fb6b41de661032db2f15fb684785cd7a8e604c42b4045d420ffaaf69033c085d6d1540fc432c06caec41f244eef724c4da218fbf4ca98c4c4eee185ad0cd8487f353aa03974c3ae70a4398a0d4d165fbcd28ad47c6535d2922e9451a512965b612513a47f2c8af809b4dbe6a3985d7d50b3f7ed0dab4a9eca792c5dca33b21d3239c855fbdf1e69f8d7aecdef22dd08089e"}, @uac_iso={0x7, 0x25, 0x1, 0x80, 0x4, 0xffff}]}}]}}, {{0x9, 0x4, 0x7a, 0x3f, 0x10, 0xff, 0xff, 0xff, 0x81, [@generic={0x6a, 0x1, "c34dade15f138fb9e94697b8760d124b4bcd264e216112be7e7a63b76c499903774a8d138425368e65cc9ad9de15869fc6a2420b2d40158dcf51bed4feb4c6d064e28a129b7727abd3718c9bf263fadbac8619bc4ddd566484cf99ba4047c17eb9ae4a4205398e84"}, @cdc_ecm={{0x8, 0x24, 0x6, 0x0, 0x0, "d741a2"}, {0x5, 0x24, 0x0, 0x1}, {0xd, 0x24, 0xf, 0x1, 0x3, 0xf001, 0x7fff}, [@mdlm_detail={0x5, 0x24, 0x13, 0x9, "9f"}, @mbim_extended={0x8, 0x24, 0x1c, 0x1f, 0x1, 0x7fff}, @mdlm_detail={0xa1, 0x24, 0x13, 0x20, "b86621bba0c46db09f0df19fb98d053bd93607990343eec058fff5c4f0aae2090531e40ad52fd6797f9975d2030bb0d454883f5dff3ac5a97ebc05e361fc3c0633e8f1b3f9eaf1848d4743583847da6105cd41b9854aca874b2cd048f008cc816e16c5aa817555df8a593666567eed815415ed87824be9fb957b1c3a738dc1556928353f15da8199ad3d5e6a7c3bd3e5a5fbaeba02b1baeb8f0a53a99c"}, @obex={0x5, 0x24, 0x15, 0x5}, @mbim={0xc, 0x24, 0x1b, 0x7, 0x0, 0x7, 0x6, 0x8, 0xc5}]}], [{{0x9, 0x5, 0x3, 0x0, 0x10, 0x3f, 0x4, 0x1, [@generic={0x68, 0x6, "9cfcf6329aabb4016207208b229cb10842e10084605a613055907fb3c33909edf52996068432e0ff8eb95632353789ba317fd285d95e642c15eda80052887c4f028ecedbb28446e07b72fd832a883a6b85434af385e923d2ffe051221091271213da6570973c"}]}}, {{0x9, 0x5, 0x310865509733ea31, 0x2, 0x8, 0x6, 0xf7, 0x3, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x8, 0x9}, @uac_iso={0x7, 0x25, 0x1, 0x80, 0x1, 0x1000}]}}, {{0x9, 0x5, 0xd, 0x10, 0x8, 0x5b, 0x81, 0x5}}, {{0x9, 0x5, 0x2, 0x8, 0x3ff, 0x81, 0x6, 0x5, [@uac_iso={0x7, 0x25, 0x1, 0x2, 0x4}]}}, {{0x9, 0x5, 0xe, 0x10, 0x228, 0x93, 0x0, 0x0, [@generic={0x101, 0x30, "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"}, @generic={0x55, 0x30, "a6a1fe35d6b31bbe8b679e48dfbf7bba67055ae1ed559b3bc64729ed6070268d1370b627ac57e851222b59c2109a1daff983569474aa17f18bb0cb64efa2b92a5ab10e5d3b6c79881d70eb1fb62f87ef160b8a"}]}}, {{0x9, 0x5, 0xb, 0xc, 0x200, 0x5, 0xb3, 0x6, [@generic={0xb7, 0x8, "2395cf84b95495faddbde1964e68763348c2fc475b21b5fb871df6ff3d01c4382a4e145c3215dfd891dc2ac41c856062940c81753a347e2c4c4aa3691a305fbbc84a992d3d7ef57246521eefc336d171b794e6fe5fd01977be85f3872c6a012ce2608055de6d3b9582ea0fcb24e4d24857c6b9f01ae9406cd15bd1f4052809a35fc2d3841f44d0f5ff6b5b70d6e30670790b26f603bee2dfcb29ecf0e17f5a9c391e48bcb5add33f8f1c2e8fa496e20cc286fcef8e"}]}}, {{0x9, 0x5, 0x4, 0x10, 0x3ff, 0x2, 0xff, 0x90, [@generic={0xf2, 0x6, "8213dee5003efd5b0f2e6c885b91ded06065fef3d0916c9b965c0d3bfc69ebdbc4e82c94bb474e06dad6b4dfc856133f7190bf65c7b4e13b23589899a52606df9c489823fa60daa0623092236df19f574c6803a5e03e770fa1fefbb1b43b6d71343807d7ba4985320940e8a5433f2f27df9da4029a3abc0cafc50ec4d4e0b09e19fb016cdc2c20ecb12973cf6f6240c24f61ed7086a48fec04e5e096fcefdb288741596d5606ee3af4dc140018c57ece2941bc5af9c7d8c6f34cbd9929ef82416d4354af0c5cd29d4d2df3c09819ac5ab5c715a0bf6e58d14c27e1088bb2d84dfe65a2ff7e6d3e0ffa17ab809fd27df1"}]}}, {{0x9, 0x5, 0x0, 0x12, 0x20, 0x8, 0x20, 0x3f, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x80, 0x5}]}}, {{0x9, 0x5, 0xf, 0x12, 0x0, 0x5, 0xb5, 0x7, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x9e, 0x2}]}}, {{0x9, 0x5, 0xf, 0x0, 0x3ff, 0xea, 0x43, 0x2d}}, {{0x9, 0x5, 0xc, 0x1, 0x3ff, 0x0, 0x4, 0x2, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x3a, 0x1}]}}, {{0x9, 0x5, 0x2, 0x10, 0x20, 0x3f, 0x3, 0x8}}, {{0x9, 0x5, 0xe, 0x4, 0x200, 0x1, 0x0, 0x20, [@uac_iso={0x7, 0x25, 0x1, 0x82, 0x2, 0x3}, @generic={0x8, 0x1, "20517123a6a4"}]}}, {{0x9, 0x5, 0xf, 0x11, 0x400, 0x3f, 0xc7, 0x80, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0xc1, 0x9}]}}, {{0x9, 0x5, 0xb, 0x0, 0x8, 0x8, 0x6, 0x3, [@generic={0xe7, 0x23, "370a66470b75263894daa32f8d159dc9dc1df9ed1c09f02104944a65789da9868b2b8219213031309fa39bad9afde5390adb34dd9c2af31083064ccb191cf42c80fff2aaa29e444c06f38d63acc872e0f04256881aab25667992c4e01ff38476c46b7c182dbd8e5b6fe5c3bd4a7105d73c76762455856c101b0a3f8d0cfedaeffb6f077f2ec92773cea290dd2dc56a3b2985ce0f0d1aaed434cc339c08980c62fe32759908a2a386f5560165049704620dcb1d6d7ca9e075a92688eab37e637439df168796bd3d738d4edc6932c747b4b45f48c9540369842dfb83d8f0c71eef99f2178812"}, @uac_iso={0x7, 0x25, 0x1, 0x1, 0x9, 0xcec}]}}, {{0x9, 0x5, 0x3, 0x3, 0x8, 0xa8, 0x9, 0x1}}]}}, {{0x9, 0x4, 0xcd, 0xf9, 0x0, 0x1e, 0x40, 0xc2, 0x3f}}]}}]}}, &(0x7f0000001280)={0xa, &(0x7f0000000080)={0xa, 0x6, 0x201, 0xff, 0x0, 0x9, 0x20, 0x8}, 0x21, &(0x7f00000000c0)=ANY=[@ANYBLOB="050f2100030b100100ba0021076d00010a100302ff0107100200660100"], 0x8, [{0xe8, &(0x7f0000001180)=@string={0xe8, 0x3, "64952ac7b626e05683e8aba777659f8dedf3fce0191094083bdf840c035dfc1fde76734257a0bbda28f35c126de30f2c0d7f37bd96688f2b2f63c43ce97f528905a63e92eac7687d91c632046363903ef951e848437affeb22967f045ce8ac8078c1ccc2153fe8f41e370037b774d110f7e1cf6ed9f410a6202dcf5c7c3de3c8182c1876035bec4eebec081b36ca174015e7e9e55d177c779206d70f13ac23f9d11a81e8e45a7037d32fe73ed983ba023a0fced201a613fedb98246e44dc47c0ae60d6a0b847f7cb75067e162dc6567843ce8fe71df2e0048b3798d91c66b7daeedaa3a59644"}}, {0x4, &(0x7f0000000100)=@lang_id={0x4, 0x3, 0x400}}, {0x3b, &(0x7f0000000140)=@string={0x3b, 0x3, "a8ba9fa970bc190ba1e608bead8099c7ca31bbbd90156beeb41bb91a97d7d1311fe490e6869673d4a60d1cbd2453e7b225e568a5ef472de3ca"}}, {0x4, &(0x7f00000001c0)=@lang_id={0x4, 0x3, 0x816}}, {0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x426}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x861}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0x40e}}, {0x4, &(0x7f0000000300)=@lang_id={0x4, 0x3, 0x3c42}}]}) syz_usb_control_io(r0, 0x0, 0x0) r1 = syz_usb_connect(0x0, 0x36, &(0x7f0000000200)=ANY=[@ANYBLOB="1201000014da2108ab12a390eb1e000000010902240001000000000904410017ff5d810009050f1f0100000000090583030091"], 0x0) syz_usb_ep_write$ath9k_ep2(r1, 0x83, 0x8, &(0x7f0000000040)=ANY=[]) syz_usb_control_io$hid(r1, &(0x7f0000001740)={0x24, &(0x7f0000001600)={0x40, 0x8, 0x4e, {0x4e, 0x22, "5fc5fd1a8df8d0b24148d6caabc0b0bdcb8decdde438bf1605177eba18a901a0c4252e82c1dd1c2680d9626cfa509beaeed6fb8f310e1391e05b90bf4e6843a7a5f729867e877e130e6679f4"}}, &(0x7f0000001680)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x2854}}, &(0x7f00000016c0)={0x0, 0x22, 0xb, {[@main=@item_4={0x3, 0x0, 0xc, "b1f57d3d"}, @local=@item_4={0x3, 0x2, 0x0, "16b4400d"}, @main=@item_012={0x0, 0x0, 0xa}]}}, &(0x7f0000001700)={0x0, 0x21, 0x9, {0x9, 0x21, 0x5614, 0x2, 0x1, {0x22, 0xca8}}}}, &(0x7f0000001980)={0x2c, &(0x7f0000001780)={0x40, 0x31, 0x7, "58f451c0c1fced"}, &(0x7f00000017c0)={0x0, 0xa, 0x1}, &(0x7f0000001800)={0x0, 0x8, 0x1, 0x9}, &(0x7f0000001840)={0x20, 0x1, 0xc0, "7fc24c43fa985837c71ed60247f2c08f462ecc4ba8e478870a0ee18529795177edb63ad926df06f3d58edf3d233f4ba9d0dcf30f2a1a3e19b1dd8089c00626cf9d46196719da221dcb21b02d5f9e7a8d8f60fa1fd3a46d055d3e45de40e47a80a473fa6454109599984e3404c696d9e8673fb14fc10c5c6c53076cbd110bfd17cf1882329c745ea530c9f7a24fe26601bda32f9103e0102305c27c40d6662485f39078d85919beebb312f65d1e4c5d362c3ad704b76ca158fb0d704e79a8c88b"}, &(0x7f0000001940)={0x20, 0x3, 0x1, 0x5}}) syz_usb_connect(0x0, 0xdfa, 0x0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1, [{0x2a, &(0x7f0000000180)=@string={0x2a, 0x3, "0b91fb408bf8408806d3a09df051f4074467d5114c1444807ad5db2aa8597341cfacbeaee8b2c437"}}]}) r2 = syz_usb_connect(0x0, 0x36, &(0x7f0000000200)=ANY=[@ANYBLOB="1201000014da2108ab12a390eb1e000000010902240001000000000904410017ff5d810009050f1f0100000000090583030091"], 0x0) syz_usb_ep_write$ath9k_ep2(r2, 0x83, 0x8, &(0x7f0000000040)=ANY=[]) syz_usb_control_io$cdc_ecm(r2, &(0x7f0000001400)={0x14, &(0x7f0000001300)={0x20, 0x9, 0x8e, {0x8e, 0x25, "cc3a8ab2a5c8d435a21a701d3f114244523cc2ca61cb7a54c6c27f598382cb08680de6c7990b9a631604125e5fde2fc7d4ea51f1995d69d32720daa5360142da8c6bddc75643196a009023f15f5f5cd5345af32a516f0765dcb60fbea70999430acf5f7f351b77436732223a6ca4f7e21f18c2ccd48a6b0113118cd4113459d17a528e7ecf9943413e1ca278"}}, &(0x7f00000013c0)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f00000015c0)={0x1c, &(0x7f0000001440)={0x0, 0xd, 0xc0, "ea7fa8eed80a28c71e5d616521e94755f70da170503e25c6a04a29b24c59be1629b191736e4ca27d3bd57643e849de8c0543234583d8ab2ad61554518871e5eef8f1e1ae4042a7efe93c5e23bfd04b1150bdac8230dd58ed324ff4002b0e0784eb6f1abe3c751b2755fc457dedd6675515749ff2806a74ea57fc001fe57d0e6b0d6172d22ed80fcc538aef358d97315064c931c62f0c234dcef02558ef0507b649eca70685542d5da384ed1b8676de2f3b59aab3b023109384b2f3bfbd4fc2fa"}, &(0x7f0000001540)={0x0, 0xa, 0x1, 0x25}, &(0x7f0000001580)={0x0, 0x8, 0x1, 0x3}}) r3 = syz_usb_connect$printer(0x0, 0x36, &(0x7f00000019c0)={{0x12, 0x1, 0x50, 0x0, 0x0, 0x0, 0xff, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x20, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x7, 0x1, 0x2, 0x8, "", {{{0x9, 0x5, 0x1, 0x2, 0x10, 0xc9, 0x5, 0x7}}, [{{0x9, 0x5, 0x82, 0x2, 0x38f, 0x9, 0x1, 0x3}}]}}}]}}]}}, &(0x7f0000001d40)={0xa, &(0x7f0000001a00)={0xa, 0x6, 0x200, 0x5, 0x44, 0x81, 0x8, 0x3f}, 0x39, &(0x7f0000001a40)={0x5, 0xf, 0x39, 0x5, [@ssp_cap={0xc, 0x10, 0xa, 0x0, 0x0, 0x1f, 0xf000, 0x7}, @wireless={0xb, 0x10, 0x1, 0xc, 0x1, 0x7c, 0x9, 0x0, 0x81}, @ext_cap={0x7, 0x10, 0x2, 0x10, 0x0, 0xe, 0x20}, @wireless={0xb, 0x10, 0x1, 0x4, 0xa, 0x9, 0x40, 0x3, 0x6}, @wireless={0xb, 0x10, 0x1, 0x8, 0x39, 0x81, 0x1, 0x3f, 0x8}]}, 0x5, [{0x41, &(0x7f0000001a80)=@string={0x41, 0x3, "7169a8bc8dc29a33faeb0f851bec1167cfbafc513132f48e74940eb45b65cdd3d228a07513a7f3d8f00aaf5fa57b34309d52b687b0d7f07c8856b86ab9c119"}}, {0x77, &(0x7f0000001b00)=@string={0x77, 0x3, "30ce30f7561e81471b70c10f3519ab851af00fd4e70755ad058e586d97ce81614984203e013c54349a2e00fb05f1346dbdc1b4ec0726e3b07e98f71ab05050ebe8815b703077f90c963d3cd1199636201a254b378502ca483d2371754bd7eacc36bdf00bf11e5e9e883f2012e3e49dc5eb38f8deb8"}}, {0x4, &(0x7f0000001b80)=@lang_id={0x4, 0x3, 0x459}}, {0xe6, &(0x7f0000001bc0)=@string={0xe6, 0x3, "de1cf40605cb9443279d5ca2bf1c76b8217e54ddb48e62cc44bcd9f66f974030ef936859ec0cac1143de7dc8fba95b21c45f2e8641aeb1ac99da3637732f8e5be608eb2c318be4dc2a0b80e903039abfba28c444ea73ebd4ce04dfec21bf78e35bf787d26bc929205c7c65c8d7a00da35d0f8c4da90d38bc68a890a92b3d3b192e5bf5de78f56f2abef4b348221db21e5fdc4743631527e6956c1e42294481edab504ef11e1f049a41d5a32a4e55edd160d1b469f1744a77f792c142336ee0358a46818e24af9361d0391f51c6acaa1cd4ed17eaaa4ac61d25c1f9ce7190cfa10675bcda"}}, {0x41, &(0x7f0000001cc0)=@string={0x41, 0x3, "cbb44c211f4131c93673828e49c57c746a06f8967422d6b8d01a4f2323f1f95a386b0468ec6724e9b0d2de70b066b2ac5448ee7ba1f1bdc37489d60489d121"}}]}) syz_usb_control_io(r3, &(0x7f0000001f00)={0x2c, &(0x7f0000001dc0)={0x20, 0x24, 0x14, {0x14, 0x22, "65f612b828d608971aa280a5245ce0089fc0"}}, &(0x7f0000001e00)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0xd8f1}}, &(0x7f0000001e40)={0x0, 0xf, 0x5, {0x5, 0xf, 0x5}}, &(0x7f0000001e80)={0x20, 0x29, 0xf, {0xf, 0x29, 0x4, 0x80, 0x20, 0x2, "28eaf41e", "af42f933"}}, &(0x7f0000001ec0)={0x20, 0x2a, 0xc, {0xc, 0x2a, 0xa9, 0x10, 0x23, 0x41, 0x1, 0x400, 0x101}}}, &(0x7f0000002340)={0x84, &(0x7f0000001f40)={0x40, 0x0, 0x2f, "53aaa573a0d4f0f22bc25f95eaf6910d7bc309e5dc194d22e98dfee33ac6dbeb05e56d092c91e28ee7d12ee81d16ea"}, &(0x7f0000001f80)={0x0, 0xa, 0x1, 0x7}, &(0x7f0000001fc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000002000)={0x20, 0x0, 0x4, {0x3, 0x1}}, &(0x7f0000002040)={0x20, 0x0, 0x4, {0x100, 0x80}}, &(0x7f0000002080)={0x40, 0x7, 0x2, 0x1}, &(0x7f00000020c0)={0x40, 0x9, 0x1, 0xe5}, &(0x7f0000002100)={0x40, 0xb, 0x2, "84b1"}, &(0x7f0000002140)={0x40, 0xf, 0x2, 0x6295}, &(0x7f0000002180)={0x40, 0x13, 0x6, @broadcast}, &(0x7f00000021c0)={0x40, 0x17, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, &(0x7f0000002200)={0x40, 0x19, 0x2, "bdaf"}, &(0x7f0000002240)={0x40, 0x1a, 0x2, 0x9}, &(0x7f0000002280)={0x40, 0x1c, 0x1, 0x3e}, &(0x7f00000022c0)={0x40, 0x1e, 0x1, 0xa5}, &(0x7f0000002300)={0x40, 0x21, 0x1, 0x1}}) syz_usb_control_io(r0, &(0x7f0000000340)={0x18, &(0x7f0000000040)=ANY=[@ANYBLOB="0000b803"], 0x0, 0x0, 0x0, 0x0}, 0x0) 07:11:02 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x74) 07:11:02 executing program 4 (fault-call:2 fault-nth:52): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) [ 173.992845][ T4409] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 174.012506][ T4409] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 174.020883][ T4409] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 174.028842][ T4409] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 174.036782][ T4409] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 174.044736][ T4409] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 07:11:02 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:11:02 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x2e01, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 174.052673][ T4409] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 07:11:02 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x7a) [ 174.110631][ T4439] FAULT_INJECTION: forcing a failure. [ 174.110631][ T4439] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 174.114314][ T4442] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 174.149930][ T4439] CPU: 0 PID: 4439 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 174.160090][ T4439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 174.177040][ T4439] Call Trace: [ 174.182792][ T4439] dump_stack+0x1d8/0x24e [ 174.194058][ T4439] ? devkmsg_release+0x11c/0x11c [ 174.201009][ T4439] ? show_regs_print_info+0x12/0x12 [ 174.206197][ T4439] ? __kasan_kmalloc+0x1a3/0x1e0 [ 174.211112][ T4439] ? preempt_count_add+0x66/0x130 [ 174.216112][ T4439] ? prep_new_page+0x122/0x370 [ 174.220860][ T4439] should_fail+0x6f6/0x860 [ 174.225248][ T4439] ? setup_fault_attr+0x3d0/0x3d0 [ 174.230250][ T4439] __alloc_pages_nodemask+0x1c4/0x880 [ 174.235598][ T4439] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 174.241121][ T4439] ? kvmalloc_node+0x7e/0xf0 [ 174.245684][ T4439] push_pipe+0x3c5/0x7e0 [ 174.249917][ T4439] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 174.255552][ T4439] ? iov_iter_get_pages+0xec0/0xec0 [ 174.260763][ T4439] ? unix_stream_recvmsg+0x1e0/0x1e0 [ 174.266020][ T4439] default_file_splice_read+0x208/0x970 [ 174.271536][ T4439] ? sock_fasync+0xf0/0xf0 [ 174.275928][ T4439] ? __ia32_sys_tee+0xa0/0xa0 [ 174.280578][ T4439] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 174.287309][ T4439] ? selinux_file_permission+0x2d0/0x520 [ 174.292930][ T4439] ? security_file_permission+0x1e9/0x300 [ 174.298634][ T4439] ? __ia32_sys_tee+0xa0/0xa0 [ 174.303300][ T4439] splice_direct_to_actor+0x3f1/0xb30 [ 174.308646][ T4439] ? do_splice_direct+0x3e0/0x3e0 [ 174.313640][ T4439] ? pipe_to_sendpage+0x300/0x300 [ 174.318635][ T4439] ? security_file_permission+0x128/0x300 [ 174.324453][ T4439] do_splice_direct+0x28b/0x3e0 [ 174.329294][ T4439] ? splice_direct_to_actor+0xb30/0xb30 [ 174.334816][ T4439] ? security_file_permission+0x128/0x300 [ 174.340508][ T4439] do_sendfile+0x8e4/0x1140 [ 174.345005][ T4439] ? compat_writev+0x3c0/0x3c0 [ 174.349740][ T4439] ? vfs_write+0x422/0x4e0 [ 174.354132][ T4439] ? check_preemption_disabled+0x154/0x330 [ 174.359907][ T4439] __x64_sys_sendfile64+0x1c4/0x220 [ 174.365076][ T4439] ? __ia32_sys_sendfile+0x240/0x240 [ 174.370333][ T4439] do_syscall_64+0xcb/0x1e0 [ 174.374808][ T4439] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 174.380670][ T4439] RIP: 0033:0x466459 [ 174.384535][ T4439] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 07:11:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x3e, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:11:02 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x300) 07:11:02 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x3f00, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:11:02 executing program 4 (fault-call:2 fault-nth:53): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) [ 174.404230][ T4439] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 174.412612][ T4439] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 174.420556][ T4439] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 174.428499][ T4439] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 174.436460][ T4439] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 174.444422][ T4439] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 [ 174.454091][ T977] usb 2-1: new high-speed USB device number 8 using dummy_hcd 07:11:03 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x4000, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:11:03 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, 0x0) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 174.465142][ T4455] incfs: Options parsing error. -22 [ 174.525006][ T4467] FAULT_INJECTION: forcing a failure. [ 174.525006][ T4467] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 174.544895][ T4467] CPU: 0 PID: 4467 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 174.548148][ T4474] incfs: Options parsing error. -22 [ 174.555048][ T4467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 174.555052][ T4467] Call Trace: [ 174.555068][ T4467] dump_stack+0x1d8/0x24e [ 174.555084][ T4467] ? devkmsg_release+0x11c/0x11c [ 174.582851][ T4467] ? show_regs_print_info+0x12/0x12 [ 174.588024][ T4467] ? __kasan_kmalloc+0x1a3/0x1e0 [ 174.592935][ T4467] ? preempt_count_add+0x66/0x130 [ 174.597937][ T4467] ? prep_new_page+0x122/0x370 [ 174.602701][ T4467] should_fail+0x6f6/0x860 [ 174.607118][ T4467] ? setup_fault_attr+0x3d0/0x3d0 [ 174.612133][ T4467] __alloc_pages_nodemask+0x1c4/0x880 [ 174.617480][ T4467] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 174.623000][ T4467] ? kvmalloc_node+0x7e/0xf0 [ 174.627564][ T4467] push_pipe+0x3c5/0x7e0 [ 174.631781][ T4467] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 174.637385][ T4467] ? iov_iter_get_pages+0xec0/0xec0 [ 174.642582][ T4467] ? unix_stream_recvmsg+0x1e0/0x1e0 [ 174.647842][ T4467] default_file_splice_read+0x208/0x970 [ 174.653381][ T4467] ? sock_fasync+0xf0/0xf0 [ 174.657776][ T4467] ? __ia32_sys_tee+0xa0/0xa0 [ 174.662431][ T4467] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 174.669290][ T4467] ? selinux_file_permission+0x2d0/0x520 [ 174.674939][ T4467] ? security_file_permission+0x1e9/0x300 [ 174.680739][ T4467] ? __ia32_sys_tee+0xa0/0xa0 [ 174.685395][ T4467] splice_direct_to_actor+0x3f1/0xb30 [ 174.690853][ T4467] ? do_splice_direct+0x3e0/0x3e0 [ 174.695853][ T4467] ? pipe_to_sendpage+0x300/0x300 [ 174.701224][ T4467] ? security_file_permission+0x128/0x300 [ 174.706919][ T4467] do_splice_direct+0x28b/0x3e0 [ 174.711865][ T4467] ? splice_direct_to_actor+0xb30/0xb30 [ 174.717387][ T4467] ? security_file_permission+0x128/0x300 [ 174.723165][ T4467] do_sendfile+0x8e4/0x1140 [ 174.727646][ T4467] ? compat_writev+0x3c0/0x3c0 [ 174.732385][ T4467] ? vfs_write+0x422/0x4e0 [ 174.736777][ T4467] ? check_preemption_disabled+0x154/0x330 [ 174.742561][ T4467] __x64_sys_sendfile64+0x1c4/0x220 [ 174.747732][ T4467] ? __ia32_sys_sendfile+0x240/0x240 [ 174.752989][ T4467] do_syscall_64+0xcb/0x1e0 [ 174.757571][ T4467] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 174.763437][ T4467] RIP: 0033:0x466459 [ 174.767305][ T4467] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 174.786896][ T4467] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 174.795280][ T4467] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 174.803224][ T4467] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 174.811167][ T4467] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 174.819128][ T4467] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 174.827072][ T4467] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 [ 174.956840][ T977] usb 2-1: Using ep0 maxpacket: 16 [ 175.076896][ T977] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 175.087878][ T977] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 175.098342][ T977] usb 2-1: New USB device found, idVendor=0458, idProduct=5019, bcdDevice= 0.00 [ 175.107675][ T977] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 175.116266][ T977] usb 2-1: config 0 descriptor?? [ 175.357526][ T4432] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 175.577089][ T4432] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 175.585053][ T4432] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 175.594132][ T4432] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 175.608320][ T977] hid (null): invalid report_count 523358679 [ 175.614285][ T977] hid (null): unknown global tag 0xe [ 175.620267][ T977] hid (null): unknown global tag 0xe [ 175.625721][ T977] hid (null): unknown global tag 0x44 [ 175.631942][ T977] hid (null): unknown global tag 0xc [ 175.642173][ T977] input: HID 0458:5019 as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/0003:0458:5019.0001/input/input6 [ 175.654981][ T977] input: HID 0458:5019 as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/0003:0458:5019.0001/input/input7 [ 175.738272][ T977] kye 0003:0458:5019.0001: input,hidraw0: USB HID v0.00 Pointer [HID 0458:5019] on usb-dummy_hcd.1-1/input0 [ 175.808654][ T977] usb 2-1: USB disconnect, device number 8 [ 176.576787][ T117] usb 2-1: new high-speed USB device number 9 using dummy_hcd [ 176.816762][ T117] usb 2-1: Using ep0 maxpacket: 16 [ 176.936879][ T117] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 176.948403][ T117] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 176.958728][ T117] usb 2-1: New USB device found, idVendor=0458, idProduct=5019, bcdDevice= 0.00 [ 176.969603][ T117] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 176.978359][ T117] usb 2-1: config 0 descriptor?? 07:11:05 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x500) 07:11:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x42, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:11:05 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x4601, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:11:05 executing program 4 (fault-call:2 fault-nth:54): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:11:05 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, 0x0) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:11:05 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x41) r1 = request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)='.-\x00', 0xfffffffffffffffa) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r5 = gettid() request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)='{\x00', r1) sendmsg$netlink(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, r4}}}], 0x20}, 0x0) keyctl$chown(0x4, r1, 0xee01, r4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xc) clone(0x1080100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) clone(0x22086605, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) sendmmsg(r0, 0x0, 0x0, 0x0) 07:11:05 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x600) 07:11:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x43, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:11:05 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x5602, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 177.138748][ T4506] FAULT_INJECTION: forcing a failure. [ 177.138748][ T4506] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 177.177120][ T4508] incfs: Options parsing error. -22 07:11:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x46, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:11:05 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) lsetxattr(&(0x7f0000000640)='./bus\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0xfc83}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00') recvfrom$unix(r0, &(0x7f00000007c0)=""/134, 0x86, 0x0, &(0x7f00000004c0)=@file={0x1, './bus\x00'}, 0x6e) getgid() mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000340)='overlay\x00', 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='lowerdir=./bus/file0,xino=off,index=off,upperdir=./bus,nfs_export=off,default_permissions,workdir=./bus/file0,metacopy=on,fsmagic=0x0000000000000005,fscontext=staff_u,defcontext=unconfined_u,smackfshat=,euid>', @ANYRESDEC=0x0, @ANYBLOB="2c6f626a5f747970653d636f6e6669676673012c00ad53787c0a1b5c60def006e1f555f9b0bf3f2e88d8a4bfac420457111079d0a41228e1"]) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) symlink(&(0x7f0000000540)='./file1\x00', &(0x7f0000000600)='./bus/file0\x00') mkdir(&(0x7f00000002c0)='./file1\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) chdir(&(0x7f00000001c0)='./bus\x00') lchown(&(0x7f00000003c0)='./bus/file0\x00', 0x0, 0xee00) [ 177.179377][ T4506] CPU: 1 PID: 4506 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 177.192463][ T4506] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 177.202505][ T4506] Call Trace: [ 177.205791][ T4506] dump_stack+0x1d8/0x24e [ 177.210236][ T4506] ? devkmsg_release+0x11c/0x11c [ 177.215172][ T4506] ? show_regs_print_info+0x12/0x12 [ 177.220359][ T4506] ? __kasan_kmalloc+0x1a3/0x1e0 [ 177.225289][ T4506] ? preempt_count_add+0x66/0x130 [ 177.230307][ T4506] ? prep_new_page+0x122/0x370 07:11:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x48, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) [ 177.235065][ T4506] should_fail+0x6f6/0x860 [ 177.239475][ T4506] ? setup_fault_attr+0x3d0/0x3d0 [ 177.244531][ T4506] __alloc_pages_nodemask+0x1c4/0x880 [ 177.249916][ T4506] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 177.255456][ T4506] ? kvmalloc_node+0x7e/0xf0 [ 177.260040][ T4506] ? kvmalloc_node+0x7e/0xf0 [ 177.264626][ T4506] push_pipe+0x3c5/0x7e0 [ 177.268862][ T4506] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 177.274487][ T4506] ? iov_iter_get_pages+0xec0/0xec0 [ 177.279680][ T4506] ? unix_stream_recvmsg+0x1e0/0x1e0 07:11:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x49, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) [ 177.284956][ T4506] default_file_splice_read+0x208/0x970 [ 177.290490][ T4506] ? sock_fasync+0xf0/0xf0 [ 177.292394][ T4534] overlayfs: unrecognized mount option "fsmagic=0x0000000000000005" or missing value [ 177.294917][ T4506] ? __ia32_sys_tee+0xa0/0xa0 [ 177.294933][ T4506] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 177.294943][ T4506] ? selinux_file_permission+0x2d0/0x520 [ 177.294953][ T4506] ? security_file_permission+0x1e9/0x300 [ 177.294965][ T4506] ? __ia32_sys_tee+0xa0/0xa0 [ 177.332013][ T4506] splice_direct_to_actor+0x3f1/0xb30 07:11:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x4a, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) [ 177.337407][ T4506] ? do_splice_direct+0x3e0/0x3e0 [ 177.342424][ T4506] ? pipe_to_sendpage+0x300/0x300 [ 177.347516][ T4506] ? security_file_permission+0x128/0x300 [ 177.353226][ T4506] do_splice_direct+0x28b/0x3e0 [ 177.358071][ T4506] ? splice_direct_to_actor+0xb30/0xb30 [ 177.363611][ T4506] ? security_file_permission+0x128/0x300 [ 177.369323][ T4506] do_sendfile+0x8e4/0x1140 [ 177.373820][ T4506] ? compat_writev+0x3c0/0x3c0 [ 177.378579][ T4506] ? vfs_write+0x422/0x4e0 [ 177.382991][ T4506] ? check_preemption_disabled+0x154/0x330 07:11:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x4b, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) [ 177.388787][ T4506] __x64_sys_sendfile64+0x1c4/0x220 [ 177.394168][ T4506] ? __ia32_sys_sendfile+0x240/0x240 [ 177.399446][ T4506] do_syscall_64+0xcb/0x1e0 [ 177.403943][ T4506] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 177.406992][ T4534] overlayfs: unrecognized mount option "fsmagic=0x0000000000000005" or missing value [ 177.409819][ T4506] RIP: 0033:0x466459 07:11:06 executing program 4 (fault-call:2 fault-nth:55): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) [ 177.409828][ T4506] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 177.409832][ T4506] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 177.419911][ T4543] overlayfs: maximum fs stacking depth exceeded [ 177.423159][ T4506] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 177.423164][ T4506] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 177.423169][ T4506] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 177.423173][ T4506] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 07:11:06 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, 0x0) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:11:06 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x700) 07:11:06 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x6800, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:11:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x4c, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:11:06 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x900) [ 177.423178][ T4506] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 [ 177.436380][ T4545] overlayfs: filesystem on './bus' not supported as upperdir [ 177.505478][ T117] usbhid 2-1:0.0: can't add hid device: -71 [ 177.517810][ T117] usbhid: probe of 2-1:0.0 failed with error -71 [ 177.532655][ T117] usb 2-1: USB disconnect, device number 9 07:11:06 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x6801, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 177.545586][ T4555] FAULT_INJECTION: forcing a failure. [ 177.545586][ T4555] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 177.561420][ T4555] CPU: 0 PID: 4555 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 177.571569][ T4555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 177.581609][ T4555] Call Trace: [ 177.584876][ T4555] dump_stack+0x1d8/0x24e [ 177.589175][ T4555] ? devkmsg_release+0x11c/0x11c [ 177.594099][ T4555] ? show_regs_print_info+0x12/0x12 [ 177.599313][ T4555] ? __kasan_kmalloc+0x1a3/0x1e0 [ 177.604222][ T4555] ? preempt_count_add+0x66/0x130 [ 177.609218][ T4555] ? prep_new_page+0x122/0x370 [ 177.613951][ T4555] should_fail+0x6f6/0x860 [ 177.618336][ T4555] ? setup_fault_attr+0x3d0/0x3d0 [ 177.623331][ T4555] __alloc_pages_nodemask+0x1c4/0x880 [ 177.629022][ T4555] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 177.634547][ T4555] ? kvmalloc_node+0x7e/0xf0 [ 177.639108][ T4555] push_pipe+0x3c5/0x7e0 [ 177.643321][ T4555] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 177.648923][ T4555] ? iov_iter_get_pages+0xec0/0xec0 [ 177.654098][ T4555] ? unix_stream_recvmsg+0x1e0/0x1e0 [ 177.659366][ T4555] default_file_splice_read+0x208/0x970 [ 177.664905][ T4555] ? sock_fasync+0xf0/0xf0 [ 177.669299][ T4555] ? __ia32_sys_tee+0xa0/0xa0 [ 177.673951][ T4555] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 177.680685][ T4555] ? selinux_file_permission+0x2d0/0x520 [ 177.686308][ T4555] ? security_file_permission+0x1e9/0x300 [ 177.692014][ T4555] ? __ia32_sys_tee+0xa0/0xa0 [ 177.696666][ T4555] splice_direct_to_actor+0x3f1/0xb30 [ 177.702017][ T4555] ? do_splice_direct+0x3e0/0x3e0 [ 177.707012][ T4555] ? pipe_to_sendpage+0x300/0x300 [ 177.712011][ T4555] ? security_file_permission+0x128/0x300 [ 177.717715][ T4555] do_splice_direct+0x28b/0x3e0 [ 177.722537][ T4555] ? splice_direct_to_actor+0xb30/0xb30 [ 177.728056][ T4555] ? security_file_permission+0x128/0x300 [ 177.733751][ T4555] do_sendfile+0x8e4/0x1140 [ 177.738234][ T4555] ? compat_writev+0x3c0/0x3c0 [ 177.742967][ T4555] ? vfs_write+0x422/0x4e0 [ 177.747357][ T4555] ? check_preemption_disabled+0x154/0x330 [ 177.753153][ T4555] __x64_sys_sendfile64+0x1c4/0x220 [ 177.758322][ T4555] ? __ia32_sys_sendfile+0x240/0x240 [ 177.763682][ T4555] do_syscall_64+0xcb/0x1e0 [ 177.768176][ T4555] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 177.774048][ T4555] RIP: 0033:0x466459 07:11:06 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) lsetxattr(&(0x7f0000000640)='./bus\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0xfc83}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00') recvfrom$unix(r0, &(0x7f00000007c0)=""/134, 0x86, 0x0, &(0x7f00000004c0)=@file={0x1, './bus\x00'}, 0x6e) getgid() mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000340)='overlay\x00', 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='lowerdir=./bus/file0,xino=off,index=off,upperdir=./bus,nfs_export=off,default_permissions,workdir=./bus/file0,metacopy=on,fsmagic=0x0000000000000005,fscontext=staff_u,defcontext=unconfined_u,smackfshat=,euid>', @ANYRESDEC=0x0, @ANYBLOB="2c6f626a5f747970653d636f6e6669676673012c00ad53787c0a1b5c60def006e1f555f9b0bf3f2e88d8a4bfac420457111079d0a41228e1"]) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) symlink(&(0x7f0000000540)='./file1\x00', &(0x7f0000000600)='./bus/file0\x00') mkdir(&(0x7f00000002c0)='./file1\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) chdir(&(0x7f00000001c0)='./bus\x00') lchown(&(0x7f00000003c0)='./bus/file0\x00', 0x0, 0xee00) 07:11:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x4d, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:11:06 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:11:06 executing program 4 (fault-call:2 fault-nth:56): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) [ 177.777919][ T4555] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 177.797492][ T4555] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 177.805876][ T4555] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 177.813818][ T4555] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 177.821763][ T4555] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 177.829760][ T4555] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 177.837842][ T4555] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 07:11:06 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0xa00) 07:11:06 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x6803, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:11:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x4e, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) [ 177.910039][ T4576] overlayfs: unrecognized mount option "fsmagic=0x0000000000000005" or missing value 07:11:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:11:06 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0xb00) 07:11:06 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x6e00, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 177.961997][ T4572] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 177.967218][ T4585] FAULT_INJECTION: forcing a failure. [ 177.967218][ T4585] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 177.986144][ T4572] incfs: Options parsing error. -22 [ 178.034230][ T4585] CPU: 1 PID: 4585 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 178.044659][ T4585] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 178.055219][ T4585] Call Trace: [ 178.058489][ T4585] dump_stack+0x1d8/0x24e [ 178.062798][ T4585] ? devkmsg_release+0x11c/0x11c [ 178.067976][ T4585] ? show_regs_print_info+0x12/0x12 [ 178.073159][ T4585] ? __kasan_kmalloc+0x1a3/0x1e0 [ 178.078083][ T4585] ? preempt_count_add+0x66/0x130 [ 178.083096][ T4585] ? prep_new_page+0x122/0x370 [ 178.087832][ T4585] should_fail+0x6f6/0x860 [ 178.092222][ T4585] ? setup_fault_attr+0x3d0/0x3d0 [ 178.097221][ T4585] __alloc_pages_nodemask+0x1c4/0x880 [ 178.102569][ T4585] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 178.108091][ T4585] ? kvmalloc_node+0x7e/0xf0 [ 178.112654][ T4585] push_pipe+0x3c5/0x7e0 [ 178.116890][ T4585] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 178.122603][ T4585] ? iov_iter_get_pages+0xec0/0xec0 [ 178.127773][ T4585] ? unix_stream_recvmsg+0x1e0/0x1e0 [ 178.133031][ T4585] default_file_splice_read+0x208/0x970 [ 178.138550][ T4585] ? sock_fasync+0xf0/0xf0 [ 178.142936][ T4585] ? __ia32_sys_tee+0xa0/0xa0 [ 178.147592][ T4585] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 178.154323][ T4585] ? selinux_file_permission+0x2d0/0x520 [ 178.160014][ T4585] ? security_file_permission+0x1e9/0x300 [ 178.165720][ T4585] ? __ia32_sys_tee+0xa0/0xa0 [ 178.170367][ T4585] splice_direct_to_actor+0x3f1/0xb30 [ 178.175730][ T4585] ? do_splice_direct+0x3e0/0x3e0 [ 178.180739][ T4585] ? pipe_to_sendpage+0x300/0x300 [ 178.185749][ T4585] ? security_file_permission+0x128/0x300 [ 178.191438][ T4585] do_splice_direct+0x28b/0x3e0 [ 178.196261][ T4585] ? splice_direct_to_actor+0xb30/0xb30 [ 178.202212][ T4585] ? security_file_permission+0x128/0x300 [ 178.207901][ T4585] do_sendfile+0x8e4/0x1140 [ 178.212375][ T4585] ? compat_writev+0x3c0/0x3c0 [ 178.217109][ T4585] ? vfs_write+0x422/0x4e0 [ 178.221499][ T4585] ? check_preemption_disabled+0x154/0x330 [ 178.227291][ T4585] __x64_sys_sendfile64+0x1c4/0x220 [ 178.232469][ T4585] ? __ia32_sys_sendfile+0x240/0x240 [ 178.237741][ T4585] do_syscall_64+0xcb/0x1e0 [ 178.242216][ T4585] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 178.248166][ T4585] RIP: 0033:0x466459 [ 178.252033][ T4585] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 178.271607][ T4585] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 07:11:06 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r2, 0x4004ae8b, &(0x7f0000000080)) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = dup3(r0, r1, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r5, &(0x7f00000000c0)=[{&(0x7f0000000140)=""/83, 0x53}, {&(0x7f00000001c0)=""/134, 0x86}, {&(0x7f0000000280)=""/31, 0x1f}, {&(0x7f0000000980)=""/4096, 0x1000}], 0x4, 0xd9f, 0x0) dup2(r4, r2) 07:11:06 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0xc00) 07:11:06 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:11:06 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x7201, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:11:06 executing program 4 (fault-call:2 fault-nth:57): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) [ 178.279985][ T4585] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 178.287929][ T4585] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 178.295873][ T4585] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 178.303815][ T4585] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 178.311758][ T4585] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 07:11:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:11:06 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0xd00) 07:11:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:11:06 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x7600, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 178.367556][ T4605] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 178.394435][ T4605] incfs: Options parsing error. -22 [ 178.402022][ T4616] FAULT_INJECTION: forcing a failure. [ 178.402022][ T4616] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 178.441057][ T4616] CPU: 1 PID: 4616 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 178.451209][ T4616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 178.461243][ T4616] Call Trace: [ 178.464514][ T4616] dump_stack+0x1d8/0x24e [ 178.468820][ T4616] ? devkmsg_release+0x11c/0x11c [ 178.473731][ T4616] ? show_regs_print_info+0x12/0x12 [ 178.478902][ T4616] ? __kasan_kmalloc+0x1a3/0x1e0 [ 178.483810][ T4616] ? preempt_count_add+0x66/0x130 [ 178.488807][ T4616] ? prep_new_page+0x122/0x370 [ 178.493544][ T4616] should_fail+0x6f6/0x860 [ 178.497932][ T4616] ? setup_fault_attr+0x3d0/0x3d0 [ 178.502943][ T4616] __alloc_pages_nodemask+0x1c4/0x880 [ 178.508312][ T4616] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 178.513831][ T4616] ? kvmalloc_node+0x7e/0xf0 [ 178.518911][ T4616] push_pipe+0x3c5/0x7e0 [ 178.523126][ T4616] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 178.528761][ T4616] ? iov_iter_get_pages+0xec0/0xec0 [ 178.533929][ T4616] ? unix_stream_recvmsg+0x1e0/0x1e0 [ 178.539184][ T4616] default_file_splice_read+0x208/0x970 [ 178.544701][ T4616] ? sock_fasync+0xf0/0xf0 [ 178.549088][ T4616] ? __ia32_sys_tee+0xa0/0xa0 [ 178.553739][ T4616] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 178.560473][ T4616] ? selinux_file_permission+0x2d0/0x520 [ 178.566077][ T4616] ? security_file_permission+0x1e9/0x300 [ 178.571767][ T4616] ? __ia32_sys_tee+0xa0/0xa0 [ 178.576413][ T4616] splice_direct_to_actor+0x3f1/0xb30 [ 178.581783][ T4616] ? do_splice_direct+0x3e0/0x3e0 [ 178.586777][ T4616] ? pipe_to_sendpage+0x300/0x300 [ 178.591771][ T4616] ? security_file_permission+0x128/0x300 [ 178.597462][ T4616] do_splice_direct+0x28b/0x3e0 [ 178.602285][ T4616] ? splice_direct_to_actor+0xb30/0xb30 [ 178.607800][ T4616] ? security_file_permission+0x128/0x300 [ 178.613489][ T4616] do_sendfile+0x8e4/0x1140 [ 178.617965][ T4616] ? compat_writev+0x3c0/0x3c0 [ 178.622699][ T4616] ? vfs_write+0x422/0x4e0 [ 178.627090][ T4616] ? check_preemption_disabled+0x154/0x330 [ 178.632867][ T4616] __x64_sys_sendfile64+0x1c4/0x220 [ 178.638036][ T4616] ? __ia32_sys_sendfile+0x240/0x240 [ 178.643291][ T4616] do_syscall_64+0xcb/0x1e0 [ 178.647768][ T4616] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 178.653645][ T4616] RIP: 0033:0x466459 [ 178.657530][ T4616] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 178.677128][ T4616] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 07:11:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0xe00) 07:11:07 executing program 4 (fault-call:2 fault-nth:58): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:11:07 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 178.686731][ T4616] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 178.694688][ T4616] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 178.702635][ T4616] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 178.710583][ T4616] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 178.718527][ T4616] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 [ 178.782554][ T4636] FAULT_INJECTION: forcing a failure. [ 178.782554][ T4636] name failslab, interval 1, probability 0, space 0, times 0 [ 178.807669][ T4636] CPU: 1 PID: 4636 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 178.817827][ T4636] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 178.827891][ T4636] Call Trace: [ 178.831165][ T4636] dump_stack+0x1d8/0x24e [ 178.835467][ T4636] ? devkmsg_release+0x11c/0x11c [ 178.840377][ T4636] ? show_regs_print_info+0x12/0x12 [ 178.845548][ T4636] ? stack_trace_save+0x120/0x1f0 [ 178.850545][ T4636] ? stack_trace_snprint+0x150/0x150 [ 178.855822][ T4636] should_fail+0x6f6/0x860 [ 178.860215][ T4636] ? setup_fault_attr+0x3d0/0x3d0 [ 178.865214][ T4636] ? __kasan_kmalloc+0x1a3/0x1e0 [ 178.870125][ T4636] ? preempt_count_add+0x66/0x130 [ 178.875124][ T4636] ? prep_new_page+0x122/0x370 [ 178.879861][ T4636] ? kmalloc_array+0x2b/0x40 [ 178.884425][ T4636] should_failslab+0x5/0x20 [ 178.888919][ T4636] __kmalloc+0x5f/0x2f0 [ 178.893046][ T4636] ? get_page_from_freelist+0x56c/0x890 [ 178.898580][ T4636] kmalloc_array+0x2b/0x40 [ 178.902971][ T4636] rw_copy_check_uvector+0xb1/0x2f0 [ 178.908228][ T4636] import_iovec+0x10d/0x380 [ 178.912702][ T4636] ? dup_iter+0x110/0x110 [ 178.917007][ T4636] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 178.922523][ T4636] vfs_readv+0x11d/0x1e0 [ 178.926738][ T4636] ? do_iter_write+0x570/0x570 [ 178.935208][ T4636] ? iov_iter_get_pages+0xec0/0xec0 [ 178.940378][ T4636] ? unix_stream_recvmsg+0x1e0/0x1e0 [ 178.945635][ T4636] default_file_splice_read+0x62b/0x970 [ 178.951155][ T4636] ? __ia32_sys_tee+0xa0/0xa0 [ 178.955810][ T4636] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 178.962542][ T4636] ? selinux_file_permission+0x2d0/0x520 [ 178.968147][ T4636] ? security_file_permission+0x1e9/0x300 [ 178.973835][ T4636] ? __ia32_sys_tee+0xa0/0xa0 [ 178.978483][ T4636] splice_direct_to_actor+0x3f1/0xb30 [ 178.983828][ T4636] ? do_splice_direct+0x3e0/0x3e0 [ 178.988821][ T4636] ? pipe_to_sendpage+0x300/0x300 [ 178.995379][ T4636] ? security_file_permission+0x128/0x300 [ 179.001068][ T4636] do_splice_direct+0x28b/0x3e0 [ 179.005892][ T4636] ? splice_direct_to_actor+0xb30/0xb30 [ 179.011415][ T4636] ? security_file_permission+0x128/0x300 [ 179.017106][ T4636] do_sendfile+0x8e4/0x1140 [ 179.021583][ T4636] ? compat_writev+0x3c0/0x3c0 [ 179.026318][ T4636] ? vfs_write+0x422/0x4e0 [ 179.030712][ T4636] ? check_preemption_disabled+0x154/0x330 [ 179.036488][ T4636] __x64_sys_sendfile64+0x1c4/0x220 [ 179.041658][ T4636] ? __ia32_sys_sendfile+0x240/0x240 [ 179.046914][ T4636] do_syscall_64+0xcb/0x1e0 [ 179.053127][ T4636] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 179.058995][ T4636] RIP: 0033:0x466459 [ 179.062863][ T4636] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 179.082453][ T4636] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 179.090834][ T4636] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 179.098777][ T4636] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 179.106721][ T4636] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 179.114679][ T4636] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 179.122622][ T4636] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 [ 179.143510][ T4642] incfs: Options parsing error. -22 [ 179.155514][ T4637] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 07:11:07 executing program 1: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:11:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:11:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x8c03, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:11:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x1100) 07:11:07 executing program 4 (fault-call:2 fault-nth:59): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:11:07 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:11:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x1200) 07:11:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:11:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x8e03, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:11:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x2300) [ 179.290142][ T4657] FAULT_INJECTION: forcing a failure. [ 179.290142][ T4657] name failslab, interval 1, probability 0, space 0, times 0 07:11:07 executing program 1: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:11:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x4000) 07:11:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x4800) 07:11:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x9601, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 179.342554][ T4666] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 179.345891][ T4657] CPU: 1 PID: 4657 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 179.361561][ T4657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 179.371605][ T4657] Call Trace: [ 179.374892][ T4657] dump_stack+0x1d8/0x24e [ 179.379248][ T4657] ? devkmsg_release+0x11c/0x11c [ 179.384178][ T4657] ? show_regs_print_info+0x12/0x12 07:11:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x4c00) [ 179.389372][ T4657] ? refcount_add_not_zero_checked+0x18b/0x250 [ 179.395518][ T4657] ? selinux_socket_getpeersec_stream+0x3c0/0x3c0 [ 179.401925][ T4657] ? asan.module_dtor+0x20/0x20 [ 179.406764][ T4657] should_fail+0x6f6/0x860 [ 179.411168][ T4657] ? setup_fault_attr+0x3d0/0x3d0 [ 179.416194][ T4657] ? unix_stream_sendpage+0x106a/0x12d0 [ 179.421736][ T4657] ? kvmalloc_node+0x7e/0xf0 [ 179.426319][ T4657] should_failslab+0x5/0x20 [ 179.430899][ T4657] __kmalloc+0x5f/0x2f0 [ 179.435063][ T4657] kvmalloc_node+0x7e/0xf0 07:11:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x6800) [ 179.439483][ T4657] iov_iter_get_pages_alloc+0xb7f/0x1070 [ 179.445110][ T4657] ? iov_iter_get_pages+0xec0/0xec0 [ 179.450298][ T4657] ? unix_stream_recvmsg+0x1e0/0x1e0 [ 179.455584][ T4657] default_file_splice_read+0x208/0x970 [ 179.461118][ T4657] ? sock_fasync+0xf0/0xf0 [ 179.465529][ T4657] ? __ia32_sys_tee+0xa0/0xa0 [ 179.470200][ T4657] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 179.476984][ T4657] ? selinux_file_permission+0x2d0/0x520 [ 179.482613][ T4657] ? security_file_permission+0x1e9/0x300 [ 179.488324][ T4657] ? __ia32_sys_tee+0xa0/0xa0 [ 179.492995][ T4657] splice_direct_to_actor+0x3f1/0xb30 [ 179.498359][ T4657] ? do_splice_direct+0x3e0/0x3e0 [ 179.503374][ T4657] ? pipe_to_sendpage+0x300/0x300 [ 179.508397][ T4657] ? security_file_permission+0x128/0x300 [ 179.514113][ T4657] do_splice_direct+0x28b/0x3e0 [ 179.518957][ T4657] ? splice_direct_to_actor+0xb30/0xb30 [ 179.524493][ T4657] ? security_file_permission+0x128/0x300 [ 179.530204][ T4657] do_sendfile+0x8e4/0x1140 [ 179.534703][ T4657] ? compat_writev+0x3c0/0x3c0 [ 179.539460][ T4657] ? vfs_write+0x422/0x4e0 [ 179.543871][ T4657] ? check_preemption_disabled+0x154/0x330 [ 179.549658][ T4657] __x64_sys_sendfile64+0x1c4/0x220 [ 179.554828][ T4657] ? __ia32_sys_sendfile+0x240/0x240 [ 179.560086][ T4657] do_syscall_64+0xcb/0x1e0 [ 179.564611][ T4657] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 179.570736][ T4657] RIP: 0033:0x466459 07:11:08 executing program 4 (fault-call:2 fault-nth:60): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:11:08 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:11:08 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x6c00) 07:11:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x9802, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:11:08 executing program 1: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:11:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) [ 179.574602][ T4657] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 179.594179][ T4657] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 179.602565][ T4657] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 179.610525][ T4657] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 179.618484][ T4657] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 179.626433][ T4657] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 179.634379][ T4657] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 07:11:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:11:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=ANY=[@ANYBLOB="28000000100001080000000000005c5400000000", @ANYRES32=0x0, @ANYBLOB="000000a0fb4e000008001b"], 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f0000000500)='system.posix_acl_access\x00', &(0x7f00000005c0)={{}, {0x1, 0x2}, [{}, {0x2, 0x2}, {0x2, 0x5, 0xee01}, {0x2, 0x4}, {0x2, 0x1, 0xffffffffffffffff}, {0x2, 0x3}, {0x2, 0x2, 0xffffffffffffffff}, {0x2, 0x4}], {0x4, 0x6}, [{0x8, 0x7, 0xee01}, {0x8, 0x4, 0xee00}, {0x8, 0x2, 0xffffffffffffffff}, {0x8, 0x4, 0xffffffffffffffff}, {}, {0x8, 0x4, 0xee00}], {}, {0x20, 0x2}}, 0x94, 0x1) mount(&(0x7f0000000580)=ANY=[@ANYBLOB="69e85afc7a04ea65f54791cf81032052000000"], &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='iso9660\x00', 0x800, 0x0) sendmsg$nl_route(r0, &(0x7f0000000680)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0}, 0x800) ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x4070aea0, &(0x7f0000000440)={[{0x9, 0x0, 0x4, 0xc2, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0xe2, 0x3, 0x5}, {0x3, 0x0, 0x0, 0x8, 0xa9, 0x6, 0x0, 0x15, 0x0, 0x7, 0x74, 0x8, 0x81}, {0x0, 0x0, 0x7, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}]}) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x0, 0x0, 0x2000, &(0x7f00004af000/0x2000)=nil}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, &(0x7f0000000080)='./file0\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$vcsa(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000003c0)='reno\x00', 0x5) add_key$keyring(0x0, &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="3000000010000108000800"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=0x0, @ANYBLOB="08001b00"], 0x30}}, 0x0) arch_prctl$ARCH_SET_GS(0x1001, &(0x7f0000000080)) r2 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000000)="5500000018007f5f0cfe07b2a49b90930206040200101301041614053900090035000c07140000001900054002600055060022dc131a014883139b84134ef75adb83de4411000b007d7d404bf790205481f6370e2e", 0x55}], 0x1, 0x0, 0x0, 0xf000000}, 0x0) 07:11:08 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x7400) 07:11:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x9c02, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 179.719772][ T4710] FAULT_INJECTION: forcing a failure. [ 179.719772][ T4710] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 179.752185][ T4710] CPU: 1 PID: 4710 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 07:11:08 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x7a00) [ 179.762353][ T4710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 179.772404][ T4710] Call Trace: [ 179.775692][ T4710] dump_stack+0x1d8/0x24e [ 179.780016][ T4710] ? devkmsg_release+0x11c/0x11c [ 179.784950][ T4710] ? show_regs_print_info+0x12/0x12 [ 179.790134][ T4710] ? __kasan_kmalloc+0x1a3/0x1e0 [ 179.795065][ T4710] ? __kmalloc+0x174/0x2f0 [ 179.799505][ T4710] ? kvmalloc_node+0x7e/0xf0 [ 179.804112][ T4710] ? iov_iter_get_pages_alloc+0xb7f/0x1070 [ 179.809910][ T4710] ? default_file_splice_read+0x208/0x970 [ 179.815621][ T4710] should_fail+0x6f6/0x860 [ 179.817276][ T4716] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 179.820030][ T4710] ? setup_fault_attr+0x3d0/0x3d0 [ 179.820043][ T4710] __alloc_pages_nodemask+0x1c4/0x880 [ 179.820059][ T4710] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 179.844887][ T4710] ? kvmalloc_node+0x7e/0xf0 [ 179.849470][ T4710] push_pipe+0x3c5/0x7e0 [ 179.853704][ T4710] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 179.859327][ T4710] ? iov_iter_get_pages+0xec0/0xec0 [ 179.864658][ T4710] ? unix_stream_recvmsg+0x1e0/0x1e0 07:11:08 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x100000) [ 179.869936][ T4710] default_file_splice_read+0x208/0x970 [ 179.875472][ T4710] ? sock_fasync+0xf0/0xf0 [ 179.879885][ T4710] ? __ia32_sys_tee+0xa0/0xa0 [ 179.882964][ T4734] device bridge_slave_0 left promiscuous mode [ 179.884580][ T4710] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 179.884591][ T4710] ? selinux_file_permission+0x2d0/0x520 [ 179.884601][ T4710] ? security_file_permission+0x1e9/0x300 [ 179.884610][ T4710] ? __ia32_sys_tee+0xa0/0xa0 [ 179.884623][ T4710] splice_direct_to_actor+0x3f1/0xb30 [ 179.899762][ T4734] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.903016][ T4710] ? do_splice_direct+0x3e0/0x3e0 [ 179.903024][ T4710] ? pipe_to_sendpage+0x300/0x300 [ 179.903034][ T4710] ? security_file_permission+0x128/0x300 [ 179.903048][ T4710] do_splice_direct+0x28b/0x3e0 [ 179.946370][ T4710] ? splice_direct_to_actor+0xb30/0xb30 [ 179.951994][ T4710] ? security_file_permission+0x128/0x300 [ 179.957704][ T4710] do_sendfile+0x8e4/0x1140 [ 179.962207][ T4710] ? compat_writev+0x3c0/0x3c0 [ 179.967058][ T4710] ? debug_smp_processor_id+0x20/0x20 [ 179.972443][ T4710] __x64_sys_sendfile64+0x1c4/0x220 [ 179.977633][ T4710] ? __ia32_sys_sendfile+0x240/0x240 [ 179.982909][ T4710] do_syscall_64+0xcb/0x1e0 [ 179.987388][ T4710] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 179.993301][ T4710] RIP: 0033:0x466459 [ 179.997272][ T4710] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 07:11:08 executing program 4 (fault-call:2 fault-nth:61): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) [ 180.016861][ T4710] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 180.025248][ T4710] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 180.033188][ T4710] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 180.041260][ T4710] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 180.049205][ T4710] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 180.057148][ T4710] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 [ 180.070929][ T4734] device bridge_slave_1 left promiscuous mode [ 180.082683][ T4734] bridge0: port 2(bridge_slave_1) entered disabled state [ 180.092314][ T4748] FAULT_INJECTION: forcing a failure. [ 180.092314][ T4748] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 180.107164][ T4748] CPU: 0 PID: 4748 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 07:11:08 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000140)='incremental-fs\x00', 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:11:08 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x1000000) 07:11:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0xa003, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:11:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) [ 180.117397][ T4748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 180.127441][ T4748] Call Trace: [ 180.130727][ T4748] dump_stack+0x1d8/0x24e [ 180.135054][ T4748] ? devkmsg_release+0x11c/0x11c [ 180.139984][ T4748] ? show_regs_print_info+0x12/0x12 [ 180.145172][ T4748] ? __kasan_kmalloc+0x1a3/0x1e0 [ 180.146494][ C1] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 180.150098][ T4748] ? preempt_count_add+0x66/0x130 [ 180.162551][ T4748] ? prep_new_page+0x122/0x370 [ 180.167303][ T4748] should_fail+0x6f6/0x860 07:11:08 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x2000000) 07:11:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0xa402, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 180.171712][ T4748] ? setup_fault_attr+0x3d0/0x3d0 [ 180.176732][ T4748] __alloc_pages_nodemask+0x1c4/0x880 [ 180.182095][ T4748] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 180.187631][ T4748] ? kvmalloc_node+0x7e/0xf0 [ 180.192214][ T4748] push_pipe+0x3c5/0x7e0 [ 180.196449][ T4748] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 180.202076][ T4748] ? iov_iter_get_pages+0xec0/0xec0 [ 180.207269][ T4748] ? unix_stream_recvmsg+0x1e0/0x1e0 [ 180.212551][ T4748] default_file_splice_read+0x208/0x970 [ 180.218086][ T4748] ? sock_fasync+0xf0/0xf0 [ 180.222494][ T4748] ? __ia32_sys_tee+0xa0/0xa0 [ 180.227171][ T4748] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 180.233922][ T4748] ? selinux_file_permission+0x2d0/0x520 [ 180.239547][ T4748] ? security_file_permission+0x1e9/0x300 [ 180.245256][ T4748] ? __ia32_sys_tee+0xa0/0xa0 [ 180.250034][ T4748] splice_direct_to_actor+0x3f1/0xb30 [ 180.255384][ T4748] ? do_splice_direct+0x3e0/0x3e0 [ 180.260383][ T4748] ? pipe_to_sendpage+0x300/0x300 [ 180.265380][ T4748] ? security_file_permission+0x128/0x300 [ 180.271074][ T4748] do_splice_direct+0x28b/0x3e0 [ 180.275918][ T4748] ? splice_direct_to_actor+0xb30/0xb30 [ 180.281439][ T4748] ? security_file_permission+0x128/0x300 [ 180.287130][ T4748] do_sendfile+0x8e4/0x1140 [ 180.291606][ T4748] ? compat_writev+0x3c0/0x3c0 [ 180.296339][ T4748] ? vfs_write+0x422/0x4e0 [ 180.300727][ T4748] ? check_preemption_disabled+0x154/0x330 [ 180.306502][ T4748] __x64_sys_sendfile64+0x1c4/0x220 [ 180.311683][ T4748] ? __ia32_sys_sendfile+0x240/0x240 [ 180.316937][ T4748] do_syscall_64+0xcb/0x1e0 [ 180.321414][ T4748] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 180.327274][ T4748] RIP: 0033:0x466459 [ 180.331141][ T4748] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 180.350715][ T4748] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 180.359182][ T4748] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 180.367122][ T4748] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 180.375062][ T4748] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 180.383002][ T4748] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 180.390945][ T4748] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 07:11:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2801001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x0, 0x2, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000300)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='vfat\x00') listxattr(0x0, &(0x7f0000000d00)=""/165, 0xa5) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000240)={0x1, 'veth1_to_batadv\x00'}) write$binfmt_misc(r2, &(0x7f0000002440)=ANY=[@ANYBLOB="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"], 0x1004) pivot_root(&(0x7f0000000280)='./file0\x00', &(0x7f0000000200)='./file0\x00') r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000440)={&(0x7f0000000340), 0xc, &(0x7f0000000400)={&(0x7f0000000380)=@ipv6_newaddr={0x68, 0x14, 0x0, 0x70bd28, 0x25dfdbfb, {0xa, 0x78, 0x2, 0xc8}, [@IFA_CACHEINFO={0x14, 0x6, {0x1, 0x2, 0x20}}, @IFA_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, [], 0x1}}, @IFA_CACHEINFO={0x14, 0x6, {0xfffffffe, 0xf2c, 0x401, 0x74}}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x0, 0x8, 0x3f}}]}, 0x68}, 0x1, 0x0, 0x0, 0x4080001}, 0x20000000) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18020000000000000000000000000020850000002c0000009500000000000000", @ANYRES64], &(0x7f00000000c0)='GPL\x00', 0x0, 0x100a, &(0x7f0000001400)=""/4106, 0x41000, 0x8, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) dup3(0xffffffffffffffff, r4, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newlink={0x34, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8, 0x1, r4}]}, @IFLA_GROUP={0x8}]}, 0x34}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x11, 0x4, 0x6, 0x2, 0x1000}, 0x40) 07:11:08 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x3000000) 07:11:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0xa602, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:11:08 executing program 4 (fault-call:2 fault-nth:62): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:11:08 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:11:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:11:09 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x4000000) 07:11:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0xb501, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 180.442227][ T4756] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 180.476943][ T4726] tipc: Resetting bearer 07:11:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:11:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0xba02, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 180.540080][ T4795] FAULT_INJECTION: forcing a failure. [ 180.540080][ T4795] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 180.560613][ T4794] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 180.575060][ T4797] device lo entered promiscuous mode [ 180.590765][ T4797] Y­4`Ò˜: renamed from lo [ 180.600949][ T4795] CPU: 1 PID: 4795 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 180.611099][ T4795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 180.621131][ T4795] Call Trace: [ 180.624401][ T4795] dump_stack+0x1d8/0x24e [ 180.628704][ T4795] ? devkmsg_release+0x11c/0x11c [ 180.633611][ T4795] ? show_regs_print_info+0x12/0x12 [ 180.638776][ T4795] ? __kasan_kmalloc+0x1a3/0x1e0 [ 180.643701][ T4795] ? preempt_count_add+0x66/0x130 [ 180.648697][ T4795] ? prep_new_page+0x122/0x370 [ 180.653445][ T4795] should_fail+0x6f6/0x860 [ 180.657830][ T4795] ? setup_fault_attr+0x3d0/0x3d0 [ 180.662824][ T4795] __alloc_pages_nodemask+0x1c4/0x880 [ 180.668179][ T4795] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 180.673698][ T4795] ? kvmalloc_node+0x7e/0xf0 [ 180.678270][ T4795] ? kvmalloc_node+0x7e/0xf0 [ 180.682833][ T4795] push_pipe+0x3c5/0x7e0 [ 180.687052][ T4795] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 180.692656][ T4795] ? iov_iter_get_pages+0xec0/0xec0 [ 180.697836][ T4795] ? unix_stream_recvmsg+0x1e0/0x1e0 [ 180.703095][ T4795] default_file_splice_read+0x208/0x970 [ 180.708611][ T4795] ? sock_fasync+0xf0/0xf0 [ 180.712999][ T4795] ? __ia32_sys_tee+0xa0/0xa0 [ 180.717651][ T4795] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 180.724382][ T4795] ? selinux_file_permission+0x2d0/0x520 [ 180.729984][ T4795] ? security_file_permission+0x1e9/0x300 [ 180.735683][ T4795] ? __ia32_sys_tee+0xa0/0xa0 [ 180.740328][ T4795] splice_direct_to_actor+0x3f1/0xb30 [ 180.745671][ T4795] ? do_splice_direct+0x3e0/0x3e0 [ 180.750663][ T4795] ? pipe_to_sendpage+0x300/0x300 [ 180.755655][ T4795] ? security_file_permission+0x128/0x300 [ 180.761341][ T4795] do_splice_direct+0x28b/0x3e0 [ 180.766161][ T4795] ? splice_direct_to_actor+0xb30/0xb30 [ 180.771675][ T4795] ? security_file_permission+0x128/0x300 [ 180.777373][ T4795] do_sendfile+0x8e4/0x1140 [ 180.781846][ T4795] ? compat_writev+0x3c0/0x3c0 [ 180.786579][ T4795] ? vfs_write+0x422/0x4e0 [ 180.790979][ T4795] ? check_preemption_disabled+0x154/0x330 [ 180.796754][ T4795] __x64_sys_sendfile64+0x1c4/0x220 [ 180.801920][ T4795] ? __ia32_sys_sendfile+0x240/0x240 [ 180.807174][ T4795] do_syscall_64+0xcb/0x1e0 [ 180.811653][ T4795] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 180.817515][ T4795] RIP: 0033:0x466459 [ 180.821391][ T4795] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 07:11:09 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x5000000) 07:11:09 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x6000000) [ 180.840971][ T4795] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 180.849354][ T4795] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 180.857295][ T4795] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 180.865237][ T4795] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 180.873200][ T4795] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 180.881143][ T4795] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 07:11:09 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x4000000) 07:11:09 executing program 4 (fault-call:2 fault-nth:63): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:11:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:11:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0xbc03, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:11:09 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 181.015956][ T4825] FAULT_INJECTION: forcing a failure. [ 181.015956][ T4825] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 181.030769][ T4825] CPU: 0 PID: 4825 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 181.040920][ T4825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 181.050964][ T4825] Call Trace: [ 181.054247][ T4825] dump_stack+0x1d8/0x24e [ 181.058567][ T4825] ? devkmsg_release+0x11c/0x11c [ 181.063490][ T4825] ? show_regs_print_info+0x12/0x12 [ 181.068660][ T4825] ? __kasan_kmalloc+0x1a3/0x1e0 [ 181.073567][ T4825] ? preempt_count_add+0x66/0x130 [ 181.078562][ T4825] ? prep_new_page+0x122/0x370 [ 181.083295][ T4825] should_fail+0x6f6/0x860 [ 181.087683][ T4825] ? setup_fault_attr+0x3d0/0x3d0 [ 181.092678][ T4825] __alloc_pages_nodemask+0x1c4/0x880 [ 181.098020][ T4825] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 181.103538][ T4825] ? kvmalloc_node+0x7e/0xf0 [ 181.108097][ T4825] push_pipe+0x3c5/0x7e0 [ 181.112309][ T4825] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 181.117924][ T4825] ? iov_iter_get_pages+0xec0/0xec0 [ 181.123092][ T4825] ? unix_stream_recvmsg+0x1e0/0x1e0 [ 181.128433][ T4825] default_file_splice_read+0x208/0x970 [ 181.133946][ T4825] ? sock_fasync+0xf0/0xf0 [ 181.138334][ T4825] ? __ia32_sys_tee+0xa0/0xa0 [ 181.142983][ T4825] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 181.149712][ T4825] ? selinux_file_permission+0x2d0/0x520 [ 181.155316][ T4825] ? security_file_permission+0x1e9/0x300 [ 181.161003][ T4825] ? __ia32_sys_tee+0xa0/0xa0 [ 181.165647][ T4825] splice_direct_to_actor+0x3f1/0xb30 [ 181.170990][ T4825] ? do_splice_direct+0x3e0/0x3e0 [ 181.175984][ T4825] ? pipe_to_sendpage+0x300/0x300 [ 181.180980][ T4825] ? security_file_permission+0x128/0x300 [ 181.186668][ T4825] do_splice_direct+0x28b/0x3e0 [ 181.191488][ T4825] ? splice_direct_to_actor+0xb30/0xb30 [ 181.197002][ T4825] ? security_file_permission+0x128/0x300 [ 181.202688][ T4825] do_sendfile+0x8e4/0x1140 [ 181.207164][ T4825] ? compat_writev+0x3c0/0x3c0 [ 181.211897][ T4825] ? vfs_write+0x422/0x4e0 [ 181.216287][ T4825] ? check_preemption_disabled+0x154/0x330 [ 181.222073][ T4825] __x64_sys_sendfile64+0x1c4/0x220 [ 181.227241][ T4825] ? __ia32_sys_sendfile+0x240/0x240 [ 181.232493][ T4825] do_syscall_64+0xcb/0x1e0 [ 181.236980][ T4825] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 181.242929][ T4825] RIP: 0033:0x466459 [ 181.246796][ T4825] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 07:11:09 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x7000000) 07:11:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0xc203, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:11:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8, 0x0, {0xffffffff00000000}}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) [ 181.266366][ T4825] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 181.274743][ T4825] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 181.282684][ T4825] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 181.290639][ T4825] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 181.298578][ T4825] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 181.306536][ T4825] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 07:11:09 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x4000000) 07:11:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0xd200, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:11:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8, 0x0, {0x0, 0xffffffff00000000}}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:11:09 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x8000000) 07:11:09 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x4000000) [ 181.337702][ T2670] tipc: Disabling bearer [ 181.355116][ T2670] tipc: Left network mode 07:11:10 executing program 4 (fault-call:2 fault-nth:64): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:11:10 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0xd203, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:11:10 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x9000000) 07:11:10 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:11:10 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x4080, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 181.698834][ T4831] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 07:11:10 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0xd801, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:11:10 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:11:10 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0xa000000) 07:11:10 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0xde03, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 181.810508][ T4872] FAULT_INJECTION: forcing a failure. [ 181.810508][ T4872] name fail_page_alloc, interval 1, probability 0, space 0, times 0 07:11:10 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0xb000000) 07:11:10 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0xc000000) [ 181.856386][ T4874] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 181.874363][ T4872] CPU: 0 PID: 4872 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 181.884519][ T4872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 181.894565][ T4872] Call Trace: [ 181.897880][ T4872] dump_stack+0x1d8/0x24e [ 181.902201][ T4872] ? devkmsg_release+0x11c/0x11c [ 181.907143][ T4872] ? show_regs_print_info+0x12/0x12 [ 181.912329][ T4872] ? __kasan_kmalloc+0x1a3/0x1e0 [ 181.917254][ T4872] ? preempt_count_add+0x66/0x130 [ 181.922266][ T4872] ? prep_new_page+0x122/0x370 [ 181.927016][ T4872] should_fail+0x6f6/0x860 [ 181.931424][ T4872] ? setup_fault_attr+0x3d0/0x3d0 [ 181.936438][ T4872] __alloc_pages_nodemask+0x1c4/0x880 [ 181.941811][ T4872] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 181.947345][ T4872] ? kvmalloc_node+0x7e/0xf0 [ 181.951921][ T4872] push_pipe+0x3c5/0x7e0 [ 181.956150][ T4872] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 181.961762][ T4872] ? iov_iter_get_pages+0xec0/0xec0 [ 181.966945][ T4872] ? unix_stream_recvmsg+0x1e0/0x1e0 [ 181.972217][ T4872] default_file_splice_read+0x208/0x970 [ 181.977745][ T4872] ? sock_fasync+0xf0/0xf0 [ 181.982145][ T4872] ? __ia32_sys_tee+0xa0/0xa0 [ 181.986810][ T4872] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 181.993559][ T4872] ? selinux_file_permission+0x2d0/0x520 [ 181.999180][ T4872] ? security_file_permission+0x1e9/0x300 [ 182.004888][ T4872] ? __ia32_sys_tee+0xa0/0xa0 [ 182.009556][ T4872] splice_direct_to_actor+0x3f1/0xb30 [ 182.015088][ T4872] ? do_splice_direct+0x3e0/0x3e0 [ 182.020096][ T4872] ? pipe_to_sendpage+0x300/0x300 [ 182.025109][ T4872] ? security_file_permission+0x128/0x300 [ 182.030823][ T4872] do_splice_direct+0x28b/0x3e0 [ 182.035672][ T4872] ? splice_direct_to_actor+0xb30/0xb30 [ 182.041208][ T4872] ? security_file_permission+0x128/0x300 [ 182.046912][ T4872] do_sendfile+0x8e4/0x1140 [ 182.051405][ T4872] ? compat_writev+0x3c0/0x3c0 [ 182.056150][ T4872] ? vfs_write+0x422/0x4e0 [ 182.060556][ T4872] ? check_preemption_disabled+0x154/0x330 [ 182.066348][ T4872] __x64_sys_sendfile64+0x1c4/0x220 [ 182.071530][ T4872] ? __ia32_sys_sendfile+0x240/0x240 [ 182.076801][ T4872] do_syscall_64+0xcb/0x1e0 [ 182.081299][ T4872] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 182.087173][ T4872] RIP: 0033:0x466459 [ 182.091401][ T4872] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 182.110995][ T4872] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 182.119394][ T4872] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 182.127352][ T4872] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 182.135311][ T4872] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 182.143269][ T4872] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 182.151312][ T4872] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 [ 183.324662][ T4903] cgroup1: Unknown subsys name 'perf_event' [ 183.330773][ T4903] cgroup1: Unknown subsys name 'net_cls' [ 183.368058][ T4903] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.375075][ T4903] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.382780][ T4903] device bridge_slave_0 entered promiscuous mode [ 183.390000][ T4903] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.397299][ T4903] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.404586][ T4903] device bridge_slave_1 entered promiscuous mode [ 183.441553][ T4903] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.448587][ T4903] bridge0: port 2(bridge_slave_1) entered forwarding state [ 183.455799][ T4903] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.462813][ T4903] bridge0: port 1(bridge_slave_0) entered forwarding state [ 183.483447][ T977] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 183.490963][ T977] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.499062][ T977] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.508573][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 183.517083][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 183.525158][ T832] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.532182][ T832] bridge0: port 1(bridge_slave_0) entered forwarding state [ 183.546301][ T977] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 183.554638][ T977] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 183.563089][ T977] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.570131][ T977] bridge0: port 2(bridge_slave_1) entered forwarding state [ 183.577465][ T977] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 183.585422][ T977] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 183.593371][ T977] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 183.601446][ T977] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 183.615424][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 183.623920][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 183.635151][ T977] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 183.644124][ T977] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 183.657383][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 183.665507][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 183.681389][ T117] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready 07:11:12 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:11:12 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0xd000000) 07:11:12 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0xf600, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:11:12 executing program 4 (fault-call:2 fault-nth:65): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:11:12 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:11:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:11:12 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0xe000000) [ 183.690075][ T117] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 183.698607][ T117] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 183.706935][ T117] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 07:11:12 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)={0x74, 0x0, 0x1, 0x40b, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @loopback=0x7f00000a}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_NAT_DST={0x10, 0xd, 0x0, 0x1, [@CTA_NAT_PROTO={0xc, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}]}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @private}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}]}, 0x74}}, 0x0) r1 = accept4(r0, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, &(0x7f0000000080)=0x80, 0x800) sendmsg$NFQNL_MSG_CONFIG(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x2, 0x3, 0x801, 0x0, 0x0, {0x7, 0x0, 0x3}, [@NFQA_CFG_CMD={0x8, 0x1, {0x2, 0x0, 0x1a}}, @NFQA_CFG_CMD={0x8, 0x1, {0x4, 0x0, 0x6}}, @NFQA_CFG_PARAMS={0x9, 0x2, {0x81, 0x5}}]}, 0x30}, 0x1, 0x0, 0x0, 0x40845}, 0x4000800) 07:11:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:11:12 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0xf803, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:11:12 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x10000000) [ 183.761760][ T4917] FAULT_INJECTION: forcing a failure. [ 183.761760][ T4917] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 183.770934][ T4915] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 183.822583][ T4915] incfs: Options parsing error. -22 [ 183.826887][ T4917] CPU: 0 PID: 4917 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 183.838013][ T4917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 183.848055][ T4917] Call Trace: [ 183.851337][ T4917] dump_stack+0x1d8/0x24e [ 183.855641][ T4917] ? devkmsg_release+0x11c/0x11c [ 183.860566][ T4917] ? show_regs_print_info+0x12/0x12 [ 183.865737][ T4917] ? __kasan_kmalloc+0x1a3/0x1e0 [ 183.870648][ T4917] ? preempt_count_add+0x66/0x130 [ 183.875658][ T4917] ? prep_new_page+0x122/0x370 [ 183.880398][ T4917] should_fail+0x6f6/0x860 [ 183.884874][ T4917] ? setup_fault_attr+0x3d0/0x3d0 [ 183.889885][ T4917] __alloc_pages_nodemask+0x1c4/0x880 [ 183.895229][ T4917] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 183.900749][ T4917] ? kvmalloc_node+0x7e/0xf0 [ 183.905307][ T4917] push_pipe+0x3c5/0x7e0 [ 183.909519][ T4917] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 183.915121][ T4917] ? iov_iter_get_pages+0xec0/0xec0 [ 183.920288][ T4917] ? unix_stream_recvmsg+0x1e0/0x1e0 [ 183.925542][ T4917] default_file_splice_read+0x208/0x970 [ 183.931058][ T4917] ? sock_fasync+0xf0/0xf0 [ 183.935442][ T4917] ? __ia32_sys_tee+0xa0/0xa0 [ 183.940107][ T4917] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 183.946839][ T4917] ? selinux_file_permission+0x2d0/0x520 [ 183.952441][ T4917] ? security_file_permission+0x1e9/0x300 [ 183.958125][ T4917] ? __ia32_sys_tee+0xa0/0xa0 [ 183.962779][ T4917] splice_direct_to_actor+0x3f1/0xb30 [ 183.968122][ T4917] ? do_splice_direct+0x3e0/0x3e0 [ 183.973113][ T4917] ? pipe_to_sendpage+0x300/0x300 [ 183.978105][ T4917] ? security_file_permission+0x128/0x300 [ 183.983802][ T4917] do_splice_direct+0x28b/0x3e0 [ 183.988625][ T4917] ? splice_direct_to_actor+0xb30/0xb30 [ 183.994226][ T4917] ? security_file_permission+0x128/0x300 [ 183.999914][ T4917] do_sendfile+0x8e4/0x1140 [ 184.004390][ T4917] ? compat_writev+0x3c0/0x3c0 [ 184.009123][ T4917] ? vfs_write+0x422/0x4e0 [ 184.013509][ T4917] ? check_preemption_disabled+0x154/0x330 [ 184.019282][ T4917] __x64_sys_sendfile64+0x1c4/0x220 [ 184.024448][ T4917] ? __ia32_sys_sendfile+0x240/0x240 [ 184.029704][ T4917] do_syscall_64+0xcb/0x1e0 [ 184.034177][ T4917] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 184.040037][ T4917] RIP: 0033:0x466459 [ 184.043903][ T4917] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 184.063490][ T4917] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 07:11:12 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0xfa02, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:11:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:11:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0xe7d0f04c95b282fa) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f00000001c0)={0x2, 0xfffffad5, 0x5, 0x6, 0x0, "5f69c6b592caa63a7f5329b3d8b6d70bf497f8"}) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0x9, 0x0, 0x1, 0x81, 0x0, 0x1, 0x7f847497fb804570, 0xc, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7, 0x4, @perf_config_ext={0x100000001, 0x7}, 0x0, 0x9, 0x5, 0x0, 0x7, 0x7, 0x9}, r2, 0x4, 0xffffffffffffffff, 0x9) preadv(0xffffffffffffffff, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x44, 0xffffffffffffffc0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x6, 0x5, 0xbb, 0x0, 0x0, 0x0, 0x28840, 0xf, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x4, @perf_config_ext={0x8, 0x9}, 0x8000, 0x100, 0x800, 0x2, 0x10001, 0x8, 0x800}, r2, 0x11, r1, 0x0) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000500)) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_DISALLOCATE(r3, 0x5608) ptrace$setopts(0xffffffffffffffff, 0x0, 0x4, 0x8) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$binfmt_script(r4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x191) close(r4) ioctl$GIO_UNIMAP(r3, 0x4b67, &(0x7f0000000080)={0x3e7f, &(0x7f0000000040)}) 07:11:12 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x12000, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 184.071870][ T4917] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 184.079809][ T4917] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 184.087749][ T4917] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 184.095693][ T4917] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 184.103633][ T4917] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 07:11:12 executing program 4 (fault-call:2 fault-nth:66): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:11:12 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:11:12 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x11000000) 07:11:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:11:12 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x3ffff, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:11:12 executing program 1: read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020}, 0x2020) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pivot_root(&(0x7f0000002040)='./file0\x00', &(0x7f0000002140)='./file0/file0\x00') connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) syz_emit_ethernet(0xc3a, &(0x7f00000021c0)={@broadcast, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "d64d4d", 0xc04, 0x3a, 0x0, @initdev={0xfe, 0x88, [0x0, 0x2], 0x0, 0x0}, @mcast2, {[], @dest_unreach={0x2, 0x0, 0x0, 0x0, [0x0, 0xff], {0x0, 0x6, '$\x00@', 0x0, 0x3a, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x16]}, @loopback, [@hopopts={0x57, 0x0, [], [@pad1]}, @hopopts={0x1d, 0x16c, [], [@jumbo, @generic={0x0, 0xb52, "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"}, @ra={0x5, 0x2, 0x1}, @pad1, @ra={0x5, 0x2, 0x95}]}], "050c68deb1caadea7302940adb40ce448fba3b17c34efcef90cbe04cd6df764e6b41c416040000005d0000759bb4875ce52a706caea6e219cf15fe4449fde5f40ddf00b247e03376977b88a6615b16f46424ac9c"}}}}}}}, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000040)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffff0606040000000000000000", 0x39}], 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0xc0045878, 0x0) fsetxattr$trusted_overlay_upper(r2, 0x0, &(0x7f0000002080)=ANY=[@ANYBLOB="00fbb204f8e0b610e82c5968b87ea9d69380544fb08feb14d7db908ad00249a6f72952eba1a068710cc4173adb56a40bcfca5c9faeaf5f4fd80ff58d8f40f2c09afeb1e66dac896ce8e8842c734389d9d71140bbe4d6fd2d383a1f0c2dcbd0cf7de3cf442de97cbb397a61823ca7483f6fa454d44afbdaccd1be4f8e4aaaaf15d1498d82f4faf3725cc9369a02392a672ed5bbb8fd904736143f97cd387860f6a88d0f86e157a922dde1d0870c85e249f516"], 0xb2, 0x1) [ 184.276855][ T4967] FAULT_INJECTION: forcing a failure. [ 184.276855][ T4967] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 184.313061][ T4967] CPU: 1 PID: 4967 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 184.323222][ T4967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 184.333265][ T4967] Call Trace: [ 184.336544][ T4967] dump_stack+0x1d8/0x24e [ 184.340860][ T4967] ? devkmsg_release+0x11c/0x11c [ 184.345773][ T4967] ? show_regs_print_info+0x12/0x12 [ 184.350944][ T4967] ? __kasan_kmalloc+0x1a3/0x1e0 [ 184.355852][ T4967] ? preempt_count_add+0x66/0x130 [ 184.360853][ T4967] ? prep_new_page+0x122/0x370 [ 184.365606][ T4967] should_fail+0x6f6/0x860 [ 184.369993][ T4967] ? setup_fault_attr+0x3d0/0x3d0 [ 184.374985][ T4967] __alloc_pages_nodemask+0x1c4/0x880 [ 184.380339][ T4967] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 184.385854][ T4967] ? kvmalloc_node+0x7e/0xf0 [ 184.390411][ T4967] push_pipe+0x3c5/0x7e0 [ 184.394622][ T4967] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 184.400239][ T4967] ? iov_iter_get_pages+0xec0/0xec0 [ 184.405404][ T4967] ? unix_stream_recvmsg+0x1e0/0x1e0 [ 184.410657][ T4967] default_file_splice_read+0x208/0x970 [ 184.416168][ T4967] ? sock_fasync+0xf0/0xf0 [ 184.420554][ T4967] ? __ia32_sys_tee+0xa0/0xa0 [ 184.425203][ T4967] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 184.431944][ T4967] ? selinux_file_permission+0x2d0/0x520 [ 184.437547][ T4967] ? security_file_permission+0x1e9/0x300 [ 184.443239][ T4967] ? __ia32_sys_tee+0xa0/0xa0 [ 184.447884][ T4967] splice_direct_to_actor+0x3f1/0xb30 [ 184.453237][ T4967] ? do_splice_direct+0x3e0/0x3e0 [ 184.458229][ T4967] ? pipe_to_sendpage+0x300/0x300 [ 184.463233][ T4967] ? security_file_permission+0x128/0x300 [ 184.468920][ T4967] do_splice_direct+0x28b/0x3e0 [ 184.473739][ T4967] ? splice_direct_to_actor+0xb30/0xb30 [ 184.479252][ T4967] ? security_file_permission+0x128/0x300 [ 184.484949][ T4967] do_sendfile+0x8e4/0x1140 [ 184.489423][ T4967] ? compat_writev+0x3c0/0x3c0 [ 184.494159][ T4967] ? vfs_write+0x422/0x4e0 [ 184.498547][ T4967] ? check_preemption_disabled+0x154/0x330 [ 184.504319][ T4967] __x64_sys_sendfile64+0x1c4/0x220 [ 184.509581][ T4967] ? __ia32_sys_sendfile+0x240/0x240 [ 184.514835][ T4967] do_syscall_64+0xcb/0x1e0 [ 184.519310][ T4967] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 184.525169][ T4967] RIP: 0033:0x466459 [ 184.529033][ T4967] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 184.548624][ T4967] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 184.557001][ T4967] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 184.564943][ T4967] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 07:11:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:11:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x12000000) 07:11:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x23000000) 07:11:13 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x40000, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 184.572883][ T4967] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 184.580824][ T4967] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 184.588763][ T4967] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 [ 184.611040][ T4975] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 184.613228][ T4985] incfs: Options parsing error. -22 07:11:13 executing program 4 (fault-call:2 fault-nth:67): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:11:13 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x100000, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:11:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x40000000) 07:11:13 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='rlog_pages=00000000\t\x00\x00\x00\x00\x00\x00\x000081,dont_hash,uid<', @ANYRESDEC=0x0, @ANYBLOB="1400336e83171757de4b5a6a3ae0145bb0e605c353ac98072c50824e2f3988e829f317131ecde9c8e307a72105c167f7c95c60b6e04f48a2f99f83caf6f8bf5b2301a6290a4a7acb9e1bb61cee3bbf04163e70c300d9cd10bcfb92d4e374c86cf13ca7609c3e2bd2c1a8d37a8ed3ec5ccda5f8a2f417a329414ed105adfb5230cf3f28a7e00a5173b7ecd201dcb7572b0c9e8554c968af79b7f4bbe5e2d727a54380d02ea4c25be0575ef10a8aad78eb0af58f0e0de844e6598f325599a1eada32b46ef98498e452e08887"]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:11:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x48000000) [ 184.691297][ T4977] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 184.693938][ T4975] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 07:11:13 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x183000, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:11:13 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x200100, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 184.738546][ T5006] FAULT_INJECTION: forcing a failure. [ 184.738546][ T5006] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 184.775557][ T5011] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 07:11:13 executing program 1: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4200, r0, 0x8, 0x4) preadv(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000140)=""/74, 0x4a}, {&(0x7f00000001c0)=""/133, 0x85}, {&(0x7f0000000280)}, {&(0x7f00000002c0)=""/186, 0xba}], 0x4, 0x3, 0xa81e) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0xa8}, 0x20) tkill(r0, 0x22) process_vm_writev(0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) [ 184.795928][ T5006] CPU: 0 PID: 5006 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 184.806086][ T5006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 184.816125][ T5006] Call Trace: [ 184.819411][ T5006] dump_stack+0x1d8/0x24e [ 184.823735][ T5006] ? devkmsg_release+0x11c/0x11c [ 184.828666][ T5006] ? show_regs_print_info+0x12/0x12 [ 184.833854][ T5006] ? __kasan_kmalloc+0x1a3/0x1e0 [ 184.838784][ T5006] ? preempt_count_add+0x66/0x130 [ 184.843799][ T5006] ? prep_new_page+0x122/0x370 [ 184.848554][ T5006] should_fail+0x6f6/0x860 [ 184.852961][ T5006] ? setup_fault_attr+0x3d0/0x3d0 [ 184.857990][ T5006] __alloc_pages_nodemask+0x1c4/0x880 [ 184.863353][ T5006] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 184.868890][ T5006] ? kvmalloc_node+0x7e/0xf0 [ 184.873470][ T5006] push_pipe+0x3c5/0x7e0 [ 184.877703][ T5006] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 184.883325][ T5006] ? iov_iter_get_pages+0xec0/0xec0 [ 184.888516][ T5006] ? unix_stream_recvmsg+0x1e0/0x1e0 [ 184.893791][ T5006] default_file_splice_read+0x208/0x970 [ 184.899323][ T5006] ? sock_fasync+0xf0/0xf0 [ 184.903729][ T5006] ? __ia32_sys_tee+0xa0/0xa0 [ 184.908392][ T5006] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 184.915129][ T5006] ? selinux_file_permission+0x2d0/0x520 [ 184.920736][ T5006] ? security_file_permission+0x1e9/0x300 [ 184.926426][ T5006] ? __ia32_sys_tee+0xa0/0xa0 [ 184.931073][ T5006] splice_direct_to_actor+0x3f1/0xb30 [ 184.936420][ T5006] ? do_splice_direct+0x3e0/0x3e0 [ 184.941415][ T5006] ? pipe_to_sendpage+0x300/0x300 [ 184.946418][ T5006] ? security_file_permission+0x128/0x300 [ 184.952109][ T5006] do_splice_direct+0x28b/0x3e0 [ 184.956933][ T5006] ? splice_direct_to_actor+0xb30/0xb30 [ 184.962450][ T5006] ? security_file_permission+0x128/0x300 [ 184.968141][ T5006] do_sendfile+0x8e4/0x1140 [ 184.972614][ T5006] ? compat_writev+0x3c0/0x3c0 [ 184.977347][ T5006] ? vfs_write+0x422/0x4e0 [ 184.982086][ T5006] ? check_preemption_disabled+0x154/0x330 [ 184.987860][ T5006] __x64_sys_sendfile64+0x1c4/0x220 [ 184.993026][ T5006] ? __ia32_sys_sendfile+0x240/0x240 [ 184.998281][ T5006] do_syscall_64+0xcb/0x1e0 [ 185.002753][ T5006] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 185.008615][ T5006] RIP: 0033:0x466459 [ 185.012480][ T5006] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 185.032052][ T5006] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 07:11:13 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x301800, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:11:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:11:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x4c000000) 07:11:13 executing program 1: r0 = socket(0x2, 0x2, 0x0) bind(r0, &(0x7f0000000000)=@rc={0x1f, @fixed={[], 0x11}, 0xff}, 0x80) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000002c0)={'ip6gre0\x00', &(0x7f0000000600)=@ethtool_per_queue_op={0x4b, 0x41, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x986, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = signalfd4(r1, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000400)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000000c0)=0xe8) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = signalfd4(r3, 0x0, 0x0, 0x0) r5 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x2, 0x80000) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000380)={'wg0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f0000004440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000500)={&(0x7f00000003c0)=@ipv6_getaddrlabel={0x38, 0x4a, 0x200, 0x70bd2c, 0x25dfdbfd, {0xa, 0x0, 0x3f, 0x0, r6, 0x1}, [@IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_LABEL={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x800) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="6800000010000104feffffff0000000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000004000128008000100736974003400028008140300ac1e000114000b00200100000000000000000000000000000000000000000000000108000a00", @ANYRES32=0x0, @ANYBLOB], 0x68}}, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000100)={'team0\x00', &(0x7f0000004180)=@ethtool_per_queue_op={0x4b, 0xf, [0x6, 0x5, 0xffffffff, 0x6, 0x7, 0x33, 0x8, 0x6, 0x5, 0x86c, 0x3, 0x6, 0xfffffffd, 0x67e9c41, 0x9, 0x80000000, 0x7fffffff, 0x1, 0x10001, 0x6, 0x8001, 0x0, 0x8, 0x5b329425, 0x5, 0x1, 0xfffffffe, 0xfffff000, 0x1, 0x2, 0x28f7cef9, 0x9, 0x3, 0x5, 0x7e, 0x5f1, 0x1, 0xbbef, 0xcf7, 0x3, 0x8, 0x2cea, 0x7, 0x2, 0x0, 0x3, 0x6, 0x400, 0x4d, 0xffffffff, 0x0, 0x7f, 0x5f, 0x7dc55cc, 0x9, 0x7f, 0x10001, 0xf234, 0x0, 0x21, 0x4, 0x5, 0x3ff, 0x6, 0x2, 0x2, 0x0, 0x6, 0x1, 0x36ae, 0x6, 0x80, 0xffffffff, 0x6, 0x7f, 0xfffffffa, 0x80000001, 0x7fff, 0x1, 0x8a0, 0x1, 0x2, 0x7f, 0x6, 0x0, 0x6, 0x0, 0x3, 0x0, 0xfffffff7, 0x3, 0x400, 0x200, 0x8, 0xee000000, 0x9, 0x8, 0x1000, 0x7, 0x200, 0xd4b, 0x8000, 0x5, 0x108, 0x6, 0x10000, 0x7d, 0x6, 0xfa6, 0xff, 0x1000, 0x0, 0x1, 0x9, 0xb6f, 0x480e6eed, 0x0, 0xffff, 0x6f8fc417, 0x3, 0xfffffe00, 0x8, 0x2, 0x4, 0x6718, 0x40, 0x0, 0x80], "fe8253c8b4719413dac3fc822f1b348621f23af0da28bcf7203b7c52059e7759ddfe7ff2328ba2e7e6581257e3d420bf1ad0f1391baffabe62cd3ef7be53312a2e20c891589bfec1dbd15035e44705f8c84219c602c960dcdd3264f085922dc120cd994879cfed150ff7427574a7c7159f2963d1a2b3f317e28d6cdfca4b0eecdd7e355f5f996212429d46ee18356ccd59ef366de6d629358ece3f8f2453f585588a8ad5ab15504974ba6d2e0712cdf17784"}}) read$FUSE(r2, &(0x7f0000002140)={0x2020}, 0x2020) sendmsg$IPSET_CMD_TEST(r2, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYBLOB="b80000000b06010200000000000000000000000074000880100007800a001100aaaaaaaaaabb0000100007800c00148008000140e00000020c00078006001d4000f900000c00078005000700080000000c00078006001d4000010000100007800900120073797a32000000001c0007801800028014000240ff01000000000000000000000000000106000000000000000c001840ffffffffffffbd7e100007800c001b4000000000000000080900020073797a3200000000"], 0xb8}}, 0x4000015) recvmsg(r1, &(0x7f0000004800)={&(0x7f0000004480)=@hci, 0x80, &(0x7f0000004700)=[{&(0x7f0000004500)=""/241, 0xf1}, {&(0x7f0000004600)=""/44, 0x2c}, {&(0x7f0000004640)=""/151, 0x97}], 0x3, &(0x7f0000004740)=""/182, 0xb6}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000840)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r8 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_SIOCETHTOOL(r8, 0x8946, &(0x7f0000000280)={'macvlan1\x00', &(0x7f0000000180)=@ethtool_channels={0x3d, 0x9, 0x80, 0x9, 0x0, 0xfffffffc, 0x4, 0x5, 0x6}}) fchownat(r4, &(0x7f0000000080)='./file0\x00', r7, 0xee00, 0x1000) [ 185.040435][ T5006] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 185.048374][ T5006] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 185.056316][ T5006] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 185.064257][ T5006] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 185.072197][ T5006] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 07:11:13 executing program 4 (fault-call:2 fault-nth:68): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:11:13 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x1000000, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:11:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x68000000) [ 185.093047][ T5015] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 185.104236][ T5035] incfs: Options parsing error. -22 07:11:13 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:11:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:11:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x6c000000) 07:11:13 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x2000000, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:11:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x74000000) [ 185.179003][ T5055] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 185.199115][ T5058] FAULT_INJECTION: forcing a failure. [ 185.199115][ T5058] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 185.210619][ T5055] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.1'. [ 185.241443][ T5058] CPU: 0 PID: 5058 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 185.251603][ T5058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 185.261642][ T5058] Call Trace: [ 185.264925][ T5058] dump_stack+0x1d8/0x24e [ 185.269233][ T5058] ? devkmsg_release+0x11c/0x11c [ 185.274149][ T5058] ? show_regs_print_info+0x12/0x12 [ 185.279320][ T5058] ? __kasan_kmalloc+0x1a3/0x1e0 [ 185.284228][ T5058] ? preempt_count_add+0x66/0x130 [ 185.289223][ T5058] ? prep_new_page+0x122/0x370 [ 185.293966][ T5058] should_fail+0x6f6/0x860 [ 185.298353][ T5058] ? setup_fault_attr+0x3d0/0x3d0 [ 185.303346][ T5058] __alloc_pages_nodemask+0x1c4/0x880 [ 185.308688][ T5058] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 185.314215][ T5058] ? kvmalloc_node+0x7e/0xf0 [ 185.318795][ T5058] push_pipe+0x3c5/0x7e0 [ 185.323009][ T5058] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 185.329219][ T5058] ? iov_iter_get_pages+0xec0/0xec0 [ 185.334385][ T5058] ? unix_stream_recvmsg+0x1e0/0x1e0 [ 185.339653][ T5058] default_file_splice_read+0x208/0x970 [ 185.345166][ T5058] ? sock_fasync+0xf0/0xf0 [ 185.349552][ T5058] ? __ia32_sys_tee+0xa0/0xa0 [ 185.354208][ T5058] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 185.360941][ T5058] ? selinux_file_permission+0x2d0/0x520 [ 185.366542][ T5058] ? security_file_permission+0x1e9/0x300 [ 185.372231][ T5058] ? __ia32_sys_tee+0xa0/0xa0 [ 185.376875][ T5058] splice_direct_to_actor+0x3f1/0xb30 [ 185.382217][ T5058] ? do_splice_direct+0x3e0/0x3e0 [ 185.387208][ T5058] ? pipe_to_sendpage+0x300/0x300 [ 185.392202][ T5058] ? security_file_permission+0x128/0x300 [ 185.397888][ T5058] do_splice_direct+0x28b/0x3e0 [ 185.402708][ T5058] ? splice_direct_to_actor+0xb30/0xb30 [ 185.408221][ T5058] ? security_file_permission+0x128/0x300 [ 185.413911][ T5058] do_sendfile+0x8e4/0x1140 [ 185.418384][ T5058] ? compat_writev+0x3c0/0x3c0 [ 185.423116][ T5058] ? vfs_write+0x422/0x4e0 [ 185.427501][ T5058] ? check_preemption_disabled+0x154/0x330 [ 185.433273][ T5058] __x64_sys_sendfile64+0x1c4/0x220 [ 185.438451][ T5058] ? __ia32_sys_sendfile+0x240/0x240 [ 185.443704][ T5058] do_syscall_64+0xcb/0x1e0 [ 185.448189][ T5058] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 185.454051][ T5058] RIP: 0033:0x466459 [ 185.457916][ T5058] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 185.477490][ T5058] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 07:11:14 executing program 4 (fault-call:2 fault-nth:69): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:11:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x2030000, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:11:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) [ 185.485867][ T5058] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 185.493808][ T5058] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 185.502272][ T5058] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 185.510211][ T5058] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 185.518167][ T5058] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 [ 185.581621][ T5084] FAULT_INJECTION: forcing a failure. [ 185.581621][ T5084] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 185.607770][ T5084] CPU: 1 PID: 5084 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 185.617939][ T5084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 185.627983][ T5084] Call Trace: [ 185.631268][ T5084] dump_stack+0x1d8/0x24e [ 185.635592][ T5084] ? devkmsg_release+0x11c/0x11c [ 185.640521][ T5084] ? show_regs_print_info+0x12/0x12 [ 185.644147][ T5071] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 185.645703][ T5084] ? __kasan_kmalloc+0x1a3/0x1e0 [ 185.645711][ T5084] ? preempt_count_add+0x66/0x130 [ 185.645725][ T5084] ? prep_new_page+0x122/0x370 [ 185.669215][ T5084] should_fail+0x6f6/0x860 [ 185.673617][ T5084] ? setup_fault_attr+0x3d0/0x3d0 [ 185.678717][ T5084] __alloc_pages_nodemask+0x1c4/0x880 [ 185.684062][ T5084] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 185.689579][ T5084] ? kvmalloc_node+0x7e/0xf0 [ 185.694139][ T5084] push_pipe+0x3c5/0x7e0 [ 185.698354][ T5084] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 185.703956][ T5084] ? iov_iter_get_pages+0xec0/0xec0 [ 185.709128][ T5084] ? unix_stream_recvmsg+0x1e0/0x1e0 [ 185.714391][ T5084] default_file_splice_read+0x208/0x970 [ 185.719906][ T5084] ? sock_fasync+0xf0/0xf0 [ 185.724300][ T5084] ? __ia32_sys_tee+0xa0/0xa0 [ 185.728954][ T5084] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 185.735686][ T5084] ? selinux_file_permission+0x2d0/0x520 [ 185.741291][ T5084] ? security_file_permission+0x1e9/0x300 [ 185.746981][ T5084] ? __ia32_sys_tee+0xa0/0xa0 [ 185.751634][ T5084] splice_direct_to_actor+0x3f1/0xb30 [ 185.756977][ T5084] ? do_splice_direct+0x3e0/0x3e0 [ 185.761997][ T5084] ? pipe_to_sendpage+0x300/0x300 [ 185.766989][ T5084] ? security_file_permission+0x128/0x300 [ 185.772674][ T5084] do_splice_direct+0x28b/0x3e0 [ 185.777493][ T5084] ? splice_direct_to_actor+0xb30/0xb30 [ 185.783007][ T5084] ? security_file_permission+0x128/0x300 [ 185.788694][ T5084] do_sendfile+0x8e4/0x1140 [ 185.793167][ T5084] ? compat_writev+0x3c0/0x3c0 [ 185.797914][ T5084] ? vfs_write+0x422/0x4e0 [ 185.802299][ T5084] ? check_preemption_disabled+0x154/0x330 [ 185.808073][ T5084] __x64_sys_sendfile64+0x1c4/0x220 [ 185.813245][ T5084] ? __ia32_sys_sendfile+0x240/0x240 [ 185.818511][ T5084] do_syscall_64+0xcb/0x1e0 [ 185.823679][ T5084] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 185.829547][ T5084] RIP: 0033:0x466459 [ 185.833419][ T5084] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 185.852998][ T5084] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 185.861379][ T5084] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 185.869318][ T5084] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 185.877260][ T5084] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 185.885202][ T5084] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 185.893143][ T5084] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000 07:11:14 executing program 1: syz_fuse_handle_req(0xffffffffffffffff, &(0x7f0000002140)="9eda438838743bd4e9720bee57093515dc189a5ea685e9556c1c2c3cfc4df50d66d31a48aa312663b68d18c5826b5b55fb738208863dac0f10f423aee7a5d8ddc45ebdfeb7424bae859d7c37ecfc4b63914d5a56d91017dd22bc84f759a15969951aef9d5c88c96560896988fa18cd946cfcc3a0f1c993348377904eac32c980bdf7976ebca2b499cab63c4e841514277fc71d4620e29a92523402485de0e82896484c0ae497a4d686df23ca7b68c3fd5e624d3510d7f94838e54af877ca58a00c5a672bba11f5aa1ed1980dfef47b9973d0bf456ded5e72f1702b3dc5197fce39cba53a038d8dc0ec783ce70577107dc5e8b299e64a0b7f1191f0926bd25762370191710bab2f44e9069f55f8a3f87e4cb488a2fb3348c0bf3b3874291f83e4776b160ea73aafa3919c7c069c73c0052173a63158db8b65541d161f9c964926ad7f06bdd6cb6a32135b04e35701c2e13c49c1f75dc7a25d623378860692d172ec3f1e1f2d9dc77c015c13721efcb101c2390abb847e871132f472a37cc0163b39b1d575a5444e246a08a1afb1a696cabab29498a314429a3b9f44c43ba29f71fac1fbe0d01c3c16d22730932704bcfb0c1b7a432bc51dd3f5dd5afc3b342cbe6a6ff899039e28f9a51881b1d46fdcf31767cb6f5c5c69ab3c80615d77c4d1664fc4ec831b8cea2e752bbb7a9ce79df875b29f1e232751daf32a1a0c4ff8bd0688e2b8e2d668b8a77e20a9eb6ec2e2c23b94e507baeacbcfa31fb6e1ca3343668f43e3aa6d85e7c29bf0bb4dbdabddc92be7f4a6f5d21b19e6da17bfb6cc926e3847532fae29c7b62fb909130ec372d3c16cfe6aaf3ce2af0fe7610fde7aad61bc80d2f96b999c8ccf6d22cf903ca8ae8b879ec4a416f334982e9810c0140a18d4dc81b5edaae23e9f4abaf40ed71512aebbba5bb251545e188db789558a845a2877b14bdaeec3c738b7d730c0860531bf5517d4f0e8f95ed3571f8a35816d5116fcb8d7cbf42b7d5d5e65541508c898bb2e0fe96297d2ab7135662de39df099ebaed5871111f5346278cee5728cec512e6c0a0d65b51e3d627873195b84103341c2bc83b6c8fdd8ba17f5957413f61c69d618c9b9d0b1f08dc81921b6c662ee1da3bfa019b095e9a03c2db4d645ccb7364e895098cbf7d932c72d80663c7a1694d122f7348393079223c11d36c64a5856eae0397ab9a9d948204b74e56525a9d552dd0916de81cbb5af3c59b3d7f8f9154423ce2cb45a5bc808e24bef13212019a19545fe54ba84d01534358380192b8c7b0eda907810375bb66a578a58fec392b47991271c8367b91d710e8a176bc1a4e96f0e137d4c25fbb03eddc392f9f170dd744472b864fbbae7c93d86e682308b21b73c5652065d72cf02e1152b44024a90a3b52eb0bb3cb412e518d37a68aa4c7f46789c54ab30d3a73d0a8712fde612294cda2aa1ccf164930b9b1d17801d4fbb06e849d39bf2b5141330caa0d2618b616f1c67e1ca57080e79ed9092ba7a55e8121cfc825cd26a0199a479a7ab1b7b23d2a4dd82fa6d04ee41ca680435efc934f0451e865e8632ac2f1115f4cdd33b0fccb7a2326127faf20cba37c828613dba5a98f4e1ad25eb6b91078cf73d873df9ef91531476f64b83559ff7ccdc4c070d478b18196ea05fe8d4ea0216ee5273dfabbd04582f40f064c9781afd2cbf30901f28cd09cc934f1b2d50883778274177e3dba8af0a1b931d80ce1a6c4085780ea2195b65ecfd2953f78a5290fe560d0cd6a5e73890a5a82dc410b92a3ef2be05ec5607820fd4ca6b9c3aa258d59022fdcb21665f1ce4e8aad8fd918c43bd3c2afe3dc223ff9f48831d401c8b6996190793d1dd7551f8511b69283992398d8f9b4bd2b3398d3b8c6f3c5d8b802ca5282b702df2b7be4b38e70c3065f8da888631375afcc05ce578089c4f783776b286b7a60d1b5e189e2742a3240c1036a953d886885422eef01413c38099b64505fd5a73488acb4e611820674c58ae74d6c64a885d4beda9bd7903bcdc71e3711e2a057c0eab2100c321050ab14c6e453c53182577ad3178603cd9afde40a701120e9a36074fd582428c74e02781318e6c65450f8f020bd22475696fe13b8c59260e53a06d16eabd135e887a0a6bbc8ad21be7661df76fec5b13844f68b8eed1a7379713738beac9f23c7a26520e19797a910cde9fb285179526889b908b7eb49bb06f70f6271fba8712c1a4269ebcf4b7d043e924e3d2c4c753fd7e547d95841e335179836f76424e728810d7f32b78256ea30c79d9238a6588426e1f2d4c0b03d5605bd826ed24f0f11326b4cf958632b86e017aa80e142db1580c44f76d9c98196f3f6852ab2bfc6a01a3553a130c2d171957f5a45c3550fbbc990ef8742a98a86b280a57b9f198ff436bc01161ada50e6f23026c3254adf2321bff7e20aa54080bbb57d8d52c6a6df6107706a2e5bc6da68f17b474c0edd39401d765086e885cf7992405f856557915603cbe8894676e996bbadbb649a5e7498b91f9bd2f697dd9ebbe4d386050258b9f4c94781e61c660651c3f1e3ae51f8c035eca365bf1c23dcacbd6e225490d7e9c133525f5c9018d752b21b4897bf18b64b6a9936f538a0a8958fc934440aeeaad2b68ac844d76f0900a6c95bd0b353d85d4fb62eb88360112237fd8c636a80e3130b21d66ae8ec58a4b76cba0602f96da919f7e84fd37e3ec2379f58e389a39c78d2482e03c379e3c4649ad63a76e3707ecff07d2fcb0c9dfc524cab49e69a09c92e4f88714335cb57d3f6184d07bef9657280fb5c9fd2d8f940f7ac6c5407e3077aa2e4ba8e217e0ee19e302d6d90e3be05a86dade35d2e454e511afb5cf5936f1d11f2fa6be6ceaa817dbdc7a6aabf2fad8ff3efa8382a25099f0c5989d2ad56ae0f4968b2cfcfc67b4f1c161c75900b4848f59a3c0376dfcb7997bf28e9e85d6dd942a360516de38e1c1a038a796f9a77ff2b0c7e5e8f4932391a0e58e76dacc6f9764178a211dfde3e75d367d2911ff398126ffdf83cf2fbdf1ad5232bed9155f7a168638a572094a9e934d4969b358cf6e121d7fd2aeae2f499068b42c152f0e3403a230885d6f92f038ddaa23499f804ffb06abdbabb51f6c38c92fb1a6271a4b13d6d11125b8ec12efa5907dc65062797fb9cca15e2f254e76b182d3fcdb4e96ac4de36d6df7e7bba5c32f422286b1be3b79bffb6fd693761952d195a84ad9ceb07287a0fbefab9e0347b513c5f60233ccd4b52d90ec144a2f896d9dc7f279f8aa93038f3efa286e1c3006933a4d7183d952f8d28b141b28b2af355b5bd8198dfde1ffb8d09202aff0d16ca3fec194662892a49f829813970a4520f1228aa03d211a45bed3b2e05bf1f10b1a152761e7b6c6ddea863a3c02224256092c70ca70dc185c4c385dd98b09e2682661e1e66f71d9c4037048eb70e8a1cbe57de87ec43713abf5fdcf63b9c482f318e3bec37e878dadbae15a02d731e6c8574eb14c059d72f73be5174add786d06b585a28a06d349d8e434a491b34897b3c1ad786ec8280d7f57edd4fbc6aea5485d659b59d393e331cf91e6ed76f340fcf7cf460892fa7318fc42b883f61d888ad982a751accb613c66661fba5f3d6de751a6a9ef8a4700316aaad04e991aab7903f4ef012ec2a8c092234e74ef335daf360ae47bbd2bbc6ad8c1a4f81efe8bbd703cb55ef36b32b4e30cb5a3b165c02ba295d0e1c40ce6ff8f479a74f01275f113ebfa8ade37a59ce70e6ca2a6f48f1be085f61bf772e2c2da523a2cfe63e99c57bdb1ff23139d4fca49eff7547e9880eefd3f7511a677efa23b52098ba89037c48dfcda2e8c1cfb9f892161049e53f8cee55256279512aecab8c441600dae0fd957883273047cf5c66ba209f830aa2ce0cbe41ca08c0cef4aed7f4324009200661a7ce680e5a8df2d051c1d8b2f63d25d8d74d05c75c46c8f3f24d625539e63459650960498a54ec3b16225bbbf4d3930009df265839d72611f5332a904cdebada108236e4414a2909ad01ec44b9d7f75de4385ad7ca5152e890a0919b3639fd1bcbca3b737ebb8d9ae541b1271cf2166ba15830e66f3d3afd3b754a7f81ad4f0999704ae99c114907c5be4a4797f13b80564f234723a34dbe137dabfd7fa23562df679f54a6ab54def6d63deae9844f72fd73efd0413551f5c4b9ee826eb3b7faf92a59ea34a16723b4fea14d1c8815a4e2d39fc48d1dbce526a7c53f5a96d0ef6463a0cee73fd3505f5c764a264b83c4a21f80e8b61c82d24442d13da99d18dc1b2538e7a510f6093d9ef2bc5cc777d4f98411e93919eddfd69d6e20d227cb61c50f358ea227f4de941fb080c1cf6b1f6e25533768fe133dbfc3f9d29c603bed38aa3c5af5b81a706b0067b40b88f992610d04c7cc36b8f649697cd6a93fae51138161891ae75a7147780fc59af5a6e18c54f9d2a4fe7fa92314b399afba9a40d0cc24f70a2593acf8d179215e06b7a9a88224bafcb2cbf60caf5fe4ff38208a70793b5dc33cd572956260e1c86312d3ba9b3a4b2b44376f2e78c616a6c0880ac8dcbaa30b9f761d500fd03a8518dd0509157b184a2d95e0caf3ffc8ac2db6c54d80c71a1e5b9ea3bf51071e2118af204123daceeb04e4f6f31f32a4d3fbb76ee49440cabda2c121c1b99acab5b87cecc37c3f9066af34ab29d6598bbfd91047a2ac7ce3a8f3027ff5e6d743506f161087278896a98ed37122ba208b61cf54d3929555ab06b564cd5e4f46f4755a6cfa2ef2b30d29ea66f2749d4060d411fa9160c91b6f55cf071ac8222c6313df18759e2958cddfe3db4cbeb9cd39abcf5f0beaecae8437813995cb7ed0b87d42ca942ff7245ece204798d01361c5f008e0d82bdf76660515bc78f7f8f409ccf68614b2cb50f5af2615661326fd971bc57eeeade60ea906b8df1cb0dfafd318cd2c396309c329d0469ca192aa8f51d7c4227685440f073983255baf054b97b9d7be1d1470d7eabd5c09b2116b4e86b0567b7e97e088717a4fe3dbdd310a1c39136ea4d2c47492001f9885dba03bf97e7da376171d666441cdc2f999db137603d57df32b4260fa0165e82917bb1631ea314e7a7437e66fc68cef22cda8f456d6e583f6e3237e0bc79987a9103f7cf0918e26881f67ea582e1ff3a49177599d385bf6e42572a2547933aeddb826530e9adf30dd84c3a7fae5c4c26f6c6f3a9f0906decd314e2407825abef959c5416d18a92ff34e6c521a16e8a0a29937c77d4ee99b41d530a732acbe0bf5d274df9d496b47a9a624546bdcf9976cde12ec989cb2a70b33a7c8a3a77652023164695f9db30dfcf587f0cd4f73e385730bcbdd688f6dcb08ba0efbb9f579220afefa4acfea522e864fce9b1782ce9f14824d16e9d33a2609c23ba3c5a1af02549357a0dcc12e37819d778021762cf895abeac1125b744c8b8225a091e7be9ded9993cfa3ca9abb83e25c8f559009977a2ed9374a89619fae5ef6d164bb73d242004dc8428e44689b33ee3bbe88bb4962ab0a32a90e7aea044f08410752cb2d7aeaf3196648a3a99092665b478bb394b48f79b36db0efc7f50d6a5179c945f5298cfaac5e5dea715296f92abce7281d48a0c9c6b785a35ef5f1697c047ddb254fe9a8ab9f498b0c1ae09ffd01a3d8d427fee7e36c51e0e5c2fee2245fb8464626ab5c9857ebce91f7d22bf024d10c2d71021cd69268472de419e6cefd970ccc5858659be6496799aa7f100411766e712aff08b731460f14f9d7356db12cf8e1c6121968dc68b1d81c086b325ca4ce6fe1f476707e08fa913144b757c6be17cf93150db29544d207f09a896f33b7335d9339215da751e7af2c6bdd19db6f521af2c8a5998dc607f97026d07111488741134c1c86eba123273d1fd5ee4b471e86f9ae9478a04c7482076ab34a1eca5c64f89e5106eed44bceec019c67c12fb4db4fdac153f4ac3b63ffeb6d30de58ec039e2dd3c181e254cd94d0a2b0b44490384cc5915b54ee1db2b6d059879bf8126c9ca976d0f7862da07ecd350930a081810a7afd72b2ad3f65b96ae9c7f91227a2b5513a559f36b90fe01be9ae5ad3ca65e2c26f358fc26b858a3633fda7ae49a5fb705220a5819b3cca41b1ccc21d7c40f5fa9c422288efa5394e4312675899d704a2aab62b8363f58fd4bc12a8bea6ffc45b4414237bf5f019321206dbba439acb5ef26641f30fdac20f964354bce94e4c9d73e137f9806deefaf6f4acaa0e76ad4fef9f6cb7fc01bbabda9612c05adbe46afcf94819e8a4b4b49ff764784fa432d47fb6d4230900043d1b4521cd6839fe8c5df4d1899fdfb13880e207cac73f0a29020bdd563bd9c2f6bcd1ec523b3e03ebf6164fc65af001830c51396f9df2d346f83a59cfc82201cf1150ea57259d579fc2ed199b3fbe42d5188c84e4354610743e5b23a265246313c80b96d936969572e11316bc8926cb23115186f3b2387b82c3898fa41bf16a308da62d5a3eb3609af1943fddde08a4036eb2a41b7292caad9eb082614b02a1fa255bc7abd4d0e3b4ec1801e131e68c7aa9da1a0ff10f9de87dec8fad1ad8bfa99caa49e203a7b9c33e044d4544a537471e7a452468b821959bc488c6b8cbf81e90081a26de273ad1203cc06adb6af242ab19f96c1c66b58c37e2c9309704fba63af99a8d9c5efc651afb631fe9f546b938cc3b8e526c4159e5c9f7afb29fd1d55fabf09367ce2a63a35e7a2062d1c772ed981fd77157a847f687a177cf9886ce41df8cc509302b46bc1e2ba896b1c1656a1bbfdf4cd9ac39cf8510d1c823075f16550fd044aacc8d42a56f03718f7b18475cdc3999faeb25ab3dd8a807ee04d8e5d831d08b4e309dff50330685138797e10c6362636f53f22bfc1f3d5090a5d369282d9de36bb4e2505411ccc6ea395afa1567b15a2fb4be2adeea7126b1a8e80034105e0d98bdd78e796ce1cdc06a4ae666fc0baec5c52614340ed997673e26ec47c88846c000bb7c9075937cd44f5c041fdcc64986e5e1c0f488148f0ee6f842c44c0b72e82109270341bba6e9080b70fcf930d0f10be5a36798ef6051fed72727b72282ff164fc08319d74f1f57cde71b57cb397a9e753f87b97729bafba017a24cbfdee5dfe7fc296c112e93bb8fce560ca80a3afd8370baaa79ad783b51352b5440b144a47378c9ae22eda5794328e95bcca220fd07bb56915529b155c61858efe89ad36a79288e74c0e251addcfaf797432175a5562b46eff5e3aebeb74623e18beef85389383c604d8884431b07dc4bea0174aadc337ff41f558a63f16690feae47efa2a5d1318b7397e1e4ba398727d286791b71610e1d78d32800e7e113c12abf0f60b6ca4401ecd23b7aacd990633b2b017daf6bfef1b2361ece74b7dbcbb1a73d4bc1f9d2e5c9fb0b7980d25cc44d1b10c09ef5a6a05c84669294a5cadf0cd88ab449f9f0bcdd8c48590d416c5c1feaa494a2145949c2a3373df7c6014225f2745bbeb20ff294d22c0d96ca111e6926946207cab56a03162a49e68968e398f70690188ee3ca847ef421742d60b9a6ad029e8a3d607950b2bf8ad8ff297cb39acc94905635770436e134435e28205140331b5100d9f64469792fffac87bca0835cbc617446ff86a7b50418c305f32e658b32130e491e38709fd3697017ac8084cdf1ed81a28375aed092ab4e32ca88a933154dd3a9e99351acbada926b67b310c7070ac1a414a28c5abfe1f45476249a12f18ca2d981528d881ed3c5072e46a6eff3cdf37dcbc89c7f79c88a1f8d15d15beb66a0e4440c7b93e379c4e2bac1d5c8e85f1852887e2cfeb178fba1c67dc2adb0c87df8ca4444ca7f455509f492effb5001328b8cc696e2933207a2d78bbce8562ca34a248193c914406b161c8141479d891b0c6110ec1e25cad38299b489f2ec437017cadba67dcb58abd4933c95b3526f1d4747b8701a7d71e446e4b62e2941d4281faca0cf22914be5aad80f47100000000ceb24e82508fe55a92fb6db70d03d1c1ec09cfee31639341756a4630a0eaaecac7bfbddf9d30c42cbd45eb181d5bd341307ad26f496bb042e2b655c03ac3dcc587acbf50f79b5c239be9938b62d3251b199f8413b020605d5d0552cfd9c39c9132719d6d0a326b000e12fcb51bc274df79d11430060d05978cdd50583f1bca82c57dbee605e2d00fcb5414af13a596d35cb5ba62de6a28cbccc857d23547b1c7fd5ac8fbf6758d5b8451fa46d9acc00344dc2e565674b1dd3547eb8f8aa5fff99042f8d1d59e6ad2f53379211e6832fcb68f5777eb2db85b28f724f4e4ce6342cf55713ff7b0cb4f7f47dd12a6566b86709eaefae024373267ce72a89e7f3e42ab48edcccc96b5d0403fe93a927e5ccf470014f220b8257393226cd7b996f20e6a34f81206733a9fdce03b701943c1b560d3eab68c2c225cf7f7f2b56123be2bb173e9e5b37f4d3348f6b987764ad07c2acd44514ff264d7eda31e5e517a179414841ad4553d51c08f435e05f10aa82d74b97a9ba3a133e6c9175fdcd4f3dc9c16d3be1d5bbaf13240177081ac1d56681bfa988a93af09868afd608520c0bfd71d857a6661fdaf6f2e166987eb007449dd26334ae932c5003fefc0f983b9e49cbfcea325f2de16a9ae935caa46f5b3433957fb370971ed957f138f08a60fed5b84995e428e7ae7d5c22021ff016baef0e713a118344c016a99ad469313ba7f2452da0dd82e019f64aa229cf80a69b3e08ac5847f10d247179855546313232f23e055c2f74ecef14e0fdcc29a9bf0976fbb249bd5c7903183d2a53c70960a183630e7d4928daa7091a85ad987d2a4a5b8f6be6612fa72d9fbb33c67bb38eff19f2e784f94e0354cf6d35a5b2c62233c039de3734b38e97ec72bd673fef09fd56fec329818cc68cdf12cb52f7d37a8350c16e94208880bfcd3e895d7aa4489e3dd15db4a9026f0d2a46f1e89c35845dbd976a1992b87c15a0c7580e6424b8792a7bb7b933d7c5433d4133ba4dbbcf7995d6ed3feaa32f876a287feeb9cc6107778c1f83e0119d980b9e994c2a3ae3de24a103efb3cacb746b49d1ad85746b233ab4aaf0e988ec2a786bc93f32040d3bdc3008031634cdfded5ac95b2279e096243228296591e7ba53c4a127772cc4620e6b238ccad250629194533d0a669ff3366c52d64928693e0b0cbb0b8e2c6029089d4dfe2b4b6c5dcd85f1a02770611e65001e48a32a8b0431a3b9d77fa3a95be38a0436a704c05a8e0183f3214c25531a63796f679bf72885aa766468d42b2543542d7e82544efc5c5e81e6a91a0f5d4e68000cff687d63e45c9a11d4ef515050daa592c9a828ac7c0488e7cdb3d6fdaef5e9176ee68d981ea50d386d74df3b40660351736deb03bfceb721878cf9894b0302df15964242ab6b9f77f98ba1c7993735983d2b022600ab74a19e3636e1400d08ba45d3a5c2774cb06a1c358bbfc11d27efaf7ca53c2e7757c8c76da24707d91a4a5244262898d68083ff91c514d9b9b1ebaa0cb0b10254fda1b1e82b9a1a47f117b5b280ddbec1f6732d11117ef1a7a674699df87fe795d1243cb9c4527e364e2b711b6562a87fafc130ce0baf1701686639b05f0c8dc708f008b1e6ab89e8d623bb83f3d54b7bcdbdacd055ac4eccbd36bbe0af0f65a00e3d6dd985ae8851d176976cfb5816d1fc2a63d3546aecaa4e712ca6961d1f181315d553de6b53485faed0dcfcf819a1ba3badffe797377d3d1ddaed8e7a0acc0c3d277762262a139f94de49faca167b11bf04f2104a5ab9a73367a6461f7124c91a2c4229ef98e6ebde9aac283c7d029400d71293f488ba169b62c1e94689cf5b248ed4aea62b88d65bb764cfe27d5231a58486e7381df518f4ed81cb905108c54a5050a94ca0e94da20d3794bc5fab9127dc95b6404b1e27b4e28136fc27806f7be798444c33aca88ffd45b860eba0d5033839f5a092863954604f1952bd61dad23b11643fe14f3ade08116aa2c13eee701ccd13e506bd65a1060bf69579aea8c8143cd38c0891a3065f251eba0c20ab9c69ddf28e3bd6400cc203bac8de1882239ad4e1b97b0ae2f1abb7bac7c0d8ef82b97ebfb1f5577f06a3a1377b09ada4db87d342f20ab0eca4b9c206042471307511429cb57a578211f92d3647189861cad9145f5eb26ab696abe50a2a6c1b4af61040528aba4e79b586c348a430f5ea61c4be1032fa61d18581f05a07fb8707c8996e0fff1c3eda59b992687fa12483b9327e10224b20d42e8b3fc4670bf070ced602283273d6818acd1f6da567c44d3f5e1377065d43d87d889843ae48e7fa8ba1634815695b8c480ca271e6e833799c70da80fd79acc09b989667a2294de5da73f0363df9a33ad4dab8d27cf7bed0a06838672e3d07d52b6396e9b5576021d5e925abd533bf161c944795065fdd44e8462e3070c479f1c118276653488dd9b2f1a673f8cad3612ca1fab4388ec9c8f834a01a499adb7b3a9a977672f6d75b41bbdd7f91ceb7e7a88568d17bb432be9e4e96e115075bce197ef4754d2914c2c59e2d7f4c08f0dbe34d31f229428f211bf1d7e8f5c319ed4a8273cb6255eb318851ac4557b0278fac63107a54d407c42f300b843a12abd3b893b46c7efac2e388ab42b87aebe2543bd4c15f459bc50aad10ffe1c1196fb52c26e54bdaa7fbd52451f207ffb073ef4b3f71eedd7da40c89505019739e3fa733bcdc84ff4919e8fe2358129ef28291be1d6426b8bafe88463b1d3cd7273745381c7f65221898e6ad361e88b24c54ccc7ac9a830145b6dc096e2d71ef71ec4f03524cb870b724e08d223bdec2f6fdde6200217a13b5136004d455d66547f5a1793e0cad85677d49e5c558852107007c8136812cf021afaf6f7e8f59883371be46cda412dd9c6fcf187c31252ceb5758901d39cd5355ab386d9a7fe6ea46ebf277aaf809c3023211ea9aa189de4d422080ebb9fec50ffab6b95ba4ae5018accc497e79149ed6047ce561ccc10e9194cdccd5c9fb75175c8dbc9d0a916ad59288f010defbbb50d263041ab37aac0f93253bef6f898cd0825d99d27224f26181f9713b8979da64756c95e7505f25a2688960d6155c3613dcc31b6c337a6dbfc6b12cfde1db22b93bbd5e48534fb0bda8b212577a14dcf665c834b0bd24e5f624d2455fe048dbe930328d7cb632db3b0e244bb5d43390b420b15157a339487fc78976f867d3a361aafdd3f50a93c01882da7c220089a544381db22e2c86b228dc2be01820468460437588952a549d37498e529e62aa62bad1580546bcb1e9a6ed1870b7838d05d12f6e3a041e78b1bdb80894626f20889ccb3a468aa4fb24b9c87cbb28623ce59c6b3c6286db366d08004551a25fe4d8d194a2bb7c52e1c85a5fbe4cb15b171489da121bea1c469a6bb185d63213084e3a81ee54dc03a94dc5ecdda7bfaad1df613f51f56627c9d529f13e5c81b5ee4dd228949ca16b9a61d186211d153294470907557e5e14ae665013f285fe4d3766e7b3d8ce5e2a14692072d4d8f79354bcc8db8a2a36c8bcd00", 0x2000, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000002000)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) poll(&(0x7f0000002100)=[{r0}], 0x1, 0x0) pread64(r0, 0x0, 0xffffffb7, 0x0) r2 = dup2(r1, r0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) 07:11:14 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0x7a000000) 07:11:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x3000000, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:11:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108, 0x0, {0xffffffff00000000}}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:11:14 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:11:14 executing program 4 (fault-call:2 fault-nth:70): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:11:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x8000000, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:11:14 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000000)="e4ca6da7fc044697b7", 0x9}], 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x44, 0x1a, 0x0, 0x1, [@AF_INET={0x12, 0x2, 0x0, 0x1, {0x4}}, @AF_INET={0x38, 0x2, 0x0, 0x1, {0x34, 0x1, 0x0, 0x1, [{0x8, 0x19}, {0x8}, {0x8, 0x1a}, {0xfffffffffffffd41}, {0x8}, {0x8}]}}]}, @IFLA_GROUP={0x8}]}, 0x6c}}, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) [ 186.003997][ T5067] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 186.013352][ T5067] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.1'. 07:11:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108, 0x0, {0x0, 0xffffffff00000000}}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 07:11:14 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0xf5ffffff) 07:11:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x12020000, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 186.063432][ T5111] FAULT_INJECTION: forcing a failure. [ 186.063432][ T5111] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 186.086622][ T5113] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 186.113092][ T5127] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. [ 186.113120][ T5113] EXT4-fs error (device loop0): __ext4_new_inode:930: comm syz-executor.0: reserved inode found cleared - inode=1 [ 186.133378][ T5111] CPU: 0 PID: 5111 Comm: syz-executor.4 Not tainted 5.4.111-syzkaller-00138-g3c5dbcf40ba8 #0 [ 186.144557][ T5111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 186.154602][ T5111] Call Trace: [ 186.157891][ T5111] dump_stack+0x1d8/0x24e 07:11:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x15000000, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 186.159062][ T5113] incfs: Can't find or create .index dir in ./file0 [ 186.162206][ T5111] ? devkmsg_release+0x11c/0x11c [ 186.162221][ T5111] ? show_regs_print_info+0x12/0x12 [ 186.178873][ T5111] ? __kasan_kmalloc+0x1a3/0x1e0 [ 186.180336][ T5136] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. [ 186.183798][ T5111] ? preempt_count_add+0x66/0x130 [ 186.198051][ T5111] ? prep_new_page+0x122/0x370 [ 186.202802][ T5111] should_fail+0x6f6/0x860 [ 186.207207][ T5111] ? setup_fault_attr+0x3d0/0x3d0 07:11:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x16000000, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:11:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x1e000000, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 186.212222][ T5111] __alloc_pages_nodemask+0x1c4/0x880 [ 186.217584][ T5111] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 186.223124][ T5111] ? kvmalloc_node+0x7e/0xf0 [ 186.227708][ T5111] push_pipe+0x3c5/0x7e0 [ 186.231945][ T5111] iov_iter_get_pages_alloc+0xbf0/0x1070 [ 186.237568][ T5111] ? iov_iter_get_pages+0xec0/0xec0 [ 186.242754][ T5111] ? unix_stream_recvmsg+0x1e0/0x1e0 [ 186.248030][ T5111] default_file_splice_read+0x208/0x970 [ 186.253584][ T5111] ? sock_fasync+0xf0/0xf0 [ 186.257984][ T5111] ? __ia32_sys_tee+0xa0/0xa0 07:11:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x24030000, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:11:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x2c000000, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) [ 186.262659][ T5111] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 186.269407][ T5111] ? selinux_file_permission+0x2d0/0x520 [ 186.275038][ T5111] ? security_file_permission+0x1e9/0x300 [ 186.280744][ T5111] ? __ia32_sys_tee+0xa0/0xa0 [ 186.285406][ T5111] splice_direct_to_actor+0x3f1/0xb30 [ 186.290769][ T5111] ? do_splice_direct+0x3e0/0x3e0 [ 186.295778][ T5111] ? pipe_to_sendpage+0x300/0x300 [ 186.300795][ T5111] ? security_file_permission+0x128/0x300 [ 186.306502][ T5111] do_splice_direct+0x28b/0x3e0 [ 186.311354][ T5111] ? splice_direct_to_actor+0xb30/0xb30 [ 186.316894][ T5111] ? security_file_permission+0x128/0x300 [ 186.322605][ T5111] do_sendfile+0x8e4/0x1140 [ 186.327099][ T5111] ? compat_writev+0x3c0/0x3c0 [ 186.331851][ T5111] ? vfs_write+0x422/0x4e0 [ 186.336261][ T5111] ? check_preemption_disabled+0x154/0x330 [ 186.342056][ T5111] __x64_sys_sendfile64+0x1c4/0x220 [ 186.347242][ T5111] ? __ia32_sys_sendfile+0x240/0x240 [ 186.352520][ T5111] do_syscall_64+0xcb/0x1e0 [ 186.357014][ T5111] entry_SYSCALL_64_after_hwframe+0x44/0xa9 07:11:14 executing program 0: inotify_init() r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='incremental-fs\x00', 0x4080, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffff7fffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 186.362895][ T5111] RIP: 0033:0x466459 [ 186.366782][ T5111] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 186.386370][ T5111] RSP: 002b:00007f94fb4ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 186.394749][ T5111] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 186.402689][ T5111] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 07:11:14 executing program 4 (fault-call:2 fault-nth:71): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ipv6_route\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x4000000000edbc) 07:11:14 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) sched_rr_get_interval(r0, &(0x7f0000000280)) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000001000000000463bc74f8071c8ffb929497481"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000002c0)='rpcgss_oid_to_mech\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32, @ANYBLOB="00000000000000001c0012000b00010062726964676500000c0002000500070005"], 0x3c}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="2825d48ac4d229c88920db49df00000010000104fdad082ecee24ae22d000000", @ANYRES32=r4, @ANYBLOB="0000000000a4a51100000008", @ANYRES32], 0x28}}, 0x0) 07:11:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004bb000/0x1000)=nil, 0x1000, 0xf, 0x11, r0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x470, 0x298, 0x150, 0x150, 0x298, 0x2e010000, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0x258, 0x298, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x149) 07:11:14 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/134, 0x86}], 0x1, 0x23, 0xffff0000) 07:11:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x14, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x298, 0x150, 0x150, 0x298, 0x0, 0x3a0, 0x238, 0x238, 0x3a0, 0x238, 0x3, 0x0, {[{{@ipv6={@remote, @private2, [], [], 'gretap0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) [ 186.410643][ T5111] RBP: 00007f94fb4ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 186.418598][ T5111] R10: 004000000000edbc R11: 0000000000000246 R12: 0000000000000002 [ 186.426535][ T5111] R13: 00007ffccbf734af R14: 00007f94fb4ec300 R15: 0000000000022000