evice loop5): open_ctree failed 14:48:40 executing program 0: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r5 = inotify_init() readv(r5, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r5, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r6 = dup3(r3, r4, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400204) getsockopt$packet_buf(r6, 0x107, 0x2, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0xfffffffffffffcc9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0x4, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 14:48:40 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_DECODER_CMD(0xffffffffffffffff, 0xc0485660, &(0x7f0000000100)={0x3, 0xa828babcaf84155d, @stop_pts=0xff}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x1a100, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f00000000c0)=0x1d, 0x4) 14:48:40 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, 0x0) 14:48:40 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='sessionid\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) recvfrom(0xffffffffffffffff, &(0x7f0000000280)=""/227, 0xe3, 0x341, &(0x7f00000003c0)=@pppol2tpv3={0x18, 0x1, {0x0, r4, {0x2, 0x4e24, @loopback}, 0x4, 0x1, 0x2, 0x3}}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000000000b2996a2913c2a7bc79c7275be1beb5df3694ce37fa85819ed2cc0269408e5ccf482ccb8ed26690df8d068cf6d3e844cf2e8a500c7e0ea9e5160b67320108e78cd326b058850f1c94dc40f61350b46dadde283ef27035e800f75412d49048c549cfb03500acd0da98a80a2a865a0ccf10af4973eb437682c05570eb885d1a1cb853"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x9, 0xa, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x6) get_thread_area(&(0x7f0000000240)={0x101, 0x20000000, 0xffffffffffffffff, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1}) dup(0xffffffffffffffff) 14:48:40 executing program 4: setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000180)=@gcm_128={{}, "463a92342d73f68f", "e8ca4c858b16eda5c8a30fb9e980c03c", "d565ab1b", "3bd5a4956999b1f6"}, 0x28) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x3, 0x3, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000400)) ioctl$KVM_RUN(r2, 0xae80, 0x0) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, 0x0, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffffffffffff6d, &(0x7f0000000180)={0x0}}, 0x2404a801) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000380)='/proc/capi/capi20ncci\x00', 0x80cbf76616c82aa6, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r9, 0x407, 0x0) write(r9, &(0x7f0000000340), 0x41395527) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0xff0c, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[]}, 0x1, 0x0, 0x0, 0x4000000}, 0x1204886e) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'vcan0\x00', r8}) socket$netlink(0x10, 0x3, 0x0) r11 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$nl_route(r11, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="480000001000050700"/18, @ANYRES32, @ANYRES32=0x0, @ANYBLOB], 0x4}}, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001980)=0x14) r13 = socket$netlink(0x10, 0x3, 0x0) r14 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) sendmsg$nl_route(r14, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES32=r15, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB], 0x5}}, 0x0) sendmsg$nl_route(r13, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x20, 0x12, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r15}}, 0x20}}, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001bc0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1a01821}, 0xc, &(0x7f0000001b80)={&(0x7f00000019c0)=ANY=[@ANYBLOB="a0010000", @ANYRES16=0x0, @ANYBLOB="00042dbd7000000000000100000008000100", @ANYRES32=0x0, @ANYBLOB="b800020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000100000008000600", @ANYRES32=r6, @ANYBLOB="74000100240001006272665f686173685f666e6300000000000000000000000000000000000000080003000b000000440004005500c849000000000700030303000000630a0910020000000000013c0000000007000004ff00000005000736030000000700050000000000ff000009060000000800010000", @ANYRES32=r10, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000400000008000600", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="780002003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r12, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=0x0], 0x1a0}, 0x1, 0x0, 0x0, 0x40}, 0x50000) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f00000004c0)="0a58ca3fbeb186e108ae30fc6a1db4806cb8d6197656af1334062599151319fc41ae10643547eb6d872fb4048bab35d6b50d6a052eb2dad40e2c252c7ad7f3f7758e0299f70ccd6a9c6c2e57dacd0b3cbb4ff9c919eeb8fdb39af9ef7a4c6d3059bbcbacad2d4b35394f90f567c0db3253655d792e23d43b74db31b37fcba7f5493286772f1ddbd1abc646de1eaece39cb36c7860a0c4936a018b9b8f5f126babff4d15bdf912078193bed8bba2cd7f7350ffa484c06434612c018f895f396a477309b95218907b21754758f52ef5911578ab49789ec380b27df76a85cfcf6bca1c89c064f", &(0x7f00000005c0)="9f8c9e664062ffec90992a0f239e05ecbd3dea24c67e652691deb6356902bc0424cd76463a534649ce94e6b88d78396a79bb968ec831df0f6f40bc7b2ca3cc4b47ad462bc524f37b1b7f12feed3aa5000bb91b75c8a595de35129440a89420a2b708ade22ab47b0ecfef0006fdf734e46cceb97bbc80526699253b8c23e2aec151a7906854f71a2e74f091cd9b382eb33d6a9f3a4034609b803be33625b0d80f08d9bdd7a18bbbc922493dd7975f563749905ceddc407bb6a2388e88bbcedceb23dd864383caec0504000117dbf0b74e1a9aa064fa0ddbb416fdbf8597cf3a73f48143e25457023538f7dee0", 0x4}, 0x20) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) sendmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x4000047) write(0xffffffffffffffff, &(0x7f00000004c0), 0x0) 14:48:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x59, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendto$inet(r0, &(0x7f0000000640)="3232ce2774e7a3797748648df71c7b4542839e347be35844e42ad67454cd5e140e0ab73493d6b6921681e5536dbc0f309747cc199a7f9a20d01e04d55fb1c26504e3e4738aac76780b5c2363a6dc4d10fe9adc2b363abf6981a31f6a58ef2103e7a145b11649eac6", 0x68, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0x1da9, 0x4) inotify_init() sendto$inet(r0, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) [ 436.394958] BTRFS error (device loop5): unsupported checksum algorithm 7790 [ 436.448162] BTRFS error (device loop5): superblock checksum mismatch [ 436.560181] BTRFS error (device loop5): open_ctree failed 14:48:40 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, 0x0) [ 436.783769] device bridge_slave_1 left promiscuous mode [ 436.792074] BTRFS error (device loop5): unsupported checksum algorithm 7790 [ 436.799808] bridge0: port 2(bridge_slave_1) entered disabled state [ 436.806656] BTRFS error (device loop5): superblock checksum mismatch [ 436.814033] device bridge_slave_0 left promiscuous mode 14:48:40 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, 0x0) [ 436.833134] bridge0: port 1(bridge_slave_0) entered disabled state [ 436.850301] BTRFS error (device loop5): open_ctree failed 14:48:40 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f8bc2099eacc29653b17fc237bdc714d5c120816f2fca9546b13cb8ce4442c6869919b0401a601a2fbbaf4160fbb71cfb63ae6d644b2558614296b6a08e9026922fad21df5c0a3df5d42fb8179593178f635a2394e864a3783e91d7604966cdf8b69a", 0x12c, 0x10000}], 0x0, 0x0) 14:48:40 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f00000003c0)={0xe0003}) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x4, 0x0, &(0x7f0000000040)=0x4f2086305ab1aa1d) flock(r3, 0x5) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f0000000300)="66b8ad008ed00f8d0808417b2c020f3548b800000100000000000f23c00f21f835010008000f23740fc778fc0f350fd8060f30", 0x33}], 0x1, 0x0, 0x0, 0x0) creat(0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) ioctl$KVM_INTERRUPT(r4, 0x4004ae86, &(0x7f0000000280)=0x101) perf_event_open(&(0x7f0000000200)={0x1, 0xfffffffffffffed5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x200000, 0x0) r6 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000700)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x6c08280}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14, r6, 0x400, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0xc001}, 0x20040801) r7 = socket(0x11, 0x2, 0x0) r8 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r7, 0x89e3, 0x0) ioctl$NBD_SET_SOCK(r8, 0xab00, r7) sendmsg$NET_DM_CMD_START(r7, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40200800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r6, 0x8, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x30010863}, 0x48001) sendmsg$NET_DM_CMD_STOP(r5, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8600000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r6, 0x200, 0x70bd2c, 0x25dfdbff, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x8030}, 0x11) ioctl$VIDIOC_REQBUFS(r5, 0xc0145608, &(0x7f0000000000)={0x1a, 0x3, 0x3}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r9 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r9) [ 437.002917] BTRFS error (device loop5): unsupported checksum algorithm 7790 [ 437.025880] device hsr_slave_1 left promiscuous mode [ 437.036870] BTRFS error (device loop5): superblock checksum mismatch [ 437.064643] device hsr_slave_0 left promiscuous mode [ 437.084642] team0 (unregistering): Port device team_slave_1 removed [ 437.091734] BTRFS error (device loop5): open_ctree failed 14:48:41 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) socket(0x0, 0x4, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 437.122594] team0 (unregistering): Port device team_slave_0 removed 14:48:41 executing program 0: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r5 = inotify_init() readv(r5, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r5, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r6 = dup3(r3, r4, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400204) getsockopt$packet_buf(r6, 0x107, 0x2, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0xfffffffffffffcc9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0x4, 0x0) 14:48:41 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, 0x0) [ 437.188395] block nbd3: Device being setup by another task [ 437.233902] bond0 (unregistering): Releasing backup interface bond_slave_1 14:48:41 executing program 4: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r5 = inotify_init() readv(r5, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r5, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r6 = dup3(r3, r4, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400204) getsockopt$packet_buf(r6, 0x107, 0x2, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0xfffffffffffffcc9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0x4, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) [ 437.274930] BTRFS error (device loop5): unsupported checksum algorithm 7790 [ 437.312205] BTRFS error (device loop5): superblock checksum mismatch [ 437.318902] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 437.402212] BTRFS error (device loop5): open_ctree failed [ 437.454548] bond0 (unregistering): Released all slaves 14:48:41 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, 0x0) [ 437.578901] BTRFS error (device loop5): unsupported checksum algorithm 7790 [ 437.595733] BTRFS error (device loop5): superblock checksum mismatch [ 437.680177] BTRFS error (device loop5): open_ctree failed [ 439.510114] net_ratelimit: 24 callbacks suppressed [ 439.510157] protocol 88fb is buggy, dev hsr_slave_1 [ 439.515300] protocol 88fb is buggy, dev hsr_slave_0 [ 439.525525] protocol 88fb is buggy, dev hsr_slave_1 [ 439.597065] IPVS: ftp: loaded support on port[0] = 21 [ 439.683663] chnl_net:caif_netlink_parms(): no params data found [ 439.723310] bridge0: port 1(bridge_slave_0) entered blocking state [ 439.730095] bridge0: port 1(bridge_slave_0) entered disabled state [ 439.737169] device bridge_slave_0 entered promiscuous mode [ 439.744500] bridge0: port 2(bridge_slave_1) entered blocking state [ 439.751240] bridge0: port 2(bridge_slave_1) entered disabled state [ 439.758237] device bridge_slave_1 entered promiscuous mode [ 439.775995] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 439.785736] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 439.804670] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 439.811896] team0: Port device team_slave_0 added [ 439.817769] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 439.825140] team0: Port device team_slave_1 added [ 439.830568] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 439.839423] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 439.858368] device hsr_slave_0 entered promiscuous mode [ 439.865247] device hsr_slave_1 entered promiscuous mode [ 439.871372] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 439.878453] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 439.893222] bridge0: port 2(bridge_slave_1) entered blocking state [ 439.899847] bridge0: port 2(bridge_slave_1) entered forwarding state [ 439.906524] bridge0: port 1(bridge_slave_0) entered blocking state [ 439.912897] bridge0: port 1(bridge_slave_0) entered forwarding state [ 439.944533] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 439.951603] 8021q: adding VLAN 0 to HW filter on device bond0 [ 439.960808] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 439.969466] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 439.977774] bridge0: port 1(bridge_slave_0) entered disabled state [ 439.985004] bridge0: port 2(bridge_slave_1) entered disabled state [ 439.996154] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 440.002741] 8021q: adding VLAN 0 to HW filter on device team0 [ 440.011904] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 440.019518] bridge0: port 1(bridge_slave_0) entered blocking state [ 440.025915] bridge0: port 1(bridge_slave_0) entered forwarding state [ 440.041092] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 440.049002] bridge0: port 2(bridge_slave_1) entered blocking state [ 440.055404] bridge0: port 2(bridge_slave_1) entered forwarding state [ 440.073152] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 440.084105] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 440.094902] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 440.102202] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 440.109848] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 440.117963] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 440.126180] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 440.134690] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 440.141980] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 440.154620] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 440.167297] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 440.240010] protocol 88fb is buggy, dev hsr_slave_0 [ 440.245550] protocol 88fb is buggy, dev hsr_slave_1 14:48:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x200000, 0x0) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000700)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x6c08280}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14, r4, 0x400, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0xfffffffffffffdb8}}, 0x20040801) r5 = socket(0x11, 0x2, 0x0) r6 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r5, 0x89e3, 0x0) ioctl$NBD_SET_SOCK(r6, 0xab00, r5) sendmsg$NET_DM_CMD_START(r5, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40200800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r4, 0x8, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x30010863}, 0x48001) sendmsg$NET_DM_CMD_STOP(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8600000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r4, 0x200, 0x70bd2c, 0x25dfdbff, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x8030}, 0x11) ioctl$EVIOCGBITKEY(r3, 0x80404521, &(0x7f0000000080)=""/78) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000001580)='/dev/rtc0\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(r0, r7, &(0x7f000000f000/0x18000)=nil, 0x0, 0xfffffffffffffe66, 0x0, 0x0, 0xffffffffffffff26) 14:48:44 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, 0x0) 14:48:44 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0x40000, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r1) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, &(0x7f0000000000)="f0fd5409", &(0x7f00000000c0)="23f2bc29cfbcbbdba1f36e3e3f30397311b589bc1af3b7914b58c5b8d15d315898bfe11cb815b0e6b54ae6481cb4b19771fdaaa42250ba29b7ca9b464ab14c5477934a047f96ab2042ca26b1bbd10d569211f409dec8b6308814c064d2c8fa303741e887c71efdf9babca1d2e8a9e41584189f1a86e965018cfe8030939d32cc4e2f0b4afd73215d4a7b03fc185558b2963fa071a574a4096add7e70f990a9a9579ec10b30fdc5c8cf2f45f571798b7ed4288660c41e17554bbbd1dab3444c738a900f293bfc0620f5e7f9a65b853e6058d00018", 0x4}, 0x20) 14:48:44 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f00000003c0)={0xe0003}) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x4, 0x0, &(0x7f0000000040)=0x4f2086305ab1aa1d) flock(r3, 0x5) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f0000000300)="66b8ad008ed00f8d0808417b2c020f3548b800000100000000000f23c00f21f835010008000f23740fc778fc0f350fd8060f30", 0x33}], 0x1, 0x0, 0x0, 0x0) creat(0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) ioctl$KVM_INTERRUPT(r4, 0x4004ae86, &(0x7f0000000280)=0x101) perf_event_open(&(0x7f0000000200)={0x1, 0xfffffffffffffed5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x200000, 0x0) r6 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000700)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x6c08280}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14, r6, 0x400, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0xc001}, 0x20040801) r7 = socket(0x11, 0x2, 0x0) r8 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r7, 0x89e3, 0x0) ioctl$NBD_SET_SOCK(r8, 0xab00, r7) sendmsg$NET_DM_CMD_START(r7, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40200800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r6, 0x8, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x30010863}, 0x48001) sendmsg$NET_DM_CMD_STOP(r5, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8600000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r6, 0x200, 0x70bd2c, 0x25dfdbff, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x8030}, 0x11) ioctl$VIDIOC_REQBUFS(r5, 0xc0145608, &(0x7f0000000000)={0x1a, 0x3, 0x3}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r9 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r9) 14:48:44 executing program 0: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r5 = inotify_init() readv(r5, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r5, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r6 = dup3(r3, r4, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400204) getsockopt$packet_buf(r6, 0x107, 0x2, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0xfffffffffffffcc9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) socket$packet(0x11, 0x0, 0x300) 14:48:44 executing program 4: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r5 = inotify_init() readv(r5, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r5, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r6 = dup3(r3, r4, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400204) getsockopt$packet_buf(r6, 0x107, 0x2, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0xfffffffffffffcc9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0x4, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) [ 440.280392] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 14:48:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x80002, 0x0) connect$netlink(r2, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x40, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f0000000040)={0x20, 0x92, 0x3, 0x0, 0x5, 0x6, 0x4, 0x5, 0x3a, 0x2, 0xdb, 0x5, 0x0, 0x6, 0x5, 0x1, 0x9, 0x3, 0x1}) [ 440.359976] protocol 88fb is buggy, dev hsr_slave_0 [ 440.365143] protocol 88fb is buggy, dev hsr_slave_1 [ 440.386603] BTRFS error (device loop5): unsupported checksum algorithm 7790 [ 440.393987] protocol 88fb is buggy, dev hsr_slave_0 [ 440.399125] protocol 88fb is buggy, dev hsr_slave_1 14:48:44 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) finit_module(r1, &(0x7f0000000300)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x1) close(r0) clone(0x8000, &(0x7f00000000c0)="f1be785d8847830bfac2d2e2cbfbc39c91b201bbffdb9259e0a44a10f29d7e64310a6b392a7e932688732b5ac5e9c28a3cabce8232541e4ad9aa7cae2408a5dce4946fdd1d41e4d250a9b15dc1caf2689c7168e2ad3e6ff5c663d85704e8038734faf85875a46884a9980d432ce210632e6d77600423c7e4b6b0f776b4889e42ee4b54dea8ac0783f106f19361e70aee8ca690497510fd58c7dabc060f8c0b52976acead504bf34b7d180b28a08b3f2a87d65a7533855fd36c52a735a102d48edd347e7ac9913b93e1cfe322a7ac41e393b42257689791d0e4f388196489a71aed88f90942d6ab56332ef1", &(0x7f0000000000), &(0x7f00000001c0), &(0x7f0000000280)="0070bec26a0206db9fa0f9924a4137b6f69cdd2b7e13e59e31a3e54cb72018b047c294d63b595bd6d6070a366458cf4afe27f1c78a6e3c714ff67a4169da8c3b7b354c7170") socket(0x0, 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000380)={0x4, {0x3f, 0x2c000, 0x7, 0x1f, 0x3, 0x6}}) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 440.413985] BTRFS error (device loop5): superblock checksum mismatch [ 440.480725] BTRFS error (device loop5): open_ctree failed [ 440.490029] protocol 88fb is buggy, dev hsr_slave_0 14:48:44 executing program 1: socket$alg(0x26, 0x5, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() mmap(&(0x7f0000ff3000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setscheduler(r1, 0x1, &(0x7f0000000240)=0x4) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000028c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$FS_IOC_MEASURE_VERITY(r5, 0xc0046686, &(0x7f00000002c0)=ANY=[@ANYBLOB="00000a00b22c87d8af2871d1f8b4f269b4874e35978261b31e18c5689b96a64f51b2febb2afa0d591ec484dc8d118733cc14a5709f4572cbac673d33910ee98723a75adda51270b9be168127"]) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) sched_setattr(0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000640)=ANY=[@ANYBLOB="66696c74707200000000000000000000000000000000000000000000000000005a00000036c3d65c305b2026e7e7185e2438febacdf3953ecc8e67297fdf52c36476d2de35bf02ecfbd5ee388fec1a343c4516bc0400000096d179140424caa821cec3e92a5fbdbab6ae542a4b1b38c870465a263a34a1e381887a24cf72"], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x37d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt(0xffffffffffffffff, 0xff, 0x1, 0x0, &(0x7f0000000040)) accept$inet(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xd, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x200000000, 0xffffffffffffffff, 0x1}, 0x0, 0x8, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) [ 440.554923] block nbd3: Device being setup by another task 14:48:44 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, 0x0) [ 440.674661] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 440.698707] BTRFS error (device loop5): unsupported checksum algorithm 7790 [ 440.725714] BTRFS error (device loop5): superblock checksum mismatch [ 440.800162] BTRFS error (device loop5): open_ctree failed 14:48:44 executing program 5: socketpair$unix(0x1, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, 0x0) [ 440.979051] BTRFS error (device loop5): unsupported checksum algorithm 7790 [ 441.016978] BTRFS error (device loop5): superblock checksum mismatch [ 441.043035] device bridge_slave_1 left promiscuous mode [ 441.053945] bridge0: port 2(bridge_slave_1) entered disabled state [ 441.076075] device bridge_slave_0 left promiscuous mode [ 441.090273] bridge0: port 1(bridge_slave_0) entered disabled state [ 441.113743] BTRFS error (device loop5): open_ctree failed 14:48:45 executing program 5: socketpair$unix(0x1, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, 0x0) 14:48:45 executing program 4: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r5 = inotify_init() readv(r5, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r5, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r6 = dup3(r3, r4, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400204) getsockopt$packet_buf(r6, 0x107, 0x2, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0xfffffffffffffcc9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0x4, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 14:48:45 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f00000003c0)={0xe0003}) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_BT_DEFER_SETUP(r3, 0x12, 0x4, 0x0, &(0x7f0000000040)=0x4f2086305ab1aa1d) flock(r3, 0x5) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f0000000300)="66b8ad008ed00f8d0808417b2c020f3548b800000100000000000f23c00f21f835010008000f23740fc778fc0f350fd8060f30", 0x33}], 0x1, 0x0, 0x0, 0x0) creat(0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) ioctl$KVM_INTERRUPT(r4, 0x4004ae86, &(0x7f0000000280)=0x101) perf_event_open(&(0x7f0000000200)={0x1, 0xfffffffffffffed5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x200000, 0x0) r6 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000700)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x6c08280}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14, r6, 0x400, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0xc001}, 0x20040801) r7 = socket(0x11, 0x2, 0x0) r8 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r7, 0x89e3, 0x0) ioctl$NBD_SET_SOCK(r8, 0xab00, r7) sendmsg$NET_DM_CMD_START(r7, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40200800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r6, 0x8, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x30010863}, 0x48001) sendmsg$NET_DM_CMD_STOP(r5, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8600000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r6, 0x200, 0x70bd2c, 0x25dfdbff, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x8030}, 0x11) ioctl$VIDIOC_REQBUFS(r5, 0xc0145608, &(0x7f0000000000)={0x1a, 0x3, 0x3}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r9 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r9) 14:48:45 executing program 0: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r5 = inotify_init() readv(r5, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r5, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r6 = dup3(r3, r4, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400204) getsockopt$packet_buf(r6, 0x107, 0x2, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0xfffffffffffffcc9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) 14:48:45 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000700)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x6c08280}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14, r1, 0x400, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0xfffffffffffffdb8}}, 0x20040801) r2 = socket(0x11, 0x2, 0x0) r3 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r2, 0x89e3, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r2) sendmsg$NET_DM_CMD_START(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40200800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r1, 0x8, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x30010863}, 0x48001) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000008c0), &(0x7f0000000900)=0x4) socket(0x0, 0x0, 0x0) syz_mount_image$nfs4(&(0x7f0000000000)='nfs4\x00', &(0x7f00000000c0)='./file0\x00', 0xba7d, 0xa, &(0x7f0000000740)=[{&(0x7f0000000100)="1299218014305f21fe36650c581d46123c5fe174c7f1a5d4542fef2632bc1636bdbabaa1ee15c7997f07c8126b277e02b070d6b88be006d680a1e39a8de83a4c3bafa42918bf612d037420541c4fc4d89a0629020376fe3687929948fb4c182b776773c8977a14b3337739e5c05275f058d6472f42ec44c9b5cc235202325c456b8e3558e7a41cdd4ced739ffbbd4b97ff7462abceab1d0457d3d5eb3c76d740ca30bc9029694feb284b149ee244c4d618af306073952a8984b3641939fbaea12480435018ce39142c1f16fa8c527e078fe9e71fa3ca0d61dc0938f5f39480618f4f9e76ffd8ea", 0xe7, 0x9}, {&(0x7f0000000280)="7d1987968d8f16d7d41c22be7a4598f77e001410fe5dcf80d505ffeefb35fd12edf1ecfb9da9b50e29b897a39ee9b6f02a893e1e7044a2346805d977f7d4dde3b38deb4559fc903a69a5412c0e4c0372181263987ac5453271504b909f3b6268a4415cc7baf6c1838e0f7e4e686bd2345bec7826455489d9d173690cf26db54ef34ecd7a3c01a5cbf88f7dc5b2cdc69036989705172bc3f60e9b314c5ef337f6bb76aaf4355046709e261f2399c9d329aef921406ca7ac3e6ae0", 0xba, 0x5}, {&(0x7f0000000340)="6a8b0c677286c6477b693b31b2cf8629108e39c8e1a7362901c5dd0f3bf04005e4067c508e4f40c0019f9b5c884a82cdc0706975229ad9167ed274e958a9d8686033d953835810d8dc96663c435b52fdb7affc18644143d340fd31fdb32158500481c9971a9628ad1989a09ba969f4", 0x6f, 0x1}, {&(0x7f00000003c0)="dcc0b45c650ebf3fbdba90652ae19e60e652c61b288107d5484541759e779c61cf3fe73bb5755b19a6c45e1e58cb8933688421dc8bc74e50fb4fb7da7e48cf2720a58d45e35bc0891846", 0x4a, 0x6}, {&(0x7f0000000440)="ae25a359332429cb84b009871c2b166c65789646d71ef44592e7086ebda30ccacd8e3d15e7ebdb7242f7254e1e4e", 0x2e, 0x9}, {&(0x7f0000000480)="b519980248004b426f1daa75f17309a1d6fca409e7d1fed4feec9b7a7bf2a220f105457681e6d5680acdecffdfcee930116e4c8671733bd537326b1d0dee123a5745951acc34d31543ceb8dd6d52a75f26ce80183390ef6a7deda8fb0128aa051e871f281667e05c8cfa6ccc58f4614a37aed0f97485c519", 0x78, 0x1}, {&(0x7f0000000500)="9b28fce8fc3e2241c51027573d9cbd945a0153c01f49e003a0e1764aaca37950c165c25362cdd7032e8e7435ec62a6b5fa0d5398a7d96e1cb69a0a096e8410d8c1c5613dec3bb27827fddd51d83c31e4cd11b0b4a184b5bd9e3c41ae34879c9b2d1008dc5970f56284ac658011a7a4a492db900c57f580833303d67d1a191fdc51495380b39fbfe045dfd29eb71bf002ac4aea74847a6e459fcc49ef1ddffd65", 0xa0, 0x6}, {&(0x7f00000005c0)="0e007acae52bf840a570e7813cdd0e86fe012b01db87312b2cdc680829c33166a98b1ba7d0923d3088dc0e80f38f3b0da17ac18238984dc72c58eb033deaa33ff762f1433523643d5a5dd5a5b130b64f2fc104c2246d9236049c3a77b4b400f0d5", 0x61, 0x3}, {&(0x7f0000000640)="9528e6aac9a86da7976460e93ed60f11a7ed03d9bc2053233487f8f24f274209b5941cb7bf0a11c9f0676fd14775e993a4681c66a39d28a205364cc2b723f825ab822aba107647e21fd472da9e0635a13fa30dcf6a4406af975bfe22947550af1ea203584e1ece0f6dfee57ca4684d5c1900ac8255", 0x75, 0x7}, {&(0x7f00000006c0)="5b9ff7a5e62aa145a3388e1e07b06d00772bfdff4bc33563300cd1d40852e5fbf714c138318aa022a9a0fc5e7d3917e62f5dc13e18c3652c1323e67c44a10df6ce6ac4461217b7da4a20e87f84f79bc345722c7da83df6a6833c8f874f10986bf7290b576902558f0c25bca2", 0x6c, 0x400}], 0x8, &(0x7f0000000840)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 441.381488] BTRFS error (device loop5): unsupported checksum algorithm 7790 [ 441.413052] device hsr_slave_1 left promiscuous mode [ 441.424212] BTRFS error (device loop5): superblock checksum mismatch [ 441.448970] device hsr_slave_0 left promiscuous mode [ 441.469503] team0 (unregistering): Port device team_slave_1 removed [ 441.481850] team0 (unregistering): Port device team_slave_0 removed [ 441.491662] BTRFS error (device loop5): open_ctree failed [ 441.510594] bond0 (unregistering): Releasing backup interface bond_slave_1 14:48:45 executing program 5: socketpair$unix(0x1, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f8bc2099eacc29653b17fc237bdc714d5c120816f2fca9546b13cb8ce4442c6869919b0401a601a2fbbaf4160fbb71cfb63ae6d644b2558614296b6a08e9026922fad21df5c0a3df5d42fb8179593178f635a2394e864a3783e91d7604966cdf8b69a", 0x12c, 0x10000}], 0x0, 0x0) [ 441.533724] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 441.548730] block nbd2: Device being setup by another task [ 441.616258] block nbd3: Device being setup by another task 14:48:45 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) set_mempolicy(0x0, &(0x7f00000001c0)=0x6, 0x8) r2 = getpgrp(r1) wait4(r2, &(0x7f0000000180), 0x20000000, &(0x7f0000000280)) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x158280, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f00000000c0)={0x0, 0x45, "a5ca7668e07bbf8e5797fceb4958d3a00716f1c13cd94205f7b80de5f4b3c566669bcac147fbd6d3ead33f698387718ed99178e562130f0c8500da483666c9c9a4c4a82c4b"}, &(0x7f0000000140)=0x4d) [ 441.709212] BTRFS error (device loop5): unsupported checksum algorithm 7790 [ 441.743512] BTRFS error (device loop5): superblock checksum mismatch 14:48:45 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, 0x0) [ 441.810960] BTRFS error (device loop5): open_ctree failed [ 441.839268] bond0 (unregistering): Released all slaves 14:48:45 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) ioctl$USBDEVFS_DISCARDURB(r0, 0x550b, &(0x7f0000000000)=0xd32) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) socket(0x2, 0x6, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 441.998254] BTRFS error (device loop5): unsupported checksum algorithm 7790 [ 442.019016] BTRFS error (device loop5): superblock checksum mismatch [ 442.080181] BTRFS error (device loop5): open_ctree failed [ 443.361085] IPVS: ftp: loaded support on port[0] = 21 [ 443.445034] chnl_net:caif_netlink_parms(): no params data found [ 443.481253] bridge0: port 1(bridge_slave_0) entered blocking state [ 443.487937] bridge0: port 1(bridge_slave_0) entered disabled state [ 443.495017] device bridge_slave_0 entered promiscuous mode [ 443.502010] bridge0: port 2(bridge_slave_1) entered blocking state [ 443.508629] bridge0: port 2(bridge_slave_1) entered disabled state [ 443.516010] device bridge_slave_1 entered promiscuous mode [ 443.533216] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 443.542317] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 443.558785] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 443.566177] team0: Port device team_slave_0 added [ 443.571736] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 443.578848] team0: Port device team_slave_1 added [ 443.584391] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 443.591899] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 443.613110] device hsr_slave_0 entered promiscuous mode [ 443.618825] device hsr_slave_1 entered promiscuous mode [ 443.625338] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 443.632898] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 443.645446] bridge0: port 2(bridge_slave_1) entered blocking state [ 443.651946] bridge0: port 2(bridge_slave_1) entered forwarding state [ 443.658525] bridge0: port 1(bridge_slave_0) entered blocking state [ 443.664899] bridge0: port 1(bridge_slave_0) entered forwarding state [ 443.694695] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 443.701234] 8021q: adding VLAN 0 to HW filter on device bond0 [ 443.709450] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 443.718697] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 443.726135] bridge0: port 1(bridge_slave_0) entered disabled state [ 443.733627] bridge0: port 2(bridge_slave_1) entered disabled state [ 443.743866] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 443.750409] 8021q: adding VLAN 0 to HW filter on device team0 [ 443.758846] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 443.766842] bridge0: port 1(bridge_slave_0) entered blocking state [ 443.773351] bridge0: port 1(bridge_slave_0) entered forwarding state [ 443.784037] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 443.791732] bridge0: port 2(bridge_slave_1) entered blocking state [ 443.798112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 443.812477] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 443.820576] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 443.837410] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 443.844984] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 443.852657] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 443.861526] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 443.867598] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 443.881738] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 443.892893] 8021q: adding VLAN 0 to HW filter on device batadv0 14:48:48 executing program 1: socket$alg(0x26, 0x5, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() mmap(&(0x7f0000ff3000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setscheduler(r1, 0x1, &(0x7f0000000240)=0x4) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000028c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$FS_IOC_MEASURE_VERITY(r5, 0xc0046686, &(0x7f00000002c0)=ANY=[@ANYBLOB="00000a00b22c87d8af2871d1f8b4f269b4874e35978261b31e18c5689b96a64f51b2febb2afa0d591ec484dc8d118733cc14a5709f4572cbac673d33910ee98723a75adda51270b9be168127"]) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) sched_setattr(0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000640)=ANY=[@ANYBLOB="66696c74707200000000000000000000000000000000000000000000000000005a00000036c3d65c305b2026e7e7185e2438febacdf3953ecc8e67297fdf52c36476d2de35bf02ecfbd5ee388fec1a343c4516bc0400000096d179140424caa821cec3e92a5fbdbab6ae542a4b1b38c870465a263a34a1e381887a24cf72"], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x37d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt(0xffffffffffffffff, 0xff, 0x1, 0x0, &(0x7f0000000040)) accept$inet(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xd, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x200000000, 0xffffffffffffffff, 0x1}, 0x0, 0x8, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) 14:48:48 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r3) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000140)="8f", 0x7a) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x14e, [0x0, 0x20000600, 0x2000084e, 0x200009fc], 0x0, &(0x7f00000000c0), &(0x7f0000000600)=[{}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{0x3, 0x18, 0x88ca, 'veth1_to_hsr\x00', 'lapb0\x00', 'ipddp0\x00', 'bridge_slave_0\x00', @broadcast, [0xff, 0xff, 0xff, 0xff, 0x0, 0xa5ec27125e94fece], @local, [0xff, 0xf7c18f3d099a11b8, 0xff, 0xff, 0x0, 0xff], 0x6e, 0x6e, 0xbe, [], [], @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}]}, 0x1c6) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) dup3(r2, r1, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_RM_MAP(0xffffffffffffffff, 0x4028641b, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) 14:48:48 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f8bc2099eacc29653b17fc237bdc714d5c120816f2fca9546b13cb8ce4442c6869919b0401a601a2fbbaf4160fbb71cfb63ae6d644b2558614296b6a08e9026922fad21df5c0a3df5d42fb8179593178f635a2394e864a3783e91d7604966cdf8b69a", 0x12c, 0x10000}], 0x0, 0x0) 14:48:48 executing program 4: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r5 = inotify_init() readv(r5, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r5, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r6 = dup3(r3, r4, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400204) getsockopt$packet_buf(r6, 0x107, 0x2, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0xfffffffffffffcc9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0x4, 0x0) 14:48:48 executing program 0: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r5 = inotify_init() readv(r5, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r5, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r6 = dup3(r3, r4, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400204) getsockopt$packet_buf(r6, 0x107, 0x2, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0xfffffffffffffcc9) 14:48:48 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f8bc2099eacc29653b17fc237bdc714d5c120816f2fca9546b13cb8ce4442c6869919b0401a601a2fbbaf4160fbb71cfb63ae6d644b2558614296b6a08e9026922fad21df5c0a3df5d42fb8179593178f635a2394e864a3783e91d7604966cdf8b69a", 0x12c, 0x10000}], 0x0, 0x0) 14:48:48 executing program 3: sched_setaffinity(0x0, 0x2de, &(0x7f0000000240)=0x40000000000009) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x200000, 0x0) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000700)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x6c08280}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14, r1, 0x400, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0xfffffffffffffdb8}}, 0x20040801) r2 = socket(0x11, 0x2, 0x0) r3 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r2, 0x89e3, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r2) sendmsg$NET_DM_CMD_START(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40200800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r1, 0x8, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x30010863}, 0x48001) sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8600000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r1, 0x200, 0x70bd2c, 0x25dfdbff, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x8030}, 0x11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x30010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = open(0x0, 0x0, 0x0) write$P9_RSYMLINK(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETCARRIER(r4, 0x400454e2, &(0x7f0000000280)) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') keyctl$unlink(0x9, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x80000000000002, &(0x7f0000000200)=0x78, 0x4) bind$inet(r5, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) ioctl$KVM_SET_TSS_ADDR(r7, 0xae47, 0xd000) ioctl$KVM_CREATE_PIT2(r7, 0x4040ae77, &(0x7f0000000040)={0x2}) ioctl$KVM_SET_USER_MEMORY_REGION(r7, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4, 0x10, r7, 0x0) ioctl$sock_netdev_private(r5, 0x89f5, &(0x7f00000002c0)="e00b028f41584e0e80ea8422a3592e2a87e083622dbec513a367e342910040d1a10b7e8f5cc38bc580b4ead21efed9a482a85dc93ce5f023419b4e93213362da3058551aa4f312fac6d012c302f6b93b988e8b0e17047302808137c93dc9f8a5955f1270243d4e103ee0c9cd64db5fc9af5de1181b24ba2fbb4bee53db98f781ef41") setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r8 = socket$alg(0x26, 0x5, 0x0) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') bind$alg(r8, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'wp384\x00'}, 0x58) r10 = accept4$alg(r8, 0x0, 0x0, 0x0) sendfile(r10, r9, 0x0, 0x3ff) r11 = syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r9, &(0x7f00000003c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000180)={0x2c, r11, 0x10, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, [""]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x60000000) recvmsg(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001800)=""/4096, 0x1000}], 0x1}, 0x100) write$binfmt_elf64(r5, &(0x7f0000001640)=ANY=[], 0xf5aab446) [ 444.229814] BTRFS error (device loop5): unsupported checksum algorithm 7790 [ 444.238888] BTRFS error (device loop5): superblock checksum mismatch [ 444.262611] block nbd3: Device being setup by another task [ 444.281485] BTRFS error (device loop5): open_ctree failed 14:48:48 executing program 1: socket$alg(0x26, 0x5, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() mmap(&(0x7f0000ff3000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setscheduler(r1, 0x1, &(0x7f0000000240)=0x4) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000028c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$FS_IOC_MEASURE_VERITY(r5, 0xc0046686, &(0x7f00000002c0)=ANY=[@ANYBLOB="00000a00b22c87d8af2871d1f8b4f269b4874e35978261b31e18c5689b96a64f51b2febb2afa0d591ec484dc8d118733cc14a5709f4572cbac673d33910ee98723a75adda51270b9be168127"]) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) sched_setattr(0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000640)=ANY=[@ANYBLOB="66696c74707200000000000000000000000000000000000000000000000000005a00000036c3d65c305b2026e7e7185e2438febacdf3953ecc8e67297fdf52c36476d2de35bf02ecfbd5ee388fec1a343c4516bc0400000096d179140424caa821cec3e92a5fbdbab6ae542a4b1b38c870465a263a34a1e381887a24cf72"], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x37d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt(0xffffffffffffffff, 0xff, 0x1, 0x0, &(0x7f0000000040)) accept$inet(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xd, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x200000000, 0xffffffffffffffff, 0x1}, 0x0, 0x8, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) 14:48:48 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f8bc2099eacc29653b17fc237bdc714d5c120816f2fca9546b13cb8ce4442c6869919b0401a601a2fbbaf4160fbb71cfb63ae6d644b2558614296b6a08e9026922fad21df5c0a3df5d42fb8179593178f635a2394e864a3783e91d7604966cdf8b69a", 0x12c, 0x10000}], 0x0, 0x0) [ 444.452687] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 444.541577] BTRFS error (device loop5): unsupported checksum algorithm 7790 [ 444.549440] BTRFS error (device loop5): superblock checksum mismatch [ 444.556523] net_ratelimit: 32 callbacks suppressed [ 444.556529] protocol 88fb is buggy, dev hsr_slave_0 [ 444.556577] protocol 88fb is buggy, dev hsr_slave_1 [ 444.610251] BTRFS error (device loop5): open_ctree failed [ 444.720203] protocol 88fb is buggy, dev hsr_slave_0 [ 444.725346] protocol 88fb is buggy, dev hsr_slave_1 14:48:48 executing program 1: socket$alg(0x26, 0x5, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() mmap(&(0x7f0000ff3000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setscheduler(r1, 0x1, &(0x7f0000000240)=0x4) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000028c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$FS_IOC_MEASURE_VERITY(r5, 0xc0046686, &(0x7f00000002c0)=ANY=[@ANYBLOB="00000a00b22c87d8af2871d1f8b4f269b4874e35978261b31e18c5689b96a64f51b2febb2afa0d591ec484dc8d118733cc14a5709f4572cbac673d33910ee98723a75adda51270b9be168127"]) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) sched_setattr(0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000640)=ANY=[@ANYBLOB="66696c74707200000000000000000000000000000000000000000000000000005a00000036c3d65c305b2026e7e7185e2438febacdf3953ecc8e67297fdf52c36476d2de35bf02ecfbd5ee388fec1a343c4516bc0400000096d179140424caa821cec3e92a5fbdbab6ae542a4b1b38c870465a263a34a1e381887a24cf72"], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x37d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt(0xffffffffffffffff, 0xff, 0x1, 0x0, &(0x7f0000000040)) accept$inet(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xd, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x200000000, 0xffffffffffffffff, 0x1}, 0x0, 0x8, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) 14:48:48 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, 0x0) 14:48:49 executing program 0: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r5 = inotify_init() readv(r5, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r5, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r6 = dup3(r3, r4, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400204) getsockopt$packet_buf(r6, 0x107, 0x2, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0xfffffffffffffcc9) [ 444.968220] BTRFS error (device loop5): unsupported checksum algorithm 7790 [ 444.981003] BTRFS error (device loop5): superblock checksum mismatch 14:48:49 executing program 4: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r5 = inotify_init() readv(r5, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r5, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r6 = dup3(r3, r4, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400204) getsockopt$packet_buf(r6, 0x107, 0x2, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0xfffffffffffffcc9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) socket$packet(0x11, 0x0, 0x300) 14:48:49 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 445.030038] protocol 88fb is buggy, dev hsr_slave_0 [ 445.035220] protocol 88fb is buggy, dev hsr_slave_1 [ 445.061025] BTRFS error (device loop5): open_ctree failed [ 445.110037] protocol 88fb is buggy, dev hsr_slave_0 [ 445.115262] protocol 88fb is buggy, dev hsr_slave_1 14:48:49 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, 0x0) [ 445.207535] audit: type=1400 audit(1571323729.189:203): avc: denied { map } for pid=19042 comm="syz-executor.3" path="/dev/kvm" dev="devtmpfs" ino=1111 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:kvm_device_t:s0 tclass=chr_file permissive=1 14:48:49 executing program 1: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r5 = inotify_init() readv(r5, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r5, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r6 = dup3(r3, r4, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400204) getsockopt$packet_buf(r6, 0x107, 0x2, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0xfffffffffffffcc9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0x4, 0x0) 14:48:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r1, 0x40505331, &(0x7f00000000c0)={{0x0, 0x5}, {0x19, 0x3f}, 0xbca8, 0x6, 0x4}) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendto$inet(r0, &(0x7f0000000640)="3232ce2774e7a3797748648df71c7b4542839e347be35844e42ad67454cd5e140e0ab73493d6b6921681e5536dbc0f309747cc199a7f9a20d01e04d55fb1c26504e3e4738aac76780b5c2363a6dc4d10fe9adc2b363abf6981a31f6a58ef2103e7a145b11649ea", 0x67, 0x24008086, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0x1da9, 0x4) sendto$inet(r0, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) [ 445.360410] BTRFS error (device loop5): unsupported checksum algorithm 7790 [ 445.379119] BTRFS error (device loop5): superblock checksum mismatch [ 445.432730] BTRFS error (device loop5): open_ctree failed 14:48:49 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, 0x0) [ 445.547513] BTRFS error (device loop5): unsupported checksum algorithm 7790 [ 445.555274] BTRFS error (device loop5): superblock checksum mismatch [ 445.611596] BTRFS error (device loop5): open_ctree failed 14:48:49 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, 0x0) 14:48:49 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x2000, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) readv(r0, &(0x7f0000395000)=[{&(0x7f00004d2000)=""/4096, 0x1000}], 0x1) read$FUSE(r0, &(0x7f0000000340), 0x12fe) r1 = dup2(r0, 0xffffffffffffffff) bind$alg(r1, &(0x7f0000000240)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes192\x00'}, 0x58) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000700)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x6c08280}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14, r3, 0x400, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0xfffffffffffffdb8}}, 0x20040801) r4 = socket(0x11, 0x2, 0x0) r5 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r4, 0x89e3, 0x0) ioctl$NBD_SET_SOCK(r5, 0xab00, r4) sendmsg$NET_DM_CMD_START(r4, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40200800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r3, 0x8, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x30010863}, 0x48001) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f00000025c0)={{{@in6=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f00000026c0)=0xe8) sendmsg$can_raw(r2, &(0x7f00000027c0)={&(0x7f0000002700)={0x1d, r6}, 0x10, &(0x7f0000002780)={&(0x7f0000002740)=@can={{0x3, 0x1, 0x1}, 0x4, 0x0, 0x0, 0x0, "9a8013e4158231b2"}, 0x10}, 0x1, 0x0, 0x0, 0x14008084}, 0xd0d158edf92b49ea) r7 = geteuid() setreuid(r7, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x1, &(0x7f0000001440)=ANY=[@ANYBLOB="7b0000aa4dcda856c5f8ed90ba04460393c58837f6f54484689f19d4f03b5aae35af443a47dc012d8ba735837027d0fda7dd5653cf7f91e79700365d8153bd07579e010ee044bbfad6512fb7defd9cb48f1803b02907d2e28313d252d4f293a2222d7cef4323c76db437e52a3003796346c34c6efcb9f0545e4329c28dea3874e3f634", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=r7, @ANYBLOB=',group_id=', @ANYRESDEC=r8, @ANYBLOB=',allow_other,default_permissions,audit,permit_directio,\x00']) getrandom(&(0x7f0000001340)=""/232, 0xe8, 0x0) 14:48:49 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, 0x0) [ 445.749993] protocol 88fb is buggy, dev hsr_slave_0 [ 445.750252] protocol 88fb is buggy, dev hsr_slave_0 14:48:49 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, 0x0) 14:48:49 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, 0x0) [ 445.916838] block nbd3: Device being setup by another task 14:48:50 executing program 0: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r5 = inotify_init() readv(r5, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r5, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r6 = dup3(r3, r4, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400204) 14:48:50 executing program 4: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r5 = inotify_init() readv(r5, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r5, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r6 = dup3(r3, r4, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400204) getsockopt$packet_buf(r6, 0x107, 0x2, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0xfffffffffffffcc9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) 14:48:50 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x12c, 0x10000}], 0x0, 0x0) 14:48:50 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x200000, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000700)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x6c08280}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14, r2, 0x400, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0xfffffffffffffdb8}}, 0x20040801) r3 = socket(0x11, 0x2, 0x0) r4 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r3, 0x89e3, 0x0) ioctl$NBD_SET_SOCK(r4, 0xab00, r3) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) sendmsg$NET_DM_CMD_START(r5, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0xffffffffffffff13, r2, 0x29, 0x70bd2c, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x1fb}, 0x1, 0x0, 0x0, 0x30010863}, 0x48001) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8600000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x200, 0x70bd2c, 0x25dfdbff, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x8030}, 0x11) write$cgroup_type(r1, &(0x7f0000000140)='threkded\x00', 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb2) r6 = socket$netlink(0x10, 0x3, 0xc) r7 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGSKNS(r7, 0x894c, 0x0) writev(r6, &(0x7f00000000c0)=[{&(0x7f0000000000)="1f0000000203193b000007000000068100023b050900020000004042020358", 0x1f}], 0x1) readahead(0xffffffffffffffff, 0x0, 0x0) close(r0) socket(0x0, 0x0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2000, 0x0) 14:48:50 executing program 1: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r5 = inotify_init() readv(r5, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r5, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r6 = dup3(r3, r4, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400204) getsockopt$packet_buf(r6, 0x107, 0x2, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0xfffffffffffffcc9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0x4, 0x0) 14:48:50 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f8bc2099eacc29653b17fc237bdc714d5c120816f2fca9546b13cb8ce4442c6869919b0401a601a2fbbaf4160fbb71cfb63ae6d644b2558614296b6a08e9026922fad21df5c0a3df5d42fb8179593178f635a2394e864a3783e91d7604966cdf8b69a", 0x12c, 0x10000}], 0x0, 0x0) [ 446.224917] block nbd2: Device being setup by another task 14:48:50 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:48:50 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:48:50 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:48:50 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x100000400000003a) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x16, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000000200000001739f486a0ef063f58e57c4fc6020c444e13f6667d868b3bbfcb8129a6ef0ba516b4f002e9e67ef97a9029fd336949ceaba9c74e66b880084c49dc9d0654d6538094d26a9eacb2ae39233f0494a84bee05438afb2c0c710cdaee6d1639c8a46f7f20161953d412002048bf8f00496d0035b249bdca000c4ee981d6ddd903a3083406d3746b10dd818ea31d00"/178], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) semctl$GETNCNT(0xffffffffffffffff, 0x2, 0xe, &(0x7f0000000180)=""/134) r3 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f000031aff8)={r1, r2}) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f0000000280)={0x73622a85, 0x180b, 0x3}) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup3(r5, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) dup2(r0, r3) [ 446.626254] block nbd3: Device being setup by another task 14:48:50 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000006740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYRESHEX], 0x12}}], 0x1, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r2 = socket$inet(0x2, 0x1, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0xfffffffffffffffc, 0x8972, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000134000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e23, @empty}, 0x10) connect$inet(r2, &(0x7f00009322c4)={0x2, 0x0, @initdev}, 0x10) connect$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f00000000c0)={r5}) r6 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmmsg(r2, &(0x7f0000004f40)=[{{0x0, 0xffffffffffffff30, 0x0}}], 0x169, 0x0) dup2(r0, r2) tkill(r1, 0x1000000000013) 14:48:50 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 14:48:50 executing program 0: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r5 = inotify_init() readv(r5, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r5, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) dup3(r3, r4, 0x80000) 14:48:51 executing program 4: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r5 = inotify_init() readv(r5, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r5, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r6 = dup3(r3, r4, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400204) getsockopt$packet_buf(r6, 0x107, 0x2, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0xfffffffffffffcc9) 14:48:51 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 14:48:51 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='huget\x1ff\x15\x82\xb3\xe3\xc6f\x00lb.2MB.usage_', 0x26e1, 0x0) close(r0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f00000000c0)={0x2e, 0x4, 0x0, {0x1, 0x8000, 0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2e) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x141040, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r3 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x20, 0x400000) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f00000001c0)=0x40) close(r0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$netrom_NETROM_T2(r4, 0x103, 0x2, &(0x7f0000000240)=0x3b, &(0x7f0000000280)=0x4) 14:48:51 executing program 1: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r5 = inotify_init() readv(r5, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r5, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r6 = dup3(r3, r4, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400204) getsockopt$packet_buf(r6, 0x107, 0x2, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0xfffffffffffffcc9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0x4, 0x0) 14:48:51 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 14:48:51 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 14:48:51 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 14:48:51 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 14:48:51 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240), 0x0, 0x10000}], 0x0, 0x0) 14:48:51 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240), 0x0, 0x10000}], 0x0, 0x0) 14:48:51 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x1, 0x0) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000400)={"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"}) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a0b9e98c0a444e6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='clear_refs\x00') pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) setxattr$security_smack_transmute(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='security.SMACK64TRANSMUTE\x00', &(0x7f00000002c0)='TRUE', 0x4, 0x7) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x181040, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10040, 0x105) ioctl$KVM_GET_XCRS(r2, 0x8188aea6, &(0x7f00000000c0)={0x7, 0x55db5c7f, [{0x0, 0x0, 0x80000001}, {0x7fe, 0x0, 0x4}, {0x9, 0x0, 0x6}, {0x7ffd, 0x0, 0x81}, {0x2ecf, 0x0, 0x6}, {0x3ff, 0x0, 0x4e834934}, {}]}) r3 = msgget$private(0x0, 0x0) msgctl$IPC_INFO(r3, 0x3, &(0x7f0000000040)=""/41) msgsnd(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0400002400000000"], 0xffffffffffffff55, 0x0) 14:48:51 executing program 0: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = inotify_init() readv(r3, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:48:51 executing program 4: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r5 = inotify_init() readv(r5, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r5, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r6 = dup3(r3, r4, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400204) 14:48:51 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240), 0x0, 0x10000}], 0x0, 0x0) 14:48:51 executing program 3: ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x1ff) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x1, 0x1}, 0x11040}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00') flistxattr(r0, &(0x7f0000000280)=""/2, 0x2) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(r0, r0) r1 = dup(0xffffffffffffffff) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r2, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) getsockopt$inet6_buf(r2, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000340)='./bus\x00', 0x341042, 0x1) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r3, 0x80003) sendfile(r2, r3, &(0x7f00000000c0), 0x8000fffffffe) r4 = geteuid() setreuid(r4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000340)={{{@in6=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000001c0)=0xe8) r6 = geteuid() fstat(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000440), &(0x7f0000000500), &(0x7f0000000540)=0x0) r9 = geteuid() setreuid(r9, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000580)={{{@in=@initdev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f0000000680)=0xe8) r11 = geteuid() setreuid(r11, 0x0) r12 = geteuid() setreuid(r12, 0x0) lstat(&(0x7f00000006c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r14 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='Cpuacct.stE\xae\x00\xe7\xb5l4\x03U\xff\xf7\x02\xc0\x12\xce\xac\xbd\x04\x88cn\xb1\xa4\x81\xc0\x06\xfe\x1ct\x8e_\xd03\x90\x96\x01\x99YL\x1faq;\x1d-\x1b\a\x04\xe8`\xecv\xb9\xabW}e\x990\x9c@\x85\xba\xc8\xf0O\x8c\xff\x8b+O\'\x14\xe0\x1e4\xc0\bW8\x06\x1e\xc4\x8e\xb4>\xbf\xc8\x8a\xad\xf7}\xa2\x1a\xf8\x83\xc5\xe4\a\xc1\xcaK\'\xe4\xbb_\xfc\x1c\x11\x1f\x83?\x1dm\xbf\xbd\x80q7\xf0\xc1\x00\x90\xa3\xcb\rH\xefm\xa6\x8c\xc0q\xe6I\xe1]\xeb\xc6\xd3\xd9E\x04\xb7\xc3-F\xe6\xf7\x12\x1a63\x84\xc3\xa1w\x96\x9e\x8d\xb9\x96\x87\"O\x11x\xda', 0x275a, 0x0) getsockopt$sock_cred(r14, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) getgroups(0x5, &(0x7f0000000240)=[0x0, 0x0, 0xffffffffffffffff, 0x0, r15]) r16 = getgid() r17 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='Cpuacct.stE\xae\x00\xe7\xb5l4\x03U\xff\xf7\x02\xc0\x12\xce\xac\xbd\x04\x88cn\xb1\xa4\x81\xc0\x06\xfe\x1ct\x8e_\xd03\x90\x96\x01\x99YL\x1faq;\x1d-\x1b\a\x04\xe8`\xecv\xb9\xabW}e\x990\x9c@\x85\xba\xc8\xf0O\x8c\xff\x8b+O\'\x14\xe0\x1e4\xc0\bW8\x06\x1e\xc4\x8e\xb4>\xbf\xc8\x8a\xad\xf7}\xa2\x1a\xf8\x83\xc5\xe4\a\xc1\xcaK\'\xe4\xbb_\xfc\x1c\x11\x1f\x83?\x1dm\xbf\xbd\x80q7\xf0\xc1\x00\x90\xa3\xcb\rH\xefm\xa6\x8c\xc0q\xe6I\xe1]\xeb\xc6\xd3\xd9E\x04\xb7\xc3-F\xe6\xf7\x12\x1a63\x84\xc3\xa1w\x96\x9e\x8d\xb9\x96\x87\"O\x11x\xda', 0x275a, 0x0) getsockopt$sock_cred(r17, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) getgroups(0x5, &(0x7f0000000240)=[0x0, 0x0, 0xffffffffffffffff, 0x0, r18]) r19 = getegid() r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='Cpuacct.stE\xae\x00\xe7\xb5l4\x03U\xff\xf7\x02\xc0\x12\xce\xac\xbd\x04\x88cn\xb1\xa4\x81\xc0\x06\xfe\x1ct\x8e_\xd03\x90\x96\x01\x99YL\x1faq;\x1d-\x1b\a\x04\xe8`\xecv\xb9\xabW}e\x990\x9c@\x85\xba\xc8\xf0O\x8c\xff\x8b+O\'\x14\xe0\x1e4\xc0\bW8\x06\x1e\xc4\x8e\xb4>\xbf\xc8\x8a\xad\xf7}\xa2\x1a\xf8\x83\xc5\xe4\a\xc1\xcaK\'\xe4\xbb_\xfc\x1c\x11\x1f\x83?\x1dm\xbf\xbd\x80q7\xf0\xc1\x00\x90\xa3\xcb\rH\xefm\xa6\x8c\xc0q\xe6I\xe1]\xeb\xc6\xd3\xd9E\x04\xb7\xc3-F\xe6\xf7\x12\x1a63\x84\xc3\xa1w\x96\x9e\x8d\xb9\x96\x87\"O\x11x\xda', 0x275a, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) getgroups(0x5, &(0x7f0000000240)=[0x0, 0x0, 0xffffffffffffffff, 0x0, r21]) r22 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='Cpuacct.stE\xae\x00\xe7\xb5l4\x03U\xff\xf7\x02\xc0\x12\xce\xac\xbd\x04\x88cn\xb1\xa4\x81\xc0\x06\xfe\x1ct\x8e_\xd03\x90\x96\x01\x99YL\x1faq;\x1d-\x1b\a\x04\xe8`\xecv\xb9\xabW}e\x990\x9c@\x85\xba\xc8\xf0O\x8c\xff\x8b+O\'\x14\xe0\x1e4\xc0\bW8\x06\x1e\xc4\x8e\xb4>\xbf\xc8\x8a\xad\xf7}\xa2\x1a\xf8\x83\xc5\xe4\a\xc1\xcaK\'\xe4\xbb_\xfc\x1c\x11\x1f\x83?\x1dm\xbf\xbd\x80q7\xf0\xc1\x00\x90\xa3\xcb\rH\xefm\xa6\x8c\xc0q\xe6I\xe1]\xeb\xc6\xd3\xd9E\x04\xb7\xc3-F\xe6\xf7\x12\x1a63\x84\xc3\xa1w\x96\x9e\x8d\xb9\x96\x87\"O\x11x\xda', 0x275a, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) getgroups(0x5, &(0x7f0000000240)=[0x0, 0x0, 0xffffffffffffffff, 0x0, r23]) r24 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)='Cpuacct.stE\xae\x00\xe7\xb5l4\x03U\xff\xf7\x02\xc0\x12\xce\xac\xbd\x04\x88cn\xb1\xa4\x81\xc0\x06\xfe\x1ct\x8e_\xd03\x90\x96\x01\x99YL\x1faq;\x1d-\x1b\a\x04\xe8`\xecv\xb9\xabW}e\x990\x9c@\x85\xba\xc8\xf0O\x8c\xff\x8b+O\'\x14\xe0\x1e4\xc0\bW8\x06\x1e\xc4\x8e\xb4>\xbf\xc8\x8a\xad\xf7}\xa2\x1a\xf8\x83\xc5\xe4\a\xc1\xcaK\'\xe4\xbb_\xfc\x1c\x11\x1f\x83?\x1dm\xbf\xbd\x80q7\xf0\xc1\x00\x90\xa3\xcb\rH\xefm\xa6\x8c\xc0q\xe6I\xe1]\xeb\xc6\xd3\xd9E\x04\xb7\xc3-F\xe6\xf7\x12\x1a63\x84\xc3\xa1w\x96\x9e\x8d\xb9\x96\x87\"O\x11x\xda', 0x275a, 0x0) getsockopt$sock_cred(r24, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) getgroups(0x5, &(0x7f0000000240)=[0x0, 0x0, 0xffffffffffffffff, 0x0, r25]) r26 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='Cpuacct.stE\xae\x00\xe7\xb5l4\x03U\xff\xf7\x02\xc0\x12\xce\xac\xbd\x04\x88cn\xb1\xa4\x81\xc0\x06\xfe\x1ct\x8e_\xd03\x90\x96\x01\x99YL\x1faq;\x1d-\x1b\a\x04\xe8`\xecv\xb9\xabW}e\x990\x9c@\x85\xba\xc8\xf0O\x8c\xff\x8b+O\'\x14\xe0\x1e4\xc0\bW8\x06\x1e\xc4\x8e\xb4>\xbf\xc8\x8a\xad\xf7}\xa2\x1a\xf8\x83\xc5\xe4\a\xc1\xcaK\'\xe4\xbb_\xfc\x1c\x11\x1f\x83?\x1dm\xbf\xbd\x80q7\xf0\xc1\x00\x90\xa3\xcb\rH\xefm\xa6\x8c\xc0q\xe6I\xe1]\xeb\xc6\xd3\xd9E\x04\xb7\xc3-F\xe6\xf7\x12\x1a63\x84\xc3\xa1w\x96\x9e\x8d\xb9\x96\x87\"O\x11x\xda', 0x275a, 0x0) getsockopt$sock_cred(r26, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) getgroups(0x5, &(0x7f0000000240)=[0x0, 0x0, 0xffffffffffffffff, 0x0, r27]) getgroups(0x7, &(0x7f0000000740)=[0x0, r23, 0xee00, r25, 0x0, r27, 0xffffffffffffffff]) r29 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='Cpuacct.stE\xae\x00\xe7\xb5l4\x03U\xff\xf7\x02\xc0\x12\xce\xac\xbd\x04\x88cn\xb1\xa4\x81\xc0\x06\xfe\x1ct\x8e_\xd03\x90\x96\x01\x99YL\x1faq;\x1d-\x1b\a\x04\xe8`\xecv\xb9\xabW}e\x990\x9c@\x85\xba\xc8\xf0O\x8c\xff\x8b+O\'\x14\xe0\x1e4\xc0\bW8\x06\x1e\xc4\x8e\xb4>\xbf\xc8\x8a\xad\xf7}\xa2\x1a\xf8\x83\xc5\xe4\a\xc1\xcaK\'\xe4\xbb_\xfc\x1c\x11\x1f\x83?\x1dm\xbf\xbd\x80q7\xf0\xc1\x00\x90\xa3\xcb\rH\xefm\xa6\x8c\xc0q\xe6I\xe1]\xeb\xc6\xd3\xd9E\x04\xb7\xc3-F\xe6\xf7\x12\x1a63\x84\xc3\xa1w\x96\x9e\x8d\xb9\x96\x87\"O\x11x\xda', 0x275a, 0x0) getsockopt$sock_cred(r29, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) getgroups(0x5, &(0x7f0000000240)=[0x0, 0x0, 0xffffffffffffffff, 0x0, r30]) r31 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='Cpuacct.stE\xae\x00\xe7\xb5l4\x03U\xff\xf7\x02\xc0\x12\xce\xac\xbd\x04\x88cn\xb1\xa4\x81\xc0\x06\xfe\x1ct\x8e_\xd03\x90\x96\x01\x99YL\x1faq;\x1d-\x1b\a\x04\xe8`\xecv\xb9\xabW}e\x990\x9c@\x85\xba\xc8\xf0O\x8c\xff\x8b+O\'\x14\xe0\x1e4\xc0\bW8\x06\x1e\xc4\x8e\xb4>\xbf\xc8\x8a\xad\xf7}\xa2\x1a\xf8\x83\xc5\xe4\a\xc1\xcaK\'\xe4\xbb_\xfc\x1c\x11\x1f\x83?\x1dm\xbf\xbd\x80q7\xf0\xc1\x00\x90\xa3\xcb\rH\xefm\xa6\x8c\xc0q\xe6I\xe1]\xeb\xc6\xd3\xd9E\x04\xb7\xc3-F\xe6\xf7\x12\x1a63\x84\xc3\xa1w\x96\x9e\x8d\xb9\x96\x87\"O\x11x\xda', 0x275a, 0x0) getsockopt$sock_cred(r31, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) getgroups(0x5, &(0x7f0000000240)=[0x0, 0x0, 0xffffffffffffffff, 0x0, r32]) fsetxattr$system_posix_acl(r2, &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000880)={{}, {}, [{0x2, 0x4, r4}, {0x2, 0x4, r5}, {0x2, 0x1, r6}, {0x2, 0x4, r7}, {0x2, 0x4, r8}, {0x2, 0x4, r9}, {0x2, 0x0, r10}, {0x2, 0x5, r11}, {0x2, 0x1, r12}], {0x4, 0x4}, [{0x8, 0x92548a8abff04bf1, r13}, {0x8, 0x2, r15}, {0x8, 0x2, r16}, {0x8, 0x0, r18}, {0x8, 0x1}, {0x8, 0x0, r19}, {0x8, 0x2, r21}, {0x8, 0x2, r28}, {0x8, 0x0, r30}, {0x8, 0x1, r32}], {0x10, 0x1}, {0x20, 0x3}}, 0xbc, 0x1) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)='tracefs\x00', 0x10002, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f00000000c0)={0x2, 0x8, 0x5, 0x1, 0xa3}) unlink(&(0x7f0000000000)='./file0\x00') syslog(0x3, &(0x7f0000002080)=""/4096, 0x1000) 14:48:51 executing program 1: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r5 = inotify_init() readv(r5, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r5, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r6 = dup3(r3, r4, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400204) getsockopt$packet_buf(r6, 0x107, 0x2, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0xfffffffffffffcc9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) socket$packet(0x11, 0x0, 0x300) 14:48:51 executing program 2: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x480000) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x886d, 0x4, 0x1000, &(0x7f0000000280)="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"}) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x200000, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000700)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x6c08280}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14, r2, 0x400, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0xfffffffffffffdb8}}, 0x20040801) r3 = socket(0x11, 0x2, 0x0) r4 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r3, 0x89e3, 0x0) ioctl$NBD_SET_SOCK(r4, 0xab00, r3) sendmsg$NET_DM_CMD_START(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40200800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x8, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x30010863}, 0x48001) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8600000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x200, 0x70bd2c, 0x25dfdbff, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x8030}, 0x11) sendmsg$FOU_CMD_ADD(r1, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001380)={&(0x7f0000001440)=ANY=[@ANYBLOB="1c0000009b38e762ec78fab1539ddf3fee8f747185f822174f8ba5736e293dfa6c48162241f341ccf50a48add2a3f219cb44c902e4cc08000000f16e58ed85271f065ba33c1e066ca621a19a4d2ba9cb335f745188208721a636d788921a4ea786ea47aa07674947a8004e0f9067bf6221635c11e668a91c5f7132554f6d0c6593bd3a8a4989edd63f46eeb1f9d332b94a028bbf3959b70200000090b849ac65ce721c7d1525591d861d09d1b4168ca90d", @ANYRES16=0x0, @ANYBLOB="5cd728bd7000fbdbdf25010000000800ac0100000600"], 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x0) clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r5, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r5, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) getsockopt$inet6_buf(r5, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000340)='./bus\x00', 0x341042, 0x1) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r6, 0x80003) creat(&(0x7f0000000100)='./bus\x00', 0x6) sendfile(r5, r6, &(0x7f00000000c0), 0x8000fffffffe) r7 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x200000, 0x0) r8 = syz_genetlink_get_family_id$net_dm(&(0x7f00000012c0)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x6c08280}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14, r8, 0x400, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0xfffffffffffffdb8}}, 0x20040801) r9 = socket(0x11, 0x2, 0x0) r10 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r9, 0x89e3, 0x0) ioctl$NBD_SET_SOCK(r10, 0xab00, r9) sendmsg$NET_DM_CMD_START(r9, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40200800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r8, 0x8, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x30010863}, 0x48001) sendmsg$NET_DM_CMD_STOP(r7, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8600000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r8, 0x200, 0x70bd2c, 0x25dfdbff, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x8030}, 0x11) r11 = openat$cgroup_ro(r7, &(0x7f0000001280)='cpuacct.us\x00\x00\x00\x00\x01\x00\x00\x00', 0x26e1, 0x0) close(r11) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r11, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r11) socket(0x2, 0xa, 0x20) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 14:48:52 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586", 0x96, 0x10000}], 0x0, 0x0) [ 448.046169] block nbd2: Device being setup by another task [ 448.079582] block nbd2: Device being setup by another task 14:48:52 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$9p(r1, &(0x7f00000000c0)="1afee72248408d12d4f54668fbd929d6e1c8f172d5964d5bd517e1233cab9f7b5d95f26dfec8360064f38bf8a6ccbe7e930308d7a163744505db977628fc49bac1913eb10ca6c21b3f7c2f227b5c066c0dfd4a878f5d665d1780d2b706d586bef7eef8803486eb0679758338d69b21d7edf143d9f8b827e8de4cbbd789a8a6ca793122b39426221d76b6b2f932051308535224049c8820f69446b2d9ac28c3b91e18574be093bd967b7527cecb1e8bf09fc7d64003383dba0a2d5656a9cd0f3c1dd36b42f6530d275cb93631bd9db22deb52a094edac405c9764379ea399fcd9d24770a7d956e4ce79b9a4327aa22ff75bb97edcd031", 0xf6) close(r0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 448.099435] block nbd2: Device being setup by another task 14:48:52 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240), 0x0, 0x10000}], 0x0, 0x0) 14:48:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000200)='./bus\x00', 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f0000000580)={'nr\x0fjc\x00\xff\x03\x00\x00\x00 \x00', 0x10001}) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x0, 0x20, 0x70bd2b, 0x25dfdbfe, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x80000001, 0x8, 0x4, 0x1}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000080}, 0x4000000) syncfs(r0) 14:48:52 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586", 0x96, 0x10000}], 0x0, 0x0) 14:48:52 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240), 0x0, 0x10000}], 0x0, 0x0) 14:48:52 executing program 0: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = inotify_init() readv(r3, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0x82a) 14:48:52 executing program 4: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r5 = inotify_init() readv(r5, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r5, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) dup3(r3, r4, 0x80000) 14:48:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', 0x0, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x616200, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r4, 0x80045700, &(0x7f0000000180)) r5 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4cf, 0x0, 0x1, 0x0, 0xb8]}) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f00000002c0)={[{0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:48:52 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240), 0x0, 0x10000}], 0x0, 0x0) 14:48:52 executing program 1: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r5 = inotify_init() readv(r5, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r5, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r6 = dup3(r3, r4, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400204) getsockopt$packet_buf(r6, 0x107, 0x2, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0xfffffffffffffcc9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) 14:48:52 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d02", 0x4b, 0x10000}], 0x0, 0x0) 14:48:52 executing program 3: perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x2, 0x3, 0xff) connect$inet(r4, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x29) r5 = open(&(0x7f0000000040)='./file0\x00', 0x42, 0x0) sendfile(r4, r5, 0x0, 0xffff) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB='=kW', @ANYRES32=0x0], &(0x7f000095dffc)=0x2) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r5, 0x84, 0x7b, &(0x7f00000002c0)={r7, 0x7}, &(0x7f0000000300)=0x8) r9 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x200000, 0x0) r10 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000700)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x6c08280}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14, r10, 0x400, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0xfffffffffffffdb8}}, 0x20040801) r11 = socket(0x11, 0x2, 0x0) r12 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r11, 0x89e3, 0x0) ioctl$NBD_SET_SOCK(r12, 0xab00, r11) sendmsg$NET_DM_CMD_START(r11, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40200800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r10, 0x8, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x30010863}, 0x48001) sendmsg$NET_DM_CMD_STOP(r9, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8600000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r10, 0x200, 0x70bd2c, 0x25dfdbff, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x8030}, 0x11) connect$inet(r9, &(0x7f0000000140)={0x2, 0x1, @multicast1}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000340)={r8, 0x41}, 0x8) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) close(0xffffffffffffffff) r13 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r13, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) 14:48:53 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d02", 0x4b, 0x10000}], 0x0, 0x0) 14:48:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000580)={'nr\x0fjc\x00\xff\x03\x00\x00\x00 \x00', 0x10001}) r1 = accept4(r0, &(0x7f0000000280)=@pptp={0x18, 0x2, {0x0, @multicast1}}, &(0x7f0000000100)=0x80, 0x800) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r2) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f0000000000)=0x7050a00) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x200000, 0x0) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000700)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x6c08280}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14, r4, 0x400, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0xfffffffffffffdb8}}, 0x20040801) r5 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r5, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r5, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) getsockopt$inet6_buf(r5, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000008, &(0x7f0000000500)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000340)='./bus\x00', 0x341042, 0x1) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r6, 0x80003) sendfile(r5, r6, &(0x7f00000000c0), 0x8000fffffffe) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000340)={0x0}, &(0x7f0000000480)=0xc) r8 = getpid() sched_setattr(r8, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r9 = syz_open_dev$admmidi(&(0x7f00000004c0)='/dev/admmidi#\x00', 0x1, 0x100a00) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) kcmp(r7, r8, 0x4, r9, 0xffffffffffffffff) r10 = socket(0x11, 0x2, 0x0) r11 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r10, 0x89e3, 0x0) ioctl$NBD_SET_SOCK(r11, 0xab00, r10) sendmsg$NET_DM_CMD_START(r10, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40200800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r4, 0x8, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x30010863}, 0x48001) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f00000003c0)=""/138, 0x8a) sendmsg$NET_DM_CMD_STOP(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8600000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r4, 0x200, 0x70bd2c, 0x25dfdbff, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x8030}, 0x11) setsockopt$bt_l2cap_L2CAP_OPTIONS(r3, 0x6, 0x1, &(0x7f00000000c0)={0xe4ed, 0x3, 0x26, 0x5, 0x1, 0x5, 0x8}, 0xc) [ 449.114373] block nbd3: Device being setup by another task [ 449.152758] audit: type=1400 audit(1571323733.139:204): avc: denied { accept } for pid=19388 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 14:48:53 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d02", 0x4b, 0x10000}], 0x0, 0x0) 14:48:53 executing program 3: syz_mount_image$ntfs(&(0x7f0000000140)='ntfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000000000b838a2fb46f10101000000646e94e19bb7ac48522b78b6e9c4234450ecfa937b1187bd834b5f84170ca3094fbd863ec84c5f8c6bd6eefcc7cb02f333bfed4553380a4e2a6c807ea4d613cc6a4f32c30388dc178ecfb6afc674aa77a9444702878631e962982e44d40e243e9d1561ca5f1b8e4955eb9ba0b92891b91f61d43cd9a3e04314e793d43c674ca8f90000000000"]) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @mcast2}, 0xd) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) getsockopt$inet6_buf(r0, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x20000, 0x0) ioctl$USBDEVFS_GET_CAPABILITIES(r1, 0x8004551a, &(0x7f0000000080)) sendto$inet6(r0, 0x0, 0x1d2, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e21, 0x8000, @loopback}, 0x1c) r2 = open(&(0x7f0000000340)='./bus\x00', 0x341042, 0x1) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xc) sendfile(r0, r2, &(0x7f00000000c0), 0x8000fffffffe) ioctl$SG_GET_TIMEOUT(r2, 0x2202, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x200000, 0x0) r6 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000700)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x6c08280}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14, r6, 0x400, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0xfffffffffffffdb8}}, 0x20040801) r7 = socket(0x11, 0x2, 0x0) r8 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r7, 0x89e3, 0x0) ioctl$NBD_SET_SOCK(r8, 0xab00, r7) sendmsg$NET_DM_CMD_START(r7, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40200800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r6, 0x8, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x30010863}, 0x48001) sendmsg$NET_DM_CMD_STOP(r5, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8600000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r6, 0x200, 0x70bd2c, 0x25dfdbff, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x8030}, 0x11) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r5, 0x800448d2, &(0x7f0000000180)={0x5, &(0x7f0000000680)=[{}, {}, {}, {}, {}]}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) ioctl$IMDELTIMER(r4, 0x80044941, &(0x7f0000000100)=0x3) 14:48:53 executing program 0: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = inotify_init() readv(r3, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0x82a) [ 449.386250] block nbd2: Device being setup by another task 14:48:53 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c", 0x71, 0x10000}], 0x0, 0x0) [ 449.487342] block nbd3: Device being setup by another task 14:48:53 executing program 4: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = inotify_init() readv(r3, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:48:53 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c", 0x71, 0x10000}], 0x0, 0x0) 14:48:53 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c", 0x71, 0x10000}], 0x0, 0x0) 14:48:53 executing program 1: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r5 = inotify_init() readv(r5, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r5, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r6 = dup3(r3, r4, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400204) getsockopt$packet_buf(r6, 0x107, 0x2, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0xfffffffffffffcc9) 14:48:53 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7", 0x84, 0x10000}], 0x0, 0x0) 14:48:53 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) openat$cgroup_ro(r0, &(0x7f0000000000)='rdma.current\x00', 0x0, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000100)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 449.910015] net_ratelimit: 26 callbacks suppressed [ 449.910021] protocol 88fb is buggy, dev hsr_slave_0 [ 449.920020] protocol 88fb is buggy, dev hsr_slave_0 [ 449.920066] protocol 88fb is buggy, dev hsr_slave_1 [ 449.925099] protocol 88fb is buggy, dev hsr_slave_1 14:48:54 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7", 0x84, 0x10000}], 0x0, 0x0) 14:48:54 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7", 0x84, 0x10000}], 0x0, 0x0) 14:48:54 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000700)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x6c08280}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14, r1, 0x400, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0xfffffffffffffdb8}}, 0x20040801) r2 = socket(0x11, 0x2, 0x0) r3 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r2, 0x89e3, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r2) sendmsg$NET_DM_CMD_START(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40200800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r1, 0x8, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x30010863}, 0x48001) sendmsg$nl_route(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10400008}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@ipv4_getroute={0x1c, 0x1a, 0x800, 0x70bd2a, 0x25dfdbfe, {0x2, 0x10, 0x0, 0x3, 0xfd, 0x3, 0x61ba6ab2b1570f08, 0x5, 0xc00}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x200049ec}, 0x8000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001003151e1c000000f0ffffffffffffff", @ANYRES32=0x0, @ANYBLOB="0000000000000000080011000000000008001b0000000000"], 0x30}}, 0x0) 14:48:54 executing program 0: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = inotify_init() readv(r3, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0x82a) 14:48:54 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c97", 0x72, 0x10000}], 0x0, 0x0) [ 450.246483] block nbd3: Device being setup by another task [ 450.253897] selinux_nlmsg_perm: 10 callbacks suppressed [ 450.253906] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=784 sclass=netlink_route_socket pig=19467 comm=syz-executor.3 14:48:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='illinois\x00', 0x9) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r2 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r2, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) getsockopt$inet6_buf(r2, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000340)='./bus\x00', 0x341042, 0x1) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r3, 0x80003) sendfile(r2, r3, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, 0x0, 0x240) r4 = socket$inet(0x2, 0xa, 0x8) recvmsg(r4, &(0x7f0000000640)={&(0x7f0000000300)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, 0x0}, 0x0) r6 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r6, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000040)=0x10) ioctl$IMSETDEVNAME(r5, 0x80184947, &(0x7f0000000080)={0x640d, 'syz1\x00'}) pipe(0x0) r7 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r7, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r7, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) getsockopt$inet6_buf(r7, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendto$inet6(r7, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r8 = open(&(0x7f0000000340)='./bus\x00', 0x341042, 0x1) setsockopt$SO_TIMESTAMPING(r7, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r8, 0x80003) sendfile(r7, r8, &(0x7f00000000c0), 0x8000fffffffe) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) write(r1, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r9 = accept4(r0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r10, 0x407, 0x0) write(r10, &(0x7f0000000340), 0x41395527) ioctl$EXT4_IOC_SWAP_BOOT(r10, 0x6611) sendto$inet6(r9, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r11 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r11, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") [ 450.367264] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:48:54 executing program 4: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = inotify_init() readv(r3, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0x82a) 14:48:54 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c97", 0x72, 0x10000}], 0x0, 0x0) [ 450.550047] protocol 88fb is buggy, dev hsr_slave_0 [ 450.555172] protocol 88fb is buggy, dev hsr_slave_1 14:48:54 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c97", 0x72, 0x10000}], 0x0, 0x0) 14:48:54 executing program 1: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r5 = inotify_init() readv(r5, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r5, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r6 = dup3(r3, r4, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400204) 14:48:54 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f07", 0x7b, 0x10000}], 0x0, 0x0) [ 450.790094] protocol 88fb is buggy, dev hsr_slave_0 [ 450.795597] protocol 88fb is buggy, dev hsr_slave_1 14:48:54 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x125) clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000100), &(0x7f00000000c0)=0x4) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000340)='./bus\x00', 0x341042, 0x1) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r2, 0x80003) sendfile(r1, r2, &(0x7f00000000c0), 0x8000fffffffe) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) socket$kcm(0x29, 0x7, 0x0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETXW(r1, 0x5435, &(0x7f0000000180)={0x3, 0x800, [0x5, 0x1, 0x3ff], 0x8918}) 14:48:54 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0x346) close(r0) r2 = semget$private(0x0, 0x1, 0x0) semctl$GETNCNT(r2, 0x0, 0xe, 0x0) semctl$SEM_INFO(r2, 0x7, 0x13, &(0x7f0000000280)=""/129) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) semtimedop(r2, &(0x7f00000000c0)=[{0x5, 0x1}], 0x1, &(0x7f0000000140)={r3, r4+30000000}) socket(0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000180)={{0x3, 0x0, 0x10001, 0x3, 0x4d53}}) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 14:48:54 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f07", 0x7b, 0x10000}], 0x0, 0x0) [ 450.950019] protocol 88fb is buggy, dev hsr_slave_0 [ 450.955165] protocol 88fb is buggy, dev hsr_slave_1 14:48:55 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r1) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 14:48:55 executing program 0: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = inotify_init() readv(r3, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:48:55 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000700)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x6c08280}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14, r1, 0x400, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0xfffffffffffffdb8}}, 0x20040801) r2 = socket(0x11, 0x2, 0x0) r3 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r2, 0x89e3, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r2) sendmsg$NET_DM_CMD_START(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40200800}, 0x41, &(0x7f00000001c0)={&(0x7f00000000c0)={0x14, r1, 0x8, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x30010863}, 0x48001) poll(&(0x7f0000000000)=[{r2}], 0x1, 0x67) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) getsockopt$inet_tcp_buf(r4, 0x6, 0xf, &(0x7f0000000180), &(0x7f0000000280)) close(r0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 14:48:55 executing program 3: syz_emit_ethernet(0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001300), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x534563ecca933399, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/snmp\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x10000000) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, &(0x7f0000000380)) write$vhci(0xffffffffffffffff, 0x0, 0x0) symlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000000)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='uppe/file0,l\b\x00\x00\x00dir=.:file0,workdir=./file1']) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000200)={{0x8, 0x84, 0x8, 0x81}, 'syz0\x00', 0x26}) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000400)={0x2d8}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000700)) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f00000001c0)={@broadcast, @dev={0xac, 0x14, 0x14, 0xe}, @rand_addr=0x3}, 0xc) syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x3, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp\x00') getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000480)={{{@in6, @in6=@initdev}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000280)=0xffdd) dup(r1) r3 = socket$inet6(0xa, 0x80003, 0x9) setsockopt$inet6_int(r3, 0x29, 0x16, &(0x7f0000000000), 0x4) getsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f0000000680), &(0x7f00000006c0)=0x4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x523) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x4800) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r4, &(0x7f0000000180)='.//ile0\x00', r4, &(0x7f00000007c0)='./file0/f.le.\x00') [ 451.145151] block nbd2: Device being setup by another task [ 451.189769] block nbd2: Device being setup by another task [ 451.228173] overlayfs: unrecognized mount option "uppe/file0" or missing value [ 451.247402] overlayfs: unrecognized mount option "uppe/file0" or missing value 14:48:55 executing program 4: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = inotify_init() readv(r3, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0x82a) 14:48:55 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f07", 0x7b, 0x10000}], 0x0, 0x0) 14:48:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00'}, 0x10) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) sendto$inet6(r0, &(0x7f0000000340)="0383000307004c0003001100fff55b4202938207d9fb86dd398d5375000000007929301e8000d5c01843e06590080800000085472da722162bb401000000c3b50035110f118d0000f5cfe606f6925cbf34658ea132797b1abc5dc62600009b000000faffffff0000", 0x395, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x140, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000080)=r3) sendmsg$TIPC_NL_NET_SET(r2, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000200)={&(0x7f0000000640)={0x2e4, 0x0, 0x800, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8000}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x76}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0xd8, 0x1, [@TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffb}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x8000, @rand_addr="a760ec312c9491e681f786299b28c177", 0x100}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x0, @local, 0xa2}}, {0x20, 0x2, @in6={0xa, 0x0, 0x10001, @ipv4={[], [], @local}, 0x1}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfffffffd}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1}]}, @TIPC_NLA_BEARER={0x194, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x90, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xffffff89}}, {0x14, 0x2, @in={0x2, 0x4e21, @remote}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @rand_addr=0x100}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x2, @mcast1, 0xa8d1}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x200}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x9, @rand_addr="01d78798ad048727bb8df862922709f1", 0x7fff}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @remote}}, {0x14, 0x2, @in={0x2, 0x4e22, @broadcast}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @remote}}, {0x14, 0x2, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0xd21, @mcast2}}, {0x14, 0x2, @in={0x2, 0x0, @remote}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x200, @remote}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x80000000, @local, 0xe138}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}]}]}, 0x2e4}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) wait4(r3, &(0x7f0000000300), 0x4, &(0x7f0000000380)) ioctl$TIOCSPGRP(r2, 0x5410, &(0x7f0000000040)=r3) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r4, 0x2275, &(0x7f0000000140)) 14:48:55 executing program 1: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r5 = inotify_init() readv(r5, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r5, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) dup3(r3, r4, 0x80000) 14:48:55 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$rxrpc(0x21, 0x2, 0xa) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 14:48:55 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x1, 0x4, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x74}, [@jmp={0x5, 0x1, 0x60cbf48b2e4af6e9}]}, &(0x7f0000e6bffc)='GPL\x00', 0x2, 0x99, &(0x7f00000000c0)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x70) 14:48:55 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) 14:48:55 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000000)='t\x83reX\xe2\xff\x1f\x00', 0x9) close(r0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 14:48:55 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r2, 0x8200) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000008000)='L', 0x1}], 0x1}, 0x0) r4 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) r5 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r5, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r5, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) getsockopt$inet6_buf(r5, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000340)='./bus\x00', 0x341042, 0x1) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f00000001c0)=0x3d697ee4a986e4c5, 0xffffffffffffffd7) ftruncate(r6, 0x80003) sendfile(r5, r6, &(0x7f00000000c0), 0x8000fffffffe) r7 = socket$inet_sctp(0x2, 0x1, 0x84) r8 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r7, 0x84, 0x22, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, r9}, &(0x7f0000000340)=0x10) r10 = socket$inet_sctp(0x2, 0x1, 0x84) r11 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r11, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYBLOB="f40000f12ed0a47e669b0000000000000000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r10, 0x84, 0x22, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, r12}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000040)={r12, 0x84, &(0x7f0000000380)=[@in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x4e20, 0xffffffd4, @empty, 0x7}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e21, @local}, @in6={0xa, 0x4e24, 0x6, @mcast1, 0xffffffc0}, @in6={0xa, 0x4a20, 0x6, @remote, 0x81}]}, &(0x7f0000000140)=0x10) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], 0x1, 0x0) sendfile(r1, r4, 0x0, 0x8000fffffffa) r13 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r13, 0x40045431, &(0x7f0000000100)) r14 = syz_open_pts(r13, 0x88d82) write(r14, &(0x7f00000001c0), 0x100000324) [ 451.701750] audit: type=1804 audit(1571323735.689:205): pid=19609 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir645343520/syzkaller.NbN550/421/bus" dev="sda1" ino=16678 res=1 [ 451.767090] audit: type=1804 audit(1571323735.749:206): pid=19609 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir645343520/syzkaller.NbN550/421/bus" dev="sda1" ino=16678 res=1 14:48:55 executing program 0: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = inotify_init() readv(r3, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:48:55 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) 14:48:55 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x200000, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000700)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x6c08280}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14, r2, 0x400, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0xfffffffffffffdb8}}, 0x20040801) r3 = socket(0x11, 0x2, 0x0) r4 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r3, 0x89e3, 0x0) ioctl$NBD_SET_SOCK(r4, 0xab00, r3) sendmsg$NET_DM_CMD_START(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40200800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x8, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x30010863}, 0x48001) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8600000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x200, 0x70bd2c, 0x25dfdbff, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x8030}, 0x11) r5 = geteuid() setreuid(r5, 0x0) r6 = getegid() lstat(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@initdev}}, &(0x7f0000000380)=0xe8) r10 = getgid() r11 = geteuid() setreuid(r11, 0x0) r12 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='Cpuacct.stE\xae\x00\xe7\xb5l4\x03U\xff\xf7\x02\xc0\x12\xce\xac\xbd\x04\x88cn\xb1\xa4\x81\xc0\x06\xfe\x1ct\x8e_\xed\xbaBl\x01\x99YL\x1faq;\x1d-\x1b\a\x04\xe8`\xecv\xb9\xabW}e\x990\x9c@\x85\xba\xc8\xf0O\x8c\xff\x8b+O\'\x14\xe0\x1e4\xc0\bW8\x06\x1e\xc4\x8e\xb4>\xbf\xc8\x8a\xad\xf7}\xa2\x1a\xf8\x83\xc5\xe4\a\xc1\xcaK\'\xe4\xbb_\xfc\x1c\x11\x1f\x83?\x1dm\xbf\xbd\x80q7\xf0\xc1\x00\x90\xa3\xcb\rH\xefm\xa6\x8c\xc0q\xe6I\xe1]:\x1e\xd3\xd9E\x04\xb7\xc3-F\xe6\xf7\x12\x1a63\x84\xc3\xa1w\x96\x9e\x8d\xb9\x96\x87\"O\x11x\xda\xc3\x87\xd0Nt\xda\x88\xba\xe0\xc7\xbf\x9e\xea\x18\x1cc\xd4]hDb\xaa\xbb\xb7\xb5\xff\'[\xf9\x9a\x16\x1a\xcc-\x95\x9f\x935.\xc8\xc9\xea\x18x\xea\xbc%\xac\xe7\xfe\xd4\x00S*\xd1\x02\xc5M\xc5\x7f{~\x89x71\xc1\xcc;7\x8c\xf9\\m\x87\xa5\xa0\xb3\x1f\xc5J\x9be8\x1e\xc62\xect#\xcb<\x1f<\x1c\b\xd4\xe0e\x9b&N\x18\xa6\x84\x19M/\x93\xbff\xe30\x87P\xf7p#\xe8\xc7~*\x11\xe0\xb9\xe2\xac7~~\x1aI\xfa\xb2y\\\x021\x947Pk\xf8\xa4\thUZ8\x00\xec\x86\x8b\xd6\x84+\x8d\xe8\x8f\xdcH\xf1\xa4\xd5\xf2~\xef\xff\x04\xa8^\xd56^&p\xb645Lk5', 0x275a, 0x0) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) getgroups(0x5, &(0x7f0000000240)=[0x0, 0x0, 0xffffffffffffffff, 0x0, r13]) r14 = geteuid() setreuid(r14, 0x0) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)=0x0) write$FUSE_DIRENTPLUS(r1, &(0x7f0000001140)=ANY=[@ANYBLOB="d00300000000000004000000000000000600000000000039000000000000000002000000000000000600ff0f000000000600000005000000050000e01ba0f96057b7b5c6b889920000000000000000060000000000000003000000000001800000000000000800000000000000090000000080ffff09100000d79c00000600"/136, @ANYRES32=r5, @ANYRES32=r6, @ANYBLOB="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", @ANYRES32=r7, @ANYRES32=r8, @ANYBLOB="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", @ANYRES32=r9, @ANYRES32=r10, @ANYBLOB="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", @ANYRES32=r11, @ANYRES32=r13, @ANYBLOB="090000001f0300000000000001000000000000000300000000000000140000000200000063707573657473797374656d5c27626465762b00000000000100000000000000000000000000000005000000000000000500000000000000060000000800000004000000000000009700000000000000ff0700000000000000000000000000000900000000000000020000000000000006000000200000000100000000000000f7ffffff", @ANYRES32=r14, @ANYRES32=r15, @ANYBLOB="03000000000000007cffffff0200000000000000010000000000000001000000040000004000000000000000"], 0x564) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 451.964112] block nbd2: Device being setup by another task 14:48:56 executing program 4: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = inotify_init() readv(r3, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0x82a) 14:48:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) mkdirat(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 14:48:56 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@remote, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@local}}, &(0x7f00000003c0)=0xe8) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000540)={&(0x7f0000000400)={0x1d, r1}, 0x10, &(0x7f0000000500)={&(0x7f0000000480)=ANY=[@ANYBLOB="050000000100e83f37f4a6996ab0f906", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=r2, @ANYRES64=r3/1000+30000, @ANYBLOB="0200ee7f0100000001000080310100005a989be1a5d9c1100f991b79c3587d4573033eb86a00bb565622f5f3d3a08739c14e35e6f7f845376bb0e2e17d9aa4b941936b1f49f096ca40e335fff9575041"], 0x80}, 0x1, 0x0, 0x0, 0x4000000}, 0xf7bd91f6cc5f4d0c) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 14:48:56 executing program 1: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = inotify_init() readv(r3, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:48:56 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b", 0x7c, 0x10000}], 0x0, 0x0) 14:48:56 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x200000, 0x0) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000700)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x6c08280}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14, r1, 0x400, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0xfffffffffffffdb8}}, 0x20040801) r2 = socket(0x11, 0x2, 0x0) r3 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r2, 0x89e3, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r2) sendmsg$NET_DM_CMD_START(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40200800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r1, 0x8, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x30010863}, 0x48001) sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8600000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r1, 0x200, 0x70bd2c, 0x25dfdbff, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x8030}, 0x11) r4 = openat$cgroup_ro(r0, &(0x7f0000000200)='cpuset.effective_mems\x00', 0x26e1, 0x0) close(r4) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r4, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r4) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 452.379698] block nbd2: Device being setup by another task [ 452.419251] block nbd2: Device being setup by another task 14:48:56 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) ioctl$VHOST_SET_VRING_NUM(0xffffffffffffffff, 0x4008af10, &(0x7f0000000000)={0x1, 0xec5a}) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) read$usbmon(0xffffffffffffffff, &(0x7f00000000c0)=""/64, 0x40) 14:48:56 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b", 0x7c, 0x10000}], 0x0, 0x0) 14:48:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0xb9ab25b3f78359d3) r2 = socket$kcm(0x29, 0x7, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x200000, 0x0) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000700)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x6c08280}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14, r4, 0x400, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0xfffffffffffffdb8}}, 0x20040801) r5 = socket(0x11, 0x2, 0x0) r6 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r5, 0x89e3, 0x0) ioctl$NBD_SET_SOCK(r6, 0xab00, r5) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r6, 0x84, 0x6d, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="b500000097530dea1869116c5945104e5bbcf75bff8e48797fbf13d23123ea340f75d8679e263a399db4b4315af1f61c689c009dafdb446ed659156eb4ca1a72e79119eaf701a362d47e5ac67f3f505bf0fc9faa009958b6b15b029f4df993c16e4ce00dd1d2b6760911ab6da3db5938cf9095cf3d78a1426336a61f6024c3ba8e92cea738cc0b847344fd3a558c248fd5da212f9305864d514dd1cde4174339830179cb06669f432207"], &(0x7f0000000340)=0xbd) r8 = socket$inet_sctp(0x2, 0x1, 0x84) r9 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, r10}, &(0x7f0000000340)=0x10) r11 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x200000, 0x0) r12 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000700)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x6c08280}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14, r12, 0x400, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0xfffffffffffffdb8}}, 0x20040801) r13 = socket(0x11, 0x2, 0x0) r14 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r13, 0x89e3, 0x0) ioctl$NBD_SET_SOCK(r14, 0xab00, r13) sendmsg$NET_DM_CMD_START(r13, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40200800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r12, 0x8, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x30010863}, 0x48001) sendmsg$NET_DM_CMD_STOP(r11, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8600000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r12, 0x200, 0x70bd2c, 0x25dfdbff, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x8030}, 0x11) getsockopt$inet6_IPV6_IPSEC_POLICY(r11, 0x29, 0x22, &(0x7f00000004c0)={{{@in=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0xe8) fchown(0xffffffffffffffff, r15, 0xee01) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000003c0)={r7, 0xfffff800, 0x5, 0xff, 0x9, 0x5, 0xffff, 0x90000, {r10, @in={{0x2, 0x4e21, @loopback}}, 0x7, 0x6, 0x1433, 0x1ff, 0xff}}, &(0x7f0000000480)=0xb0) sendmsg$NET_DM_CMD_START(r5, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40200800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r4, 0x8, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x30010863}, 0x48001) sendmsg$NET_DM_CMD_STOP(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8600000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r4, 0x200, 0x70bd2c, 0x25dfdbff, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x8030}, 0x11) fcntl$getownex(r3, 0x10, &(0x7f0000000040)={0x0, 0x0}) getresuid(&(0x7f0000000080)=0x0, &(0x7f00000000c0), &(0x7f0000000100)) fstat(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={r16, r17, r18}, 0xc) write$UHID_INPUT(r0, &(0x7f0000001cc0)={0x8, "5f5539ae7383df635d7eb9f00cde999ef4e1d4fbae589edcbcd64ae9781d89f20a7c347bd734db9d80a3e9ee0d0f04fe5305dacf9e656dc623d0d8abb05b81ebf7fa83533ebfe364612ee7d5571be6e3af5eccf0e26370ff66a26e95f4b7b1206b9d9a70fe612b356ec5074716b0e71eb9f60ac1c5e653c9a7de0de9a5f8c8047f77ece27201fc36e2ca04338864356e123b3b96be97afa5d6698e6f08a657f7ad07b42df05dfca83247581434b575e2d4419e52f1103e9e3ddc440a98f9caeace71f8affb3cfc62e4b428403787ff063d2923a50c0410f191c7923b77c51fea54cc7f2b8adcd2a5e1f53495c168736a160f28435b70f6e40df8523c2deaef8b70f13bc408d1d6eb05dbcae35f0c12cb00b8d589c0dda912acf9315852e1cbb85857f9421cd623fc5046448db22eec3c07358c4778c73a2495bf3452b18d8e904ed88ae250a99edb20b78fc923ccc841847a4f6d514320309afe2f0a075e50096c7a8cd4da2d88791d01a10cea10a97d32e8bb05a5e2bf52be5fffa3fb26953a0fadac598644cf0297d01d5c1ed9f2123ba789fa650b0d140a478903cc23a5b5c2a2a52f19bdd40039ac0291f648f1f991e272c52669f7843e73b3be22103fe0a88d5d405b9ecea5d602be0b5466d18d8a971b69a8e80e48621103a6bc6ee3a7b70b199005241779f22fa2cc159988eaf2d53c858ec06ab56acc232b587ffee3a5cb29f5641b2189fb1617d1a652e42511fe2e447a2636f18ceabc261126200193eb9f309f80aa204a93883bf6fb247ade866685f300295f8735e18d1d81365dbd2bddfa1779c59effed803bbe0a68302b1ab0f0d00892138ad24d52d653d92897bd28c2f031a77eae54ef3ce9a1fc44ea41763b2d780a454f68ea1a297302b4fa6664923a818040f5a74e0db3ff24e940e97d4abff40af2d36f7bceb8a0c5e90dbefbc8ba496f6e42f11ce11fb20655138f9387938abc3aa3a742f749a8695d972c537127519f654945bac96f0a2ef9d6b24f2226ae677684e3eb63041d6b5105777a8e6aa41ff11366448c0af1ddf5e3f2a1d828b4c9ede3809eab736c9035f2a7032ce38b699dfdc3e158e1ce62d325441e1b05a3ba5f663f20b0cb703cb2960aad298177881aa6b52bf4ae112c5d2bb691ac34b0723be7ddcfff0015e578475db1f062c5a50b54bbcba2f591eb4d6de66f386b0d5dd3975229ad25ae95d82266dfb9c1a6f497ef54b6ac5ee81edae16c47e89f9a435377dfac411db459559ce483921251745b8b94f69d4815b009ea86aedc5a75a516ff2afaff9a418f73c2cacbcdf45dd02ba962399f9b81e149635c2b4c0bda790a6d72fc243f6fbc73d0a0636db51c03d93b44b42c07f2269b465231f953e6a45dc549e9b5ef05443da7820cd667f5b0ff47a13f0a3df630a6f98f72e09978b829389d6a11afb0a7a0988822bb95fcb50399e51295f464662118646d2996da0fa710b082036820ae0a60828479bad4489061244b74179cfec74ab273551190c0eb2ca95be86391b8e469454796d04b29646b8aaae49889ffd84e83e33fb0cd7b10d778e72422f474911897dbd4548d9658e9af23cfff0ad4a7d750ab59e0f8988082ab7ac8d27eeab1c5809de6694aba8ee6ff1ba23d422f38dc026a77933cb0fc916d22131f7f736e35c881c5551f13a5037f65b9090372bb8e73bb9cd686715afef6b40ff275a978078c1e1c7db358285e5caee5c53cb4a7b446db91e5c0615342265edd9f09a72002aae56c7ad4269a0513569db514ee852724cdcccb72e8836fc270f7aa03e03e65f4572c2909e6fb1b557e89c3b505ba2f2b10b545513758abdbdc5b3e5ec1fe4d6bd5947b354058eccb79f10e971a85bdafa5aa27224acc734d884f9282ed033fc540defa3181d451713565d940879cd70a1d704b9a390de509351d5129bff18051b0c7ca196a78d3b8d0c8f384c79ad637b2e1770fecfc980960ef403cbc6bb284792cd169133f35aea028d9ffdc1668572dd197db86a26cb6fe1bb822bb76968ef2cd3c384704b75d0f17a50bcce054a400edd3b2f2abf72d2d8a679fdc94216d2d7d43ca1e60aeb5a313f8104f8ae54e75beb6c106cf080b9ecc9a1f91508b37d9ede25a1bede738c3a7f3501391a7b1863fe120ea26c4ff13f1de4588b150f3f2c12a9b9d92e6a8610c788c4d449a91416307a313536e1779bef88028d65a9398c5d1492b729d5f08e34e64fa07507f64297a1f9305a2d68169f653d5c107c9860ca0d822916eb357c646c229e792b1a5da56b35ab971bb82e41581e11f24f9c6b26c019dd2f2f89f2a82b74bd856ed7b46a2d9c07b2856bc39e9a28f271c5bb06db5bfa04d21e37e778b3e03071d25da8bbc91543fe8909603ba92e3455cb0edfe1dc040f12c169a97a5b8fb09f97acda29ab8491e7c9f81320b1a9de5773078557a6a0bdc5a1bfd2d953c47b3e5ccc70d76dc4ba10c297d7591e2c2150b8235de09714fedcf23aedb0ec9586e52f6af6c299256ad5a0a4ce22666be48592977dc5ff5c5eea529b81df4510016240b8fc8489bf59c899bb75481220554d0b9aebf1660cb72b01dfc3ffaac27dc1d36247e86339c6d99fc3ca8edf585fdb236ecdffda1b99819f873367ee5d8fde5d596517f895c9154deab01ca26008edbeadecfe33cae750ff044469a1b3b104b35af0c04a35a48aecf54dd8844b598432b81f67ce232ad46a247cad103274cd7c206d890008b149aaa3310f9794243cc5e04d4bd3e66a5b01ef67044412eba507a20399856cd26fb6233ebc064aa7b5ba94198bc05301dd74d6875b6d3b4731c2a11f0656767a3e6ba0a3d6951a7f9385ff99876891b8150ac5257756ef92a6c3854ccba8f13bca3cd3e66fdc93feefc44c3eba570970e0a6921f1eef24713ed5a174b8e52a0bc1bd3b420bdd0e521835289d29267fca4512caeaf64d1adeba2457864801d30d37e4eea965f8cfdb314f62307d8a12084a65da330f800862cae3876cdffe8c77d982ce9527b069628f0d796c0ec1c1b423ab6eb248e176a9b201d4de572f7901d8d88ae3dc6c3f196a4e3fb81552f16f7a7b7b3a242824b0618a855fc150fe8d484c80b3e1ea6c42f165dcfa7b0b292f9c7f27179d32260d4f472385a8818f7d76133030cf1256153b4162c8c3a3629c01e9b8cb5a30b3d0068d7f0e3727d8159739386511746fad1cfcc98c7af05b489876432957c6d59c51f12ebb62acac90311e6b00cea58b355db5a36718dfb8140d23e64e41ef9d33969cae75ea3ef8f14ad8c9b2d0c8bd7bf4366b091b5992ffbd71800495c0484cbee4b5fffaede0808cdcfa2409227e6b96dd82481d6d00bfff72c29f860b7fa4fa9c3634d9a2e4f7a8ef240c997b749e0562514d5c2c5d66da75149dea37b1cbb347fa0df5be2b9a5ddf20a6d47936b3b55cedc64453e69413a89c8a9eaeda00fccc96281b4f29db0f3e45fa098c77ffe3c0488529ecfa801cdf7fe8a23f6a3aa04acaf4e300c44e6d873f43b9fd4b13cbed2411c97378e07c7a6799d272d36ac8964233130947ed88f727915fa58a4812ceacd6cc6a52bc7fcba5e57543e93d293d5a428c73b194f33ba752b0ebeb0262423e7a8f490707a220857f44e191304cffb93cfc75b217ca306292549c8742fe3aa62a464d40c666115015201c0fef3e9555615f91c3d15b6e1556a9b04febc2ae7e3d689ca5f58b51f2717ae8c5153f2c2a4df11ea8cafcc369327c2a0a6f7946daf09be323d59e4b0e42ebcdeca373a6d70a3286382f1405b7107af899da00dbd52324657870bd18ca26f3ef47e0e81cd335c827512e88f24202836e7a1b505f0d03a23d577430d971458a11ff42e36b2d2883b664d402eb7497a90ba1f94829b6d9c6b4c4f7e9dc49882520a6fd2590cb8b41328541b9076e43f6019c3da9084e57960478c268f4215bb98455fbd2981e7e37caf7aaf9008f87cfe196da930637c55da5a34e142a433494e6f92a5985d7e6fc0ec68d2ad25144919af6dc81afc88cd05f01b401730bccc3086c9dd06d38ed522e52e7ffae7671898fb91cec0821c061aaea6c47ae877d2d7f5ca1ecf159e0ea152ce713f652c116f62e12cad293331db922a5fed311ab22096d90fc17ccc53f84d46eae680def0b9949e0d9debff263d575e590941a5ce0b33548beb6dbc01104f6054da73cc349625adece6a54e092d8d740915b91d81df30374a78693d6b69724f05354d61ac0febff4a544b88954d11d3f4927895edf6ad755313227ac87f24f12d70a831df16bd45c4a03570fdf27d698fa5581fce2d002890a3f2059a6bfdf77f0aeee3ad8318449bc1b2d486b225b148a78e921c73a2c37256dfb1ad611e410d5436e0d31d00ab5177da7915a74ef3307927c23c764f5cf62c3e2db86284c9abb39045b625d507f5c8d440557b4dad2a39593fbb572cce25a364aae44134fdd97ef0148690881bee42b6bd929f12cdf07996597a2a8366b12841f8fb8dfc0ece651756637b95c6bdb92320302805b4a700e7d3dfb0b8878862f400f8437a6c153b5fab40d30af07e73cf4345cb6fa81574018a7bc0e8789fae8b8560f4b93d413fa8e0e0218527ccb82873fc9da6cc34b6197c1d8bd9223ab7c4efb1f8cf021450037f4576934d83116655c120062fc3b912176fd395ccc792d492f2730465f8b4c68155b6ceb52e80742d2970e24004171f4685cd78467a4e943a0fecff66dffff10922d69236460dc37c1df9b19dded1ecb932dd8dd2045d2f8e8d3dfb6a83a65d6623553a2aed7a12b78effeeaa58eec84cdefc84923177afb7bd04f6fc3d3332d63ed5c5d6fe8820b9853e7615407eb23962f5232db44bc0267e7f07e47b158de0732a974b80aeb00ffeeca83d26fe21e487ea4472cd9048f942155784af8f68006cdb4286480a7ffa1ba6e93fe7fdb33283359d28bf9311dee59899e0e77aa113fadda21526c8e2bd60f21e182b735a5b0177fb95e948857c6c4ae391b2b4950a35b129e7bf25b7eb2c0857290c55f5d28b78ca1f39f0cd676610805b0a378647ae958182b26de1ddbf80e80d7ab1d2476086ed192e98bee0969bc0e8765278cb5570ccc29ac6d7298821bff4f85895deffcf4ce54a69878cfb41eade0d8703cbcff02352733ace2d800ba68b0fdcc52b94247ecacddf80ad228cf76eb547d276d0f6402054e34c3569e2b53ea3cbc54e49e099372cde3acd1ba47f836a765f855763a175a58ec4d6cecc72375da2d8c956c2868e77bfdb697182b554f0b743d7095cf13a3ba1d19e7590c281bd09ce235898a9682aacb5633b4fa4c3bdd71139c20c518b6a7651a47df7658a5a7ed41b3e7e43543d68c1dd4a5d01ec7e42cabdd6963db84f0d69b5a471ff8b929a8774baee39b14ab325af2ea7756c656c0135a59568499208341333d6b896cf0cc10108970e20313df241d179bd2a4d2392b269e6aeb9d2570bba7e3c67f49e90cf95562f93077a5fb588225724d444fcd8da55921dcff7b0be49ac0171ae98209e729f65bcebe447ccc0a185719f3fd55d1ae263daac4a420da91d05cdfc85d48e5743483dbb6fe81e5c216948953d95d5e725db17df44f05a57c6cc425e55572f9163e536a6d2d51d5213c937f6ddba08fc1f90ec73088a766a685f2c0d43b80422d48eef23b2ea588ea26b8dffb4f0df0cf91d6ea8f14a663ba2b165e4427010742fe63905d62b9dcf2385dce09fe75e4746d5c9c402ee77bfc9f39a28eb9f2751a81b090a499706accafbf5ae1afa9af350fd7481bb", 0x1000}, 0x1006) [ 452.586962] block nbd3: Device being setup by another task [ 452.596979] block nbd3: Device being setup by another task 14:48:56 executing program 0: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = inotify_init() readv(r3, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:48:56 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) mincore(&(0x7f0000fff000/0x1000)=nil, 0x1000, &(0x7f00000000c0)=""/101) close(r0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 14:48:56 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b", 0x7c, 0x10000}], 0x0, 0x0) 14:48:57 executing program 4: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = inotify_init() readv(r3, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:48:57 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f00000000c0)='./file0\x00', 0x4, 0x4, &(0x7f00000004c0)=[{&(0x7f0000000100)="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", 0xfb, 0xd}, {&(0x7f0000000280)="5674900216098c4655bdd36dd6bcc86988e59238e07279744cafa0cf6a841c7f3882b662bfb358ccd0383f3123bc010a8803f1e9d8046b843b83e1c1dac97568544dfd8709bb83be0509824ba77e342e1b3eae4941c738cb34a3a41c798529072f88ddd33b71103f407f8b283b82af020ab20aa78ec243ca01d482abb1f71d2eeef6d00812cd1baa7cfa695e231ffaba448bc0dfba25b4695f4d7ce78b422324beb2ecb36067c568ce97d6c261f38bbfdcd56eca74d7", 0xb6, 0x9}, {&(0x7f0000000340)="70417cae445c172394022a115d24f8a0f3dcfb7dc627b16bac1d571d7bb966ce9439b4459404c33dda4464bf4b650513f93094acbe209ba268f11986f53ab534cad15ee3d187134450f70b97f2b1276a8fecec8d14da7fc2ec2e1d06563b031d5d9c4ee7de73d4f6e9dd53cd801d1a323df258867fecabe201051bfa79781c4b02d1529df5884d9abaf80dea238e4fa156a8b8", 0x93, 0x1}, {&(0x7f0000000400)="b36a1d304f46f9a548970be371e49a6b36f41f0d001f8b16244c4593b6adab328c79614c67375f7abf39d90577ce3b63a4251908783a8aa58a35526f7ab6addc21a988f3b3031c8ef93544722f850c873d7378912b8cb3f0d5ab4ed34e852123d6860c2865ada66a89d5788ef75200ed95bb5a03bdebcc1f7451c8ed783f7b5aa7ca4b5613f667848e6f6beaec160b3d5dd68b0f3e4ff3a72ad9", 0x9a, 0x1ff}], 0x10c420, 0x0) clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 14:48:57 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee", 0x7e, 0x10000}], 0x0, 0x0) 14:48:57 executing program 1: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = inotify_init() readv(r3, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:48:57 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee", 0x7e, 0x10000}], 0x0, 0x0) 14:48:57 executing program 3: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) mincore(&(0x7f0000fff000/0x1000)=nil, 0x1000, &(0x7f00000000c0)=""/101) close(r0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 14:48:57 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee", 0x7e, 0x10000}], 0x0, 0x0) 14:48:57 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94", 0x7f, 0x10000}], 0x0, 0x0) 14:48:57 executing program 0: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = inotify_init() readv(r3, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:48:57 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94", 0x7f, 0x10000}], 0x0, 0x0) 14:48:57 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94", 0x7f, 0x10000}], 0x0, 0x0) 14:48:57 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80}], 0x0, 0x0) 14:48:57 executing program 4: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = inotify_init() readv(r3, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:48:58 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80}], 0x0, 0x0) 14:48:58 executing program 1: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = inotify_init() readv(r3, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0x82a) 14:48:58 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) r1 = socket$rds(0x15, 0x5, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f00000000c0)={0x88000000}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r5, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r5, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) getsockopt$inet6_buf(r5, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000340)='./bus\x00', 0x341042, 0x1) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r6, 0x80003) sendfile(r5, r6, &(0x7f00000000c0), 0x8000fffffffe) accept4$vsock_stream(r6, &(0x7f00000003c0)={0x28, 0x0, 0xffffffff, @host}, 0x10, 0x80000) ioctl$SIOCAX25DELUID(r3, 0x89e2, &(0x7f0000000340)={0x3, @default, r4}) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r2) socket(0x8, 0x80000, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r7, 0x407, 0x0) write(r7, &(0x7f0000000340), 0x41395527) ioctl$KDSKBSENT(r7, 0x4b49, &(0x7f0000000100)="b3c2a7fe49ef3ed87a6b6a1761b4ac963960f50082321ac9c0f77bd1a9fde158197614be1d96e8a30d69ded8749d6a47d4441d0d5a830334b62c252d109de2ec8e0a2d0d612daedfa2c7e39fb382a13d3e55edc71a3e71aac7b76923efc610d7c533462d642d9458b0f792120c2b2b7f0b086cc6026c41455eb440cf443f0ac4e6a3dd30de5518d68e618958596ec9e5e5d252b3d14798eab7fe18d7cdcfd3ac5b8113e150d9cc6a7a02c611ae7c9b902e1873e4dbc6ca502b618f777510cf5fecb60c35c1c492412979ae817ca22cdbafaee98b0211de515174d245") openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 14:48:58 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80}], 0x0, 0x0) 14:48:58 executing program 3: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) mincore(&(0x7f0000fff000/0x1000)=nil, 0x1000, &(0x7f00000000c0)=""/101) close(r0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 14:48:58 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x5}, 0x16) r5 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') sendfile(r4, r6, 0x0, 0x80040006) dup2(r3, r4) timer_settime(0x0, 0x0, &(0x7f0000000180)={{}, {0x0, 0x989680}}, 0x0) tkill(r5, 0x1004000000015) 14:48:58 executing program 5 (fault-call:2 fault-nth:0): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) [ 454.366979] FAULT_INJECTION: forcing a failure. [ 454.366979] name failslab, interval 1, probability 0, space 0, times 0 [ 454.378423] CPU: 0 PID: 19804 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 454.385553] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 454.394925] Call Trace: [ 454.397526] dump_stack+0x138/0x197 [ 454.401174] should_fail.cold+0x10f/0x159 [ 454.405343] should_failslab+0xdb/0x130 [ 454.409331] __kmalloc+0x2f0/0x7a0 [ 454.412880] ? __sb_end_write+0xc1/0x100 [ 454.416945] ? strnlen_user+0x12f/0x1a0 [ 454.420923] ? SyS_memfd_create+0xba/0x3a0 [ 454.425490] SyS_memfd_create+0xba/0x3a0 [ 454.429560] ? shmem_fcntl+0x130/0x130 [ 454.433570] ? do_syscall_64+0x53/0x640 [ 454.437589] ? shmem_fcntl+0x130/0x130 [ 454.441705] do_syscall_64+0x1e8/0x640 [ 454.445923] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 454.450813] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 454.456021] RIP: 0033:0x459a59 [ 454.459216] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 14:48:58 executing program 0: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = inotify_init() readv(r3, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:48:58 executing program 3: syz_emit_ethernet(0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001300), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001300), 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, &(0x7f0000000380)) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000b6dfc8)={0xffffff7f00000000, 0x0, &(0x7f00008feff0)={&(0x7f0000000100)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @dev}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @remote}}]}, 0x50}}, 0x0) write$vhci(0xffffffffffffffff, 0x0, 0x0) symlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000000)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) renameat(r0, 0x0, 0xffffffffffffff9c, 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x3, 0x2000) mount$9p_rdma(&(0x7f00000001c0)='127.0.0.1\x00', &(0x7f00000003c0)='./file1\x00', 0x0, 0x100002, &(0x7f0000000980)={'trans=rdma,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@sq={'sq', 0x3d, 0xbf2}}, {@common=@debug={'debug', 0x3d, 0x7}}, {@common=@afid={'a\xff\xff{', 0x3d, 0x2}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'MMAP_CHECK'}}, {@obj_role={'obj_role', 0x3d, 'net/udp\x00'}}]}}) dup(0xffffffffffffffff) r2 = socket$inet6(0xa, 0x80003, 0x9) getsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000680), &(0x7f00000006c0)=0x4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x523) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, 0x0, 0x4800) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r3, &(0x7f0000000180)='.//ile0\x00', r3, &(0x7f00000007c0)='./file0/f.le.\x00') [ 454.467060] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459a59 [ 454.474585] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004be9b7 [ 454.481871] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 454.489243] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f39d7da96d4 [ 454.496528] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:48:58 executing program 5 (fault-call:2 fault-nth:1): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) [ 454.573725] FAULT_INJECTION: forcing a failure. [ 454.573725] name failslab, interval 1, probability 0, space 0, times 0 [ 454.585434] CPU: 0 PID: 19811 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 454.592469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 454.601821] Call Trace: [ 454.604424] dump_stack+0x138/0x197 [ 454.608071] should_fail.cold+0x10f/0x159 [ 454.612237] should_failslab+0xdb/0x130 [ 454.616233] kmem_cache_alloc+0x2d7/0x780 [ 454.620529] ? __alloc_fd+0x1d4/0x4a0 [ 454.624344] __d_alloc+0x2d/0x9f0 [ 454.627802] ? lock_downgrade+0x740/0x740 [ 454.632195] d_alloc_pseudo+0x1e/0x30 [ 454.636082] __shmem_file_setup.part.0+0xd8/0x400 [ 454.640938] ? __alloc_fd+0x1d4/0x4a0 [ 454.644751] ? shmem_fill_super+0x8c0/0x8c0 [ 454.649117] SyS_memfd_create+0x1f9/0x3a0 [ 454.653282] ? shmem_fcntl+0x130/0x130 [ 454.657183] ? do_syscall_64+0x53/0x640 [ 454.661166] ? shmem_fcntl+0x130/0x130 [ 454.665062] do_syscall_64+0x1e8/0x640 [ 454.668960] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 454.673815] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 454.679006] RIP: 0033:0x459a59 [ 454.682194] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 454.689902] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459a59 [ 454.697185] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004be9b7 [ 454.704905] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 454.712190] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f39d7da96d4 14:48:58 executing program 5 (fault-call:2 fault-nth:2): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) [ 454.719472] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 [ 454.771234] FAULT_INJECTION: forcing a failure. [ 454.771234] name failslab, interval 1, probability 0, space 0, times 0 [ 454.783595] CPU: 0 PID: 19818 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 454.790627] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 454.800088] Call Trace: [ 454.802688] dump_stack+0x138/0x197 [ 454.806335] should_fail.cold+0x10f/0x159 [ 454.810497] should_failslab+0xdb/0x130 [ 454.814493] kmem_cache_alloc+0x2d7/0x780 [ 454.818644] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 454.824198] ? rcu_read_lock_sched_held+0x110/0x130 [ 454.829220] ? shmem_destroy_callback+0xa0/0xa0 [ 454.833894] shmem_alloc_inode+0x1c/0x50 [ 454.837951] alloc_inode+0x64/0x180 [ 454.841573] new_inode_pseudo+0x19/0xf0 [ 454.845770] new_inode+0x1f/0x40 [ 454.849127] shmem_get_inode+0x75/0x750 [ 454.853171] __shmem_file_setup.part.0+0x111/0x400 [ 454.858087] ? __alloc_fd+0x1d4/0x4a0 [ 454.861891] ? shmem_fill_super+0x8c0/0x8c0 [ 454.866339] SyS_memfd_create+0x1f9/0x3a0 [ 454.870485] ? shmem_fcntl+0x130/0x130 [ 454.874372] ? do_syscall_64+0x53/0x640 [ 454.878346] ? shmem_fcntl+0x130/0x130 [ 454.882239] do_syscall_64+0x1e8/0x640 [ 454.886243] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 454.891207] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 454.896394] RIP: 0033:0x459a59 [ 454.899713] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 454.907736] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459a59 14:48:58 executing program 4: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = inotify_init() readv(r3, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:48:58 executing program 1: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = inotify_init() readv(r3, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0x82a) [ 454.915098] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004be9b7 [ 454.922413] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 454.929691] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f39d7da96d4 [ 454.936965] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 [ 454.950001] net_ratelimit: 24 callbacks suppressed [ 454.950006] protocol 88fb is buggy, dev hsr_slave_0 [ 454.960223] protocol 88fb is buggy, dev hsr_slave_1 14:48:59 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='\x00\x00\xdf\xff\xff\xff\x00', 0xfffffffffffffd31) close(r0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0xdcc1a56c8b24a4a0, 0x40) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000340)='./bus\x00', 0x341042, 0x1) r3 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r3, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r3, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) getsockopt$inet6_buf(r3, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000340)='./bus\x00', 0x341042, 0x1) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r4, 0x80003) sendfile(r3, r4, &(0x7f00000000c0), 0x8000fffffffe) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000100)={@rand_addr="5821e701d2d93f13ad5c48178074a856", 0x1f, 0xec408e178b093172, 0xff, 0x2, 0xff, 0x3f}, &(0x7f0000000140)=0x20) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r2, 0x80003) sendfile(r1, r2, &(0x7f00000000c0), 0x8000fffffffe) r5 = socket$inet6(0xa, 0x400000000001, 0x40) bind$inet6(r5, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r5, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) getsockopt$inet6_buf(r5, 0x29, 0x14, &(0x7f0000000580)=""/219, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000340)='./bus\x00', 0x341042, 0x1) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r6, 0x80003) sendfile(r5, r6, &(0x7f00000000c0), 0x8000fffffffe) dup3(r1, r6, 0x180000) [ 455.008125] overlayfs: filesystem on './file0' not supported as upperdir 14:48:59 executing program 3: 14:48:59 executing program 5 (fault-call:2 fault-nth:3): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) [ 455.110010] protocol 88fb is buggy, dev hsr_slave_0 [ 455.115140] protocol 88fb is buggy, dev hsr_slave_1 14:48:59 executing program 3: [ 455.207915] FAULT_INJECTION: forcing a failure. [ 455.207915] name failslab, interval 1, probability 0, space 0, times 0 [ 455.228356] CPU: 1 PID: 19836 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 455.235440] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 455.244797] Call Trace: [ 455.247498] dump_stack+0x138/0x197 [ 455.251660] should_fail.cold+0x10f/0x159 [ 455.255835] should_failslab+0xdb/0x130 [ 455.259824] kmem_cache_alloc+0x2d7/0x780 [ 455.264098] ? shmem_alloc_inode+0x1c/0x50 [ 455.268443] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 455.273939] selinux_inode_alloc_security+0xb6/0x2a0 [ 455.279059] security_inode_alloc+0x94/0xd0 [ 455.283396] inode_init_always+0x552/0xaf0 [ 455.287644] alloc_inode+0x81/0x180 [ 455.291271] new_inode_pseudo+0x19/0xf0 [ 455.295406] new_inode+0x1f/0x40 [ 455.299047] shmem_get_inode+0x75/0x750 [ 455.303117] __shmem_file_setup.part.0+0x111/0x400 [ 455.308150] ? __alloc_fd+0x1d4/0x4a0 [ 455.311955] ? shmem_fill_super+0x8c0/0x8c0 [ 455.316304] SyS_memfd_create+0x1f9/0x3a0 [ 455.320448] ? shmem_fcntl+0x130/0x130 [ 455.324340] ? do_syscall_64+0x53/0x640 [ 455.328326] ? shmem_fcntl+0x130/0x130 [ 455.332224] do_syscall_64+0x1e8/0x640 [ 455.336109] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 455.340953] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 455.346137] RIP: 0033:0x459a59 [ 455.350118] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 14:48:59 executing program 3: [ 455.357998] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459a59 [ 455.365389] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004be9b7 [ 455.372662] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 455.379933] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f39d7da96d4 [ 455.387212] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:48:59 executing program 3: 14:48:59 executing program 0: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = inotify_init() readv(r3, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 455.430004] protocol 88fb is buggy, dev hsr_slave_0 [ 455.435221] protocol 88fb is buggy, dev hsr_slave_1 14:48:59 executing program 3: 14:48:59 executing program 5 (fault-call:2 fault-nth:4): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) 14:48:59 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000700)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x6c08280}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14, r2, 0x400, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0xfffffffffffffdb8}}, 0x20040801) r3 = socket(0x3, 0xeb77958af42594a0, 0x0) r4 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r3, 0x89e3, 0x0) ioctl$NBD_SET_SOCK(r4, 0xab00, r3) sendmsg$NET_DM_CMD_START(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40200800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x8, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x30010863}, 0x48001) ioctl$sock_SIOCADDDLCI(r3, 0x8980, &(0x7f00000000c0)={'nr\x0fjc\x00\xff\x03\x00\x00\x00 \x00', 0x10001}) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0x7, &(0x7f0000000000)={0x59cd, 0x9, 0x6501, 0xffffffff}, 0x10) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 455.513228] protocol 88fb is buggy, dev hsr_slave_0 [ 455.518451] protocol 88fb is buggy, dev hsr_slave_1 [ 455.562594] FAULT_INJECTION: forcing a failure. [ 455.562594] name failslab, interval 1, probability 0, space 0, times 0 [ 455.575977] CPU: 1 PID: 19865 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 455.583044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 455.592779] Call Trace: [ 455.595393] dump_stack+0x138/0x197 [ 455.599038] should_fail.cold+0x10f/0x159 [ 455.603198] should_failslab+0xdb/0x130 [ 455.607179] kmem_cache_alloc+0x2d7/0x780 [ 455.611335] ? lock_downgrade+0x740/0x740 [ 455.615647] get_empty_filp+0x8c/0x3f0 [ 455.619767] alloc_file+0x23/0x440 [ 455.623393] __shmem_file_setup.part.0+0x1b1/0x400 [ 455.628428] ? __alloc_fd+0x1d4/0x4a0 [ 455.632287] ? shmem_fill_super+0x8c0/0x8c0 [ 455.636603] SyS_memfd_create+0x1f9/0x3a0 [ 455.640745] ? shmem_fcntl+0x130/0x130 [ 455.644632] ? do_syscall_64+0x53/0x640 [ 455.648602] ? shmem_fcntl+0x130/0x130 [ 455.652511] do_syscall_64+0x1e8/0x640 [ 455.656388] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 455.661226] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 455.666403] RIP: 0033:0x459a59 [ 455.669599] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 455.677306] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459a59 [ 455.684564] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004be9b7 [ 455.691866] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 455.699126] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f39d7da96d4 [ 455.706383] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:48:59 executing program 4: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = inotify_init() readv(r3, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:48:59 executing program 3: 14:48:59 executing program 5 (fault-call:2 fault-nth:5): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) 14:48:59 executing program 1: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = inotify_init() readv(r3, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0x82a) 14:48:59 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c00010062726964676500000300020092ab29e6bc90313f5c14a8d5d4534e466f18e7a665b4fd2a0e0ffabd5f884b8215627962f7a4aab6691329692afb3fdcc3e7378871f430fe0e63a139f8432b7c88d952fec2b4b0543063914575e89dce08917ef4c83982304f91f231dc1ecf62c4bf0541ff2b5060b6a4d69b9403c96422fd8632e43e946636599dedd725bcd83c8971198e43a29e4b1c15388e01dee5bf7c4e128ff5b5c146c15db0684e76186c004209d8b4158f7b359d8efa69231277e09c47884e9fb0b010687409fc6fa73c91c9504b4460a91a865e0897f10dc1c1e0edc0d560f18478d67cc5cf8dbb0ee5000200000000000000bcb9eb76abba12076a8d076c853092edf73f4224c4e770006630b3a7e43c7e4c90ce6a20fac946584d406aa1cc75103f746d1f026456e44c9a39c62eecdb8bb82ca275e24c5c9095cbc8a6701a2447f9f6e6e4a372717366f176f0e4df46e9e28ede8a00e2a8b3dc"], 0x34}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'brixge\x00'}, {0x4}}}]}, 0x34}}, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000100)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) sendmsg$nl_xfrm(r0, &(0x7f0000000800)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8080}, 0xc, &(0x7f00000007c0)={&(0x7f00000002c0)=@newpolicy={0x4f4, 0x13, 0x400, 0x70bd26, 0x25dfdbfd, {{@in=@dev={0xac, 0x14, 0x14, 0x1c}, @in6=@loopback, 0x4e24, 0x7fd, 0x4e21, 0x6, 0x2, 0x80, 0xa0, 0x21, r4, r5}, {0x9, 0x80000001, 0x3, 0x101, 0x7, 0x8, 0x9, 0x1}, {0xffffffff80000000, 0x9, 0x5, 0xa4a3}, 0x401, 0x6e6bbf, 0x1, 0x1, 0x1, 0x1}, [@ipv4_hthresh={0x8, 0x3, {0x1b, 0xc}}, @algo_auth={0x144, 0x1, {{'sha256-arm64-neon\x00'}, 0x7e0, "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"}}, @algo_auth={0xc4, 0x1, {{'cmac(arc4)\x00'}, 0x3c8, "459ba402d51ee43878caf36fe7f97c271ada99b1da0fb3e49612ccafc85c2a28ed019bc8fb04ddb14f5ef8e31d0577e34d12664f52c90bbe44b92531252f0006c2556b6212584fadcbfdf6f6455af9d364e2ebb00fd64d4752be2748616cbb98b34188cfdc271f22977c43b7685d6424a42fcee3f18332783d"}}, @sa={0xe4, 0x6, {{@in=@multicast1, @in=@multicast2, 0x4e22, 0x56, 0x4e21, 0x79, 0xa, 0x0, 0x80, 0x3c, 0x0, r6}, {@in6=@mcast2, 0x4d6, 0x32}, @in6=@empty, {0x1, 0x1, 0x8, 0x2, 0x3f, 0x0, 0x4, 0x1000}, {0x33c301c2, 0x984, 0x1ff, 0x8}, {0x75, 0x8, 0x57}, 0x70bd2a, 0x3507, 0x2, 0x0, 0x1, 0xc8}}, @algo_auth_trunc={0x148, 0x14, {{'sha3-224\x00'}, 0x7e0, 0x0, "e6855e59f5e3fd0d0ccee8768359661b0b1ae0c52717cab02d5362565e27d04bbd4640bbbfb2d199885516eb462b9cfce352ee871c10ac077d60d4abccc0edaf14c00ce9503e73f2d0ab07619b1449f0627e7f27e0cb755fa4eaf0ea2c0e00881b09ee2ed2cd24de0a24e9c89a4b3b4c3f04aa4e3889f63badfb7b450e6c8c767f29d9b6eb86b6b11f3e0bccec3d17700db6bd117b69c1d39c210a862e21fb23102e9c8c85351a212c44ac39afa4282ddb8f04bb820b914461ed12191f30cb1e2e45f3e8962ebfc1ed280c2c9ca319faf0be970f98cf147e773c6ba3d757f9e618901dc4b462e74c23413e5a9e63c399cc8e3b86e5fbade111009778"}}]}, 0x4f4}, 0x1, 0x0, 0x0, 0x10}, 0x4040) close(r1) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 14:48:59 executing program 3: [ 455.905746] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 455.944635] FAULT_INJECTION: forcing a failure. [ 455.944635] name failslab, interval 1, probability 0, space 0, times 0 14:48:59 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_READ(0x17, 0x0) 14:49:00 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) keyctl$session_to_parent(0x12) close(r0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 455.978041] CPU: 0 PID: 19881 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 455.985116] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 455.994532] Call Trace: [ 455.997138] dump_stack+0x138/0x197 [ 456.000791] should_fail.cold+0x10f/0x159 [ 456.004957] should_failslab+0xdb/0x130 [ 456.008951] kmem_cache_alloc+0x2d7/0x780 [ 456.013110] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 456.018665] ? check_preemption_disabled+0x3c/0x250 [ 456.023718] selinux_file_alloc_security+0xb4/0x190 [ 456.028764] security_file_alloc+0x6d/0xa0 [ 456.033104] get_empty_filp+0x162/0x3f0 [ 456.037093] alloc_file+0x23/0x440 [ 456.040648] __shmem_file_setup.part.0+0x1b1/0x400 [ 456.045778] ? __alloc_fd+0x1d4/0x4a0 [ 456.049594] ? shmem_fill_super+0x8c0/0x8c0 [ 456.054025] SyS_memfd_create+0x1f9/0x3a0 [ 456.058192] ? shmem_fcntl+0x130/0x130 [ 456.062091] ? do_syscall_64+0x53/0x640 [ 456.066070] ? shmem_fcntl+0x130/0x130 [ 456.069964] do_syscall_64+0x1e8/0x640 [ 456.073854] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 456.078793] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 456.083991] RIP: 0033:0x459a59 [ 456.083997] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 456.084009] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459a59 [ 456.084015] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004be9b7 [ 456.084021] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 456.084027] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f39d7da96d4 [ 456.084033] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 [ 456.150017] protocol 88fb is buggy, dev hsr_slave_0 [ 456.152393] protocol 88fb is buggy, dev hsr_slave_0 14:49:00 executing program 0: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) readv(0xffffffffffffffff, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:00 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 14:49:00 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) write$P9_RSTATu(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c) 14:49:00 executing program 5 (fault-call:2 fault-nth:6): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) [ 456.367212] FAULT_INJECTION: forcing a failure. [ 456.367212] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 456.391204] CPU: 1 PID: 19917 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 456.398440] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 456.407808] Call Trace: [ 456.410537] dump_stack+0x138/0x197 [ 456.414193] should_fail.cold+0x10f/0x159 [ 456.418355] ? __might_sleep+0x93/0xb0 [ 456.422302] __alloc_pages_nodemask+0x1d6/0x7a0 [ 456.427221] ? __alloc_pages_slowpath+0x2930/0x2930 [ 456.432235] ? lock_downgrade+0x740/0x740 [ 456.436572] alloc_pages_vma+0xc9/0x4c0 [ 456.440627] shmem_alloc_page+0xf6/0x1a0 [ 456.444866] ? shmem_swapin+0x1a0/0x1a0 [ 456.449111] ? cred_has_capability+0x142/0x290 [ 456.453698] ? check_preemption_disabled+0x3c/0x250 [ 456.458811] ? __this_cpu_preempt_check+0x1d/0x30 [ 456.463645] ? percpu_counter_add_batch+0x112/0x160 [ 456.468736] ? __vm_enough_memory+0x26a/0x490 [ 456.473245] shmem_alloc_and_acct_page+0x12a/0x680 [ 456.478181] shmem_getpage_gfp+0x3e7/0x25d0 [ 456.482514] ? shmem_add_to_page_cache+0x860/0x860 [ 456.487440] ? iov_iter_fault_in_readable+0x1da/0x3c0 [ 456.492791] shmem_write_begin+0xfd/0x1b0 [ 456.496931] ? trace_hardirqs_on_caller+0x400/0x590 [ 456.501945] generic_perform_write+0x1f8/0x480 [ 456.506519] ? page_endio+0x530/0x530 [ 456.510306] ? current_time+0xb0/0xb0 [ 456.514092] ? generic_file_write_iter+0x9a/0x660 [ 456.518929] __generic_file_write_iter+0x239/0x5b0 [ 456.523902] generic_file_write_iter+0x303/0x660 [ 456.529089] __vfs_write+0x4a7/0x6b0 [ 456.532788] ? selinux_file_open+0x420/0x420 [ 456.537196] ? kernel_read+0x120/0x120 [ 456.541164] ? check_preemption_disabled+0x3c/0x250 [ 456.546179] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 456.551615] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 456.559310] ? __sb_start_write+0x153/0x2f0 [ 456.563623] vfs_write+0x198/0x500 [ 456.567153] SyS_pwrite64+0x115/0x140 [ 456.571026] ? SyS_pread64+0x140/0x140 [ 456.574934] ? do_syscall_64+0x53/0x640 [ 456.578894] ? SyS_pread64+0x140/0x140 [ 456.582969] do_syscall_64+0x1e8/0x640 [ 456.586842] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 456.591685] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 456.596904] RIP: 0033:0x4139a7 [ 456.600084] RSP: 002b:00007f39d7da8a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 456.607804] RAX: ffffffffffffffda RBX: 0000000020000050 RCX: 00000000004139a7 [ 456.615069] RDX: 0000000000000080 RSI: 0000000020000240 RDI: 0000000000000006 [ 456.622352] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 456.629617] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000006 [ 456.637187] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:00 executing program 4: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = inotify_init() readv(r3, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:00 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) socket(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000340)='./bus\x00', 0x341042, 0x1) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r2, 0x80003) sendfile(r1, r2, &(0x7f00000000c0), 0x8000fffffffe) ioctl$PPPIOCSMAXCID(r2, 0x40047451, &(0x7f0000000000)=0xffffff81) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000140)={[{0xdba6abf3bd77365, 'pids'}, {0xf9131ea99578f02, 'rdma'}, {0x67d15597d2a24f8b, 'pids'}, {0x2d, 'rdma'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x0, 'memory'}]}, 0x2e) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 14:49:00 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3", 0x12}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 14:49:00 executing program 5 (fault-call:2 fault-nth:7): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) 14:49:00 executing program 1: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = inotify_init() readv(r3, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 456.778552] ptrace attach of "/root/syz-executor.3"[19930] was attempted by "/root/syz-executor.3"[19933] [ 456.796455] FAULT_INJECTION: forcing a failure. [ 456.796455] name failslab, interval 1, probability 0, space 0, times 0 [ 456.808130] CPU: 1 PID: 19936 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 456.815270] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 456.824623] Call Trace: [ 456.827326] dump_stack+0x138/0x197 [ 456.831046] should_fail.cold+0x10f/0x159 [ 456.836062] should_failslab+0xdb/0x130 [ 456.840057] kmem_cache_alloc+0x47/0x780 [ 456.844104] ? __alloc_pages_slowpath+0x2930/0x2930 [ 456.849101] ? lock_downgrade+0x740/0x740 [ 456.853251] radix_tree_node_alloc.constprop.0+0x1c7/0x310 [ 456.858882] __radix_tree_create+0x337/0x4d0 [ 456.863288] __radix_tree_insert+0xab/0x570 [ 456.867606] ? __radix_tree_create+0x4d0/0x4d0 [ 456.872191] shmem_add_to_page_cache+0x5a4/0x860 [ 456.876939] ? shmem_writepage+0xbb0/0xbb0 [ 456.881164] ? __radix_tree_preload+0x1d2/0x260 [ 456.885834] shmem_getpage_gfp+0x1757/0x25d0 [ 456.890290] ? shmem_add_to_page_cache+0x860/0x860 [ 456.895272] ? iov_iter_fault_in_readable+0x1da/0x3c0 [ 456.900464] shmem_write_begin+0xfd/0x1b0 [ 456.904612] ? trace_hardirqs_on_caller+0x400/0x590 [ 456.909764] generic_perform_write+0x1f8/0x480 [ 456.914485] ? page_endio+0x530/0x530 [ 456.918272] ? current_time+0xb0/0xb0 [ 456.922172] ? generic_file_write_iter+0x9a/0x660 [ 456.927111] __generic_file_write_iter+0x239/0x5b0 [ 456.932036] generic_file_write_iter+0x303/0x660 [ 456.936785] __vfs_write+0x4a7/0x6b0 [ 456.940486] ? selinux_file_open+0x420/0x420 [ 456.944878] ? kernel_read+0x120/0x120 [ 456.948754] ? check_preemption_disabled+0x3c/0x250 [ 456.953755] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 456.959276] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 456.964021] ? __sb_start_write+0x153/0x2f0 [ 456.968335] vfs_write+0x198/0x500 [ 456.971878] SyS_pwrite64+0x115/0x140 [ 456.975775] ? SyS_pread64+0x140/0x140 [ 456.979651] ? do_syscall_64+0x53/0x640 [ 456.983619] ? SyS_pread64+0x140/0x140 [ 456.987498] do_syscall_64+0x1e8/0x640 [ 456.991370] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 456.996201] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 457.001371] RIP: 0033:0x4139a7 [ 457.004553] RSP: 002b:00007f39d7da8a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 457.012245] RAX: ffffffffffffffda RBX: 0000000020000050 RCX: 00000000004139a7 [ 457.019612] RDX: 0000000000000080 RSI: 0000000020000240 RDI: 0000000000000006 14:49:01 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) socket(0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @rand_addr=0x2}, @in={0x2, 0x4e20, @rand_addr=0x200}, @in={0x2, 0x4e24, @multicast1}, @in6={0xa, 0x4e23, 0x10d1, @mcast2, 0x25}, @in6={0xa, 0x4e22, 0x7, @mcast2, 0x6a}, @in={0x2, 0x4e20, @rand_addr=0x8}, @in={0x2, 0x4e22, @local}, @in6={0xa, 0x4e20, 0x261, @empty, 0x5}, @in={0x2, 0x4e23, @empty}], 0xb4) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 457.026863] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 457.034116] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000006 [ 457.042327] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:01 executing program 5 (fault-call:2 fault-nth:8): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) 14:49:01 executing program 0: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) readv(0xffffffffffffffff, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 457.188074] FAULT_INJECTION: forcing a failure. [ 457.188074] name failslab, interval 1, probability 0, space 0, times 0 [ 457.200601] CPU: 1 PID: 19963 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 457.207630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 457.217080] Call Trace: [ 457.219881] dump_stack+0x138/0x197 [ 457.223767] should_fail.cold+0x10f/0x159 [ 457.227998] should_failslab+0xdb/0x130 [ 457.231983] kmem_cache_alloc+0x2d7/0x780 [ 457.236149] ? vfs_write+0x25f/0x500 [ 457.239958] getname_flags+0xcb/0x580 [ 457.243874] ? check_preemption_disabled+0x3c/0x250 [ 457.248893] getname+0x1a/0x20 [ 457.252087] do_sys_open+0x1e7/0x430 [ 457.255788] ? filp_open+0x70/0x70 [ 457.259312] ? fput+0xd4/0x150 [ 457.262488] ? SyS_pwrite64+0xca/0x140 [ 457.266387] SyS_open+0x2d/0x40 [ 457.269917] ? do_sys_open+0x430/0x430 [ 457.273804] do_syscall_64+0x1e8/0x640 [ 457.277794] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 457.282753] entry_SYSCALL_64_after_hwframe+0x42/0xb7 14:49:01 executing program 5 (fault-call:2 fault-nth:9): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) [ 457.287925] RIP: 0033:0x413941 [ 457.291117] RSP: 002b:00007f39d7da8a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 457.299157] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413941 [ 457.306432] RDX: 00007f39d7da8b0a RSI: 0000000000000002 RDI: 00007f39d7da8b00 [ 457.313927] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 457.321235] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000006 [ 457.328491] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 [ 457.371487] FAULT_INJECTION: forcing a failure. [ 457.371487] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 457.383400] CPU: 1 PID: 19968 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 457.390402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 457.399839] Call Trace: [ 457.402443] dump_stack+0x138/0x197 [ 457.406066] should_fail.cold+0x10f/0x159 [ 457.410382] __alloc_pages_nodemask+0x1d6/0x7a0 [ 457.415043] ? fs_reclaim_acquire+0x20/0x20 [ 457.419352] ? __alloc_pages_slowpath+0x2930/0x2930 [ 457.425010] cache_grow_begin+0x80/0x400 [ 457.429063] kmem_cache_alloc+0x6a6/0x780 [ 457.433813] ? vfs_write+0x25f/0x500 [ 457.437522] getname_flags+0xcb/0x580 [ 457.441327] ? check_preemption_disabled+0x3c/0x250 [ 457.446366] getname+0x1a/0x20 [ 457.449558] do_sys_open+0x1e7/0x430 [ 457.453381] ? filp_open+0x70/0x70 [ 457.457004] ? fput+0xd4/0x150 [ 457.460184] ? SyS_pwrite64+0xca/0x140 [ 457.464187] SyS_open+0x2d/0x40 [ 457.467459] ? do_sys_open+0x430/0x430 [ 457.471346] do_syscall_64+0x1e8/0x640 [ 457.475230] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 457.480084] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 457.485294] RIP: 0033:0x413941 [ 457.488469] RSP: 002b:00007f39d7da8a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 457.496168] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413941 [ 457.503430] RDX: 00007f39d7da8b0a RSI: 0000000000000002 RDI: 00007f39d7da8b00 [ 457.510700] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 457.517959] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000006 [ 457.525227] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:01 executing program 1: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = inotify_init() readv(r3, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:01 executing program 4: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = inotify_init() readv(r3, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:01 executing program 5 (fault-call:2 fault-nth:10): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) [ 457.684198] FAULT_INJECTION: forcing a failure. [ 457.684198] name failslab, interval 1, probability 0, space 0, times 0 [ 457.697043] CPU: 0 PID: 19979 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 457.704186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 457.713844] Call Trace: [ 457.716461] dump_stack+0x138/0x197 [ 457.720399] should_fail.cold+0x10f/0x159 [ 457.724577] should_failslab+0xdb/0x130 [ 457.728691] kmem_cache_alloc+0x2d7/0x780 [ 457.732847] ? save_stack+0xa9/0xd0 [ 457.736585] get_empty_filp+0x8c/0x3f0 [ 457.740566] path_openat+0x8f/0x3f70 [ 457.744371] ? trace_hardirqs_on+0x10/0x10 [ 457.748601] ? check_preemption_disabled+0x3c/0x250 [ 457.753614] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 457.758273] ? find_held_lock+0x35/0x130 [ 457.762608] ? save_trace+0x290/0x290 [ 457.766429] ? __alloc_fd+0x1d4/0x4a0 [ 457.770353] do_filp_open+0x18e/0x250 [ 457.774203] ? may_open_dev+0xe0/0xe0 [ 457.778027] ? lock_downgrade+0x740/0x740 [ 457.782180] ? _raw_spin_unlock+0x2d/0x50 [ 457.786332] ? __alloc_fd+0x1d4/0x4a0 [ 457.790167] do_sys_open+0x2c5/0x430 [ 457.793893] ? filp_open+0x70/0x70 [ 457.797439] ? fput+0xd4/0x150 [ 457.800631] ? SyS_pwrite64+0xca/0x140 [ 457.804660] SyS_open+0x2d/0x40 [ 457.807930] ? do_sys_open+0x430/0x430 [ 457.811819] do_syscall_64+0x1e8/0x640 [ 457.815705] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 457.821511] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 457.826700] RIP: 0033:0x413941 14:49:01 executing program 5 (fault-call:2 fault-nth:11): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) [ 457.829878] RSP: 002b:00007f39d7da8a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 457.837589] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413941 [ 457.845015] RDX: 00007f39d7da8b0a RSI: 0000000000000002 RDI: 00007f39d7da8b00 [ 457.852282] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 457.859551] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000006 [ 457.866819] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:01 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f00000000c0)='threadec\xfb', 0x9) close(r0) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000700)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x6c08280}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14, r1, 0x400, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0xfffffffffffffdb8}}, 0x20040801) r2 = socket(0x11, 0x2, 0x0) r3 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r2, 0x89e3, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r2) sendmsg$NET_DM_CMD_START(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40200800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r1, 0x8, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x30010863}, 0x48001) ioctl$SIOCX25GCALLUSERDATA(r2, 0x89e4, &(0x7f0000000840)={0x4b, "f7767784ac5923183dc7a44247f84dfe3329021fa194606837f173bef49e1a37fcb2b4e615afb41860431a284ae2f0542d253df2d67f7cacb96f8542cc5543ae65aff5fb132c2c497b1edf2f2bc1fd3e00ea20a3d5b7781bd82e45316a63e8154309240e64fa13a49339ec1df161f58dbeaa164000ba53a41dcab77f134f6aac"}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'\x00', {0x2, 0x4e24, @empty}}) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x200800, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x1, 0x0) write$binfmt_elf64(r5, &(0x7f0000000100)={{0x2, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "3b7fb143e2b0df57b50726c0a2a4a086119ef2b84bf6dd5707f972c246bdfd82de4ad7441dc08419c39a74d3764ebf5a2d87b7a3e85342c6a678f4ca593e5848e4c0f05d93563114f514bf7c77a103fada715d7f161f041563124121666c41c8447f19e06c83ea6b85cb328ba7f15721213a048f60ea8cbef4bd59d10346fb28d2fec6a044ae3af69629972141ac4eec90f0ce9e550881ba4e81f573163bde5d3a87f25edc9d9ec73f0bbebfb89743b1921f6268f62509aa9d3934b96d7a7461c9204229a35c0ea5a3c375624f0ea67d7a92eaa665e562db95fa5159882a0cc451214c151048f4e9bc0ab8df574d20b514e92dc21a3a5a4f51401c1fbf8c0dcc25fb094077c35088d76831211fad8f742c9287a4090df2cccc02152f48980d75a840802ce251cb4006ab0234534987e6078e53cc0f62db59b66c84197eb85e498f5c8fbf6829b962a7cf273ec48f7bc64190869a88dcb227dc80c6172a3e6459b118a7f4d3403401aec662ea2dc392c47eaafbb1bf80de15ed6f624baa0a952a9c5a90d92171dcdd5ea521726a24e81a679eee7acb76085785152be7de59a18170550b1463980fe68065720e3344fe0c3a2dbeb0d8a473dfb164f8626ee895a75188c18ca01a0eccc8a53ed66ab5fc32410cb2e291c0c39b48e466df23175f49feda365873530de99915aaa835d67da4baa07729b333cdd6cbdef1b1edcc8d2b0a1eb9e3536bd160a2f0e8427f1f9d8db2794961334b3128f6cb291b090c810f0e9d08138a3de2ebf9763761289e030705109f2c3c7dfe9df3f87e3b23153bb927a5582b9eb14aa2d9914905e305d26d2d293874793319c7b81d8d9b082910b745f2d3694b6833672f024168bbcac475f8a4d0f3ebb1983cfa2188a8a82a46700f56ef1871439aa2af6143d8996965c2b253fe782c63388255536f7ab1c26cccdb57fc82d0fc8afd6b4492a289e1547cf2cdd5223368ae72f9c287d97b740c428b530e2a34c30ff8abe4f09f53c50ab6e1551722762dd8038a2177411c66ddcf3008acf690ccb65ac5df06a78b7203ef3acc798b61f50d5b6b8e89c0e41433b82badff54c752fa0de28a9ea949317e204b6d86b0085c156f99d6a956bcf48167adf4a2ecbd42f1d4ec6b2d7829af8afba2f9436ef9ed1977e54ad0c08b356254295226b0743067bba7acd8d68844cb4fa255687365f8019ce3f5b10991f0d2f8683669af37c9bbf130e93fad49989e3c4acd97dc763d34006945318901c8406cb678d1b244b6f19fe7fd55dcf22f114dff6222fe7a4d9d500f347ac291f8b3f41f421266a2e6c6e0527d92340a2d88ae5c61f1855e8224667e325cbce0ed3a069499c2a96268695d395badb49c0d398bed8605cdab12d8fd680d309baae9f0a610712e3993530a37a8ab93e1660581446d1f82786d98233c70f0c7e4012df3744446e1dc2371dc8ec1dd9dbc05e2206ee6ea5ed7f83b31ac72dbec0c91ded8cfa80df927cb1729de14d8ac140bb926c3735fd734ad81de3ab8524b508f89f988d6d951b7c206d6b38d8ff3059709d91df5a17bdae34207329a985ec6a31670d66e5c38bbdf3759a38dcc3831292f7d8471b1979dfb69f2b2bc590448bacaa8acda52e0221a58292e77a1a65a2704d0467d56a40d304354e598663979f22de938f2588dc0afc5ef77e258395ec76365e01e58b68c99bbae7efddf189a5e1ae4cea030cb3ded92ea5369bf9a1787a46333aa658cae5afaa4647ec10355dee27e48e1dc9f761145b4885face6c9050faca2f90fea5b9dcbd6608a182545a3d3d25c9c6aa25374f8968f8102", [[0x1000000]]}, 0x682) ioctl$KVM_PPC_GET_PVINFO(r4, 0x4080aea1, &(0x7f0000000100)=""/97) futimesat(r5, &(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)={{}, {0x77359400}}) [ 457.943088] FAULT_INJECTION: forcing a failure. [ 457.943088] name failslab, interval 1, probability 0, space 0, times 0 [ 457.959201] block nbd2: Device being setup by another task [ 457.964777] CPU: 0 PID: 19990 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 457.971973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 457.981518] Call Trace: [ 457.984233] dump_stack+0x138/0x197 [ 457.987990] should_fail.cold+0x10f/0x159 [ 457.992179] should_failslab+0xdb/0x130 [ 457.996320] kmem_cache_alloc+0x2d7/0x780 [ 458.000472] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 458.005941] ? check_preemption_disabled+0x3c/0x250 [ 458.010995] selinux_file_alloc_security+0xb4/0x190 [ 458.016035] security_file_alloc+0x6d/0xa0 [ 458.020492] get_empty_filp+0x162/0x3f0 [ 458.024464] path_openat+0x8f/0x3f70 [ 458.028282] ? trace_hardirqs_on+0x10/0x10 [ 458.032536] ? check_preemption_disabled+0x3c/0x250 [ 458.037576] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 458.042420] ? find_held_lock+0x35/0x130 [ 458.046499] ? save_trace+0x290/0x290 [ 458.049178] block nbd2: Device being setup by another task [ 458.050327] ? __alloc_fd+0x1d4/0x4a0 [ 458.050342] do_filp_open+0x18e/0x250 [ 458.050355] ? may_open_dev+0xe0/0xe0 [ 458.050370] ? lock_downgrade+0x740/0x740 [ 458.050385] ? _raw_spin_unlock+0x2d/0x50 [ 458.050392] ? __alloc_fd+0x1d4/0x4a0 [ 458.050410] do_sys_open+0x2c5/0x430 [ 458.050422] ? filp_open+0x70/0x70 [ 458.050429] ? fput+0xd4/0x150 [ 458.050438] ? SyS_pwrite64+0xca/0x140 [ 458.050450] SyS_open+0x2d/0x40 [ 458.050456] ? do_sys_open+0x430/0x430 [ 458.050469] do_syscall_64+0x1e8/0x640 [ 458.050477] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 458.050490] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 458.050499] RIP: 0033:0x413941 [ 458.118235] RSP: 002b:00007f39d7da8a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 458.126252] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413941 [ 458.133532] RDX: 00007f39d7da8b0a RSI: 0000000000000002 RDI: 00007f39d7da8b00 [ 458.140810] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 458.148184] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000006 [ 458.155523] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:03 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ppoll(&(0x7f0000000080)=[{r0}], 0x1, &(0x7f00000000c0), 0x0, 0x0) 14:49:03 executing program 0: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) readv(0xffffffffffffffff, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:03 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) socket(0x3, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 14:49:03 executing program 5 (fault-call:2 fault-nth:12): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) 14:49:03 executing program 4: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) readv(0xffffffffffffffff, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:03 executing program 1: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = inotify_init() readv(r3, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 459.804618] FAULT_INJECTION: forcing a failure. [ 459.804618] name failslab, interval 1, probability 0, space 0, times 0 14:49:03 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) r1 = openat$cgroup(r0, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000180)='pids.current\x00', 0x26e1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r3, 0x28, 0x2, &(0x7f0000000000)=0x7fff, 0x8) r4 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r4, &(0x7f0000008880), 0x62a, 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000100)={'mangle\x00'}, &(0x7f0000000040)=0x54) close(r2) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r2) socket(0x2, 0x3, 0x81) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x181c00) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 459.848426] CPU: 0 PID: 20012 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 459.855572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 459.865035] Call Trace: [ 459.867644] dump_stack+0x138/0x197 [ 459.871326] should_fail.cold+0x10f/0x159 [ 459.875508] should_failslab+0xdb/0x130 [ 459.879539] kmem_cache_alloc_trace+0x2e9/0x790 [ 459.884235] ? __lockdep_init_map+0x10c/0x570 [ 459.889110] ? loop_get_status64+0x120/0x120 [ 459.893777] __kthread_create_on_node+0xe3/0x3e0 [ 459.899323] ? kthread_park+0x140/0x140 [ 459.903305] ? __fget+0x210/0x370 [ 459.906778] ? loop_get_status64+0x120/0x120 [ 459.911696] kthread_create_on_node+0xa8/0xd0 [ 459.916187] ? __kthread_create_on_node+0x3e0/0x3e0 [ 459.921350] ? __lockdep_init_map+0x10c/0x570 [ 459.925883] lo_ioctl+0xcf7/0x1ce0 [ 459.929432] ? debug_check_no_obj_freed+0x2aa/0x7b7 [ 459.934448] ? loop_probe+0x160/0x160 [ 459.938259] blkdev_ioctl+0x96b/0x1860 [ 459.942146] ? blkpg_ioctl+0x980/0x980 [ 459.946044] ? __might_sleep+0x93/0xb0 [ 459.950029] ? __fget+0x210/0x370 [ 459.953494] block_ioctl+0xde/0x120 [ 459.957229] ? blkdev_fallocate+0x3b0/0x3b0 [ 459.961553] do_vfs_ioctl+0x7ae/0x1060 [ 459.965555] ? selinux_file_mprotect+0x5d0/0x5d0 [ 459.970327] ? lock_downgrade+0x740/0x740 [ 459.974634] ? ioctl_preallocate+0x1c0/0x1c0 [ 459.979189] ? __fget+0x237/0x370 [ 459.982722] ? security_file_ioctl+0x89/0xb0 [ 459.987177] SyS_ioctl+0x8f/0xc0 [ 459.990565] ? do_vfs_ioctl+0x1060/0x1060 [ 459.994737] do_syscall_64+0x1e8/0x640 [ 459.998649] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 460.003498] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 460.008837] RIP: 0033:0x4598c7 [ 460.012509] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 460.020226] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004598c7 [ 460.027524] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 460.034980] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 460.042286] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 14:49:04 executing program 3: 14:49:04 executing program 5 (fault-call:2 fault-nth:13): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) [ 460.049567] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:04 executing program 3: [ 460.156928] FAULT_INJECTION: forcing a failure. [ 460.156928] name failslab, interval 1, probability 0, space 0, times 0 [ 460.169169] CPU: 1 PID: 20037 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 460.176473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 460.185846] Call Trace: [ 460.185873] dump_stack+0x138/0x197 [ 460.185896] should_fail.cold+0x10f/0x159 [ 460.185913] should_failslab+0xdb/0x130 [ 460.185928] kmem_cache_alloc+0x2d7/0x780 14:49:04 executing program 3: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x20002, 0x0) write$binfmt_aout(r0, 0x0, 0x0) [ 460.196659] ? trace_hardirqs_on+0x10/0x10 [ 460.196678] ? save_trace+0x290/0x290 [ 460.196699] __kernfs_new_node+0x70/0x420 [ 460.196712] kernfs_new_node+0x80/0xf0 [ 460.196725] kernfs_create_dir_ns+0x41/0x140 [ 460.225493] internal_create_group+0xea/0x7b0 [ 460.230015] sysfs_create_group+0x20/0x30 [ 460.234185] lo_ioctl+0x1176/0x1ce0 [ 460.237929] ? loop_probe+0x160/0x160 [ 460.241740] blkdev_ioctl+0x96b/0x1860 [ 460.245635] ? blkpg_ioctl+0x980/0x980 [ 460.249539] ? __might_sleep+0x93/0xb0 [ 460.253432] ? __fget+0x210/0x370 14:49:04 executing program 3: socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffa}, 0x0, 0x2, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$TUNSETSNDBUF(r1, 0x400454d4, 0x0) userfaultfd(0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) openat$cgroup(r0, &(0x7f0000000480)='\x16\xeb\x00', 0x200002, 0x0) perf_event_open$cgroup(0x0, r0, 0x6, 0xffffffffffffffff, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_int(r0, 0x0, 0x2, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4\x02\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000017c0)={&(0x7f0000000100)=@un=@file={0x1, './file0\x00'}, 0x80, 0x0}, 0x0) write$cgroup_int(r2, &(0x7f0000000080)=0x1a001b00, 0x297ef) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000280)) mkdir(&(0x7f00000004c0)='./file1\x00', 0x4) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r3 = socket$kcm(0x10, 0x0, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000200)="4f5f1b3b87025a7b6086102c56f35e379975ddd1f873527272bab34c95c250047998c29ca65d2f6ed2da93bbaecb61ee61e58e17ef0320fa2f41086437addb3d617c22f09e57210611188b5fe36afe5e7a193ffd8dbca521bb51234aecfaa681b55e062c10583fbcc5677710292e84b4c424afc768131ea4b380", 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000b48000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r5 = accept$alg(r4, 0x0, 0x0) r6 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fcntl$F_SET_FILE_RW_HINT(r6, 0x40e, &(0x7f00000bf000)=0x5) sendfile(r5, r6, 0x0, 0xffff) bind$alg(0xffffffffffffffff, &(0x7f0000b48000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) accept$alg(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0x3, 0x2) socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) [ 460.256887] block_ioctl+0xde/0x120 [ 460.260519] ? blkdev_fallocate+0x3b0/0x3b0 [ 460.264852] do_vfs_ioctl+0x7ae/0x1060 [ 460.268849] ? selinux_file_mprotect+0x5d0/0x5d0 [ 460.273745] ? lock_downgrade+0x740/0x740 [ 460.277918] ? ioctl_preallocate+0x1c0/0x1c0 [ 460.282341] ? __fget+0x237/0x370 [ 460.285810] ? security_file_ioctl+0x89/0xb0 [ 460.290226] SyS_ioctl+0x8f/0xc0 [ 460.293599] ? do_vfs_ioctl+0x1060/0x1060 [ 460.297759] do_syscall_64+0x1e8/0x640 [ 460.301649] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 460.306504] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 460.311725] RIP: 0033:0x4598c7 [ 460.314917] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 460.322630] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004598c7 [ 460.329904] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 460.337638] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 460.344916] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 460.352195] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 [ 460.360223] net_ratelimit: 25 callbacks suppressed [ 460.360229] protocol 88fb is buggy, dev hsr_slave_0 [ 460.361089] protocol 88fb is buggy, dev hsr_slave_0 [ 460.365408] protocol 88fb is buggy, dev hsr_slave_1 [ 460.370451] protocol 88fb is buggy, dev hsr_slave_1 14:49:04 executing program 3: socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffa}, 0x0, 0x2, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$TUNSETSNDBUF(r1, 0x400454d4, 0x0) userfaultfd(0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) openat$cgroup(r0, &(0x7f0000000480)='\x16\xeb\x00', 0x200002, 0x0) perf_event_open$cgroup(0x0, r0, 0x6, 0xffffffffffffffff, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_int(r0, 0x0, 0x2, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4\x02\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000017c0)={&(0x7f0000000100)=@un=@file={0x1, './file0\x00'}, 0x80, 0x0}, 0x0) write$cgroup_int(r2, &(0x7f0000000080)=0x1a001b00, 0x297ef) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000280)) mkdir(&(0x7f00000004c0)='./file1\x00', 0x4) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r3 = socket$kcm(0x10, 0x0, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000200)="4f5f1b3b87025a7b6086102c56f35e379975ddd1f873527272bab34c95c250047998c29ca65d2f6ed2da93bbaecb61ee61e58e17ef0320fa2f41086437addb3d617c22f09e57210611188b5fe36afe5e7a193ffd8dbca521bb51234aecfaa681b55e062c10583fbcc5677710292e84b4c424afc768131ea4b380", 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000b48000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r5 = accept$alg(r4, 0x0, 0x0) r6 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fcntl$F_SET_FILE_RW_HINT(r6, 0x40e, &(0x7f00000bf000)=0x5) sendfile(r5, r6, 0x0, 0xffff) bind$alg(0xffffffffffffffff, &(0x7f0000b48000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) accept$alg(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0x3, 0x2) socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) 14:49:04 executing program 0: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) r3 = inotify_init() readv(r3, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:04 executing program 5 (fault-call:2 fault-nth:14): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) 14:49:04 executing program 4: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) readv(0xffffffffffffffff, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:04 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e24, @dev}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_ttl={{0x14, 0x0, 0x2, 0xaf}}], 0x18}}], 0x1, 0x0) 14:49:04 executing program 1: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = inotify_init() readv(r3, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:04 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in, @in, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x6e6bbc}, {{@in=@empty}, 0x0, @in6=@ipv4}}, 0xe8) 14:49:04 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r5, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r5, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) getsockopt$inet6_buf(r5, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000340)='./bus\x00', 0x341042, 0x1) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r6, 0x80003) sendfile(r5, r6, &(0x7f00000000c0), 0x8000fffffffe) r7 = dup2(0xffffffffffffffff, r5) r8 = socket$tipc(0x1e, 0x2, 0x0) r9 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r9, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r9, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) getsockopt$inet6_buf(r9, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendto$inet6(r9, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r10 = open(&(0x7f0000000340)='./bus\x00', 0x341042, 0x1) setsockopt$SO_TIMESTAMPING(r9, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r10, 0x80003) sendfile(r9, r10, &(0x7f00000000c0), 0x8000fffffffe) r11 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) poll(&(0x7f00000000c0)=[{r1, 0x1042}, {r3, 0x4000}, {r1, 0x4008}, {r2, 0x40a}, {r4, 0x4a8a8a7a9c15ecbd}, {0xffffffffffffffff, 0x400}, {r7, 0x100}, {r8, 0x110}, {r10, 0x4c86766644f1fa6b}, {r11, 0x202}], 0xa, 0x8) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) socket(0x3, 0x5, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 460.736670] FAULT_INJECTION: forcing a failure. [ 460.736670] name failslab, interval 1, probability 0, space 0, times 0 [ 460.758462] CPU: 0 PID: 20061 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 460.765526] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 460.774885] Call Trace: [ 460.777505] dump_stack+0x138/0x197 [ 460.781162] should_fail.cold+0x10f/0x159 [ 460.785664] should_failslab+0xdb/0x130 [ 460.789645] kmem_cache_alloc+0x2d7/0x780 [ 460.793805] ? __mutex_unlock_slowpath+0x71/0x800 [ 460.798788] ? __lock_is_held+0xb6/0x140 [ 460.802858] __kernfs_new_node+0x70/0x420 [ 460.807192] kernfs_new_node+0x80/0xf0 [ 460.811085] __kernfs_create_file+0x46/0x323 [ 460.815586] sysfs_add_file_mode_ns+0x1e4/0x450 [ 460.820259] internal_create_group+0x232/0x7b0 [ 460.824840] sysfs_create_group+0x20/0x30 [ 460.828979] lo_ioctl+0x1176/0x1ce0 [ 460.832605] ? loop_probe+0x160/0x160 [ 460.836399] blkdev_ioctl+0x96b/0x1860 [ 460.840280] ? blkpg_ioctl+0x980/0x980 [ 460.844186] ? __might_sleep+0x93/0xb0 [ 460.848068] ? __fget+0x210/0x370 [ 460.851519] block_ioctl+0xde/0x120 [ 460.855230] ? blkdev_fallocate+0x3b0/0x3b0 [ 460.859548] do_vfs_ioctl+0x7ae/0x1060 [ 460.863421] ? selinux_file_mprotect+0x5d0/0x5d0 [ 460.868263] ? lock_downgrade+0x740/0x740 [ 460.872403] ? ioctl_preallocate+0x1c0/0x1c0 [ 460.876813] ? __fget+0x237/0x370 [ 460.880267] ? security_file_ioctl+0x89/0xb0 [ 460.884682] SyS_ioctl+0x8f/0xc0 [ 460.888046] ? do_vfs_ioctl+0x1060/0x1060 [ 460.892189] do_syscall_64+0x1e8/0x640 [ 460.896154] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 460.901002] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 460.906197] RIP: 0033:0x4598c7 [ 460.909382] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 460.917190] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004598c7 [ 460.924453] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 14:49:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1, 0x32, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 14:49:05 executing program 3: getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0xa925, 0x2b, 0x0, 0xffffffffffffffff}) r3 = dup(r2) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r3}) [ 460.931719] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 460.938991] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 460.946363] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 [ 460.954096] protocol 88fb is buggy, dev hsr_slave_0 [ 460.959276] protocol 88fb is buggy, dev hsr_slave_1 14:49:05 executing program 5 (fault-call:2 fault-nth:15): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) 14:49:05 executing program 3: getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0xa925, 0x2b, 0x0, 0xffffffffffffffff}) r3 = dup(r2) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r3}) 14:49:05 executing program 3: eventfd2(0x0, 0x0) [ 461.127190] FAULT_INJECTION: forcing a failure. [ 461.127190] name failslab, interval 1, probability 0, space 0, times 0 [ 461.148251] CPU: 1 PID: 20093 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 461.155312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 461.164676] Call Trace: [ 461.167276] dump_stack+0x138/0x197 [ 461.171011] should_fail.cold+0x10f/0x159 [ 461.175176] should_failslab+0xdb/0x130 [ 461.179168] kmem_cache_alloc+0x2d7/0x780 [ 461.179183] ? wait_for_completion+0x420/0x420 [ 461.179200] __kernfs_new_node+0x70/0x420 [ 461.179212] kernfs_new_node+0x80/0xf0 [ 461.188024] __kernfs_create_file+0x46/0x323 [ 461.188038] sysfs_add_file_mode_ns+0x1e4/0x450 [ 461.188052] internal_create_group+0x232/0x7b0 [ 461.188067] sysfs_create_group+0x20/0x30 [ 461.218632] lo_ioctl+0x1176/0x1ce0 [ 461.222271] ? loop_probe+0x160/0x160 [ 461.226145] blkdev_ioctl+0x96b/0x1860 [ 461.230017] ? blkpg_ioctl+0x980/0x980 [ 461.234174] ? __might_sleep+0x93/0xb0 [ 461.238158] ? __fget+0x210/0x370 [ 461.241959] block_ioctl+0xde/0x120 [ 461.245670] ? blkdev_fallocate+0x3b0/0x3b0 [ 461.250856] do_vfs_ioctl+0x7ae/0x1060 [ 461.254990] ? selinux_file_mprotect+0x5d0/0x5d0 [ 461.259750] ? lock_downgrade+0x740/0x740 [ 461.263889] ? ioctl_preallocate+0x1c0/0x1c0 [ 461.268286] ? __fget+0x237/0x370 [ 461.271732] ? security_file_ioctl+0x89/0xb0 [ 461.276139] SyS_ioctl+0x8f/0xc0 [ 461.279491] ? do_vfs_ioctl+0x1060/0x1060 [ 461.283711] do_syscall_64+0x1e8/0x640 [ 461.287581] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 461.292521] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 461.297707] RIP: 0033:0x4598c7 [ 461.300883] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 461.308739] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004598c7 [ 461.315998] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 461.323272] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 461.330538] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 461.337810] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 [ 461.346814] protocol 88fb is buggy, dev hsr_slave_0 [ 461.351990] protocol 88fb is buggy, dev hsr_slave_1 [ 461.359970] protocol 88fb is buggy, dev hsr_slave_0 [ 461.365197] protocol 88fb is buggy, dev hsr_slave_1 14:49:05 executing program 0: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) r3 = inotify_init() readv(r3, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:05 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_mr_cache\x00') r1 = perf_event_open(&(0x7f0000001900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x40, 0x0) ioctl$KDGKBTYPE(r2, 0x4b33, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000480)) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000100)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) socket$inet(0x2, 0x2, 0x7f) r3 = memfd_create(&(0x7f0000000080)='/dev/ion\x00', 0x0) write$binfmt_misc(r3, &(0x7f0000000c40)=ANY=[@ANYRES32], 0x1000000d8) lseek(r3, 0x0, 0x4) write$P9_RSTATu(r0, &(0x7f0000000040)={0x67, 0x7d, 0x1, {{0x0, 0x52, 0xff3, 0x2, {0x80, 0x4, 0x8}, 0x8000000, 0x0, 0x1, 0x401, 0xa, '/dev/ptmx\x00', 0x1, '-', 0xa, '/dev/ptmx\x00', 0xa, '/dev/ptmx\x00'}}}, 0x67) 14:49:05 executing program 5 (fault-call:2 fault-nth:16): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) 14:49:05 executing program 4: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) readv(0xffffffffffffffff, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:05 executing program 1: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = inotify_init() readv(r3, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:05 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) socket(0x0, 0xa, 0x40) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 461.613714] FAULT_INJECTION: forcing a failure. [ 461.613714] name failslab, interval 1, probability 0, space 0, times 0 [ 461.648161] CPU: 0 PID: 20115 Comm: syz-executor.5 Not tainted 4.14.149 #0 14:49:05 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) socket(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r2, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) getsockopt$inet6_buf(r2, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000340)='./bus\x00', 0x341042, 0x1) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r4, 0x0) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x41, &(0x7f0000000140)=0xc08, 0xfffffffffffffe57) ftruncate(r3, 0x80003) sendfile(r2, r3, &(0x7f00000000c0), 0x8000fffffffe) ioctl$VHOST_SET_VRING_ENDIAN(r3, 0x4008af13, &(0x7f0000000100)={0x3, 0xec0d}) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = open(&(0x7f0000000340)='./bus\x00', 0x341042, 0x1) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r5, 0x80003) sendfile(r1, r5, &(0x7f00000000c0), 0x8000fffffffe) sendmsg$nl_route(r5, 0x0, 0x24000000) [ 461.655224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 461.664715] Call Trace: [ 461.667308] dump_stack+0x138/0x197 [ 461.670947] should_fail.cold+0x10f/0x159 [ 461.675249] should_failslab+0xdb/0x130 [ 461.679234] kmem_cache_alloc+0x2d7/0x780 [ 461.683387] ? wait_for_completion+0x420/0x420 [ 461.688074] __kernfs_new_node+0x70/0x420 [ 461.692247] kernfs_new_node+0x80/0xf0 [ 461.696136] __kernfs_create_file+0x46/0x323 [ 461.700557] sysfs_add_file_mode_ns+0x1e4/0x450 [ 461.705246] internal_create_group+0x232/0x7b0 [ 461.709849] sysfs_create_group+0x20/0x30 [ 461.714005] lo_ioctl+0x1176/0x1ce0 [ 461.717644] ? loop_probe+0x160/0x160 [ 461.721450] blkdev_ioctl+0x96b/0x1860 [ 461.725336] ? blkpg_ioctl+0x980/0x980 [ 461.729269] ? __might_sleep+0x93/0xb0 [ 461.733249] ? __fget+0x210/0x370 [ 461.736706] block_ioctl+0xde/0x120 [ 461.740436] ? blkdev_fallocate+0x3b0/0x3b0 [ 461.744764] do_vfs_ioctl+0x7ae/0x1060 [ 461.748659] ? selinux_file_mprotect+0x5d0/0x5d0 [ 461.753418] ? lock_downgrade+0x740/0x740 [ 461.757569] ? ioctl_preallocate+0x1c0/0x1c0 [ 461.761982] ? __fget+0x237/0x370 [ 461.765442] ? security_file_ioctl+0x89/0xb0 [ 461.769862] SyS_ioctl+0x8f/0xc0 [ 461.773224] ? do_vfs_ioctl+0x1060/0x1060 [ 461.777383] do_syscall_64+0x1e8/0x640 [ 461.781271] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 461.786473] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 461.791661] RIP: 0033:0x4598c7 [ 461.794843] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 461.802692] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004598c7 [ 461.810084] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 461.817382] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 461.824651] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 461.831931] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:05 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x80, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\x16\xf1\xc0\x93\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&lD\x87\x17H\x1f.\xdbA\x11\xf5\xa5\n@^\x9d\x84\x1b\xafz\xe3\xdc\xfd;*\xec\xfe\xfa', 0x26e1, 0x0) close(r0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000000c0)) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000280)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) r3 = socket$inet_sctp(0x2, 0x1, 0x84) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, r5}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000140)={r5, 0x20, 0x20}, &(0x7f0000000180)=0xc) setsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000001c0)=@assoc_id=r6, 0x4) close(r0) socket(0x0, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 14:49:05 executing program 5 (fault-call:2 fault-nth:17): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) 14:49:06 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 462.047169] FAULT_INJECTION: forcing a failure. [ 462.047169] name failslab, interval 1, probability 0, space 0, times 0 [ 462.059149] CPU: 0 PID: 20145 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 462.066177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 462.075539] Call Trace: [ 462.078132] dump_stack+0x138/0x197 [ 462.081972] should_fail.cold+0x10f/0x159 [ 462.086130] should_failslab+0xdb/0x130 [ 462.090110] kmem_cache_alloc+0x47/0x780 [ 462.094256] ? save_stack_trace+0x16/0x20 [ 462.098398] ? save_stack+0x45/0xd0 [ 462.102027] ? kasan_kmalloc+0xce/0xf0 [ 462.105981] ? kasan_slab_alloc+0xf/0x20 [ 462.110491] ? kmem_cache_alloc+0x12e/0x780 [ 462.114817] ? __kernfs_new_node+0x70/0x420 [ 462.119143] ? kernfs_new_node+0x80/0xf0 [ 462.123211] ? __kernfs_create_file+0x46/0x323 [ 462.127805] radix_tree_node_alloc.constprop.0+0x1c7/0x310 [ 462.133436] idr_get_free_cmn+0x563/0x8d0 [ 462.137605] idr_alloc_cmn+0x10e/0x210 [ 462.141499] ? __fprop_inc_percpu_max+0x1e0/0x1e0 [ 462.146347] ? __lock_is_held+0xb6/0x140 [ 462.150420] ? check_preemption_disabled+0x3c/0x250 [ 462.155437] idr_alloc_cyclic+0xd0/0x1e2 [ 462.159498] ? ida_simple_remove+0x60/0x60 [ 462.163740] __kernfs_new_node+0xe4/0x420 [ 462.167899] kernfs_new_node+0x80/0xf0 [ 462.171790] __kernfs_create_file+0x46/0x323 [ 462.176203] sysfs_add_file_mode_ns+0x1e4/0x450 [ 462.180877] internal_create_group+0x232/0x7b0 [ 462.185475] sysfs_create_group+0x20/0x30 [ 462.189622] lo_ioctl+0x1176/0x1ce0 [ 462.193255] ? loop_probe+0x160/0x160 [ 462.197064] blkdev_ioctl+0x96b/0x1860 [ 462.200964] ? blkpg_ioctl+0x980/0x980 [ 462.204862] ? __might_sleep+0x93/0xb0 [ 462.208755] ? __fget+0x210/0x370 [ 462.212209] block_ioctl+0xde/0x120 [ 462.215834] ? blkdev_fallocate+0x3b0/0x3b0 [ 462.220154] do_vfs_ioctl+0x7ae/0x1060 [ 462.224043] ? selinux_file_mprotect+0x5d0/0x5d0 [ 462.228799] ? lock_downgrade+0x740/0x740 [ 462.233037] ? ioctl_preallocate+0x1c0/0x1c0 [ 462.237452] ? __fget+0x237/0x370 [ 462.240942] ? security_file_ioctl+0x89/0xb0 [ 462.245354] SyS_ioctl+0x8f/0xc0 [ 462.248843] ? do_vfs_ioctl+0x1060/0x1060 [ 462.253015] do_syscall_64+0x1e8/0x640 [ 462.256903] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 462.261750] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 462.266933] RIP: 0033:0x4598c7 [ 462.270115] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 462.277824] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004598c7 [ 462.285183] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 14:49:06 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) fcntl$notify(r1, 0x402, 0x8) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 462.292713] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 462.299979] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 462.307273] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:06 executing program 4: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) r3 = inotify_init() readv(r3, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:06 executing program 0: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) r3 = inotify_init() readv(r3, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:06 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)) 14:49:06 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f00000000c0)='threaded\x00', 0xfffffe62) close(r0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 14:49:06 executing program 1: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = inotify_init() readv(r3, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:06 executing program 5 (fault-call:2 fault-nth:18): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) 14:49:06 executing program 3: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000003ff6)='G\x00', 0x5, 0x0, 0x0, 0x0, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) r0 = perf_event_open(&(0x7f0000001900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000100)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x0, 0x7f) write$binfmt_aout(r1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='/dev/ion\x00', 0x0) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[@ANYRES32], 0x1000000d8) lseek(0xffffffffffffffff, 0x0, 0x4) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, &(0x7f0000000100)) [ 462.564717] FAULT_INJECTION: forcing a failure. [ 462.564717] name failslab, interval 1, probability 0, space 0, times 0 [ 462.577258] CPU: 1 PID: 20179 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 462.584392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 462.593890] Call Trace: [ 462.596501] dump_stack+0x138/0x197 [ 462.600148] should_fail.cold+0x10f/0x159 [ 462.600166] should_failslab+0xdb/0x130 14:49:06 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x3, 0x2) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r1) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$VT_SETMODE(r2, 0x5602, &(0x7f0000000000)={0x8, 0x7, 0x9, 0x3, 0x120}) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 462.600181] kmem_cache_alloc+0x2d7/0x780 [ 462.600196] ? wait_for_completion+0x420/0x420 [ 462.600215] __kernfs_new_node+0x70/0x420 [ 462.600230] kernfs_new_node+0x80/0xf0 [ 462.600243] __kernfs_create_file+0x46/0x323 [ 462.600254] sysfs_add_file_mode_ns+0x1e4/0x450 [ 462.600268] internal_create_group+0x232/0x7b0 [ 462.600283] sysfs_create_group+0x20/0x30 [ 462.600295] lo_ioctl+0x1176/0x1ce0 [ 462.600308] ? loop_probe+0x160/0x160 [ 462.600320] blkdev_ioctl+0x96b/0x1860 [ 462.600329] ? blkpg_ioctl+0x980/0x980 [ 462.600346] ? __might_sleep+0x93/0xb0 [ 462.600354] ? __fget+0x210/0x370 [ 462.600366] block_ioctl+0xde/0x120 [ 462.600376] ? blkdev_fallocate+0x3b0/0x3b0 [ 462.600385] do_vfs_ioctl+0x7ae/0x1060 [ 462.600396] ? selinux_file_mprotect+0x5d0/0x5d0 [ 462.600406] ? lock_downgrade+0x740/0x740 [ 462.600416] ? ioctl_preallocate+0x1c0/0x1c0 [ 462.600427] ? __fget+0x237/0x370 [ 462.600443] ? security_file_ioctl+0x89/0xb0 [ 462.600455] SyS_ioctl+0x8f/0xc0 [ 462.600463] ? do_vfs_ioctl+0x1060/0x1060 [ 462.600475] do_syscall_64+0x1e8/0x640 [ 462.600484] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 462.600499] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 462.600507] RIP: 0033:0x4598c7 [ 462.600513] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 462.600524] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004598c7 [ 462.600529] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 462.600536] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 14:49:06 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) recvmsg(r1, &(0x7f0000000380)={&(0x7f00000000c0)=@ethernet={0x0, @local}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000000)=""/22, 0x16}, {&(0x7f0000000140)=""/8, 0x8}, {&(0x7f0000000180)=""/40, 0x28}, {&(0x7f0000000280)=""/94, 0x5e}, {&(0x7f00000001c0)=""/25, 0x19}], 0x5}, 0x40) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 462.600542] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 462.600549] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:06 executing program 5 (fault-call:2 fault-nth:19): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) [ 462.937678] FAULT_INJECTION: forcing a failure. [ 462.937678] name failslab, interval 1, probability 0, space 0, times 0 [ 462.960664] CPU: 1 PID: 20213 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 462.968284] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 462.977744] Call Trace: [ 462.980350] dump_stack+0x138/0x197 [ 462.983988] should_fail.cold+0x10f/0x159 [ 462.988242] should_failslab+0xdb/0x130 [ 462.992465] kmem_cache_alloc+0x2d7/0x780 [ 462.997021] ? wait_for_completion+0x420/0x420 [ 463.001621] __kernfs_new_node+0x70/0x420 [ 463.005789] kernfs_new_node+0x80/0xf0 [ 463.009680] __kernfs_create_file+0x46/0x323 [ 463.014092] sysfs_add_file_mode_ns+0x1e4/0x450 [ 463.018852] internal_create_group+0x232/0x7b0 [ 463.023450] sysfs_create_group+0x20/0x30 [ 463.027615] lo_ioctl+0x1176/0x1ce0 [ 463.031348] ? loop_probe+0x160/0x160 [ 463.036583] blkdev_ioctl+0x96b/0x1860 [ 463.040472] ? blkpg_ioctl+0x980/0x980 [ 463.044473] ? __might_sleep+0x93/0xb0 [ 463.048388] ? __fget+0x210/0x370 [ 463.051863] block_ioctl+0xde/0x120 [ 463.055501] ? blkdev_fallocate+0x3b0/0x3b0 [ 463.059823] do_vfs_ioctl+0x7ae/0x1060 [ 463.063982] ? selinux_file_mprotect+0x5d0/0x5d0 [ 463.068848] ? lock_downgrade+0x740/0x740 [ 463.073106] ? ioctl_preallocate+0x1c0/0x1c0 [ 463.077577] ? __fget+0x237/0x370 [ 463.081566] ? security_file_ioctl+0x89/0xb0 [ 463.086009] SyS_ioctl+0x8f/0xc0 [ 463.089409] ? do_vfs_ioctl+0x1060/0x1060 [ 463.094103] do_syscall_64+0x1e8/0x640 [ 463.097991] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 463.103088] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 463.108280] RIP: 0033:0x4598c7 [ 463.111474] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 463.119201] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004598c7 [ 463.126561] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 463.135088] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 463.142582] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 463.150595] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:07 executing program 4: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) r3 = inotify_init() readv(r3, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:07 executing program 0: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = inotify_init() readv(r3, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:07 executing program 5 (fault-call:2 fault-nth:20): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) 14:49:07 executing program 1: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) readv(0xffffffffffffffff, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 463.425355] FAULT_INJECTION: forcing a failure. [ 463.425355] name failslab, interval 1, probability 0, space 0, times 0 [ 463.445384] CPU: 0 PID: 20225 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 463.452457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 463.462187] Call Trace: [ 463.464797] dump_stack+0x138/0x197 [ 463.468451] should_fail.cold+0x10f/0x159 [ 463.473309] should_failslab+0xdb/0x130 [ 463.477296] kmem_cache_alloc+0x2d7/0x780 [ 463.481458] ? wait_for_completion+0x420/0x420 [ 463.486058] __kernfs_new_node+0x70/0x420 [ 463.490419] kernfs_new_node+0x80/0xf0 [ 463.494321] __kernfs_create_file+0x46/0x323 [ 463.498745] sysfs_add_file_mode_ns+0x1e4/0x450 [ 463.503429] internal_create_group+0x232/0x7b0 [ 463.508113] sysfs_create_group+0x20/0x30 [ 463.512305] lo_ioctl+0x1176/0x1ce0 [ 463.516289] ? loop_probe+0x160/0x160 [ 463.520099] blkdev_ioctl+0x96b/0x1860 14:49:07 executing program 3: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f0000001900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/dev/ion\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0x1000000d8) [ 463.523993] ? blkpg_ioctl+0x980/0x980 [ 463.527903] ? __might_sleep+0x93/0xb0 [ 463.532060] ? __fget+0x210/0x370 [ 463.535618] block_ioctl+0xde/0x120 [ 463.539263] ? blkdev_fallocate+0x3b0/0x3b0 [ 463.543596] do_vfs_ioctl+0x7ae/0x1060 [ 463.550190] ? selinux_file_mprotect+0x5d0/0x5d0 [ 463.554968] ? lock_downgrade+0x740/0x740 [ 463.554984] ? ioctl_preallocate+0x1c0/0x1c0 [ 463.554997] ? __fget+0x237/0x370 [ 463.555016] ? security_file_ioctl+0x89/0xb0 [ 463.555029] SyS_ioctl+0x8f/0xc0 [ 463.564533] ? do_vfs_ioctl+0x1060/0x1060 [ 463.564549] do_syscall_64+0x1e8/0x640 [ 463.564558] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 463.564577] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 463.564586] RIP: 0033:0x4598c7 [ 463.564591] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 463.605531] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004598c7 [ 463.612805] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 463.620087] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 463.627449] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 463.634720] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:07 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) ioctl$KDDISABIO(r0, 0x4b37) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 14:49:07 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) open(&(0x7f0000000340)='./bus\x00', 0x341042, 0x1) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) r2 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r2, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x0, &(0x7f0000000380), 0x0, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syncfs(0xffffffffffffffff) r3 = semget$private(0x0, 0x20000000102, 0x0) semop(r3, &(0x7f0000000180)=[{}, {0x0, 0xb323}], 0x2) semop(0x0, 0x0, 0x0) semop(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 14:49:07 executing program 5 (fault-call:2 fault-nth:21): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) [ 463.859846] FAULT_INJECTION: forcing a failure. [ 463.859846] name failslab, interval 1, probability 0, space 0, times 0 [ 463.873520] CPU: 0 PID: 20255 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 463.880658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 463.890189] Call Trace: [ 463.892874] dump_stack+0x138/0x197 [ 463.896516] should_fail.cold+0x10f/0x159 [ 463.900761] should_failslab+0xdb/0x130 [ 463.904737] kmem_cache_alloc_trace+0x2e9/0x790 [ 463.909421] ? kernfs_put+0x35e/0x490 [ 463.913316] ? sysfs_add_file_mode_ns+0x1e4/0x450 [ 463.918174] ? devm_device_remove_groups+0x50/0x50 [ 463.923478] kobject_uevent_env+0x378/0xc23 [ 463.927807] ? internal_create_group+0x49a/0x7b0 [ 463.932705] kobject_uevent+0x20/0x26 [ 463.936512] lo_ioctl+0x11e7/0x1ce0 [ 463.940478] ? loop_probe+0x160/0x160 [ 463.944740] blkdev_ioctl+0x96b/0x1860 [ 463.948631] ? blkpg_ioctl+0x980/0x980 [ 463.952902] ? __might_sleep+0x93/0xb0 [ 463.957089] ? __fget+0x210/0x370 [ 463.960685] block_ioctl+0xde/0x120 [ 463.964403] ? blkdev_fallocate+0x3b0/0x3b0 [ 463.968839] do_vfs_ioctl+0x7ae/0x1060 [ 463.972913] ? selinux_file_mprotect+0x5d0/0x5d0 [ 463.977669] ? lock_downgrade+0x740/0x740 [ 463.981905] ? ioctl_preallocate+0x1c0/0x1c0 [ 463.986315] ? __fget+0x237/0x370 [ 463.989776] ? security_file_ioctl+0x89/0xb0 [ 463.994979] SyS_ioctl+0x8f/0xc0 [ 463.998368] ? do_vfs_ioctl+0x1060/0x1060 [ 464.006868] do_syscall_64+0x1e8/0x640 [ 464.010761] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 464.015706] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 464.021123] RIP: 0033:0x4598c7 [ 464.021129] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 464.021141] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004598c7 [ 464.021147] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 464.021153] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 464.021159] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 464.021164] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:08 executing program 0: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = inotify_init() readv(r3, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:08 executing program 4: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) r3 = inotify_init() readv(r3, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:08 executing program 5 (fault-call:2 fault-nth:22): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) 14:49:08 executing program 1: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) readv(0xffffffffffffffff, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 464.297660] FAULT_INJECTION: forcing a failure. [ 464.297660] name failslab, interval 1, probability 0, space 0, times 0 [ 464.326604] CPU: 0 PID: 20278 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 464.333661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 464.343192] Call Trace: [ 464.345893] dump_stack+0x138/0x197 [ 464.351380] should_fail.cold+0x10f/0x159 [ 464.355548] should_failslab+0xdb/0x130 [ 464.359542] kmem_cache_alloc_trace+0x2e9/0x790 [ 464.364221] ? kernfs_put+0x35e/0x490 [ 464.368020] ? sysfs_add_file_mode_ns+0x1e4/0x450 [ 464.372865] ? devm_device_remove_groups+0x50/0x50 [ 464.377800] kobject_uevent_env+0x378/0xc23 [ 464.382128] ? internal_create_group+0x49a/0x7b0 [ 464.387252] kobject_uevent+0x20/0x26 [ 464.391058] lo_ioctl+0x11e7/0x1ce0 [ 464.394781] ? loop_probe+0x160/0x160 [ 464.398671] blkdev_ioctl+0x96b/0x1860 [ 464.402562] ? blkpg_ioctl+0x980/0x980 [ 464.406465] ? __might_sleep+0x93/0xb0 [ 464.410400] ? __fget+0x210/0x370 [ 464.413857] block_ioctl+0xde/0x120 [ 464.417569] ? blkdev_fallocate+0x3b0/0x3b0 [ 464.422066] do_vfs_ioctl+0x7ae/0x1060 [ 464.425956] ? selinux_file_mprotect+0x5d0/0x5d0 [ 464.430710] ? lock_downgrade+0x740/0x740 [ 464.434855] ? ioctl_preallocate+0x1c0/0x1c0 [ 464.439266] ? __fget+0x237/0x370 [ 464.442735] ? security_file_ioctl+0x89/0xb0 [ 464.447148] SyS_ioctl+0x8f/0xc0 [ 464.450515] ? do_vfs_ioctl+0x1060/0x1060 [ 464.454662] do_syscall_64+0x1e8/0x640 [ 464.458979] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 464.463830] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 464.469370] RIP: 0033:0x4598c7 [ 464.472558] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 464.480285] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004598c7 [ 464.487821] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 464.495090] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 464.502348] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 464.509603] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:08 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 14:49:08 executing program 5 (fault-call:2 fault-nth:23): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) 14:49:08 executing program 3: [ 464.686469] FAULT_INJECTION: forcing a failure. [ 464.686469] name failslab, interval 1, probability 0, space 0, times 0 [ 464.712103] CPU: 1 PID: 20295 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 464.720275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 464.730030] Call Trace: [ 464.732665] dump_stack+0x138/0x197 [ 464.736297] should_fail.cold+0x10f/0x159 [ 464.740649] should_failslab+0xdb/0x130 [ 464.740661] kmem_cache_alloc_node+0x287/0x780 [ 464.740676] __alloc_skb+0x9c/0x500 [ 464.740684] ? skb_scrub_packet+0x4b0/0x4b0 [ 464.740696] ? netlink_has_listeners+0x20a/0x330 [ 464.740713] kobject_uevent_env+0x781/0xc23 [ 464.752857] ? internal_create_group+0x49a/0x7b0 [ 464.752879] kobject_uevent+0x20/0x26 [ 464.752891] lo_ioctl+0x11e7/0x1ce0 [ 464.752906] ? loop_probe+0x160/0x160 [ 464.752918] blkdev_ioctl+0x96b/0x1860 14:49:08 executing program 3: 14:49:08 executing program 3: 14:49:08 executing program 3: [ 464.752928] ? blkpg_ioctl+0x980/0x980 [ 464.752942] ? __might_sleep+0x93/0xb0 [ 464.794618] ? __fget+0x210/0x370 [ 464.798091] block_ioctl+0xde/0x120 [ 464.801751] ? blkdev_fallocate+0x3b0/0x3b0 [ 464.806076] do_vfs_ioctl+0x7ae/0x1060 [ 464.810074] ? selinux_file_mprotect+0x5d0/0x5d0 [ 464.814866] ? lock_downgrade+0x740/0x740 [ 464.819015] ? ioctl_preallocate+0x1c0/0x1c0 [ 464.823547] ? __fget+0x237/0x370 [ 464.827005] ? security_file_ioctl+0x89/0xb0 [ 464.831590] SyS_ioctl+0x8f/0xc0 [ 464.834947] ? do_vfs_ioctl+0x1060/0x1060 [ 464.839200] do_syscall_64+0x1e8/0x640 [ 464.843099] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 464.849161] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 464.854524] RIP: 0033:0x4598c7 [ 464.857699] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 464.865614] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004598c7 [ 464.873223] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 14:49:08 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) write(0xffffffffffffffff, &(0x7f0000000000)="27fb02bed40e57d30518f8897c", 0xd) close(r0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 14:49:08 executing program 3: [ 464.880568] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 464.888013] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 464.895889] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:09 executing program 0: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = inotify_init() readv(r3, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:09 executing program 4: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = inotify_init() readv(r3, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:09 executing program 3: 14:49:09 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000000)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 14:49:09 executing program 5 (fault-call:2 fault-nth:24): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) 14:49:09 executing program 1: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) readv(0xffffffffffffffff, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 465.128269] FAULT_INJECTION: forcing a failure. [ 465.128269] name failslab, interval 1, probability 0, space 0, times 0 [ 465.140068] CPU: 1 PID: 20324 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 465.147102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 465.156550] Call Trace: [ 465.159235] dump_stack+0x138/0x197 [ 465.162877] should_fail.cold+0x10f/0x159 [ 465.167126] should_failslab+0xdb/0x130 [ 465.171322] kmem_cache_alloc_node_trace+0x280/0x770 14:49:09 executing program 3: [ 465.176524] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 465.181991] __kmalloc_node_track_caller+0x3d/0x80 [ 465.187013] __kmalloc_reserve.isra.0+0x40/0xe0 [ 465.187024] __alloc_skb+0xcf/0x500 [ 465.187034] ? skb_scrub_packet+0x4b0/0x4b0 [ 465.187046] ? netlink_has_listeners+0x20a/0x330 [ 465.187060] kobject_uevent_env+0x781/0xc23 [ 465.195338] ? internal_create_group+0x49a/0x7b0 [ 465.195356] kobject_uevent+0x20/0x26 [ 465.195368] lo_ioctl+0x11e7/0x1ce0 [ 465.195379] ? loop_probe+0x160/0x160 [ 465.195390] blkdev_ioctl+0x96b/0x1860 14:49:09 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000000280)={'filter\x00', 0x7, 0x4, 0x4a8, 0x0, 0x280, 0x140, 0x3c0, 0x3c0, 0x3c0, 0x4, &(0x7f0000000000), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @local, @broadcast, 0x4}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x7a0eb66fe86c1c9e}, @mac=@broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xf, 0x1}}}, {{@arp={@loopback, @broadcast, 0x4655c9520f3c6940, 0xff000000, @mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x4}, {[0xff, 0xff, 0x0, 0xff, 0x7f, 0xff]}, @mac=@broadcast, {[0x0, 0x0, 0xff, 0xff, 0x0, 0xff]}, 0xff, 0x9, 0x6, 0x6, 0x7fff, 0xd0, 'bridge_slave_0\x00', 'gre0\x00', {0xff}, {0xff}, 0x0, 0x8c}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@local, @mac=@random="487a8e658c99", @multicast2, @multicast2, 0x4, 0xffffffff}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4f8) r3 = socket(0x11, 0x2, 0x0) r4 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r3, 0x89e3, 0x0) ioctl$NBD_SET_SOCK(r4, 0xab00, r3) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) close(r1) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 14:49:09 executing program 3: [ 465.228693] ? blkpg_ioctl+0x980/0x980 [ 465.232598] ? __might_sleep+0x93/0xb0 [ 465.236502] ? __fget+0x210/0x370 [ 465.240136] block_ioctl+0xde/0x120 [ 465.243787] ? blkdev_fallocate+0x3b0/0x3b0 [ 465.248121] do_vfs_ioctl+0x7ae/0x1060 [ 465.252016] ? selinux_file_mprotect+0x5d0/0x5d0 [ 465.256782] ? lock_downgrade+0x740/0x740 [ 465.260939] ? ioctl_preallocate+0x1c0/0x1c0 [ 465.265358] ? __fget+0x237/0x370 [ 465.268914] ? security_file_ioctl+0x89/0xb0 [ 465.273331] SyS_ioctl+0x8f/0xc0 14:49:09 executing program 3: 14:49:09 executing program 3: [ 465.276707] ? do_vfs_ioctl+0x1060/0x1060 [ 465.280863] do_syscall_64+0x1e8/0x640 [ 465.284754] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 465.289607] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 465.294794] RIP: 0033:0x4598c7 [ 465.297984] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 465.305777] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004598c7 [ 465.313070] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 465.318994] block nbd2: Device being setup by another task 14:49:09 executing program 3: [ 465.320339] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 465.320346] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 465.320352] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 [ 465.510035] net_ratelimit: 23 callbacks suppressed [ 465.510041] protocol 88fb is buggy, dev hsr_slave_0 [ 465.510060] protocol 88fb is buggy, dev hsr_slave_1 [ 465.515330] protocol 88fb is buggy, dev hsr_slave_1 14:49:09 executing program 0: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') socket$inet(0x2, 0x4000000000000001, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r2 = inotify_init() readv(r2, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 465.829985] protocol 88fb is buggy, dev hsr_slave_0 [ 465.835432] protocol 88fb is buggy, dev hsr_slave_1 14:49:09 executing program 4: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = inotify_init() readv(r3, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:09 executing program 3: 14:49:09 executing program 5 (fault-call:2 fault-nth:25): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) 14:49:09 executing program 1: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) r3 = inotify_init() readv(r3, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:10 executing program 3: [ 466.007901] FAULT_INJECTION: forcing a failure. [ 466.007901] name failslab, interval 1, probability 0, space 0, times 0 [ 466.020097] CPU: 1 PID: 20365 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 466.027220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 466.036759] Call Trace: [ 466.036788] dump_stack+0x138/0x197 [ 466.036807] should_fail.cold+0x10f/0x159 [ 466.036823] should_failslab+0xdb/0x130 [ 466.036834] kmem_cache_alloc_node+0x287/0x780 [ 466.036850] __alloc_skb+0x9c/0x500 [ 466.036859] ? skb_scrub_packet+0x4b0/0x4b0 [ 466.036870] ? netlink_has_listeners+0x20a/0x330 [ 466.036881] kobject_uevent_env+0x781/0xc23 [ 466.036890] ? internal_create_group+0x49a/0x7b0 [ 466.036905] kobject_uevent+0x20/0x26 [ 466.036916] lo_ioctl+0x11e7/0x1ce0 [ 466.036928] ? loop_probe+0x160/0x160 [ 466.036937] blkdev_ioctl+0x96b/0x1860 [ 466.036947] ? blkpg_ioctl+0x980/0x980 [ 466.047336] ? __might_sleep+0x93/0xb0 [ 466.070125] protocol 88fb is buggy, dev hsr_slave_0 14:49:10 executing program 3: [ 466.072870] ? __fget+0x210/0x370 [ 466.072888] block_ioctl+0xde/0x120 [ 466.072899] ? blkdev_fallocate+0x3b0/0x3b0 [ 466.072911] do_vfs_ioctl+0x7ae/0x1060 [ 466.072922] ? selinux_file_mprotect+0x5d0/0x5d0 [ 466.072937] ? lock_downgrade+0x740/0x740 [ 466.077743] protocol 88fb is buggy, dev hsr_slave_1 [ 466.082084] ? ioctl_preallocate+0x1c0/0x1c0 [ 466.082095] ? __fget+0x237/0x370 [ 466.082110] ? security_file_ioctl+0x89/0xb0 [ 466.082120] SyS_ioctl+0x8f/0xc0 [ 466.082128] ? do_vfs_ioctl+0x1060/0x1060 [ 466.082140] do_syscall_64+0x1e8/0x640 [ 466.082150] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 466.164998] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 466.170350] RIP: 0033:0x4598c7 [ 466.173535] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 466.181240] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004598c7 [ 466.188689] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 466.195951] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 14:49:10 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r1, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r2, &(0x7f0000000140), 0x10) clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = accept4$tipc(0xffffffffffffffff, &(0x7f0000000000)=@name, &(0x7f00000000c0)=0x10, 0x80800) bind(r3, &(0x7f0000000100)=@nfc={0x27, 0x1, 0x2, 0x7}, 0x80) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r4) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r4, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r4) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 14:49:10 executing program 3: [ 466.203659] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 466.211197] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:10 executing program 3: 14:49:10 executing program 3: 14:49:10 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) ptrace$setopts(0x4200, r0, 0xfffffffffffffff9, 0x6d) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) ioctl$sock_bt_bnep_BNEPCONNDEL(r1, 0x400442c9, &(0x7f0000000000)={0x3, @local}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r2, 0xc0bc5351, &(0x7f0000000100)={0xfffffff7, 0x0, 'client1\x00', 0xffffffff80000003, "dfa90faf4f002e4b", "68229a2f2d8c54d07f21d87dac6a3e1e72b7127fd89c035fcbd63e709d8688d6", 0x7, 0x4b}) close(r1) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 466.550039] protocol 88fb is buggy, dev hsr_slave_0 [ 466.550082] protocol 88fb is buggy, dev hsr_slave_0 [ 466.555223] protocol 88fb is buggy, dev hsr_slave_1 14:49:10 executing program 0: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r2 = inotify_init() readv(r2, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:10 executing program 4: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = inotify_init() readv(r3, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:10 executing program 5 (fault-call:2 fault-nth:26): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) 14:49:10 executing program 3: 14:49:10 executing program 1: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) r3 = inotify_init() readv(r3, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:10 executing program 3: [ 466.847740] FAULT_INJECTION: forcing a failure. [ 466.847740] name failslab, interval 1, probability 0, space 0, times 0 [ 466.885805] CPU: 0 PID: 20404 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 466.893004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 466.902818] Call Trace: [ 466.905470] dump_stack+0x138/0x197 [ 466.909162] should_fail.cold+0x10f/0x159 [ 466.913392] should_failslab+0xdb/0x130 [ 466.917368] kmem_cache_alloc_node_trace+0x280/0x770 [ 466.922547] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 466.928270] __kmalloc_node_track_caller+0x3d/0x80 [ 466.933199] __kmalloc_reserve.isra.0+0x40/0xe0 [ 466.938108] __alloc_skb+0xcf/0x500 [ 466.941720] ? skb_scrub_packet+0x4b0/0x4b0 [ 466.946040] ? netlink_has_listeners+0x20a/0x330 [ 466.950815] kobject_uevent_env+0x781/0xc23 [ 466.955137] kobject_uevent+0x20/0x26 [ 466.958934] lo_ioctl+0x11e7/0x1ce0 [ 466.962551] ? loop_probe+0x160/0x160 [ 466.966351] blkdev_ioctl+0x96b/0x1860 [ 466.970228] ? blkpg_ioctl+0x980/0x980 [ 466.974103] ? __might_sleep+0x93/0xb0 [ 466.978063] ? __fget+0x210/0x370 [ 466.981604] block_ioctl+0xde/0x120 [ 466.985237] ? blkdev_fallocate+0x3b0/0x3b0 [ 466.989576] do_vfs_ioctl+0x7ae/0x1060 [ 466.993470] ? selinux_file_mprotect+0x5d0/0x5d0 [ 466.998217] ? lock_downgrade+0x740/0x740 [ 467.002371] ? ioctl_preallocate+0x1c0/0x1c0 [ 467.006766] ? __fget+0x237/0x370 [ 467.010443] ? security_file_ioctl+0x89/0xb0 [ 467.015037] SyS_ioctl+0x8f/0xc0 [ 467.018447] ? do_vfs_ioctl+0x1060/0x1060 [ 467.022778] do_syscall_64+0x1e8/0x640 [ 467.026740] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 467.031579] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 467.036754] RIP: 0033:0x4598c7 [ 467.039932] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 14:49:11 executing program 3: [ 467.047644] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004598c7 [ 467.054914] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 467.062288] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 467.069802] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 467.077065] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:11 executing program 3: 14:49:11 executing program 3: 14:49:11 executing program 3: 14:49:11 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) openat$cgroup_ro(r0, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 14:49:11 executing program 5 (fault-call:2 fault-nth:27): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) [ 467.294500] FAULT_INJECTION: forcing a failure. [ 467.294500] name failslab, interval 1, probability 0, space 0, times 0 [ 467.307445] CPU: 0 PID: 20432 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 467.314816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 467.324269] Call Trace: [ 467.326856] dump_stack+0x138/0x197 [ 467.330613] should_fail.cold+0x10f/0x159 [ 467.334857] should_failslab+0xdb/0x130 [ 467.338825] kmem_cache_alloc_node+0x287/0x780 [ 467.343420] __alloc_skb+0x9c/0x500 [ 467.347038] ? skb_scrub_packet+0x4b0/0x4b0 [ 467.351361] ? netlink_has_listeners+0x20a/0x330 [ 467.356126] kobject_uevent_env+0x781/0xc23 [ 467.360467] kobject_uevent+0x20/0x26 [ 467.364268] lo_ioctl+0x11e7/0x1ce0 [ 467.367895] ? loop_probe+0x160/0x160 [ 467.371701] blkdev_ioctl+0x96b/0x1860 [ 467.375575] ? blkpg_ioctl+0x980/0x980 [ 467.379458] ? __might_sleep+0x93/0xb0 [ 467.383334] ? __fget+0x210/0x370 [ 467.386782] block_ioctl+0xde/0x120 [ 467.390421] ? blkdev_fallocate+0x3b0/0x3b0 [ 467.394814] do_vfs_ioctl+0x7ae/0x1060 [ 467.398709] ? selinux_file_mprotect+0x5d0/0x5d0 [ 467.403459] ? lock_downgrade+0x740/0x740 [ 467.407613] ? ioctl_preallocate+0x1c0/0x1c0 [ 467.412005] ? __fget+0x237/0x370 [ 467.415454] ? security_file_ioctl+0x89/0xb0 [ 467.419857] SyS_ioctl+0x8f/0xc0 [ 467.423217] ? do_vfs_ioctl+0x1060/0x1060 [ 467.427358] do_syscall_64+0x1e8/0x640 [ 467.431235] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 467.436074] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 467.441256] RIP: 0033:0x4598c7 14:49:11 executing program 0: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r2 = inotify_init() readv(r2, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 467.444440] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 467.452275] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004598c7 [ 467.459537] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 467.466999] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 467.474261] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 467.481642] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:11 executing program 4: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') socket$inet(0x2, 0x4000000000000001, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r2 = inotify_init() readv(r2, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:11 executing program 3: 14:49:11 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) socket$rds(0x15, 0x5, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 14:49:11 executing program 1: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48c82, 0x0) r3 = inotify_init() readv(r3, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:11 executing program 5 (fault-call:2 fault-nth:28): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) 14:49:11 executing program 3: 14:49:11 executing program 3: [ 467.748308] FAULT_INJECTION: forcing a failure. [ 467.748308] name failslab, interval 1, probability 0, space 0, times 0 [ 467.765845] CPU: 0 PID: 20451 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 467.772903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 467.782269] Call Trace: [ 467.784876] dump_stack+0x138/0x197 [ 467.788523] should_fail.cold+0x10f/0x159 [ 467.792696] should_failslab+0xdb/0x130 [ 467.796689] kmem_cache_alloc_node+0x287/0x780 [ 467.801327] __alloc_skb+0x9c/0x500 [ 467.804960] ? skb_scrub_packet+0x4b0/0x4b0 [ 467.809287] ? netlink_has_listeners+0x20a/0x330 [ 467.814055] kobject_uevent_env+0x781/0xc23 [ 467.818481] kobject_uevent+0x20/0x26 [ 467.822299] lo_ioctl+0x11e7/0x1ce0 [ 467.826057] ? loop_probe+0x160/0x160 [ 467.829865] blkdev_ioctl+0x96b/0x1860 [ 467.833780] ? blkpg_ioctl+0x980/0x980 [ 467.837681] ? __might_sleep+0x93/0xb0 [ 467.841580] ? __fget+0x210/0x370 [ 467.845049] block_ioctl+0xde/0x120 14:49:11 executing program 3: 14:49:11 executing program 3: 14:49:11 executing program 3: 14:49:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x200000, 0x0) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000700)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x6c08280}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14, r1, 0x400, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0xfffffffffffffdb8}}, 0x20040801) r2 = socket(0x11, 0x2, 0x0) r3 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r2, 0x89e3, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r2) sendmsg$NET_DM_CMD_START(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40200800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r1, 0x8, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x30010863}, 0x48001) sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8600000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r1, 0x200, 0x70bd2c, 0x25dfdbff, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x8030}, 0x11) write$selinux_load(r0, &(0x7f0000000180)={0xf97cff8c, 0x8, 'SE Linux', "6a22a5d011cab30c59ed26ee4f6bd862a42cd3d47ab7b30298018012ed79028b49749572577f122a0d1067d0467548aadf"}, 0x41) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)) socket$inet(0x2, 0x0, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) syz_open_dev$sndseq(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r5, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pselect6(0xfe90, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) vmsplice(r4, 0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0x0, 0x2) [ 467.848681] ? blkdev_fallocate+0x3b0/0x3b0 [ 467.853010] do_vfs_ioctl+0x7ae/0x1060 [ 467.856905] ? selinux_file_mprotect+0x5d0/0x5d0 [ 467.861664] ? lock_downgrade+0x740/0x740 [ 467.865817] ? ioctl_preallocate+0x1c0/0x1c0 [ 467.870256] ? __fget+0x237/0x370 [ 467.873748] ? security_file_ioctl+0x89/0xb0 [ 467.878172] SyS_ioctl+0x8f/0xc0 [ 467.881553] ? do_vfs_ioctl+0x1060/0x1060 [ 467.885708] do_syscall_64+0x1e8/0x640 [ 467.889731] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 467.894083] block nbd3: Device being setup by another task [ 467.894605] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 467.894616] RIP: 0033:0x4598c7 [ 467.894622] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 467.894634] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004598c7 [ 467.894639] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 467.894645] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 467.894652] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 467.894658] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:12 executing program 0: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r0, &(0x7f00000001c0), 0xfffffef3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r1 = inotify_init() readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:12 executing program 4: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r2 = inotify_init() readv(r2, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:12 executing program 5 (fault-call:2 fault-nth:29): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) [ 468.513219] FAULT_INJECTION: forcing a failure. [ 468.513219] name failslab, interval 1, probability 0, space 0, times 0 [ 468.532689] CPU: 0 PID: 20479 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 468.539938] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 468.549557] Call Trace: [ 468.552136] dump_stack+0x138/0x197 [ 468.555768] should_fail.cold+0x10f/0x159 [ 468.559926] should_failslab+0xdb/0x130 [ 468.563900] kmem_cache_alloc_node+0x287/0x780 [ 468.568577] __alloc_skb+0x9c/0x500 [ 468.572196] ? skb_scrub_packet+0x4b0/0x4b0 [ 468.576527] ? netlink_has_listeners+0x20a/0x330 [ 468.581276] kobject_uevent_env+0x781/0xc23 [ 468.585597] kobject_uevent+0x20/0x26 [ 468.589391] lo_ioctl+0x11e7/0x1ce0 [ 468.593013] ? loop_probe+0x160/0x160 [ 468.596804] blkdev_ioctl+0x96b/0x1860 [ 468.600673] ? blkpg_ioctl+0x980/0x980 [ 468.604551] ? __might_sleep+0x93/0xb0 [ 468.608420] ? __fget+0x210/0x370 [ 468.611857] block_ioctl+0xde/0x120 [ 468.615467] ? blkdev_fallocate+0x3b0/0x3b0 [ 468.619767] do_vfs_ioctl+0x7ae/0x1060 [ 468.623638] ? selinux_file_mprotect+0x5d0/0x5d0 [ 468.628374] ? lock_downgrade+0x740/0x740 [ 468.632591] ? ioctl_preallocate+0x1c0/0x1c0 [ 468.636996] ? __fget+0x237/0x370 [ 468.640444] ? security_file_ioctl+0x89/0xb0 [ 468.644959] SyS_ioctl+0x8f/0xc0 [ 468.648308] ? do_vfs_ioctl+0x1060/0x1060 [ 468.652463] do_syscall_64+0x1e8/0x640 [ 468.656346] ? trace_hardirqs_off_thunk+0x1a/0x1c 14:49:12 executing program 1: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = inotify_init() readv(r3, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:12 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f00000000c0)='threaded\x00', 0xc891) close(r0) socket(0x0, 0x0, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f0000000000)={0x9, 0x7ff, 0x1}) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 14:49:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) fcntl$setflags(r0, 0x2, 0x1) pipe(&(0x7f0000000200)={0xffffffffffffffff}) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000000040)=0x5) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$sock_x25_SIOCDELRT(r1, 0x890c, &(0x7f0000000100)={@null=' \x00', 0x7, 'eql\x00'}) socket$inet6(0xa, 0x2, 0x0) [ 468.661176] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 468.666387] RIP: 0033:0x4598c7 [ 468.669561] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 468.677260] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004598c7 [ 468.684622] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 468.691885] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 468.699176] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 468.706431] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:12 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) pipe(&(0x7f0000000000)) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x7f) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x42) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000100)=0x800, 0x4) ftruncate(r2, 0x80003) sendfile(r1, r2, &(0x7f00000000c0), 0x8000fffffffe) ioctl$LOOP_SET_CAPACITY(r2, 0x4c07) 14:49:12 executing program 5 (fault-call:2 fault-nth:30): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) [ 468.901057] FAULT_INJECTION: forcing a failure. [ 468.901057] name failslab, interval 1, probability 0, space 0, times 0 [ 468.927905] CPU: 0 PID: 20508 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 468.934971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 468.944336] Call Trace: [ 468.946937] dump_stack+0x138/0x197 14:49:12 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000340)='./bus\x00', 0x341042, 0x1) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r2, 0x80003) sendfile(r1, r2, &(0x7f00000000c0), 0x8000fffffffe) ioctl$KVM_KVMCLOCK_CTRL(r2, 0xaead) r3 = geteuid() r4 = geteuid() setreuid(r4, 0x0) setreuid(r3, r3) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r5, 0x0) ftruncate(r5, 0x100) ioctl$SIOCAX25ADDUID(r0, 0x89e1, &(0x7f0000000000)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r3}) close(r0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 468.950585] should_fail.cold+0x10f/0x159 [ 468.954746] should_failslab+0xdb/0x130 [ 468.958823] kmem_cache_alloc_node+0x287/0x780 [ 468.964642] __alloc_skb+0x9c/0x500 [ 468.968281] ? skb_scrub_packet+0x4b0/0x4b0 [ 468.972618] ? netlink_has_listeners+0x20a/0x330 [ 468.977390] kobject_uevent_env+0x781/0xc23 [ 468.981821] kobject_uevent+0x20/0x26 [ 468.985630] lo_ioctl+0x11e7/0x1ce0 [ 468.989352] ? loop_probe+0x160/0x160 [ 468.993158] blkdev_ioctl+0x96b/0x1860 [ 468.997050] ? blkpg_ioctl+0x980/0x980 14:49:13 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfffffc90) close(r0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 469.000964] ? perf_trace_lock+0x109/0x500 [ 469.005236] ? __might_sleep+0x93/0xb0 [ 469.009121] ? __fget+0x210/0x370 [ 469.012583] block_ioctl+0xde/0x120 [ 469.016216] ? blkdev_fallocate+0x3b0/0x3b0 [ 469.021505] do_vfs_ioctl+0x7ae/0x1060 [ 469.025398] ? selinux_file_mprotect+0x5d0/0x5d0 [ 469.030159] ? lock_downgrade+0x740/0x740 [ 469.034307] ? ioctl_preallocate+0x1c0/0x1c0 [ 469.038860] ? __fget+0x237/0x370 [ 469.042320] ? security_file_ioctl+0x89/0xb0 [ 469.046730] SyS_ioctl+0x8f/0xc0 [ 469.046741] ? do_vfs_ioctl+0x1060/0x1060 [ 469.046760] do_syscall_64+0x1e8/0x640 [ 469.046770] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 469.046789] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 469.046799] RIP: 0033:0x4598c7 [ 469.063107] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 469.063118] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004598c7 [ 469.063123] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 469.063128] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 14:49:13 executing program 0: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 469.063134] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 469.063139] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:13 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) socket(0x0, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) r2 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r2, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) getsockopt$inet6_buf(r2, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000340)='./bus\x00', 0x341042, 0x1) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r3, 0x80003) sendfile(r2, r3, &(0x7f00000000c0), 0x8000fffffffe) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x200000, 0x0) r5 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000700)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x6c08280}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14, r5, 0x400, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0xfffffffffffffdb8}}, 0x20040801) r6 = socket(0x11, 0x2, 0x0) r7 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r6, 0x89e3, 0x0) ioctl$NBD_SET_SOCK(r7, 0xab00, r6) sendmsg$NET_DM_CMD_START(r6, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40200800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r5, 0x8, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x30010863}, 0x48001) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8600000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r5, 0x200, 0x70bd2c, 0x25dfdbff, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x8030}, 0x11) ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f0000000280)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 14:49:13 executing program 5 (fault-call:2 fault-nth:31): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) [ 469.235048] block nbd2: Device being setup by another task [ 469.241210] FAULT_INJECTION: forcing a failure. [ 469.241210] name failslab, interval 1, probability 0, space 0, times 0 [ 469.252974] CPU: 0 PID: 20533 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 469.259998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 469.269353] Call Trace: [ 469.271946] dump_stack+0x138/0x197 [ 469.275586] should_fail.cold+0x10f/0x159 [ 469.279878] should_failslab+0xdb/0x130 [ 469.283860] kmem_cache_alloc_node_trace+0x280/0x770 [ 469.288971] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 469.294435] __kmalloc_node_track_caller+0x3d/0x80 [ 469.299376] __kmalloc_reserve.isra.0+0x40/0xe0 [ 469.304045] __alloc_skb+0xcf/0x500 [ 469.307670] ? skb_scrub_packet+0x4b0/0x4b0 [ 469.312081] ? netlink_has_listeners+0x20a/0x330 [ 469.316850] kobject_uevent_env+0x781/0xc23 [ 469.321171] kobject_uevent+0x20/0x26 [ 469.325204] lo_ioctl+0x11e7/0x1ce0 [ 469.328816] ? loop_probe+0x160/0x160 [ 469.332609] blkdev_ioctl+0x96b/0x1860 [ 469.336485] ? blkpg_ioctl+0x980/0x980 [ 469.340361] ? perf_trace_lock+0x109/0x500 [ 469.344714] ? __might_sleep+0x93/0xb0 [ 469.348602] ? __fget+0x210/0x370 [ 469.352050] block_ioctl+0xde/0x120 [ 469.355668] ? blkdev_fallocate+0x3b0/0x3b0 [ 469.359980] do_vfs_ioctl+0x7ae/0x1060 [ 469.363859] ? selinux_file_mprotect+0x5d0/0x5d0 [ 469.368594] ? lock_downgrade+0x740/0x740 [ 469.372739] ? ioctl_preallocate+0x1c0/0x1c0 [ 469.377138] ? __fget+0x237/0x370 [ 469.380588] ? security_file_ioctl+0x89/0xb0 [ 469.385089] SyS_ioctl+0x8f/0xc0 [ 469.388437] ? do_vfs_ioctl+0x1060/0x1060 [ 469.392582] do_syscall_64+0x1e8/0x640 [ 469.396980] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 469.401811] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 469.406981] RIP: 0033:0x4598c7 [ 469.410153] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 469.417851] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004598c7 [ 469.425104] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 14:49:13 executing program 4: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r2 = inotify_init() readv(r2, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:13 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) sigaltstack(&(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000000)) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f00000000c0)={@rand_addr, @multicast2, 0x0}, &(0x7f0000000100)=0xc) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000140)={r1, 0x1, 0x6, @local}, 0x10) socket(0x4, 0x6, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 469.432363] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 469.439624] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 469.446886] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:13 executing program 1: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = inotify_init() readv(r3, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:13 executing program 0: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, &(0x7f0000000140)={[], 0x0, 0x1}) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write(0xffffffffffffffff, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce", 0x78) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x0) mknod$loop(0x0, 0x2000, 0x1) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) r3 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB='$\n'], 0x2, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f000001f000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(r4, 0x0, 0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000002) 14:49:13 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000280)={0x5, @win={{0x3, 0xb1ac, 0x6, 0x7fff}, 0x1b, 0x8, &(0x7f0000000100)={{0x7, 0xfffffffe, 0x6, 0x400}, &(0x7f00000000c0)={{0x10000, 0x4, 0x7, 0xffff5d76}, &(0x7f0000000000)={{0x0, 0x1, 0x3ff, 0x7}}}}, 0x6, &(0x7f0000000140)="b79aa79882669e93d18b1ce17aaf718d95f35b920da7508a9590466b4428ce02945fc02bc36b05a4a57dc3294d1245c47ab8c7a6499e782320480a6058a77a733b06b4b24b7e10bf5b7a58f91549acc2ccd4ed8fd953da916676b9c460b718c536aee5ef5e7e8fd61153f2d374dc667215977f4c05770c0c6a1086b892dc03550436b1927194bb31", 0x1}}) 14:49:13 executing program 5 (fault-call:2 fault-nth:32): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) 14:49:13 executing program 0: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 469.759876] FAULT_INJECTION: forcing a failure. [ 469.759876] name failslab, interval 1, probability 0, space 0, times 0 [ 469.777859] CPU: 1 PID: 20564 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 469.784990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 469.794489] Call Trace: [ 469.797093] dump_stack+0x138/0x197 [ 469.800762] should_fail.cold+0x10f/0x159 [ 469.805097] should_failslab+0xdb/0x130 [ 469.809084] kmem_cache_alloc_node_trace+0x280/0x770 [ 469.814197] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 469.820085] __kmalloc_node_track_caller+0x3d/0x80 [ 469.825069] __kmalloc_reserve.isra.0+0x40/0xe0 [ 469.829938] __alloc_skb+0xcf/0x500 [ 469.833590] ? skb_scrub_packet+0x4b0/0x4b0 [ 469.837913] ? netlink_has_listeners+0x20a/0x330 [ 469.842680] kobject_uevent_env+0x781/0xc23 [ 469.847018] kobject_uevent+0x20/0x26 [ 469.850821] lo_ioctl+0x11e7/0x1ce0 [ 469.854572] ? loop_probe+0x160/0x160 [ 469.858383] blkdev_ioctl+0x96b/0x1860 [ 469.862274] ? blkpg_ioctl+0x980/0x980 [ 469.866281] ? __might_sleep+0x93/0xb0 [ 469.870184] ? __fget+0x210/0x370 [ 469.873639] block_ioctl+0xde/0x120 [ 469.877369] ? blkdev_fallocate+0x3b0/0x3b0 [ 469.881694] do_vfs_ioctl+0x7ae/0x1060 [ 469.885589] ? selinux_file_mprotect+0x5d0/0x5d0 [ 469.890431] ? lock_downgrade+0x740/0x740 [ 469.894582] ? ioctl_preallocate+0x1c0/0x1c0 [ 469.899693] ? __fget+0x237/0x370 [ 469.903154] ? security_file_ioctl+0x89/0xb0 [ 469.907569] SyS_ioctl+0x8f/0xc0 [ 469.910938] ? do_vfs_ioctl+0x1060/0x1060 [ 469.915090] do_syscall_64+0x1e8/0x640 [ 469.919333] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 469.924367] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 469.929560] RIP: 0033:0x4598c7 [ 469.932759] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 469.940739] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004598c7 [ 469.948215] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 469.955579] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 469.963067] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 469.970907] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:14 executing program 5 (fault-call:2 fault-nth:33): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) 14:49:14 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0xc0884123, &(0x7f00000000c0)='O') r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) getsockopt$inet6_int(r1, 0x29, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) setsockopt$inet_tcp_buf(r0, 0x6, 0x21, &(0x7f0000000140)="98a397723418be5718aff81e24343fc05d2900facd70feb534ae8ea93e18fb32407efe913c85f484e6e7f4773756bfea01d57fc31e197cbe391cebc881411e55b99a780b1702af354b5e2649b9f19a8b317a9bfbf89d3b25cee82e973eeceec49d8cc1d83ea5ab89a76064147afa2077069665b0a849549cb01cee6600e42818135ca40a7b4f96b42bef7dc1f0dae8f567f2882d901a01f932891e2034f6a9866ae2478179a83c032bb6b61de1faa2ebabebbe75e0ccacb927afe7833df772c24315b249f7404eb690ed7bda203ddcff910d4039c70528a63a2e066d93e708875e808c", 0xe3) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x200000, 0x0) ioctl$USBDEVFS_IOCTL(r2, 0xc0105512, &(0x7f0000000100)=@usbdevfs_disconnect={0x1}) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) [ 470.126545] FAULT_INJECTION: forcing a failure. [ 470.126545] name failslab, interval 1, probability 0, space 0, times 0 [ 470.141028] CPU: 1 PID: 20583 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 470.148139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 470.157498] Call Trace: [ 470.160095] dump_stack+0x138/0x197 [ 470.163744] should_fail.cold+0x10f/0x159 [ 470.167949] should_failslab+0xdb/0x130 14:49:14 executing program 3: r0 = creat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x612, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, r0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0xa}, 0x202, 0x3, 0x0, 0x0, 0x0, 0xffff7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x7) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="8000f1f63804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) [ 470.172114] kmem_cache_alloc_node_trace+0x280/0x770 [ 470.177326] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 470.182790] __kmalloc_node_track_caller+0x3d/0x80 [ 470.182809] __kmalloc_reserve.isra.0+0x40/0xe0 [ 470.192696] __alloc_skb+0xcf/0x500 [ 470.192705] ? skb_scrub_packet+0x4b0/0x4b0 [ 470.192718] ? netlink_has_listeners+0x20a/0x330 [ 470.192734] kobject_uevent_env+0x781/0xc23 [ 470.192749] kobject_uevent+0x20/0x26 [ 470.192760] lo_ioctl+0x11e7/0x1ce0 [ 470.192772] ? loop_probe+0x160/0x160 [ 470.221561] blkdev_ioctl+0x96b/0x1860 [ 470.225483] ? blkpg_ioctl+0x980/0x980 [ 470.229366] ? __might_sleep+0x93/0xb0 [ 470.233369] ? __fget+0x210/0x370 [ 470.236814] block_ioctl+0xde/0x120 [ 470.240428] ? blkdev_fallocate+0x3b0/0x3b0 [ 470.244924] do_vfs_ioctl+0x7ae/0x1060 [ 470.248883] ? selinux_file_mprotect+0x5d0/0x5d0 [ 470.253896] ? lock_downgrade+0x740/0x740 [ 470.258044] ? ioctl_preallocate+0x1c0/0x1c0 [ 470.262455] ? __fget+0x237/0x370 [ 470.265920] ? security_file_ioctl+0x89/0xb0 [ 470.270338] SyS_ioctl+0x8f/0xc0 [ 470.273709] ? do_vfs_ioctl+0x1060/0x1060 [ 470.277845] do_syscall_64+0x1e8/0x640 [ 470.281745] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 470.286605] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 470.291788] RIP: 0033:0x4598c7 [ 470.294976] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 470.302670] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004598c7 [ 470.309938] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 470.317204] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 14:49:14 executing program 4: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r2 = inotify_init() readv(r2, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 470.324463] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 470.331738] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:14 executing program 5 (fault-call:2 fault-nth:34): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) 14:49:14 executing program 1: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = inotify_init() readv(r3, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:14 executing program 0: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0), 0xfffffef3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r1 = inotify_init() readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:14 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f00000002c0)={0x2, &(0x7f0000000000), &(0x7f0000000280)=[{0x81, 0x12, 0x28, &(0x7f00000000c0)=""/18}, {0x0, 0xcd, 0x5, &(0x7f0000000100)=""/205}]}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r1) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 470.561923] FAULT_INJECTION: forcing a failure. [ 470.561923] name failslab, interval 1, probability 0, space 0, times 0 14:49:14 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000700)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x6c08280}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14, r1, 0x400, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0xfffffffffffffdb8}}, 0x20040801) r2 = socket(0x11, 0x2, 0x0) r3 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r2, 0x89e3, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r2) sendmsg$NET_DM_CMD_START(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40200800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r1, 0x8, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x30010863}, 0x48001) getsockopt$llc_int(r2, 0x10c, 0x0, &(0x7f00000000c0), &(0x7f0000000100)=0x4) socket(0x0, 0x6, 0x5) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x0, 0x6, [0x9, 0x0, 0x3, 0x5, 0xffe0], 0x5}) [ 470.623783] CPU: 1 PID: 20601 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 470.630836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 470.640295] Call Trace: [ 470.642906] dump_stack+0x138/0x197 [ 470.646549] should_fail.cold+0x10f/0x159 [ 470.650713] should_failslab+0xdb/0x130 [ 470.654704] kmem_cache_alloc_node+0x287/0x780 [ 470.659307] __alloc_skb+0x9c/0x500 [ 470.662942] ? skb_scrub_packet+0x4b0/0x4b0 [ 470.667269] ? netlink_has_listeners+0x20a/0x330 [ 470.672043] kobject_uevent_env+0x781/0xc23 [ 470.673845] block nbd2: Device being setup by another task [ 470.676514] kobject_uevent+0x20/0x26 [ 470.676528] lo_ioctl+0x11e7/0x1ce0 [ 470.676543] ? loop_probe+0x160/0x160 [ 470.676556] blkdev_ioctl+0x96b/0x1860 [ 470.676566] ? blkpg_ioctl+0x980/0x980 [ 470.676585] ? __might_sleep+0x93/0xb0 [ 470.705317] ? __fget+0x210/0x370 [ 470.708872] block_ioctl+0xde/0x120 [ 470.712515] ? blkdev_fallocate+0x3b0/0x3b0 [ 470.716838] do_vfs_ioctl+0x7ae/0x1060 [ 470.720743] ? selinux_file_mprotect+0x5d0/0x5d0 [ 470.725498] ? lock_downgrade+0x740/0x740 [ 470.729642] ? ioctl_preallocate+0x1c0/0x1c0 [ 470.734041] ? __fget+0x237/0x370 [ 470.737506] ? security_file_ioctl+0x89/0xb0 [ 470.742063] SyS_ioctl+0x8f/0xc0 [ 470.745425] ? do_vfs_ioctl+0x1060/0x1060 [ 470.749586] do_syscall_64+0x1e8/0x640 [ 470.753494] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 470.758350] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 470.763558] RIP: 0033:0x4598c7 [ 470.766747] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 470.774552] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004598c7 [ 470.781825] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 470.789102] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 470.796459] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 470.803719] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 [ 470.812386] net_ratelimit: 24 callbacks suppressed [ 470.812390] protocol 88fb is buggy, dev hsr_slave_0 14:49:14 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) r1 = socket(0x9, 0x816, 0x1f) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f00000000c0)={0x0, {0x2, 0x4e24, @broadcast}, {0x2, 0x4e21, @empty}, {0x2, 0x4e20, @loopback}, 0x560, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)='bpq0\x00', 0xfffffffffffffbff, 0x80000000, 0x3}) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) socket(0x0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="05", 0x1, r2) keyctl$get_security(0x11, r2, &(0x7f0000000280)=""/222, 0xde) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 470.820132] protocol 88fb is buggy, dev hsr_slave_0 [ 470.822647] protocol 88fb is buggy, dev hsr_slave_1 [ 470.827856] protocol 88fb is buggy, dev hsr_slave_1 14:49:14 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) lseek(0xffffffffffffffff, 0x0, 0x3) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 14:49:15 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f0000000100)={0x0, 0xd, 0x6, 0x100, 0xffffff81, 0x80000000, 0x4}) r3 = open(&(0x7f0000000340)='./bus\x00', 0x341042, 0x1) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r3, 0x80003) sendfile(r1, r3, &(0x7f00000000c0), 0x8000fffffffe) fcntl$setstatus(r3, 0x4, 0x44800) close(r0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 14:49:15 executing program 3: bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) write$P9_RLINK(r0, &(0x7f0000000040)={0xffffffffffffffda, 0x47, 0x1}, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x10000, 0x0, 0x0, 0x0, 0xfffffffffffefffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) r1 = open(0x0, 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000180)='.//ile0\x00', 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f00000007c0)='./file0\x00') setsockopt$TIPC_CONN_TIMEOUT(r1, 0x10f, 0x82, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0xffffffffffffffd5) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) geteuid() socket$inet6_tcp(0xa, 0x1, 0x0) r2 = open(0x0, 0x400100, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r2, 0x8955, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x9, 0x400201) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xf3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x6100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000000c0)={'sit0\x00\x00\xff\xff\xff\xff\xa0\x00Q\xfc\x03\x00', 0x141}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a73ff0)='/dev/sequencer2\x00', 0x0, 0x0) 14:49:15 executing program 5 (fault-call:2 fault-nth:35): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) [ 471.176360] device sit0 entered promiscuous mode 14:49:15 executing program 4: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r0, &(0x7f00000001c0), 0xfffffef3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r1 = inotify_init() readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 471.228277] FAULT_INJECTION: forcing a failure. [ 471.228277] name failslab, interval 1, probability 0, space 0, times 0 [ 471.239715] device sit0 left promiscuous mode [ 471.263447] CPU: 1 PID: 20648 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 471.267167] device sit0 entered promiscuous mode [ 471.270521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 471.270527] Call Trace: [ 471.270546] dump_stack+0x138/0x197 [ 471.270566] should_fail.cold+0x10f/0x159 [ 471.270582] should_failslab+0xdb/0x130 [ 471.270598] kmem_cache_alloc_node_trace+0x280/0x770 [ 471.270612] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 471.270628] __kmalloc_node_track_caller+0x3d/0x80 [ 471.270642] __kmalloc_reserve.isra.0+0x40/0xe0 [ 471.270653] __alloc_skb+0xcf/0x500 [ 471.270663] ? skb_scrub_packet+0x4b0/0x4b0 [ 471.270674] ? netlink_has_listeners+0x20a/0x330 [ 471.270692] kobject_uevent_env+0x781/0xc23 [ 471.270713] kobject_uevent+0x20/0x26 [ 471.340640] lo_ioctl+0x11e7/0x1ce0 [ 471.344260] ? loop_probe+0x160/0x160 [ 471.348052] blkdev_ioctl+0x96b/0x1860 [ 471.351940] ? blkpg_ioctl+0x980/0x980 [ 471.355821] ? __might_sleep+0x93/0xb0 [ 471.359791] ? __fget+0x210/0x370 [ 471.363261] block_ioctl+0xde/0x120 [ 471.366868] ? blkdev_fallocate+0x3b0/0x3b0 [ 471.371195] do_vfs_ioctl+0x7ae/0x1060 [ 471.375071] ? selinux_file_mprotect+0x5d0/0x5d0 [ 471.379818] ? lock_downgrade+0x740/0x740 [ 471.383964] ? ioctl_preallocate+0x1c0/0x1c0 [ 471.388372] ? __fget+0x237/0x370 [ 471.391821] ? security_file_ioctl+0x89/0xb0 [ 471.396225] SyS_ioctl+0x8f/0xc0 [ 471.399585] ? do_vfs_ioctl+0x1060/0x1060 [ 471.403797] do_syscall_64+0x1e8/0x640 [ 471.407695] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 471.412528] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 471.417811] RIP: 0033:0x4598c7 [ 471.420995] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 14:49:15 executing program 0: ioprio_set$pid(0x1, 0x0, 0x7fff) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:15 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x1, 0x200400) write$P9_RFSYNC(r1, &(0x7f00000000c0)={0x7, 0x33, 0x2}, 0x7) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3235004000000f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4d}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x7, 0x0, 0x20010, 0x0, 0x0, 0x4cb, 0x0, 0x0, 0x10, 0x6, 0x0, 0x0, 0x44]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 14:49:15 executing program 1: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = inotify_init() readv(r3, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 471.428895] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004598c7 [ 471.436159] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 471.443433] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 471.450958] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 471.458211] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:15 executing program 0: write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:15 executing program 5 (fault-call:2 fault-nth:36): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) [ 471.590022] protocol 88fb is buggy, dev hsr_slave_0 [ 471.595204] protocol 88fb is buggy, dev hsr_slave_1 [ 471.667901] FAULT_INJECTION: forcing a failure. [ 471.667901] name failslab, interval 1, probability 0, space 0, times 0 [ 471.690983] CPU: 0 PID: 20673 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 471.698038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 471.707400] Call Trace: [ 471.709987] dump_stack+0x138/0x197 [ 471.713613] should_fail.cold+0x10f/0x159 [ 471.717767] should_failslab+0xdb/0x130 [ 471.721726] kmem_cache_alloc_node+0x287/0x780 [ 471.726295] __alloc_skb+0x9c/0x500 [ 471.729916] ? skb_scrub_packet+0x4b0/0x4b0 [ 471.734232] ? netlink_has_listeners+0x20a/0x330 [ 471.738994] kobject_uevent_env+0x781/0xc23 [ 471.743309] kobject_uevent+0x20/0x26 [ 471.747099] lo_ioctl+0x11e7/0x1ce0 [ 471.750846] ? loop_probe+0x160/0x160 [ 471.754629] blkdev_ioctl+0x96b/0x1860 [ 471.758498] ? blkpg_ioctl+0x980/0x980 [ 471.762477] ? __might_sleep+0x93/0xb0 [ 471.767300] ? __fget+0x210/0x370 [ 471.770749] block_ioctl+0xde/0x120 [ 471.774365] ? blkdev_fallocate+0x3b0/0x3b0 [ 471.778813] do_vfs_ioctl+0x7ae/0x1060 [ 471.782689] ? selinux_file_mprotect+0x5d0/0x5d0 [ 471.787434] ? lock_downgrade+0x740/0x740 [ 471.791568] ? ioctl_preallocate+0x1c0/0x1c0 [ 471.795960] ? __fget+0x237/0x370 [ 471.799403] ? security_file_ioctl+0x89/0xb0 [ 471.803805] SyS_ioctl+0x8f/0xc0 [ 471.807159] ? do_vfs_ioctl+0x1060/0x1060 [ 471.811294] do_syscall_64+0x1e8/0x640 [ 471.815431] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 471.820282] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 471.825451] RIP: 0033:0x4598c7 [ 471.828634] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 471.836333] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004598c7 [ 471.843596] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 471.850851] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 471.858102] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 14:49:15 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000700)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x6c08280}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14, r2, 0x400, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0xfffffffffffffdb8}}, 0x20040801) r3 = socket(0x11, 0x2, 0x0) r4 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r3, 0x89e3, 0x0) ioctl$SG_GET_LOW_DMA(r1, 0x227a, &(0x7f0000000000)) ioctl$NBD_SET_SOCK(r4, 0xab00, r3) sendmsg$NET_DM_CMD_START(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40200800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x8, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x30010863}, 0x48001) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000000c0)={{0x1, 0x0, @reserved="7da021922bcecde6217c37809465eb644bb7f24ed0f80a2b932efe09d2493b7f"}, 0x22, [], "b226073ff288802b0cae9e946562cabaab1889a5725ac8648707cc63fe6ae8d8d972"}) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 471.865359] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 [ 471.872949] protocol 88fb is buggy, dev hsr_slave_0 [ 471.878025] protocol 88fb is buggy, dev hsr_slave_1 [ 471.879993] protocol 88fb is buggy, dev hsr_slave_0 [ 471.888562] protocol 88fb is buggy, dev hsr_slave_1 14:49:15 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:15 executing program 5 (fault-call:2 fault-nth:37): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) [ 471.939169] block nbd2: Device being setup by another task 14:49:16 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:16 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x696afeb95ee97b88, 0x6) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000000), 0x4) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f0000000180)=0xc) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x40000000000000f, &(0x7f00000002c0)=""/16, &(0x7f0000000200)=0xfffffffffffffdd6) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)) syz_open_pts(0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = creat(0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) ioctl$DRM_IOCTL_SET_SAREA_CTX(r5, 0x4010641c, &(0x7f0000000140)={0x0, &(0x7f0000000080)=""/159}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) quotactl(0x810, 0x0, r4, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) r6 = dup3(0xffffffffffffffff, r0, 0x80000) bind$inet6(r6, &(0x7f0000000240)={0xa, 0x8000000004e20, 0x6bf}, 0xfffffffffffffff6) sendto$inet6(r2, 0x0, 0xffffffffffffffdd, 0x20000008, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x31, &(0x7f0000000140)=0x4, 0x4) rmdir(&(0x7f00000003c0)='./bus\x00') ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, 0x0) clock_adjtime(0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x36, &(0x7f0000000440)=@fragment, 0x8) r7 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) pipe(&(0x7f0000000340)) write$P9_RWRITE(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) utimensat(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) ftruncate(r7, 0x7fff) sendfile(r3, r7, 0x0, 0x8040fffffffd) [ 471.991394] block nbd2: Device being setup by another task [ 472.048382] FAULT_INJECTION: forcing a failure. [ 472.048382] name failslab, interval 1, probability 0, space 0, times 0 14:49:16 executing program 4: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 472.123470] CPU: 0 PID: 20692 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 472.130552] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 472.139944] Call Trace: [ 472.142543] dump_stack+0x138/0x197 [ 472.146193] should_fail.cold+0x10f/0x159 [ 472.150349] should_failslab+0xdb/0x130 [ 472.154329] kmem_cache_alloc_node_trace+0x280/0x770 [ 472.159437] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 472.164894] __kmalloc_node_track_caller+0x3d/0x80 14:49:16 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xa) close(r2) r3 = socket$netlink(0x10, 0x3, 0x4) r4 = socket(0x200000100000011, 0x803, 0x0) setsockopt$packet_int(r4, 0x107, 0xf, &(0x7f00000001c0)=0x8, 0x4) socketpair$unix(0x1, 0x25e3c83ee29aaff9, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4f20, 0x0) [ 472.169827] __kmalloc_reserve.isra.0+0x40/0xe0 [ 472.174498] __alloc_skb+0xcf/0x500 [ 472.178128] ? skb_scrub_packet+0x4b0/0x4b0 [ 472.182450] ? netlink_has_listeners+0x20a/0x330 [ 472.187213] kobject_uevent_env+0x781/0xc23 [ 472.191552] kobject_uevent+0x20/0x26 [ 472.195382] lo_ioctl+0x11e7/0x1ce0 [ 472.199010] ? loop_probe+0x160/0x160 [ 472.202824] blkdev_ioctl+0x96b/0x1860 [ 472.206708] ? blkpg_ioctl+0x980/0x980 [ 472.210692] ? __might_sleep+0x93/0xb0 [ 472.214593] ? __fget+0x210/0x370 [ 472.218060] block_ioctl+0xde/0x120 14:49:16 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x4000) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000180)={0x1, 0x8, 0x7, 0x1, 0x6}) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r4, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r4, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) getsockopt$inet6_buf(r4, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = open(&(0x7f0000000340)='./bus\x00', 0x341042, 0x1) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r4, r5, &(0x7f00000000c0), 0x8000fffffffe) write(r4, &(0x7f0000000340), 0x0) ioctl$RNDADDENTROPY(r3, 0x40085203, &(0x7f00000000c0)={0x1, 0x54, "cf22afd046081e3bc67b8c0300a7726925a36dd6cba2e1f124f61df2afe00e8d75e7892593576889581056ca483037a5c43b3ffa4ca71a53752fb87fe9b65ff07aa690a2691ef83686dd21adff72e3cc801447e0"}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) write$UHID_DESTROY(r2, &(0x7f0000000000), 0x4) [ 472.221690] ? blkdev_fallocate+0x3b0/0x3b0 [ 472.226013] do_vfs_ioctl+0x7ae/0x1060 [ 472.229905] ? selinux_file_mprotect+0x5d0/0x5d0 [ 472.234663] ? lock_downgrade+0x740/0x740 [ 472.238808] ? ioctl_preallocate+0x1c0/0x1c0 [ 472.243204] ? __fget+0x237/0x370 [ 472.246644] ? security_file_ioctl+0x89/0xb0 [ 472.251043] SyS_ioctl+0x8f/0xc0 [ 472.254389] ? do_vfs_ioctl+0x1060/0x1060 [ 472.258520] do_syscall_64+0x1e8/0x640 [ 472.262400] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 472.267396] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 472.272576] RIP: 0033:0x4598c7 [ 472.275798] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 472.281199] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=20708 comm=syz-executor.3 [ 472.283508] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004598c7 [ 472.283514] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 472.283520] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 14:49:16 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:16 executing program 4: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:16 executing program 1: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') socket$inet(0x2, 0x4000000000000001, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r2 = inotify_init() readv(r2, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 472.283526] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 472.283531] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 [ 472.381726] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=20708 comm=syz-executor.3 [ 472.438020] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=20708 comm=syz-executor.3 14:49:16 executing program 4: ioprio_set$pid(0x1, 0x0, 0x7fff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:16 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:16 executing program 5 (fault-call:2 fault-nth:38): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) [ 472.492935] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=20708 comm=syz-executor.3 [ 472.525295] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=20708 comm=syz-executor.3 [ 472.591655] FAULT_INJECTION: forcing a failure. [ 472.591655] name failslab, interval 1, probability 0, space 0, times 0 [ 472.604050] CPU: 0 PID: 20736 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 472.611083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 472.620574] Call Trace: [ 472.623171] dump_stack+0x138/0x197 [ 472.626812] should_fail.cold+0x10f/0x159 [ 472.630969] should_failslab+0xdb/0x130 [ 472.635051] kmem_cache_alloc_node_trace+0x280/0x770 [ 472.640159] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 472.645628] __kmalloc_node_track_caller+0x3d/0x80 [ 472.651349] __kmalloc_reserve.isra.0+0x40/0xe0 [ 472.656018] __alloc_skb+0xcf/0x500 [ 472.659652] ? skb_scrub_packet+0x4b0/0x4b0 [ 472.663974] ? netlink_has_listeners+0x20a/0x330 [ 472.668730] kobject_uevent_env+0x781/0xc23 [ 472.673061] kobject_uevent+0x20/0x26 [ 472.676861] lo_ioctl+0x11e7/0x1ce0 [ 472.680493] ? loop_probe+0x160/0x160 [ 472.684405] blkdev_ioctl+0x96b/0x1860 [ 472.688289] ? blkpg_ioctl+0x980/0x980 [ 472.692182] ? __might_sleep+0x93/0xb0 [ 472.696061] ? __fget+0x210/0x370 [ 472.699517] block_ioctl+0xde/0x120 [ 472.703135] ? blkdev_fallocate+0x3b0/0x3b0 [ 472.707886] do_vfs_ioctl+0x7ae/0x1060 [ 472.711770] ? selinux_file_mprotect+0x5d0/0x5d0 [ 472.716515] ? lock_downgrade+0x740/0x740 [ 472.720653] ? ioctl_preallocate+0x1c0/0x1c0 [ 472.725062] ? __fget+0x237/0x370 [ 472.728508] ? security_file_ioctl+0x89/0xb0 [ 472.732899] SyS_ioctl+0x8f/0xc0 [ 472.736245] ? do_vfs_ioctl+0x1060/0x1060 [ 472.740475] do_syscall_64+0x1e8/0x640 [ 472.744350] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 472.749187] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 472.754362] RIP: 0033:0x4598c7 [ 472.757539] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 472.765239] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004598c7 [ 472.772491] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 472.779756] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 14:49:16 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 472.787007] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 472.794263] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:16 executing program 5 (fault-call:2 fault-nth:39): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) 14:49:16 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 472.938869] FAULT_INJECTION: forcing a failure. [ 472.938869] name failslab, interval 1, probability 0, space 0, times 0 [ 472.951310] CPU: 0 PID: 20750 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 472.958453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 472.967800] Call Trace: [ 472.970480] dump_stack+0x138/0x197 [ 472.974114] should_fail.cold+0x10f/0x159 [ 472.978268] should_failslab+0xdb/0x130 [ 472.982242] kmem_cache_alloc_node_trace+0x280/0x770 [ 472.987447] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 472.992915] __kmalloc_node_track_caller+0x3d/0x80 [ 472.997855] __kmalloc_reserve.isra.0+0x40/0xe0 [ 473.002529] __alloc_skb+0xcf/0x500 [ 473.006135] ? skb_scrub_packet+0x4b0/0x4b0 [ 473.010441] ? netlink_has_listeners+0x20a/0x330 [ 473.015184] kobject_uevent_env+0x781/0xc23 [ 473.019496] kobject_uevent+0x20/0x26 [ 473.023375] lo_ioctl+0x11e7/0x1ce0 [ 473.026995] ? loop_probe+0x160/0x160 [ 473.031034] blkdev_ioctl+0x96b/0x1860 [ 473.034913] ? blkpg_ioctl+0x980/0x980 [ 473.038792] ? __might_sleep+0x93/0xb0 [ 473.042667] ? __fget+0x210/0x370 [ 473.046112] block_ioctl+0xde/0x120 [ 473.049732] ? blkdev_fallocate+0x3b0/0x3b0 [ 473.054042] do_vfs_ioctl+0x7ae/0x1060 [ 473.057923] ? selinux_file_mprotect+0x5d0/0x5d0 [ 473.062668] ? lock_downgrade+0x740/0x740 [ 473.066804] ? ioctl_preallocate+0x1c0/0x1c0 [ 473.071194] ? __fget+0x237/0x370 [ 473.074649] ? security_file_ioctl+0x89/0xb0 [ 473.079045] SyS_ioctl+0x8f/0xc0 [ 473.082491] ? do_vfs_ioctl+0x1060/0x1060 [ 473.086626] do_syscall_64+0x1e8/0x640 [ 473.090502] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 473.095356] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 473.100548] RIP: 0033:0x4598c7 [ 473.103730] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 473.111426] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004598c7 [ 473.118824] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 473.126223] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 14:49:17 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:17 executing program 3: socket$nl_route(0x10, 0x3, 0x0) getpid() sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000740)=@mangle={'mangle\x00', 0x1f, 0x6, 0x500, 0x2d0, 0x0, 0x1b8, 0x3b8, 0x3b8, 0x498, 0x498, 0x498, 0x498, 0x498, 0x6, 0x0, {[{{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x18}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@broadcast, @multicast2, 0xff, 0xff, 'syzkaller1\x00', 'syz_tun\x00', {}, {0xff}, 0xff, 0x0, 0x40}, 0x0, 0x98, 0xd0}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffff, 0x2, 0x1}, {0x2, 0x81}, {0x7f, 0x22, 0xd1}, 0x2}}}, {{@ip={@multicast1, @loopback, 0x0, 0xffffffff, 'yam0\x00', 'ip6tnl0\x00', {0x7f}, {0xff}, 0xe1}, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x3f, 0x8}}]}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00'}}, {{@uncond, 0x0, 0xb8, 0xe0, 0x0, {}, [@common=@socket0={0x20, 'socket\x00'}]}, @TTL={0x28, 'TTL\x00', 0x0, {0x0, 0x20}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x560) syz_genetlink_get_family_id$tipc2(0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x108) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '#! '}]}, 0xf) close(r0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000200)=ANY=[@ANYBLOB="04000000dfff0000000000c00900000003000000000000349a0900000100000003200000000000000000000000000000000000000010000001000000010000000600000007000000400000000000000000000000000000000700000005000000010000000500000006000000ff7f00000400000000000000000000000000000000000000ff0f000009000000090000000200000001000000001000"/168]) r1 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r2 = syz_open_dev$vivid(0x0, 0x0, 0x2) ioctl$VIDIOC_SUBSCRIBE_EVENT(r2, 0x4020565a, &(0x7f00000003c0)={0x0, 0x7fffffff}) chdir(&(0x7f0000000180)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') ioctl$SCSI_IOCTL_STOP_UNIT(r1, 0x6) socket$netlink(0x10, 0x3, 0x2) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, 0x0) [ 473.133492] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 473.140848] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:17 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) socket(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x62a, 0x0, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) fcntl$setown(r1, 0x8, r2) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 14:49:17 executing program 5 (fault-call:2 fault-nth:40): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) 14:49:17 executing program 1: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r2 = inotify_init() readv(r2, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:17 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 473.323128] FAULT_INJECTION: forcing a failure. [ 473.323128] name failslab, interval 1, probability 0, space 0, times 0 [ 473.342229] CPU: 0 PID: 20767 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 473.350243] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 473.359600] Call Trace: [ 473.362197] dump_stack+0x138/0x197 [ 473.365835] should_fail.cold+0x10f/0x159 [ 473.369989] should_failslab+0xdb/0x130 [ 473.373964] kmem_cache_alloc_node_trace+0x280/0x770 [ 473.379105] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 473.384568] __kmalloc_node_track_caller+0x3d/0x80 [ 473.389704] __kmalloc_reserve.isra.0+0x40/0xe0 [ 473.394379] __alloc_skb+0xcf/0x500 [ 473.398006] ? skb_scrub_packet+0x4b0/0x4b0 [ 473.402364] ? netlink_has_listeners+0x20a/0x330 [ 473.407132] kobject_uevent_env+0x781/0xc23 [ 473.407152] kobject_uevent+0x20/0x26 [ 473.415263] lo_ioctl+0x11e7/0x1ce0 [ 473.415278] ? loop_probe+0x160/0x160 [ 473.415290] blkdev_ioctl+0x96b/0x1860 [ 473.415298] ? blkpg_ioctl+0x980/0x980 [ 473.415313] ? __might_sleep+0x93/0xb0 [ 473.435034] ? __fget+0x210/0x370 [ 473.438500] block_ioctl+0xde/0x120 [ 473.442133] ? blkdev_fallocate+0x3b0/0x3b0 [ 473.446459] do_vfs_ioctl+0x7ae/0x1060 [ 473.450349] ? selinux_file_mprotect+0x5d0/0x5d0 [ 473.455110] ? lock_downgrade+0x740/0x740 [ 473.457347] overlayfs: './file0' not a directory [ 473.459258] ? ioctl_preallocate+0x1c0/0x1c0 [ 473.459271] ? __fget+0x237/0x370 [ 473.459291] ? security_file_ioctl+0x89/0xb0 [ 473.476263] SyS_ioctl+0x8f/0xc0 [ 473.479776] ? do_vfs_ioctl+0x1060/0x1060 [ 473.483997] do_syscall_64+0x1e8/0x640 [ 473.488002] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 473.492938] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 473.498110] RIP: 0033:0x4598c7 [ 473.501456] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 473.510046] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004598c7 14:49:17 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:17 executing program 3: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x2, 0x1, 0xff) connect$inet(r4, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x29) r5 = open(&(0x7f0000000040)='./file0\x00', 0x42, 0x0) ftruncate(r5, 0x8007ffc) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f000095dffc)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000040)={r7}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r5, 0x84, 0x7b, &(0x7f00000002c0)={r7, 0x7}, &(0x7f0000000300)=0x8) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x2, 0x121140) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r8, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) mknodat(r8, &(0x7f00000000c0)='./file0\x00', 0x80, 0x9) r9 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r9) r10 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r10, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) ioctl$FUSE_DEV_IOC_CLONE(r9, 0x8004e500, &(0x7f0000000240)=r10) [ 473.517437] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 473.524789] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 473.532402] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 473.539934] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:17 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:17 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:17 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:17 executing program 5 (fault-call:2 fault-nth:41): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) [ 473.751130] FAULT_INJECTION: forcing a failure. [ 473.751130] name failslab, interval 1, probability 0, space 0, times 0 [ 473.762903] CPU: 1 PID: 20807 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 473.769945] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 473.779461] Call Trace: [ 473.782057] dump_stack+0x138/0x197 [ 473.785692] should_fail.cold+0x10f/0x159 [ 473.789844] should_failslab+0xdb/0x130 [ 473.793989] kmem_cache_alloc_node_trace+0x280/0x770 [ 473.799112] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 473.804564] __kmalloc_node_track_caller+0x3d/0x80 [ 473.809614] __kmalloc_reserve.isra.0+0x40/0xe0 [ 473.814285] __alloc_skb+0xcf/0x500 [ 473.817942] ? skb_scrub_packet+0x4b0/0x4b0 [ 473.822281] ? netlink_has_listeners+0x20a/0x330 [ 473.827046] kobject_uevent_env+0x781/0xc23 [ 473.831396] kobject_uevent+0x20/0x26 [ 473.835247] lo_ioctl+0x11e7/0x1ce0 [ 473.838883] ? loop_probe+0x160/0x160 [ 473.842688] blkdev_ioctl+0x96b/0x1860 [ 473.846589] ? blkpg_ioctl+0x980/0x980 14:49:17 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 473.850575] ? __might_sleep+0x93/0xb0 [ 473.854471] ? __fget+0x210/0x370 [ 473.857957] block_ioctl+0xde/0x120 [ 473.857968] ? blkdev_fallocate+0x3b0/0x3b0 [ 473.857980] do_vfs_ioctl+0x7ae/0x1060 [ 473.857992] ? selinux_file_mprotect+0x5d0/0x5d0 [ 473.858004] ? lock_downgrade+0x740/0x740 [ 473.866023] ? ioctl_preallocate+0x1c0/0x1c0 [ 473.866036] ? __fget+0x237/0x370 [ 473.866056] ? security_file_ioctl+0x89/0xb0 [ 473.866069] SyS_ioctl+0x8f/0xc0 [ 473.866078] ? do_vfs_ioctl+0x1060/0x1060 [ 473.866091] do_syscall_64+0x1e8/0x640 [ 473.866101] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 473.909177] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 473.914368] RIP: 0033:0x4598c7 [ 473.917644] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 473.925363] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004598c7 [ 473.932640] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 473.940179] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 14:49:17 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 473.947464] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 473.954745] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:18 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:18 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x611c01, 0x0) recvfrom$inet6(r1, &(0x7f0000000040)=""/127, 0x7f, 0x1, &(0x7f00000000c0)={0xa, 0x4e23, 0x5, @mcast2}, 0x1c) 14:49:18 executing program 5 (fault-call:2 fault-nth:42): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) 14:49:18 executing program 2: clone(0x31220017f8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 14:49:18 executing program 1: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000480)=""/250, 0xfffffffffffffdec) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r2 = inotify_init() readv(r2, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:18 executing program 3: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) getsockopt$inet6_buf(r0, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = open(&(0x7f0000000340)='./bus\x00', 0x341042, 0x1) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000300)=0xc08, 0x4) ftruncate(r1, 0x80003) sendfile(r0, r1, &(0x7f00000000c0), 0x8000fffffffe) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x200000, 0x0) r3 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000700)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x6c08280}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14, r3, 0x400, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0x5b6a9fd551b8622c}}, 0x20040801) r4 = socket(0x11, 0x2, 0x0) r5 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r4, 0x89e3, 0x0) ioctl$NBD_SET_SOCK(r5, 0xab00, r4) sendmsg$NET_DM_CMD_START(r4, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40200800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r3, 0x8, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x30010863}, 0x48001) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8600000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r3, 0x200, 0x70bd2c, 0x25dfdbff, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x8030}, 0x11) openat$cgroup_ro(r2, &(0x7f0000000280)='cpuacct.usage_sys\x00', 0x275a, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x6, 0x0, 0x7f, 0x200, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x8) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x91d3, 0x4, @perf_bp={0x0, 0x8}, 0x200020000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x10) r6 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fallocate(r6, 0x0, 0x0, 0x1000f4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8000fffffffe) [ 474.267772] FAULT_INJECTION: forcing a failure. [ 474.267772] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 474.279623] CPU: 1 PID: 20836 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 474.287018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 474.296379] Call Trace: [ 474.298979] dump_stack+0x138/0x197 [ 474.302619] should_fail.cold+0x10f/0x159 [ 474.306778] __alloc_pages_nodemask+0x1d6/0x7a0 [ 474.311555] ? fs_reclaim_acquire+0x20/0x20 14:49:18 executing program 3: pipe(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="01"], 0x1) close(r2) fallocate(r1, 0x0, 0x40000, 0x4) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r1, 0x0, 0x8}) socket(0x10, 0x803, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000000010000000000000000000000000000000546b1f94134e4a71bfd8101fd74b8a3a07b9fa3f301fd07db103be444a34dd3da07594a6e8465b173e1fceb6abc719bc52fc1ccdc1c2f570a9ba1ab21d0ae173d3a02e237814f97b854244b6d2ccf7a07e5f1a1ec0343322abbb2c66e01044737da6c62bb3ddd40883fc0f5074de8840da9ea4059c58039315f2627e2b2c2f362bc5e2fdc61f8225d9a48fd6f30af59a539ed9056b857bd26b6e3ae4c11715518ca2ee35dee6a4cbe478304cc69be08b63b055191ea456057760dfd271116ceed8b06243910762f26d0fa543f3b1e7e1578f66e925aaf3b890a7bc05", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCADDDLCI(r3, 0x8980, &(0x7f0000000580)={'nr\x0fjc\x00\xff\x03\x00\x00\x00 \x00', 0x10001}) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000180)={0x1, 0x1ff}, 0x8) [ 474.315889] ? __alloc_pages_slowpath+0x2930/0x2930 [ 474.318390] block nbd3: Device being setup by another task [ 474.320922] cache_grow_begin+0x80/0x400 [ 474.320939] kmem_cache_alloc+0x6a6/0x780 [ 474.320950] ? selinux_file_mprotect+0x5d0/0x5d0 [ 474.320961] ? lock_downgrade+0x740/0x740 [ 474.320975] getname_flags+0xcb/0x580 [ 474.320987] SyS_mkdir+0x7e/0x200 [ 474.335322] block nbd3: Device being setup by another task [ 474.339631] ? SyS_mkdirat+0x210/0x210 [ 474.339645] ? do_syscall_64+0x53/0x640 [ 474.339655] ? SyS_mkdirat+0x210/0x210 [ 474.339665] do_syscall_64+0x1e8/0x640 [ 474.339676] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 474.377362] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 474.382644] RIP: 0033:0x458e77 [ 474.385833] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 474.393720] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458e77 [ 474.401007] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000100 [ 474.408279] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 474.415584] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 474.422854] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:18 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:18 executing program 5 (fault-call:2 fault-nth:43): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) 14:49:18 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 474.603902] FAULT_INJECTION: forcing a failure. [ 474.603902] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 474.615752] CPU: 1 PID: 20869 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 474.622785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 474.632150] Call Trace: [ 474.632172] dump_stack+0x138/0x197 [ 474.632192] should_fail.cold+0x10f/0x159 [ 474.632209] __alloc_pages_nodemask+0x1d6/0x7a0 [ 474.642591] ? fs_reclaim_acquire+0x20/0x20 14:49:18 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0xc4942, 0x0) ioctl$UI_SET_SWBIT(r2, 0x4004556d, 0xd) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) [ 474.642610] ? __alloc_pages_slowpath+0x2930/0x2930 [ 474.642636] cache_grow_begin+0x80/0x400 [ 474.642648] kmem_cache_alloc+0x6a6/0x780 [ 474.664872] ? selinux_file_mprotect+0x5d0/0x5d0 [ 474.669751] ? lock_downgrade+0x740/0x740 [ 474.673918] getname_flags+0xcb/0x580 [ 474.677735] SyS_mkdir+0x7e/0x200 [ 474.681212] ? SyS_mkdirat+0x210/0x210 [ 474.685094] ? do_syscall_64+0x53/0x640 [ 474.689064] ? SyS_mkdirat+0x210/0x210 [ 474.692947] do_syscall_64+0x1e8/0x640 [ 474.696823] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 474.701663] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 474.706840] RIP: 0033:0x458e77 [ 474.710018] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 474.717714] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458e77 [ 474.725057] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000100 [ 474.732418] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 474.739677] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 474.746937] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:18 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:18 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(0xffffffffffffffff, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:18 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(0xffffffffffffffff, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:18 executing program 5 (fault-call:2 fault-nth:44): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) [ 474.954122] FAULT_INJECTION: forcing a failure. [ 474.954122] name failslab, interval 1, probability 0, space 0, times 0 [ 474.970614] CPU: 0 PID: 20895 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 474.977659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 474.977680] Call Trace: [ 474.977702] dump_stack+0x138/0x197 [ 474.977727] should_fail.cold+0x10f/0x159 [ 474.977746] should_failslab+0xdb/0x130 [ 474.977759] kmem_cache_alloc+0x2d7/0x780 [ 474.977772] ? __debug_object_init+0x171/0x8e0 [ 474.977782] ? ext4_alloc_inode+0x1d/0x610 [ 474.977798] selinux_inode_alloc_security+0xb6/0x2a0 [ 474.977817] security_inode_alloc+0x94/0xd0 [ 475.024326] inode_init_always+0x552/0xaf0 [ 475.028578] alloc_inode+0x81/0x180 [ 475.032233] new_inode_pseudo+0x19/0xf0 [ 475.036219] new_inode+0x1f/0x40 [ 475.036235] __ext4_new_inode+0x32c/0x4860 [ 475.036258] ? avc_has_perm+0x2df/0x4b0 [ 475.036271] ? ext4_free_inode+0x1210/0x1210 [ 475.047844] ? dquot_get_next_dqblk+0x160/0x160 [ 475.047869] ext4_mkdir+0x331/0xc20 [ 475.047888] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 475.065578] ? security_inode_mkdir+0xd0/0x110 [ 475.065602] vfs_mkdir+0x3ca/0x610 [ 475.065614] SyS_mkdir+0x1b7/0x200 [ 475.077265] ? SyS_mkdirat+0x210/0x210 [ 475.081157] ? do_syscall_64+0x53/0x640 [ 475.085135] ? SyS_mkdirat+0x210/0x210 [ 475.089032] do_syscall_64+0x1e8/0x640 [ 475.093013] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 475.097872] entry_SYSCALL_64_after_hwframe+0x42/0xb7 14:49:19 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) close(0xffffffffffffffff) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(0xffffffffffffffff) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 14:49:19 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(0xffffffffffffffff, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:19 executing program 1: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r0, &(0x7f00000001c0), 0xfffffef3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r1 = inotify_init() readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:19 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 475.103067] RIP: 0033:0x458e77 [ 475.106340] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 475.114056] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458e77 [ 475.121333] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000100 [ 475.121339] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 475.121344] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 475.121349] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:19 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, 0x0, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:19 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x11, 0x2, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r1, 0x89e3, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r1) fsetxattr(r2, &(0x7f0000000100)=ANY=[@ANYBLOB='od\x00'/14], &(0x7f00000000c0)='\x00', 0x1, 0x1) 14:49:19 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:19 executing program 3: socket(0x200000000010, 0x2, 0x0) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lgetxattr(0x0, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) recvfrom$x25(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000700)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000540)='TIPCv2\x00') syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x3, 0x1) add_key(0x0, &(0x7f0000000480)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) request_key(&(0x7f00000004c0)='cifs.spnego\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0xffffffffffffffff) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) ppoll(0x0, 0x0, &(0x7f0000000080), &(0x7f0000000300), 0x8) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x700, &(0x7f0000000000)) r0 = socket(0x1, 0x5, 0x0) fsetxattr(r0, &(0x7f00000000c0)=@known='system.sockprotoname\x00', &(0x7f0000000600)='wlan1#wlan0!(nodevppp0vboxnet1wlan1[posix_acl_accessmd5sum\x00', 0x3b, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4100002}, 0xc, &(0x7f0000000440)={&(0x7f0000000200)=ANY=[@ANYBLOB="3007566e14c0c80a73e3f2513a44236acaab0000", @ANYRES16], 0x2}, 0x1, 0x0, 0x0, 0x4000}, 0x10000054) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 14:49:19 executing program 5 (fault-call:2 fault-nth:45): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) 14:49:19 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, 0x0, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 475.382236] block nbd2: Device being setup by another task 14:49:19 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(0xffffffffffffffff, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:19 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x200000, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000700)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x6c08280}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14, r2, 0x400, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0xfffffffffffffdb8}}, 0x20040801) r3 = socket(0x11, 0x2, 0x0) r4 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r3, 0x89e3, 0x0) ioctl$NBD_SET_SOCK(r4, 0xab00, r3) sendmsg$NET_DM_CMD_START(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40200800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x8, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x30010863}, 0x48001) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8600000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x200, 0x70bd2c, 0x25dfdbff, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x8030}, 0x11) ioctl$KDSETLED(r1, 0x4b32, 0x100000000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) ioctl$SG_SET_FORCE_PACK_ID(r5, 0x227b, &(0x7f0000000000)) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 475.499030] FAULT_INJECTION: forcing a failure. [ 475.499030] name failslab, interval 1, probability 0, space 0, times 0 [ 475.535916] CPU: 1 PID: 20945 Comm: syz-executor.5 Not tainted 4.14.149 #0 14:49:19 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, 0x0, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 475.543018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 475.552809] Call Trace: [ 475.552833] dump_stack+0x138/0x197 [ 475.552856] should_fail.cold+0x10f/0x159 [ 475.552873] should_failslab+0xdb/0x130 [ 475.559086] kmem_cache_alloc+0x2d7/0x780 [ 475.559102] ? __debug_object_init+0x171/0x8e0 [ 475.559115] ? ext4_alloc_inode+0x1d/0x610 [ 475.559140] selinux_inode_alloc_security+0xb6/0x2a0 [ 475.585936] security_inode_alloc+0x94/0xd0 [ 475.590274] inode_init_always+0x552/0xaf0 [ 475.594616] alloc_inode+0x81/0x180 14:49:19 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0), 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 475.598346] new_inode_pseudo+0x19/0xf0 [ 475.599958] block nbd2: Device being setup by another task [ 475.602408] new_inode+0x1f/0x40 [ 475.602421] __ext4_new_inode+0x32c/0x4860 [ 475.602444] ? avc_has_perm+0x2df/0x4b0 [ 475.602456] ? ext4_free_inode+0x1210/0x1210 [ 475.602473] ? dquot_get_next_dqblk+0x160/0x160 [ 475.602490] ext4_mkdir+0x331/0xc20 [ 475.632562] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 475.637464] ? security_inode_mkdir+0xd0/0x110 [ 475.642333] vfs_mkdir+0x3ca/0x610 [ 475.646130] SyS_mkdir+0x1b7/0x200 [ 475.649677] ? SyS_mkdirat+0x210/0x210 [ 475.653716] ? do_syscall_64+0x53/0x640 [ 475.657750] ? SyS_mkdirat+0x210/0x210 [ 475.661651] do_syscall_64+0x1e8/0x640 [ 475.665549] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 475.670407] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 475.675770] RIP: 0033:0x458e77 [ 475.678963] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 475.686691] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458e77 [ 475.693971] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000100 [ 475.701255] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 475.708534] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 475.715812] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:20 executing program 1: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:20 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(0xffffffffffffffff, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:20 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x200000, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000700)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x6c08280}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14, r2, 0x400, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0xfffffffffffffdb8}}, 0x20040801) r3 = socket(0x11, 0x2, 0x0) r4 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r3, 0x89e3, 0x0) ioctl$NBD_SET_SOCK(r4, 0xab00, r3) sendmsg$NET_DM_CMD_START(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40200800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x8, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x30010863}, 0x48001) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8600000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x200, 0x70bd2c, 0x25dfdbff, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x8030}, 0x11) ioctl$TCSETX(r1, 0x5433, &(0x7f0000000000)={0xff, 0x4, [0x200, 0x7, 0x200, 0x7], 0x51}) r5 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0x2a}}, 0x1c) getsockopt$SO_COOKIE(r5, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) getsockopt$inet6_buf(r5, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000340)='./bus\x00', 0x341042, 0x1) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r6, 0x80003) sendfile(r5, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r6, 0x84, 0xc, &(0x7f0000000040)=0x20, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x8b1a, &(0x7f0000002440)='wlan0\x00') 14:49:20 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0), 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:20 executing program 5 (fault-call:2 fault-nth:46): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) [ 475.990226] net_ratelimit: 23 callbacks suppressed [ 475.990232] protocol 88fb is buggy, dev hsr_slave_0 [ 475.990563] protocol 88fb is buggy, dev hsr_slave_0 [ 475.995438] protocol 88fb is buggy, dev hsr_slave_1 [ 476.000415] protocol 88fb is buggy, dev hsr_slave_1 14:49:20 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(0xffffffffffffffff, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 476.108782] block nbd3: Device being setup by another task [ 476.125768] FAULT_INJECTION: forcing a failure. [ 476.125768] name failslab, interval 1, probability 0, space 0, times 0 [ 476.139440] CPU: 0 PID: 20979 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 476.146609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 476.156069] Call Trace: [ 476.158691] dump_stack+0x138/0x197 [ 476.162420] should_fail.cold+0x10f/0x159 [ 476.166600] should_failslab+0xdb/0x130 [ 476.170618] __kmalloc+0x71/0x7a0 [ 476.174093] ? mls_compute_context_len+0x3f6/0x5e0 [ 476.179049] ? context_struct_to_string+0x33a/0x630 [ 476.184101] context_struct_to_string+0x33a/0x630 [ 476.189085] ? security_load_policycaps+0x320/0x320 [ 476.194139] security_sid_to_context_core+0x18a/0x200 [ 476.199375] security_sid_to_context_force+0x2b/0x40 [ 476.204511] selinux_inode_init_security+0x493/0x700 [ 476.209642] ? selinux_inode_create+0x30/0x30 [ 476.214151] ? kfree+0x20a/0x270 [ 476.217671] security_inode_init_security+0x18d/0x360 [ 476.222885] ? ext4_init_acl+0x1f0/0x1f0 [ 476.226971] ? security_kernel_post_read_file+0xd0/0xd0 [ 476.230095] protocol 88fb is buggy, dev hsr_slave_0 [ 476.232347] ? posix_acl_create+0xf5/0x3a0 [ 476.232400] ? ext4_set_acl+0x400/0x400 [ 476.232413] ? lock_downgrade+0x740/0x740 [ 476.232428] ext4_init_security+0x34/0x40 [ 476.232442] __ext4_new_inode+0x3385/0x4860 14:49:20 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, 0x0, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 476.232460] ? ext4_free_inode+0x1210/0x1210 [ 476.237589] protocol 88fb is buggy, dev hsr_slave_1 [ 476.241700] ? dquot_get_next_dqblk+0x160/0x160 [ 476.241716] ext4_mkdir+0x331/0xc20 [ 476.241730] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 476.241744] ? security_inode_mkdir+0xd0/0x110 [ 476.241754] vfs_mkdir+0x3ca/0x610 [ 476.241766] SyS_mkdir+0x1b7/0x200 [ 476.241777] ? SyS_mkdirat+0x210/0x210 [ 476.241788] ? do_syscall_64+0x53/0x640 [ 476.241798] ? SyS_mkdirat+0x210/0x210 [ 476.304575] do_syscall_64+0x1e8/0x640 14:49:20 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, 0x0, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 476.308567] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 476.313433] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 476.318636] RIP: 0033:0x458e77 [ 476.321834] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 476.329555] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458e77 [ 476.336847] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000100 [ 476.344361] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 14:49:20 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0), 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 476.353128] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 476.360438] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:20 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) r1 = getpid() tkill(r1, 0x31) r2 = socket(0x8, 0x6, 0x36) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000000)={0x3, 'veth1\x00', 0x3}, 0x18) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCLINUX4(r3, 0x541c, &(0x7f00000000c0)) close(r0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 14:49:20 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x4, 0x8000) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000040)) r2 = socket$packet(0x11, 0x2, 0x300) creat(0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) tkill(0x0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r4, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x4000, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000002c0), 0x4) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) creat(&(0x7f0000000340)='./file0\x00', 0x10) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r7 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(0xffffffffffffffff, 0x0) r8 = gettid() r9 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r9, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r9, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) getsockopt$inet6_buf(r9, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendto$inet6(r9, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r10 = open(&(0x7f0000000340)='./bus\x00', 0x341042, 0x1) setsockopt$SO_TIMESTAMPING(r9, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r10, 0x80003) sendfile(r9, r10, &(0x7f00000000c0), 0x8000fffffffe) ioctl$LOOP_SET_CAPACITY(r10, 0x4c07) process_vm_writev(r8, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x35c}], 0x329, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x299, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYRES32]) sendfile(0xffffffffffffffff, r7, 0x0, 0x2008000fffffffe) socket$inet_tcp(0x2, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x8}, 0x1c) syz_emit_ethernet(0x6e, &(0x7f00000001c0)=ANY=[@ANYBLOB="ffffffffffff0180c28903009100070081001f0086dd607660510030b99c3a00fe8000000000000000000000000000aaff020000000000000000000000000001860090780007080060c5961e4000cd17161e036563f19746286247638800000000000000000000000000000000400011050000000000000000002000000001"], 0x0) 14:49:20 executing program 5 (fault-call:2 fault-nth:47): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) [ 476.549983] protocol 88fb is buggy, dev hsr_slave_0 [ 476.555364] protocol 88fb is buggy, dev hsr_slave_1 [ 476.556183] FAULT_INJECTION: forcing a failure. [ 476.556183] name failslab, interval 1, probability 0, space 0, times 0 [ 476.572090] CPU: 1 PID: 21004 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 476.579197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 476.588552] Call Trace: [ 476.591147] dump_stack+0x138/0x197 [ 476.594884] should_fail.cold+0x10f/0x159 [ 476.599172] should_failslab+0xdb/0x130 [ 476.603155] __kmalloc+0x71/0x7a0 [ 476.606617] ? mls_compute_context_len+0x3f6/0x5e0 [ 476.611556] ? context_struct_to_string+0x33a/0x630 [ 476.616584] context_struct_to_string+0x33a/0x630 [ 476.621443] ? security_load_policycaps+0x320/0x320 [ 476.621459] security_sid_to_context_core+0x18a/0x200 [ 476.631723] security_sid_to_context_force+0x2b/0x40 [ 476.631736] selinux_inode_init_security+0x493/0x700 [ 476.631748] ? selinux_inode_create+0x30/0x30 [ 476.631757] ? kfree+0x20a/0x270 [ 476.631774] security_inode_init_security+0x18d/0x360 [ 476.655205] ? ext4_init_acl+0x1f0/0x1f0 [ 476.659370] ? security_kernel_post_read_file+0xd0/0xd0 [ 476.664847] ? posix_acl_create+0xf5/0x3a0 [ 476.669216] ? ext4_set_acl+0x400/0x400 [ 476.673306] ? lock_downgrade+0x740/0x740 [ 476.677816] ext4_init_security+0x34/0x40 [ 476.681956] __ext4_new_inode+0x3385/0x4860 [ 476.686516] ? ext4_free_inode+0x1210/0x1210 [ 476.690939] ? dquot_get_next_dqblk+0x160/0x160 [ 476.695600] ext4_mkdir+0x331/0xc20 [ 476.699215] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 476.703874] ? security_inode_mkdir+0xd0/0x110 [ 476.708443] vfs_mkdir+0x3ca/0x610 [ 476.712136] SyS_mkdir+0x1b7/0x200 [ 476.715664] ? SyS_mkdirat+0x210/0x210 [ 476.719832] ? do_syscall_64+0x53/0x640 [ 476.723798] ? SyS_mkdirat+0x210/0x210 [ 476.727711] do_syscall_64+0x1e8/0x640 [ 476.731732] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 476.736590] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 476.741783] RIP: 0033:0x458e77 [ 476.744974] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 476.752689] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458e77 [ 476.760825] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000100 [ 476.768092] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 476.775358] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 476.782632] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 [ 476.795345] audit: type=1800 audit(1571323760.779:207): pid=21013 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="sda1" ino=17156 res=0 14:49:20 executing program 1: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:20 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, 0x0, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:20 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{0x0}], 0x1) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:20 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4818010}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r2, 0x200, 0x70bd26, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x1080}, 0x4000000) close(r0) socket(0x13, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 14:49:20 executing program 5 (fault-call:2 fault-nth:48): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) 14:49:20 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0), 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:20 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{0x0}], 0x1) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 476.975018] FAULT_INJECTION: forcing a failure. [ 476.975018] name failslab, interval 1, probability 0, space 0, times 0 [ 476.994430] CPU: 0 PID: 21028 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 477.001670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 477.011024] Call Trace: [ 477.013640] dump_stack+0x138/0x197 [ 477.017278] should_fail.cold+0x10f/0x159 [ 477.021439] should_failslab+0xdb/0x130 14:49:21 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0), 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 477.025411] kmem_cache_alloc+0x2d7/0x780 [ 477.029556] ? rcu_read_lock_sched_held+0x110/0x130 [ 477.030043] protocol 88fb is buggy, dev hsr_slave_0 [ 477.034566] ? __mark_inode_dirty+0x2b7/0x1040 [ 477.039728] protocol 88fb is buggy, dev hsr_slave_1 [ 477.044188] ext4_mb_new_blocks+0x509/0x3990 [ 477.044200] ? ext4_find_extent+0x709/0x960 [ 477.044220] ext4_ext_map_blocks+0x26cd/0x4fa0 [ 477.044240] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 477.044251] ? __lock_is_held+0xb6/0x140 [ 477.044268] ? lock_acquire+0x16f/0x430 [ 477.076208] ext4_map_blocks+0x881/0x17c0 [ 477.080567] ? ext4_issue_zeroout+0x160/0x160 [ 477.085073] ? __brelse+0x50/0x60 [ 477.088554] ext4_getblk+0xac/0x450 [ 477.092193] ? ext4_iomap_begin+0x8a0/0x8a0 [ 477.096609] ? ext4_free_inode+0x1210/0x1210 [ 477.101038] ext4_bread+0x6e/0x1a0 [ 477.104585] ? ext4_getblk+0x450/0x450 [ 477.108568] ext4_append+0x14b/0x360 [ 477.112292] ext4_mkdir+0x531/0xc20 [ 477.115932] ? ext4_init_dot_dotdot+0x4c0/0x4c0 14:49:21 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0), 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 477.120775] ? security_inode_mkdir+0xd0/0x110 [ 477.127052] vfs_mkdir+0x3ca/0x610 [ 477.130608] SyS_mkdir+0x1b7/0x200 [ 477.134158] ? SyS_mkdirat+0x210/0x210 [ 477.138113] ? do_syscall_64+0x53/0x640 [ 477.142100] ? SyS_mkdirat+0x210/0x210 [ 477.145992] do_syscall_64+0x1e8/0x640 [ 477.149887] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 477.154745] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 477.159939] RIP: 0033:0x458e77 [ 477.163154] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 14:49:21 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{0x0}], 0x1) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 477.171001] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458e77 [ 477.178276] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000100 [ 477.185550] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 477.192822] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 477.200298] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:21 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, 0x0, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='events\x00\x00\x00\xc7\xaa\xff\x0f\xb0\xc7\x9b\x93\x91\xe4\xaedY\xd8\x00\x00\x00\x00\x00', 0xf0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x40086607, &(0x7f0000000000)={0x79f1a8b474f6b668, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80000000}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)) socket(0x8, 0x5, 0x3) fchownat(0xffffffffffffffff, &(0x7f0000000500)='./bus\x00', 0x0, 0x0, 0x1000) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) tkill(0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) getresuid(0x0, &(0x7f00000017c0), &(0x7f0000001800)) r3 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fchownat(r3, &(0x7f0000000500)='./bus\x00', 0x0, 0x0, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001a00)={{{@in=@local, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000001940)=0x1ea) creat(&(0x7f0000000140)='./bus\x00', 0x0) geteuid() getegid() getpgrp(0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) setuid(0x0) creat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) fchownat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$UHID_DESTROY(r5, &(0x7f0000000300), 0x4) r6 = socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f0000000200)) dup2(0xffffffffffffffff, 0xffffffffffffffff) r7 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet_tcp_int(r7, 0x6, 0x0, 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000001980)='/proc/self/attr/current\x00', 0x2, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000019c0)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(0x0) keyctl$get_persistent(0x16, r8, 0x0) getgid() r9 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000001e40)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001f00)={{{@in=@multicast1}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000002000)=0xe8) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r11 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet_tcp_int(r11, 0x6, 0x22, 0x0, 0x0) r12 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r12, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) accept4$inet6(r12, 0x0, &(0x7f0000001b00), 0x1000) fstat(r9, &(0x7f0000004c80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000020c0), &(0x7f0000002100)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002200)) r13 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r14) r15 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, r14, r15) stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) r16 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r16, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) fcntl$getownex(r16, 0x10, &(0x7f0000002300)) getresgid(&(0x7f0000000540), 0x0, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000500)='./bus\x00', 0x0, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002340)) r17 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r17, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x22, 0x0, 0x0) r18 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r18, 0x0, &(0x7f0000000200)) r19 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet_tcp_int(r19, 0x6, 0x22, 0x0, 0x0) r20 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$UHID_DESTROY(r20, 0x0, 0x0) r21 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) r22 = openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r22, 0x6, 0x22, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r24 = getpid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r25, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r26, 0x0) sendmmsg$unix(r23, &(0x7f0000002dc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000002b40)=[@cred={{0x1c, 0x1, 0x2, {r24, r26}}}], 0x20}], 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000025c0)={0x14, 0x3, &(0x7f0000000580)=ANY=[@ANYRES16=r26, @ANYRES32=r20, @ANYBLOB="000000000000000095000000000000003b5557", @ANYRES32=r21, @ANYBLOB="e55f7c278343c1f7008000008000009a61e790bb3463e4f64aa31376e60ee4aed693bdc6c5e861945bd77f920f08a287e630e98be74d7083a948de2e4e6ac42a3d16ca5ba30f2b613cead3442e2950f4c3b2e19beb6c7bfd960da49efe0cb2a12fff897cde6add239116d02e9acf6e05"], &(0x7f00000002c0)='syzkaller\x00', 0xaf, 0xf6, &(0x7f0000002440)=""/246, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002540)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002580)={0x2}, 0x10}, 0x70) r27 = gettid() ptrace$setopts(0x4206, r27, 0x0, 0x0) tkill(r27, 0x0) ptrace$setregs(0xffffffffffffffff, r27, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000004040)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r28) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) creat(&(0x7f0000000140)='./bus\x00', 0x0) getresgid(0x0, 0x0, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000500)='./bus\x00', 0x0, 0x0, 0x1000) r29 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet_tcp_int(r29, 0x6, 0x22, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x22, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) accept$unix(0xffffffffffffffff, 0x0, 0x0) r30 = gettid() ptrace$setregs(0xd, r30, 0x0, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r31 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r31, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(0x0) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, r32, 0x0) creat(&(0x7f0000000140)='./bus\x00', 0x0) getresgid(0x0, 0x0, 0x0) r33 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r33, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000300), 0x4) socket(0x10, 0x803, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) r34 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_persistent(0x16, 0x0, r34) getegid() setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) r35 = gettid() ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r35, 0x39) ptrace$setregs(0xd, r35, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) syz_open_procfs(r35, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(0x0, 0x39) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) r36 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r36, 0x1, 0x11, &(0x7f0000000240), 0x0) setuid(0x0) r37 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, r37, 0xfffffffffffffffd) lstat(&(0x7f00000042c0)='./file0\x00', &(0x7f0000004300)) r38 = creat(0x0, 0x0) getresgid(&(0x7f0000000540), 0x0, 0x0) fchownat(r38, 0x0, 0x0, 0x0, 0x0) 14:49:21 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{0x0}], 0x1) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:21 executing program 1: ioprio_set$pid(0x1, 0x0, 0x7fff) pipe(&(0x7f0000000440)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:21 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{0x0}], 0x1) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:21 executing program 5 (fault-call:2 fault-nth:49): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) [ 477.475578] audit: type=1800 audit(1571323761.379:208): pid=21051 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="sda1" ino=17156 res=0 [ 477.571958] FAULT_INJECTION: forcing a failure. [ 477.571958] name failslab, interval 1, probability 0, space 0, times 0 [ 477.583877] CPU: 0 PID: 21061 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 477.590927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 477.600522] Call Trace: [ 477.603118] dump_stack+0x138/0x197 [ 477.606840] should_fail.cold+0x10f/0x159 [ 477.611023] ? __es_tree_search.isra.0+0x15f/0x1c0 [ 477.615952] should_failslab+0xdb/0x130 [ 477.620042] kmem_cache_alloc+0x47/0x780 [ 477.624105] __es_insert_extent+0x26c/0xe60 [ 477.628669] ext4_es_insert_extent+0x1f0/0x590 [ 477.633260] ? check_preemption_disabled+0x3c/0x250 [ 477.638289] ? ext4_es_find_delayed_extent_range+0x960/0x960 [ 477.644182] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 477.649674] ? ext4_es_find_delayed_extent_range+0x31d/0x960 [ 477.655491] ext4_ext_put_gap_in_cache+0xcb/0x110 [ 477.660343] ? ext4_zeroout_es+0x170/0x170 [ 477.664577] ? ext4_find_extent+0x64c/0x960 [ 477.668932] ext4_ext_map_blocks+0x1d4b/0x4fa0 [ 477.673514] ? save_trace+0x290/0x290 [ 477.673527] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 477.673533] ? __lock_is_held+0xb6/0x140 [ 477.673547] ? lock_acquire+0x16f/0x430 [ 477.673556] ? ext4_map_blocks+0x402/0x17c0 [ 477.673573] ext4_map_blocks+0xd3c/0x17c0 [ 477.673584] ? __lock_is_held+0xb6/0x140 [ 477.673596] ? check_preemption_disabled+0x3c/0x250 [ 477.673609] ? ext4_issue_zeroout+0x160/0x160 [ 477.673620] ? __brelse+0x50/0x60 [ 477.673635] ext4_getblk+0xac/0x450 [ 477.673646] ? ext4_iomap_begin+0x8a0/0x8a0 [ 477.673656] ? ext4_free_inode+0x1210/0x1210 [ 477.673670] ext4_bread+0x6e/0x1a0 [ 477.685764] EXT4-fs warning (device sda1): ext4_group_extend:1764: will only finish group (524288 blocks, 256 new) [ 477.686636] ? ext4_getblk+0x450/0x450 [ 477.686654] ext4_append+0x14b/0x360 [ 477.686666] ext4_mkdir+0x531/0xc20 [ 477.686684] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 477.713254] EXT4-fs warning (device sda1): ext4_group_extend:1770: can't read last block, resize aborted [ 477.716479] ? security_inode_mkdir+0xd0/0x110 [ 477.716494] vfs_mkdir+0x3ca/0x610 [ 477.716508] SyS_mkdir+0x1b7/0x200 [ 477.716520] ? SyS_mkdirat+0x210/0x210 [ 477.716529] ? do_syscall_64+0x53/0x640 [ 477.716539] ? SyS_mkdirat+0x210/0x210 [ 477.769183] do_syscall_64+0x1e8/0x640 [ 477.769195] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 477.769213] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 477.769222] RIP: 0033:0x458e77 [ 477.769229] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000246 [ 477.784752] ORIG_RAX: 0000000000000053 14:49:21 executing program 1: ioprio_set$pid(0x1, 0x0, 0x7fff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:21 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{0x0}], 0x1) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:21 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:21 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, 0x0, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='events\x00\x00\x00\xc7\xaa\xff\x0f\xb0\xc7\x9b\x93\x91\xe4\xaedY\xd8\x00\x00\x00\x00\x00', 0xf0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x40086607, &(0x7f0000000000)={0x79f1a8b474f6b668, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80000000}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)) socket(0x8, 0x5, 0x3) fchownat(0xffffffffffffffff, &(0x7f0000000500)='./bus\x00', 0x0, 0x0, 0x1000) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) tkill(0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) getresuid(0x0, &(0x7f00000017c0), &(0x7f0000001800)) r3 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fchownat(r3, &(0x7f0000000500)='./bus\x00', 0x0, 0x0, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001a00)={{{@in=@local, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000001940)=0x1ea) creat(&(0x7f0000000140)='./bus\x00', 0x0) geteuid() getegid() getpgrp(0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) setuid(0x0) creat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) fchownat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$UHID_DESTROY(r5, &(0x7f0000000300), 0x4) r6 = socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f0000000200)) dup2(0xffffffffffffffff, 0xffffffffffffffff) r7 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet_tcp_int(r7, 0x6, 0x0, 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000001980)='/proc/self/attr/current\x00', 0x2, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000019c0)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(0x0) keyctl$get_persistent(0x16, r8, 0x0) getgid() r9 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000001e40)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001f00)={{{@in=@multicast1}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000002000)=0xe8) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r11 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet_tcp_int(r11, 0x6, 0x22, 0x0, 0x0) r12 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r12, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) accept4$inet6(r12, 0x0, &(0x7f0000001b00), 0x1000) fstat(r9, &(0x7f0000004c80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000020c0), &(0x7f0000002100)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002200)) r13 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r14) r15 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, r14, r15) stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) r16 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r16, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) fcntl$getownex(r16, 0x10, &(0x7f0000002300)) getresgid(&(0x7f0000000540), 0x0, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000500)='./bus\x00', 0x0, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002340)) r17 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r17, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x22, 0x0, 0x0) r18 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r18, 0x0, &(0x7f0000000200)) r19 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet_tcp_int(r19, 0x6, 0x22, 0x0, 0x0) r20 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$UHID_DESTROY(r20, 0x0, 0x0) r21 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) r22 = openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r22, 0x6, 0x22, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r24 = getpid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r25, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r26, 0x0) sendmmsg$unix(r23, &(0x7f0000002dc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000002b40)=[@cred={{0x1c, 0x1, 0x2, {r24, r26}}}], 0x20}], 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000025c0)={0x14, 0x3, &(0x7f0000000580)=ANY=[@ANYRES16=r26, @ANYRES32=r20, @ANYBLOB="000000000000000095000000000000003b5557", @ANYRES32=r21, @ANYBLOB="e55f7c278343c1f7008000008000009a61e790bb3463e4f64aa31376e60ee4aed693bdc6c5e861945bd77f920f08a287e630e98be74d7083a948de2e4e6ac42a3d16ca5ba30f2b613cead3442e2950f4c3b2e19beb6c7bfd960da49efe0cb2a12fff897cde6add239116d02e9acf6e05"], &(0x7f00000002c0)='syzkaller\x00', 0xaf, 0xf6, &(0x7f0000002440)=""/246, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002540)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002580)={0x2}, 0x10}, 0x70) r27 = gettid() ptrace$setopts(0x4206, r27, 0x0, 0x0) tkill(r27, 0x0) ptrace$setregs(0xffffffffffffffff, r27, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000004040)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r28) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) creat(&(0x7f0000000140)='./bus\x00', 0x0) getresgid(0x0, 0x0, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000500)='./bus\x00', 0x0, 0x0, 0x1000) r29 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet_tcp_int(r29, 0x6, 0x22, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x22, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) accept$unix(0xffffffffffffffff, 0x0, 0x0) r30 = gettid() ptrace$setregs(0xd, r30, 0x0, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r31 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r31, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(0x0) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, r32, 0x0) creat(&(0x7f0000000140)='./bus\x00', 0x0) getresgid(0x0, 0x0, 0x0) r33 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r33, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000300), 0x4) socket(0x10, 0x803, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) r34 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_persistent(0x16, 0x0, r34) getegid() setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) r35 = gettid() ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r35, 0x39) ptrace$setregs(0xd, r35, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) syz_open_procfs(r35, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(0x0, 0x39) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) r36 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r36, 0x1, 0x11, &(0x7f0000000240), 0x0) setuid(0x0) r37 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, r37, 0xfffffffffffffffd) lstat(&(0x7f00000042c0)='./file0\x00', &(0x7f0000004300)) r38 = creat(0x0, 0x0) getresgid(&(0x7f0000000540), 0x0, 0x0) fchownat(r38, 0x0, 0x0, 0x0, 0x0) 14:49:21 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000280)="17c1e395700c7cff915495aa19e49aa62ee399fbbbb0ab73ae5994612313a5c7b8146e51bd1c1183ae814d4a31136992593ad6d89950e49787edaecf979ad5ac54150645e5bf90f58be7f5049220240d4c46a9e51e530e33fc2c437e2b2dd57e9616a5fe2575a8b566b5d12d2f36134967033de53211bee3f9db2243087105f97e0be93329ea595305a0ab8499df553b3a6686a5d33ed4fb5f53e2af4812389e5dd16fa2e8c0ee96c62bc413d63907e4f5ce", 0xb2) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000140)={0x4000, &(0x7f0000000100), 0x0, r0, 0x1}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f0000000180)={0xa, {0x80000000, 0x1000, 0x2, 0x7}}) close(r1) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r1) socket(0x0, 0x0, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/checkreqprot\x00', 0x44080, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r2, 0x110, 0x2, &(0x7f0000000340)='cgroup[\"keyring', 0xf) ioctl$CAPI_GET_MANUFACTURER(0xffffffffffffffff, 0xc0044306, &(0x7f0000000000)) openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x72000, 0x0) 14:49:21 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 477.784759] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458e77 [ 477.784765] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000100 [ 477.784771] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 477.784776] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 477.784784] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:21 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 477.897710] EXT4-fs warning (device sda1): ext4_group_extend:1764: will only finish group (524288 blocks, 256 new) [ 477.918670] EXT4-fs warning (device sda1): ext4_group_extend:1770: can't read last block, resize aborted 14:49:21 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, 0x0, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='events\x00\x00\x00\xc7\xaa\xff\x0f\xb0\xc7\x9b\x93\x91\xe4\xaedY\xd8\x00\x00\x00\x00\x00', 0xf0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x40086607, &(0x7f0000000000)={0x79f1a8b474f6b668, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80000000}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)) socket(0x8, 0x5, 0x3) fchownat(0xffffffffffffffff, &(0x7f0000000500)='./bus\x00', 0x0, 0x0, 0x1000) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) tkill(0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) getresuid(0x0, &(0x7f00000017c0), &(0x7f0000001800)) r3 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fchownat(r3, &(0x7f0000000500)='./bus\x00', 0x0, 0x0, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001a00)={{{@in=@local, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000001940)=0x1ea) creat(&(0x7f0000000140)='./bus\x00', 0x0) geteuid() getegid() getpgrp(0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) setuid(0x0) creat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) fchownat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$UHID_DESTROY(r5, &(0x7f0000000300), 0x4) r6 = socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f0000000200)) dup2(0xffffffffffffffff, 0xffffffffffffffff) r7 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet_tcp_int(r7, 0x6, 0x0, 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000001980)='/proc/self/attr/current\x00', 0x2, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000019c0)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(0x0) keyctl$get_persistent(0x16, r8, 0x0) getgid() r9 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000001e40)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001f00)={{{@in=@multicast1}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000002000)=0xe8) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r11 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet_tcp_int(r11, 0x6, 0x22, 0x0, 0x0) r12 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r12, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) accept4$inet6(r12, 0x0, &(0x7f0000001b00), 0x1000) fstat(r9, &(0x7f0000004c80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000020c0), &(0x7f0000002100)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002200)) r13 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r14) r15 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, r14, r15) stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) r16 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r16, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) fcntl$getownex(r16, 0x10, &(0x7f0000002300)) getresgid(&(0x7f0000000540), 0x0, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000500)='./bus\x00', 0x0, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002340)) r17 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r17, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x22, 0x0, 0x0) r18 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r18, 0x0, &(0x7f0000000200)) r19 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet_tcp_int(r19, 0x6, 0x22, 0x0, 0x0) r20 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$UHID_DESTROY(r20, 0x0, 0x0) r21 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) r22 = openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r22, 0x6, 0x22, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r24 = getpid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r25, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r26, 0x0) sendmmsg$unix(r23, &(0x7f0000002dc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000002b40)=[@cred={{0x1c, 0x1, 0x2, {r24, r26}}}], 0x20}], 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000025c0)={0x14, 0x3, &(0x7f0000000580)=ANY=[@ANYRES16=r26, @ANYRES32=r20, @ANYBLOB="000000000000000095000000000000003b5557", @ANYRES32=r21, @ANYBLOB="e55f7c278343c1f7008000008000009a61e790bb3463e4f64aa31376e60ee4aed693bdc6c5e861945bd77f920f08a287e630e98be74d7083a948de2e4e6ac42a3d16ca5ba30f2b613cead3442e2950f4c3b2e19beb6c7bfd960da49efe0cb2a12fff897cde6add239116d02e9acf6e05"], &(0x7f00000002c0)='syzkaller\x00', 0xaf, 0xf6, &(0x7f0000002440)=""/246, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002540)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002580)={0x2}, 0x10}, 0x70) r27 = gettid() ptrace$setopts(0x4206, r27, 0x0, 0x0) tkill(r27, 0x0) ptrace$setregs(0xffffffffffffffff, r27, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000004040)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r28) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) creat(&(0x7f0000000140)='./bus\x00', 0x0) getresgid(0x0, 0x0, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000500)='./bus\x00', 0x0, 0x0, 0x1000) r29 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet_tcp_int(r29, 0x6, 0x22, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x22, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) accept$unix(0xffffffffffffffff, 0x0, 0x0) r30 = gettid() ptrace$setregs(0xd, r30, 0x0, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r31 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r31, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(0x0) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, r32, 0x0) creat(&(0x7f0000000140)='./bus\x00', 0x0) getresgid(0x0, 0x0, 0x0) r33 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r33, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000300), 0x4) socket(0x10, 0x803, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) r34 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_persistent(0x16, 0x0, r34) getegid() setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) r35 = gettid() ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r35, 0x39) ptrace$setregs(0xd, r35, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) syz_open_procfs(r35, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(0x0, 0x39) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) r36 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r36, 0x1, 0x11, &(0x7f0000000240), 0x0) setuid(0x0) r37 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, r37, 0xfffffffffffffffd) lstat(&(0x7f00000042c0)='./file0\x00', &(0x7f0000004300)) r38 = creat(0x0, 0x0) getresgid(&(0x7f0000000540), 0x0, 0x0) fchownat(r38, 0x0, 0x0, 0x0, 0x0) 14:49:21 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000340)='./bus\x00', 0x341042, 0x1) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r2, 0x80003) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)=""/214, &(0x7f0000000180)=0xd6) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) prlimit64(r3, 0x6, &(0x7f0000000100)={0x6, 0xffff}, &(0x7f0000000140)) sendfile(r1, r2, &(0x7f00000000c0), 0x8000fffffffe) close(r2) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 14:49:22 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 478.025737] audit: type=1400 audit(1571323762.009:209): avc: denied { getrlimit } for pid=21098 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=process permissive=1 [ 478.044627] EXT4-fs warning (device sda1): ext4_group_extend:1764: will only finish group (524288 blocks, 256 new) [ 478.097986] EXT4-fs warning (device sda1): ext4_group_extend:1770: can't read last block, resize aborted 14:49:22 executing program 5 (fault-call:2 fault-nth:50): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) 14:49:22 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, 0x0, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='events\x00\x00\x00\xc7\xaa\xff\x0f\xb0\xc7\x9b\x93\x91\xe4\xaedY\xd8\x00\x00\x00\x00\x00', 0xf0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x40086607, &(0x7f0000000000)={0x79f1a8b474f6b668, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80000000}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)) socket(0x8, 0x5, 0x3) fchownat(0xffffffffffffffff, &(0x7f0000000500)='./bus\x00', 0x0, 0x0, 0x1000) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) tkill(0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) getresuid(0x0, &(0x7f00000017c0), &(0x7f0000001800)) r3 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fchownat(r3, &(0x7f0000000500)='./bus\x00', 0x0, 0x0, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001a00)={{{@in=@local, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000001940)=0x1ea) creat(&(0x7f0000000140)='./bus\x00', 0x0) geteuid() getegid() getpgrp(0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) setuid(0x0) creat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) fchownat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$UHID_DESTROY(r5, &(0x7f0000000300), 0x4) r6 = socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f0000000200)) dup2(0xffffffffffffffff, 0xffffffffffffffff) r7 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet_tcp_int(r7, 0x6, 0x0, 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000001980)='/proc/self/attr/current\x00', 0x2, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000019c0)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(0x0) keyctl$get_persistent(0x16, r8, 0x0) getgid() r9 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000001e40)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001f00)={{{@in=@multicast1}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000002000)=0xe8) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r11 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet_tcp_int(r11, 0x6, 0x22, 0x0, 0x0) r12 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r12, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) accept4$inet6(r12, 0x0, &(0x7f0000001b00), 0x1000) fstat(r9, &(0x7f0000004c80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000020c0), &(0x7f0000002100)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002200)) r13 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r14) r15 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, r14, r15) stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) r16 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r16, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) fcntl$getownex(r16, 0x10, &(0x7f0000002300)) getresgid(&(0x7f0000000540), 0x0, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000500)='./bus\x00', 0x0, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002340)) r17 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r17, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x22, 0x0, 0x0) r18 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r18, 0x0, &(0x7f0000000200)) r19 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet_tcp_int(r19, 0x6, 0x22, 0x0, 0x0) r20 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$UHID_DESTROY(r20, 0x0, 0x0) r21 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) r22 = openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r22, 0x6, 0x22, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r24 = getpid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r25, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r26, 0x0) sendmmsg$unix(r23, &(0x7f0000002dc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000002b40)=[@cred={{0x1c, 0x1, 0x2, {r24, r26}}}], 0x20}], 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000025c0)={0x14, 0x3, &(0x7f0000000580)=ANY=[@ANYRES16=r26, @ANYRES32=r20, @ANYBLOB="000000000000000095000000000000003b5557", @ANYRES32=r21, @ANYBLOB="e55f7c278343c1f7008000008000009a61e790bb3463e4f64aa31376e60ee4aed693bdc6c5e861945bd77f920f08a287e630e98be74d7083a948de2e4e6ac42a3d16ca5ba30f2b613cead3442e2950f4c3b2e19beb6c7bfd960da49efe0cb2a12fff897cde6add239116d02e9acf6e05"], &(0x7f00000002c0)='syzkaller\x00', 0xaf, 0xf6, &(0x7f0000002440)=""/246, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002540)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002580)={0x2}, 0x10}, 0x70) r27 = gettid() ptrace$setopts(0x4206, r27, 0x0, 0x0) tkill(r27, 0x0) ptrace$setregs(0xffffffffffffffff, r27, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000004040)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r28) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) creat(&(0x7f0000000140)='./bus\x00', 0x0) getresgid(0x0, 0x0, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000500)='./bus\x00', 0x0, 0x0, 0x1000) r29 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet_tcp_int(r29, 0x6, 0x22, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x22, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) accept$unix(0xffffffffffffffff, 0x0, 0x0) r30 = gettid() ptrace$setregs(0xd, r30, 0x0, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r31 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r31, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(0x0) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, r32, 0x0) creat(&(0x7f0000000140)='./bus\x00', 0x0) getresgid(0x0, 0x0, 0x0) r33 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r33, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000300), 0x4) socket(0x10, 0x803, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) r34 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_persistent(0x16, 0x0, r34) getegid() setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) r35 = gettid() ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r35, 0x39) ptrace$setregs(0xd, r35, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) syz_open_procfs(r35, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(0x0, 0x39) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) r36 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r36, 0x1, 0x11, &(0x7f0000000240), 0x0) setuid(0x0) r37 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, r37, 0xfffffffffffffffd) lstat(&(0x7f00000042c0)='./file0\x00', &(0x7f0000004300)) r38 = creat(0x0, 0x0) getresgid(&(0x7f0000000540), 0x0, 0x0) fchownat(r38, 0x0, 0x0, 0x0, 0x0) [ 478.209468] FAULT_INJECTION: forcing a failure. [ 478.209468] name failslab, interval 1, probability 0, space 0, times 0 [ 478.226733] CPU: 1 PID: 21112 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 478.233784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 478.243234] Call Trace: [ 478.246009] dump_stack+0x138/0x197 [ 478.249817] should_fail.cold+0x10f/0x159 [ 478.253977] should_failslab+0xdb/0x130 [ 478.257959] kmem_cache_alloc+0x2d7/0x780 [ 478.262292] ? rcu_read_lock_sched_held+0x110/0x130 [ 478.267328] ? __mark_inode_dirty+0x2b7/0x1040 [ 478.272091] ext4_mb_new_blocks+0x509/0x3990 [ 478.276540] ? ext4_find_extent+0x709/0x960 [ 478.280875] ext4_ext_map_blocks+0x26cd/0x4fa0 [ 478.285469] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 478.290492] ? __lock_is_held+0xb6/0x140 [ 478.294586] ? lock_acquire+0x16f/0x430 [ 478.298577] ext4_map_blocks+0x881/0x17c0 [ 478.302744] ? ext4_issue_zeroout+0x160/0x160 [ 478.307329] ? __brelse+0x50/0x60 [ 478.310794] ext4_getblk+0xac/0x450 [ 478.314425] ? ext4_iomap_begin+0x8a0/0x8a0 [ 478.318750] ? ext4_free_inode+0x1210/0x1210 [ 478.323173] ext4_bread+0x6e/0x1a0 [ 478.326717] ? ext4_getblk+0x450/0x450 [ 478.330609] ext4_append+0x14b/0x360 [ 478.334322] ext4_mkdir+0x531/0xc20 [ 478.337954] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 478.342630] ? security_inode_mkdir+0xd0/0x110 [ 478.347214] vfs_mkdir+0x3ca/0x610 [ 478.350757] SyS_mkdir+0x1b7/0x200 [ 478.354296] ? SyS_mkdirat+0x210/0x210 14:49:22 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 478.358184] ? do_syscall_64+0x53/0x640 [ 478.362164] ? SyS_mkdirat+0x210/0x210 [ 478.366055] do_syscall_64+0x1e8/0x640 [ 478.369944] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 478.375141] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 478.376660] EXT4-fs warning (device sda1): ext4_group_extend:1764: will only finish group (524288 blocks, 256 new) [ 478.380406] RIP: 0033:0x458e77 [ 478.380412] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 478.380423] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458e77 14:49:22 executing program 5 (fault-call:2 fault-nth:51): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) [ 478.380429] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000100 [ 478.380434] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 478.380438] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 478.380443] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:22 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) socket(0x0, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x200000, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000700)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x6c08280}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14, r2, 0x400, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0xfffffffffffffdb8}}, 0x20040801) r3 = socket(0x11, 0x2, 0x0) r4 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r3, 0x89e3, 0x0) ioctl$NBD_SET_SOCK(r4, 0xab00, r3) sendmsg$NET_DM_CMD_START(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40200800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x8, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x30010863}, 0x48001) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8600000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x200, 0x70bd2c, 0x25dfdbff, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x8030}, 0x11) sendmsg$nl_route(r1, 0x0, 0x0) [ 478.502594] EXT4-fs warning (device sda1): ext4_group_extend:1770: can't read last block, resize aborted [ 478.572260] FAULT_INJECTION: forcing a failure. [ 478.572260] name failslab, interval 1, probability 0, space 0, times 0 [ 478.585067] CPU: 1 PID: 21129 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 478.592740] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 478.602287] Call Trace: [ 478.604892] dump_stack+0x138/0x197 [ 478.608721] should_fail.cold+0x10f/0x159 [ 478.614014] ? __es_tree_search.isra.0+0x15f/0x1c0 [ 478.620228] should_failslab+0xdb/0x130 [ 478.624224] kmem_cache_alloc+0x47/0x780 [ 478.628475] ? ext4_es_can_be_merged+0x16e/0x230 [ 478.633329] __es_insert_extent+0x26c/0xe60 [ 478.637810] ext4_es_insert_extent+0x1f0/0x590 [ 478.642464] ? ext4_es_find_delayed_extent_range+0x960/0x960 [ 478.648275] ext4_map_blocks+0xab1/0x17c0 [ 478.652432] ? ext4_issue_zeroout+0x160/0x160 [ 478.656940] ? __brelse+0x50/0x60 [ 478.660404] ext4_getblk+0xac/0x450 [ 478.664058] ? ext4_iomap_begin+0x8a0/0x8a0 [ 478.668384] ? ext4_free_inode+0x1210/0x1210 [ 478.668401] ext4_bread+0x6e/0x1a0 [ 478.668412] ? ext4_getblk+0x450/0x450 [ 478.668428] ext4_append+0x14b/0x360 [ 478.668442] ext4_mkdir+0x531/0xc20 [ 478.676585] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 478.676603] ? security_inode_mkdir+0xd0/0x110 [ 478.676617] vfs_mkdir+0x3ca/0x610 [ 478.676630] SyS_mkdir+0x1b7/0x200 [ 478.704740] ? SyS_mkdirat+0x210/0x210 [ 478.708645] ? do_syscall_64+0x53/0x640 [ 478.712633] ? SyS_mkdirat+0x210/0x210 [ 478.714381] block nbd2: Device being setup by another task 14:49:22 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:22 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 478.716529] do_syscall_64+0x1e8/0x640 [ 478.716540] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 478.716559] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 478.716566] RIP: 0033:0x458e77 [ 478.716574] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 478.747299] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458e77 [ 478.754566] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000100 [ 478.754571] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 14:49:22 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:22 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000180)='./file0\x00', 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, 0x0}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r3, 0x0, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$ax25_int(r5, 0x101, 0x8, &(0x7f0000000000), &(0x7f0000000100)=0x4) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) setsockopt$RDS_CONG_MONITOR(r4, 0x114, 0x6, &(0x7f0000000140)=0xffffffff, 0x473) ioctl$KVM_IRQFD(r2, 0x4020ae76, 0x0) 14:49:22 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f00000000c0)=0x8001) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r1, 0x4010aeab, &(0x7f0000000000)={0x5}) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 478.754576] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 478.754581] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:22 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:22 executing program 5 (fault-call:2 fault-nth:52): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) 14:49:22 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 478.995969] FAULT_INJECTION: forcing a failure. [ 478.995969] name failslab, interval 1, probability 0, space 0, times 0 [ 479.007723] CPU: 1 PID: 21165 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 479.015432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 479.024803] Call Trace: [ 479.027396] dump_stack+0x138/0x197 [ 479.031198] should_fail.cold+0x10f/0x159 [ 479.035383] ? __es_tree_search.isra.0+0x15f/0x1c0 [ 479.040495] should_failslab+0xdb/0x130 14:49:23 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 479.044492] kmem_cache_alloc+0x47/0x780 [ 479.048568] ? ext4_es_can_be_merged+0x16e/0x230 [ 479.053339] __es_insert_extent+0x26c/0xe60 [ 479.057677] ext4_es_insert_extent+0x1f0/0x590 [ 479.062281] ? ext4_es_find_delayed_extent_range+0x960/0x960 [ 479.068187] ext4_map_blocks+0xab1/0x17c0 [ 479.072343] ? ext4_issue_zeroout+0x160/0x160 [ 479.077238] ? __brelse+0x50/0x60 [ 479.080702] ext4_getblk+0xac/0x450 [ 479.084335] ? ext4_iomap_begin+0x8a0/0x8a0 [ 479.088736] ? ext4_free_inode+0x1210/0x1210 14:49:23 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 479.093330] ext4_bread+0x6e/0x1a0 [ 479.096878] ? ext4_getblk+0x450/0x450 [ 479.100763] ext4_append+0x14b/0x360 [ 479.104644] ext4_mkdir+0x531/0xc20 [ 479.108300] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 479.112971] ? security_inode_mkdir+0xd0/0x110 [ 479.117737] vfs_mkdir+0x3ca/0x610 [ 479.121279] SyS_mkdir+0x1b7/0x200 [ 479.124828] ? SyS_mkdirat+0x210/0x210 [ 479.128808] ? do_syscall_64+0x53/0x640 [ 479.132790] ? SyS_mkdirat+0x210/0x210 [ 479.136684] do_syscall_64+0x1e8/0x640 [ 479.140572] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 479.145424] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 479.150707] RIP: 0033:0x458e77 [ 479.153898] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 479.161858] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458e77 [ 479.169402] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000100 [ 479.176937] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 479.184296] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 14:49:23 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 479.192026] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:23 executing program 5 (fault-call:2 fault-nth:53): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) [ 479.348650] FAULT_INJECTION: forcing a failure. [ 479.348650] name failslab, interval 1, probability 0, space 0, times 0 [ 479.362299] CPU: 0 PID: 21181 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 479.369355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 479.378724] Call Trace: [ 479.381343] dump_stack+0x138/0x197 [ 479.384985] should_fail.cold+0x10f/0x159 [ 479.389158] should_failslab+0xdb/0x130 [ 479.393272] __kmalloc_track_caller+0x2ec/0x790 [ 479.397951] ? strndup_user+0x62/0xf0 [ 479.401752] memdup_user+0x26/0xa0 [ 479.405301] strndup_user+0x62/0xf0 [ 479.408929] SyS_mount+0x3c/0x120 [ 479.412522] ? copy_mnt_ns+0x8c0/0x8c0 [ 479.416425] do_syscall_64+0x1e8/0x640 [ 479.420440] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 479.425302] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 479.430501] RIP: 0033:0x45c4aa [ 479.433692] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 479.441404] RAX: ffffffffffffffda RBX: 00007f39d7da8b40 RCX: 000000000045c4aa [ 479.448782] RDX: 00007f39d7da8ae0 RSI: 0000000020000100 RDI: 00007f39d7da8b00 [ 479.456062] RBP: 0000000000000001 R08: 00007f39d7da8b40 R09: 00007f39d7da8ae0 [ 479.463335] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 479.470608] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:23 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:23 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:23 executing program 5 (fault-call:2 fault-nth:54): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) 14:49:23 executing program 3: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:23 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000100)=@ipv4_newaddr={0x4c, 0x14, 0x2, 0x70bd27, 0x25dfdbfb, {0x2, 0x8ae6b0cae2007268, 0x24, 0x0, r2}, [@IFA_FLAGS={0x8, 0x8, 0x9cee786a1e09f3dd}, @IFA_FLAGS={0x8, 0x8, 0x2}, @IFA_CACHEINFO={0x14, 0x6, {0x4, 0x5, 0x6, 0x473}}, @IFA_LOCAL={0x8, 0x2, @empty}, @IFA_FLAGS={0x8, 0x8, 0x80}]}, 0x4c}}, 0x80) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_TSC(0x19, &(0x7f0000000000)) 14:49:23 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 479.719242] FAULT_INJECTION: forcing a failure. [ 479.719242] name failslab, interval 1, probability 0, space 0, times 0 [ 479.738750] CPU: 0 PID: 21196 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 479.745819] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 479.755193] Call Trace: [ 479.757792] dump_stack+0x138/0x197 [ 479.757814] should_fail.cold+0x10f/0x159 [ 479.757832] should_failslab+0xdb/0x130 [ 479.769665] __kmalloc_track_caller+0x2ec/0x790 [ 479.774350] ? strndup_user+0x62/0xf0 [ 479.774364] memdup_user+0x26/0xa0 [ 479.774375] strndup_user+0x62/0xf0 [ 479.774390] SyS_mount+0x3c/0x120 [ 479.788788] ? copy_mnt_ns+0x8c0/0x8c0 [ 479.792692] do_syscall_64+0x1e8/0x640 [ 479.796591] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 479.801467] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 479.806700] RIP: 0033:0x45c4aa [ 479.809893] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 14:49:23 executing program 2: prctl$PR_SET_SECUREBITS(0x1c, 0x1) clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 14:49:23 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(0xffffffffffffffff, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:23 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(0xffffffffffffffff) socket(0x0, 0x0, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f00000000c0)=""/105) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 479.817614] RAX: ffffffffffffffda RBX: 00007f39d7da8b40 RCX: 000000000045c4aa [ 479.824893] RDX: 00007f39d7da8ae0 RSI: 0000000020000100 RDI: 00007f39d7da8b00 [ 479.832260] RBP: 0000000000000001 R08: 00007f39d7da8b40 R09: 00007f39d7da8ae0 [ 479.839539] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 479.846833] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:23 executing program 3: r0 = socket$inet6(0xa, 0x18000b, 0x1) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000003a40)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x4, 0x0) recvmmsg(r2, &(0x7f0000003240)=[{{0x0, 0x0, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000140)=""/176, 0xb0}, {&(0x7f0000000240)=""/56, 0x38}], 0x3}, 0x20}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) syslog(0x14, 0x0, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = getpid() ptrace$pokeuser(0x6, r5, 0x388, 0xfffffffffffffffe) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) 14:49:23 executing program 5 (fault-call:2 fault-nth:55): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) 14:49:23 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(0xffffffffffffffff, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 480.005145] FAULT_INJECTION: forcing a failure. [ 480.005145] name failslab, interval 1, probability 0, space 0, times 0 [ 480.036261] CPU: 1 PID: 21233 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 480.043476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 480.052849] Call Trace: [ 480.056854] dump_stack+0x138/0x197 [ 480.060551] should_fail.cold+0x10f/0x159 [ 480.064803] should_failslab+0xdb/0x130 [ 480.069109] kmem_cache_alloc+0x2d7/0x780 [ 480.073253] ? fs_reclaim_acquire+0x20/0x20 [ 480.078033] ? find_held_lock+0x35/0x130 [ 480.082274] getname_flags+0xcb/0x580 [ 480.086196] user_path_at_empty+0x2f/0x50 [ 480.092259] do_mount+0x12b/0x27d0 [ 480.095797] ? copy_mount_options+0x5c/0x2f0 [ 480.100212] ? rcu_read_lock_sched_held+0x110/0x130 [ 480.105248] ? copy_mount_string+0x40/0x40 [ 480.109538] ? _copy_from_user+0x99/0x110 [ 480.113779] ? copy_mount_options+0x1fe/0x2f0 [ 480.118376] SyS_mount+0xab/0x120 [ 480.121826] ? copy_mnt_ns+0x8c0/0x8c0 [ 480.125729] do_syscall_64+0x1e8/0x640 [ 480.129615] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 480.134484] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 480.139663] RIP: 0033:0x45c4aa [ 480.142840] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 480.150672] RAX: ffffffffffffffda RBX: 00007f39d7da8b40 RCX: 000000000045c4aa [ 480.157938] RDX: 00007f39d7da8ae0 RSI: 0000000020000100 RDI: 00007f39d7da8b00 [ 480.165299] RBP: 0000000000000001 R08: 00007f39d7da8b40 R09: 00007f39d7da8ae0 [ 480.172662] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 480.180033] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:24 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:24 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x9) close(r0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 14:49:24 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(0xffffffffffffffff, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:24 executing program 5 (fault-call:2 fault-nth:56): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) 14:49:24 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYRESDEC, @ANYRES16, @ANYRESHEX, @ANYRES16, @ANYBLOB="c6292fdfe740aba82d39d236ab243347a178fb1fb08609f55c860b7274ce37fba681b500d0c814f800b8011a484e65b37e866369e0751b310c2e4c24e0ef4ea10fc5291793ea975cc22ca7c07ced93b665d9e45871f7687d63f44d4d868a2bf9e07a4bbe73665b0a0fe52f521c2b62"], 0xfc7c) fallocate(r0, 0x8, 0x0, 0x8000) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000180)) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000340)='./bus\x00', 0x341042, 0x1) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r2, 0x80003) sendfile(r1, r2, &(0x7f00000000c0), 0x8000fffffffe) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r2, 0x4010640d, &(0x7f0000000040)={0x0, 0x3a6}) 14:49:24 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 480.585468] FAULT_INJECTION: forcing a failure. [ 480.585468] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 480.597552] CPU: 1 PID: 21255 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 480.604577] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 480.610581] audit: type=1804 audit(1571323764.599:210): pid=21253 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir645343520/syzkaller.NbN550/509/file0" dev="sda1" ino=17670 res=1 [ 480.613934] Call Trace: [ 480.613955] dump_stack+0x138/0x197 [ 480.613977] should_fail.cold+0x10f/0x159 [ 480.651715] __alloc_pages_nodemask+0x1d6/0x7a0 [ 480.656398] ? fs_reclaim_acquire+0x20/0x20 [ 480.660737] ? __alloc_pages_slowpath+0x2930/0x2930 [ 480.665774] cache_grow_begin+0x80/0x400 [ 480.669851] kmem_cache_alloc_trace+0x6b2/0x790 [ 480.674628] ? kasan_check_write+0x14/0x20 [ 480.678876] copy_mount_options+0x5c/0x2f0 [ 480.683119] SyS_mount+0x87/0x120 [ 480.686572] ? copy_mnt_ns+0x8c0/0x8c0 [ 480.690466] do_syscall_64+0x1e8/0x640 [ 480.690703] audit: type=1804 audit(1571323764.649:211): pid=21264 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir645343520/syzkaller.NbN550/509/file0" dev="sda1" ino=17670 res=1 [ 480.694398] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 480.694417] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 480.694426] RIP: 0033:0x45c4aa 14:49:24 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, 0x0, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:24 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, 0x0, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:24 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, 0x0, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:24 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) r1 = getuid() getresgid(&(0x7f0000000000)=0x0, &(0x7f00000000c0), &(0x7f0000000100)) write$P9_RGETATTR(r0, &(0x7f0000000140)={0xa0, 0x19, 0x2, {0x800, {0x4}, 0x82, r1, r2, 0xffffffffffff0632, 0xe7b3, 0x4, 0x9, 0x78b, 0x8, 0x8, 0xab, 0x7, 0x3f, 0x3, 0x0, 0x1, 0x6, 0x5}}, 0xa0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 480.694431] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 480.742936] RAX: ffffffffffffffda RBX: 00007f39d7da8b40 RCX: 000000000045c4aa [ 480.750823] RDX: 00007f39d7da8ae0 RSI: 0000000020000100 RDI: 00007f39d7da8b00 [ 480.758241] RBP: 0000000000000001 R08: 00007f39d7da8b40 R09: 00007f39d7da8ae0 [ 480.765516] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 480.772814] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:24 executing program 3: pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_SET_RESERVED_SIZE(r2, 0x2275, &(0x7f0000000100)=0x50d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000002, 0x11, r2, 0x0) io_setup(0x0, 0x0) inotify_init1(0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='clear_refs\x00') pwritev(r3, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) write(r1, &(0x7f00000001c0), 0xfffffefc) r4 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r4, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r4, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) getsockopt$inet6_buf(r4, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = open(&(0x7f0000000340)='./bus\x00', 0x341042, 0x1) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r5, 0x80003) sendfile(r4, r5, &(0x7f00000000c0), 0x8000fffffffe) recvmmsg(r4, &(0x7f0000005e40)=[{{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/9, 0x9}, {&(0x7f0000000400)=""/119, 0x77}], 0x2}, 0x1}, {{&(0x7f0000000480)=@nl, 0x80, &(0x7f0000001b80)=[{&(0x7f0000000500)=""/81, 0x51}, {&(0x7f0000000580)=""/78, 0x4e}, {&(0x7f0000000640)=""/250, 0xfa}, {&(0x7f0000000740)=""/80, 0x50}, {&(0x7f00000007c0)=""/112, 0x70}, {&(0x7f0000000840)=""/181, 0xb5}, {&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000001900)=""/250, 0xfa}, {&(0x7f0000001a00)=""/193, 0xc1}, {&(0x7f0000001b00)=""/65, 0x41}], 0xa, &(0x7f0000001c40)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000002c40)=@caif=@dbg, 0x80, &(0x7f0000000140)=[{&(0x7f0000002cc0)=""/133, 0x85}, {&(0x7f0000002d80)=""/220, 0xdc}], 0x2, &(0x7f0000002e80)=""/88, 0x58}, 0x9}, {{&(0x7f0000002f00)=@nfc, 0x80, &(0x7f0000003500)=[{&(0x7f0000002f80)=""/205, 0xcd}, {&(0x7f0000003080)=""/81, 0x51}, {&(0x7f0000003100)=""/61, 0x3d}, {&(0x7f0000003140)=""/137, 0x89}, {&(0x7f0000003200)=""/198, 0xc6}, {&(0x7f0000003300)=""/207, 0xcf}, {&(0x7f0000003400)=""/245, 0xf5}], 0x7}}, {{&(0x7f0000003580)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000037c0)=[{&(0x7f0000003600)=""/131, 0x83}, {&(0x7f00000036c0)=""/10, 0xa}, {&(0x7f0000003700)=""/52, 0x34}, {&(0x7f0000003740)=""/86, 0x56}], 0x4}, 0x9}, {{&(0x7f0000003800)=@generic, 0x80, &(0x7f0000005a80)=[{&(0x7f0000003880)=""/4096, 0x1000}, {&(0x7f0000004880)=""/154, 0x9a}, {&(0x7f0000004940)=""/162, 0xa2}, {&(0x7f0000004a00)=""/4096, 0x1000}, {&(0x7f0000005a00)=""/120, 0x78}], 0x5, &(0x7f0000005b00)=""/69, 0x45}, 0x8e}, {{&(0x7f0000005b80)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f0000005d40)=[{&(0x7f0000005c00)=""/165, 0xa5}, {&(0x7f0000005cc0)=""/49, 0x31}, {&(0x7f0000005d00)=""/47, 0x2f}], 0x3, &(0x7f0000005d80)=""/155, 0x9b}, 0xfff}], 0x7, 0x100, &(0x7f0000006000)) setsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000006040)=@int=0x6776, 0x4) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, &(0x7f0000006080)=0x1) r7 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r7, 0xc0185500, &(0x7f0000000080)={0x20, 0xd12458daea4eefcd, 0x0, 0x0, 0xfeb1, 0x0, 0x0}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) 14:49:24 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0), 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 480.890672] audit: type=1400 audit(1571323764.879:212): avc: denied { map } for pid=21277 comm="syz-executor.3" path="/dev/sg0" dev="devtmpfs" ino=15052 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=chr_file permissive=1 [ 481.270189] net_ratelimit: 25 callbacks suppressed [ 481.270210] protocol 88fb is buggy, dev hsr_slave_0 [ 481.280840] protocol 88fb is buggy, dev hsr_slave_1 14:49:25 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:25 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x78) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000100)=ANY=[@ANYBLOB="0000004ebafe00", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, r3}, &(0x7f0000000340)=0x10) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x9, 0x6, 0x85c6, 0x9}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x48000) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000000)={r3, 0x6}, &(0x7f00000000c0)=0x8) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 14:49:25 executing program 5 (fault-call:2 fault-nth:57): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) 14:49:25 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0), 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:25 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 481.350019] protocol 88fb is buggy, dev hsr_slave_0 [ 481.355293] protocol 88fb is buggy, dev hsr_slave_1 14:49:25 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$unix(0x1, 0x6, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f00000000c0)={{0x9, 0x7f}, 0x0, 0x8000, 0xc000000, {0x0, 0x9}, 0xf0, 0x5404}) mmap$usbmon(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x1000000800) [ 481.447262] FAULT_INJECTION: forcing a failure. [ 481.447262] name failslab, interval 1, probability 0, space 0, times 0 [ 481.460427] CPU: 1 PID: 21303 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 481.467786] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 481.477146] Call Trace: [ 481.479747] dump_stack+0x138/0x197 [ 481.483403] should_fail.cold+0x10f/0x159 [ 481.487569] should_failslab+0xdb/0x130 [ 481.491556] kmem_cache_alloc+0x2d7/0x780 [ 481.495715] ? kmem_cache_alloc_trace+0x57a/0x790 [ 481.500565] ? find_held_lock+0x35/0x130 [ 481.504637] getname_flags+0xcb/0x580 [ 481.508444] user_path_at_empty+0x2f/0x50 [ 481.512604] do_mount+0x12b/0x27d0 [ 481.516758] ? copy_mount_options+0x5c/0x2f0 [ 481.521256] ? rcu_read_lock_sched_held+0x110/0x130 [ 481.526285] ? copy_mount_string+0x40/0x40 [ 481.530746] ? copy_mount_options+0x1fe/0x2f0 [ 481.535261] SyS_mount+0xab/0x120 [ 481.538725] ? copy_mnt_ns+0x8c0/0x8c0 [ 481.542621] do_syscall_64+0x1e8/0x640 14:49:25 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0), 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:25 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{0x0}], 0x1) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 481.546509] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 481.551385] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 481.556578] RIP: 0033:0x45c4aa [ 481.559768] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 481.567488] RAX: ffffffffffffffda RBX: 00007f39d7da8b40 RCX: 000000000045c4aa [ 481.574751] RDX: 00007f39d7da8ae0 RSI: 0000000020000100 RDI: 00007f39d7da8b00 [ 481.574757] RBP: 0000000000000001 R08: 00007f39d7da8b40 R09: 00007f39d7da8ae0 [ 481.574761] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 14:49:25 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4e23}, 0x1c) r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, &(0x7f0000000300)) 14:49:25 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{0x0}], 0x1) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 481.574765] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:25 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x200000, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000700)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x6c08280}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14, r2, 0x400, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0xfffffffffffffdb8}}, 0x20040801) r3 = socket(0x11, 0x2, 0x0) r4 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r3, 0x89e3, 0x0) ioctl$NBD_SET_SOCK(r4, 0xab00, r3) sendmsg$NET_DM_CMD_START(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40200800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x8, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x30010863}, 0x48001) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8600000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x200, 0x70bd2c, 0x25dfdbff, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x8030}, 0x11) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCADDDLCI(r5, 0x8980, &(0x7f0000000580)={'nr\x0fjc\x00\xff\x03\x00\x00\x00 \x00', 0x10001}) r6 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000700)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x6c08280}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14, r6, 0x400, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0xfffffffffffffdb8}}, 0x20040801) r7 = socket(0x11, 0x2, 0x0) r8 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r7, 0x89e3, 0x0) ioctl$NBD_SET_SOCK(r8, 0xab00, r7) sendmsg$NET_DM_CMD_START(r7, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40200800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r6, 0x8, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x30010863}, 0x48001) close(r7) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 14:49:25 executing program 5 (fault-call:2 fault-nth:58): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) [ 481.765200] block nbd2: Device being setup by another task [ 481.774631] block nbd2: Device being setup by another task [ 481.797679] FAULT_INJECTION: forcing a failure. [ 481.797679] name failslab, interval 1, probability 0, space 0, times 0 [ 481.820243] CPU: 1 PID: 21332 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 481.827398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 481.836929] Call Trace: [ 481.839523] dump_stack+0x138/0x197 [ 481.843159] should_fail.cold+0x10f/0x159 [ 481.847314] should_failslab+0xdb/0x130 [ 481.851305] kmem_cache_alloc+0x2d7/0x780 [ 481.855460] ? lock_downgrade+0x740/0x740 [ 481.859619] alloc_vfsmnt+0x28/0x7d0 [ 481.863470] vfs_kern_mount.part.0+0x2a/0x3d0 [ 481.867972] do_mount+0x417/0x27d0 [ 481.871539] ? copy_mount_options+0x5c/0x2f0 [ 481.876117] ? rcu_read_lock_sched_held+0x110/0x130 [ 481.881143] ? copy_mount_string+0x40/0x40 [ 481.885406] ? copy_mount_options+0x1fe/0x2f0 [ 481.889908] SyS_mount+0xab/0x120 [ 481.893538] ? copy_mnt_ns+0x8c0/0x8c0 [ 481.897432] do_syscall_64+0x1e8/0x640 [ 481.901362] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 481.906217] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 481.911400] RIP: 0033:0x45c4aa [ 481.914586] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 481.922384] RAX: ffffffffffffffda RBX: 00007f39d7da8b40 RCX: 000000000045c4aa [ 481.929943] RDX: 00007f39d7da8ae0 RSI: 0000000020000100 RDI: 00007f39d7da8b00 [ 481.937309] RBP: 0000000000000001 R08: 00007f39d7da8b40 R09: 00007f39d7da8ae0 [ 481.944690] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 481.951964] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 [ 481.989994] protocol 88fb is buggy, dev hsr_slave_0 [ 481.995297] protocol 88fb is buggy, dev hsr_slave_1 14:49:26 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:26 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{0x0}], 0x1) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:26 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr\x1c\xbdn\xa9\x00', 0x2}) r1 = memfd_create(&(0x7f00000001c0)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa6k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f\xf1vn|\x84F\xafc\x1c\xcc\xdbU\x1bG\x81\x84\xc6I\x146\xbc\xad\xddH\xe6C\x9e\xa9v\xff\x1b\x8b\x98\xd5pb\xae\xc7\x05\xaa\xa5K\x1bs\xb9\xb1\x9b\xf8$2\x8f,\xfa\x91\x85\t\xbe\xc1\x14y\xc4\x01\xa2F\xe0X;\xd4 \xd7\xef\x87K\xbaa]c\f,\xccwN\x87\x18\x86\x06\xe0\xb7|\x1e\n\\N\xfa^\x88\xb1\xac\xa4\xc3X\xb8Xf\x05\xd4\xcb\x84\x8aV\x88\xbc\x9dv_\x8e\xf6\x85rig\xdb\x0e\xd7s\x00'/212, 0x0) fallocate(r1, 0x20, 0x2000421, 0x1) write(r1, &(0x7f0000002000)='/', 0x1) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$VIDIOC_S_OUTPUT(r2, 0xc004562f, &(0x7f0000000080)=0x800) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") sendfile(r1, r1, &(0x7f0000000100), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x400454d1, &(0x7f00000000c0)) ioctl$VIDIOC_SUBDEV_G_FMT(r3, 0xc0585604, &(0x7f00000002c0)={0x1, 0x0, {0x80, 0x7, 0x2010, 0x7, 0x0, 0xb6893df078e52b13, 0x0, 0x3}}) 14:49:26 executing program 5 (fault-call:2 fault-nth:59): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) 14:49:26 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 482.230004] protocol 88fb is buggy, dev hsr_slave_0 [ 482.230007] protocol 88fb is buggy, dev hsr_slave_0 [ 482.235522] protocol 88fb is buggy, dev hsr_slave_1 [ 482.240569] protocol 88fb is buggy, dev hsr_slave_1 14:49:26 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 482.324503] FAULT_INJECTION: forcing a failure. [ 482.324503] name failslab, interval 1, probability 0, space 0, times 0 [ 482.342625] CPU: 0 PID: 21351 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 482.349670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 482.349676] Call Trace: [ 482.349692] dump_stack+0x138/0x197 [ 482.349712] should_fail.cold+0x10f/0x159 [ 482.349726] should_failslab+0xdb/0x130 [ 482.361685] kmem_cache_alloc+0x2d7/0x780 [ 482.361701] ? lock_downgrade+0x740/0x740 [ 482.361716] alloc_vfsmnt+0x28/0x7d0 [ 482.361731] vfs_kern_mount.part.0+0x2a/0x3d0 [ 482.369511] do_mount+0x417/0x27d0 [ 482.369522] ? copy_mount_options+0x5c/0x2f0 [ 482.369532] ? rcu_read_lock_sched_held+0x110/0x130 [ 482.369546] ? copy_mount_string+0x40/0x40 [ 482.369562] ? copy_mount_options+0x1fe/0x2f0 [ 482.369576] SyS_mount+0xab/0x120 [ 482.369584] ? copy_mnt_ns+0x8c0/0x8c0 [ 482.369596] do_syscall_64+0x1e8/0x640 14:49:26 executing program 5 (fault-call:2 fault-nth:60): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) [ 482.377684] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 482.377701] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 482.377710] RIP: 0033:0x45c4aa [ 482.377715] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 482.377727] RAX: ffffffffffffffda RBX: 00007f39d7da8b40 RCX: 000000000045c4aa [ 482.377733] RDX: 00007f39d7da8ae0 RSI: 0000000020000100 RDI: 00007f39d7da8b00 [ 482.377739] RBP: 0000000000000001 R08: 00007f39d7da8b40 R09: 00007f39d7da8ae0 [ 482.377745] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 482.377751] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 [ 482.584507] FAULT_INJECTION: forcing a failure. [ 482.584507] name failslab, interval 1, probability 0, space 0, times 0 [ 482.601968] CPU: 1 PID: 21365 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 482.609079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 482.618427] Call Trace: [ 482.621005] dump_stack+0x138/0x197 [ 482.624876] should_fail.cold+0x10f/0x159 [ 482.629021] should_failslab+0xdb/0x130 [ 482.632993] kmem_cache_alloc+0x2d7/0x780 [ 482.637127] ? check_preemption_disabled+0x3c/0x250 [ 482.642130] alloc_vfsmnt+0x28/0x7d0 [ 482.645856] vfs_kern_mount.part.0+0x2a/0x3d0 [ 482.650346] ? find_held_lock+0x35/0x130 [ 482.654402] vfs_kern_mount+0x40/0x60 [ 482.658190] btrfs_mount+0x3ce/0x2b28 [ 482.661971] ? lock_downgrade+0x740/0x740 [ 482.666110] ? find_held_lock+0x35/0x130 [ 482.670153] ? pcpu_alloc+0x3af/0x1050 [ 482.674031] ? btrfs_remount+0x11f0/0x11f0 [ 482.678256] ? rcu_read_lock_sched_held+0x110/0x130 [ 482.683259] ? __lockdep_init_map+0x10c/0x570 [ 482.687734] ? __lockdep_init_map+0x10c/0x570 [ 482.692229] mount_fs+0x97/0x2a1 [ 482.695679] vfs_kern_mount.part.0+0x5e/0x3d0 [ 482.700170] do_mount+0x417/0x27d0 [ 482.703702] ? copy_mount_string+0x40/0x40 [ 482.707917] ? copy_mount_options+0x151/0x2f0 [ 482.712397] ? __sanitizer_cov_trace_pc+0x4a/0x60 [ 482.717412] ? copy_mount_options+0x1fe/0x2f0 [ 482.721900] SyS_mount+0xab/0x120 [ 482.725358] ? copy_mnt_ns+0x8c0/0x8c0 [ 482.731236] do_syscall_64+0x1e8/0x640 [ 482.735106] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 482.740023] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 482.745199] RIP: 0033:0x45c4aa [ 482.748371] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 482.756060] RAX: ffffffffffffffda RBX: 00007f39d7da8b40 RCX: 000000000045c4aa [ 482.763313] RDX: 00007f39d7da8ae0 RSI: 0000000020000100 RDI: 00007f39d7da8b00 [ 482.770566] RBP: 0000000000000001 R08: 00007f39d7da8b40 R09: 00007f39d7da8ae0 [ 482.777817] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 482.785069] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:26 executing program 5 (fault-call:2 fault-nth:61): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) [ 482.882758] FAULT_INJECTION: forcing a failure. [ 482.882758] name failslab, interval 1, probability 0, space 0, times 0 [ 482.895146] CPU: 1 PID: 21371 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 482.902190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 482.911903] Call Trace: [ 482.914623] dump_stack+0x138/0x197 [ 482.918342] should_fail.cold+0x10f/0x159 [ 482.922521] should_failslab+0xdb/0x130 [ 482.926623] __kmalloc_track_caller+0x2ec/0x790 [ 482.931312] ? unwind_get_return_address+0x61/0xa0 [ 482.936233] ? __save_stack_trace+0x7b/0xd0 [ 482.940563] ? btrfs_parse_early_options+0xa3/0x310 [ 482.945688] kstrdup+0x3a/0x70 [ 482.948884] btrfs_parse_early_options+0xa3/0x310 [ 482.953718] ? btrfs_freeze+0xc0/0xc0 [ 482.957503] ? find_next_bit+0x28/0x30 [ 482.961376] ? pcpu_alloc+0xcf0/0x1050 [ 482.965266] ? find_held_lock+0x35/0x130 [ 482.969451] ? pcpu_alloc+0xcf0/0x1050 [ 482.973341] btrfs_mount+0x11d/0x2b28 [ 482.977149] ? lock_downgrade+0x740/0x740 [ 482.981306] ? find_held_lock+0x35/0x130 [ 482.985369] ? pcpu_alloc+0x3af/0x1050 [ 482.989262] ? _find_next_bit+0xee/0x120 [ 482.993329] ? check_preemption_disabled+0x3c/0x250 [ 482.998338] ? btrfs_remount+0x11f0/0x11f0 [ 483.002564] ? rcu_read_lock_sched_held+0x110/0x130 [ 483.007596] ? __lockdep_init_map+0x10c/0x570 [ 483.012096] ? __lockdep_init_map+0x10c/0x570 [ 483.016594] mount_fs+0x97/0x2a1 [ 483.019987] vfs_kern_mount.part.0+0x5e/0x3d0 [ 483.024489] do_mount+0x417/0x27d0 [ 483.028029] ? copy_mount_options+0x5c/0x2f0 [ 483.032439] ? rcu_read_lock_sched_held+0x110/0x130 [ 483.037462] ? copy_mount_string+0x40/0x40 [ 483.041703] ? copy_mount_options+0x1fe/0x2f0 [ 483.046213] SyS_mount+0xab/0x120 [ 483.049845] ? copy_mnt_ns+0x8c0/0x8c0 [ 483.053734] do_syscall_64+0x1e8/0x640 [ 483.057778] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 483.062756] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 483.067954] RIP: 0033:0x45c4aa [ 483.071127] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 14:49:27 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, 0x0, 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:27 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, 0x0, 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 483.078824] RAX: ffffffffffffffda RBX: 00007f39d7da8b40 RCX: 000000000045c4aa [ 483.086099] RDX: 00007f39d7da8ae0 RSI: 0000000020000100 RDI: 00007f39d7da8b00 [ 483.093356] RBP: 0000000000000001 R08: 00007f39d7da8b40 R09: 00007f39d7da8ae0 [ 483.100731] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 483.108015] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:28 executing program 5 (fault-call:2 fault-nth:62): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) 14:49:28 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:28 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x28001, 0x40002) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000340)='./bus\x00', 0x341042, 0x1) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r2, 0x80003) sendfile(r1, r2, &(0x7f00000000c0), 0x8000fffffffe) r3 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000700)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x6c08280}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14, r3, 0x400, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0xfffffffffffffdb8}}, 0x20040801) r4 = socket(0x11, 0x2, 0x0) r5 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r4, 0x89e3, 0x0) ioctl$NBD_SET_SOCK(r5, 0xab00, r4) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x200000, 0x0) r7 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000700)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x6c08280}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0xc, r7, 0x400, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0xfffffffffffffdb8}}, 0x20040801) r8 = socket(0x11, 0x2, 0x0) r9 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r8, 0x89e3, 0x0) ioctl$NBD_SET_SOCK(r9, 0xab00, r8) sendmsg$NET_DM_CMD_START(r8, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40200800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r7, 0x8, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x30010863}, 0x48001) sendmsg$NET_DM_CMD_STOP(r6, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8600000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r7, 0x200, 0x70bd2c, 0x25dfdbff, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x8030}, 0x11) r10 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r10, 0x0) ioctl$int_in(r10, 0x5452, 0x0) r11 = accept4$inet6(r0, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r11, 0x1, 0x1a, 0x0, 0xfffffdeb) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r12 = getpid() sched_setattr(r12, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r13 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r13, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r16 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) fcntl$setpipe(r16, 0x407, 0xfffffffffffffffc) write(r15, &(0x7f0000000340), 0x41395527) r17 = syz_open_dev$cec(0x0, 0x2, 0x2) dup3(0xffffffffffffffff, r17, 0x0) write$selinux_load(r15, &(0x7f00000002c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e7578698395d771139ef4c3e8ef91c5a51234e3735d3ba7eb5493d341776f26f22b673fe17a770b66f5326d73e75f162043f000e2512a041be2a987de0a1b71da0fb36fd7bf44b404454683453c3a9da8bf7c5e8c65080000000000000075301dd8e37adb657cf8f37173f1e568b3120e42ba4857676f3a758e8ae2f601a5c5b202e03711fb5d5d4eaac946a88ae724aa0eafb03bcb00b7147700000000"], 0xab) vmsplice(r14, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) r18 = creat(&(0x7f0000000580)='./bus\x00', 0x0) r19 = socket$inet6(0xa, 0x1, 0x0) r20 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x28001, 0x40002) ioctl$int_in(r20, 0x80006000005016, 0x0) sendto$inet6(r20, 0x0, 0x0, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0xffffffffffffff89) sendto$inet6(r19, &(0x7f00000009c0)="c7cfcaaa22e10542fca5c0195350f15147657e0bfc59d383a47190db88690e6fedc3040ab5809ae02a54cd429cc3338c5afa0c9dce3f91950d1f567f358ac21154159130e88cbb6c43197813b2f23f3e442f80877490b393408142ebcfea6821f543e5ee9e27032e2b75d78f1b79f5a6bb6f0645e267770ef7e8f3a92148091217450ce8581e54223eeb6486205a209bf1fe854d211c03f8c3140fc3979d824082990d119473d20e94f253c9621fac339560ae46cb24b88bf2d01559bb658e343257b90f233b81bc5c398be3bbddb23a1e5d37149eb0f4a333726cf6d5b7647306559155f1c69d6bfd145b83576f2df4d85f271fd4119db923e2412c66dd954eb59dddc7e1fd286a83971b2ba1c63b4f99702cf91f3d1ecffb8ae189c79b403805e83650c251a564942896f205640c23b0cf51fe9bd931f54a343794710a9cd53cef20938edddb2bfa3c1f72f8e79e41e30fb8f9d314abd999ba396521b6c10bec7bc9d0745a80299342f5cf89eb9d94044258fbb18cec1cdbbc016a773d3ae41e3e30248e716fd0873d31454902cbe7dcf7d644dfadc255d99652b5ed5a5b1a75e3ad49cf80178678402e9d3a755d009889b2e6138f81dc02eedcc353aceb2f7781aea08aa91be7e1e2416ba3d555b1f2237f68c5d7dcfcb1b917c292a35d6d7e7cf2cb1dd6dba5a50ce55c4638d7d38cb7afd8da02f281ab69392bc6531eb03eb97c1d075e3342c244861d04bcad8991b8f588e48ad7fe218d2f5e604bb31c59241245b485210fe418af3d6377b59d5ab128497efeced38cc5036b1f34cb89674b5179219f34b9e8e1849695d7c23cce77eb8f038ef9f2cd69d1c9e2d6b46610adbadbdad857a77f59d38cb5120709716b87c52a48de249b231d7e39985b8b58094c0d7b4c6d1671a8ff9d2daaca94df2adcff6420077df0ddbc66d00b141ffc6e28bed09a19056e52a905a72c99a04af56b22da83135808ba2bfe87a39753447e78500d16bdad52d97df73d4852a79e7ec6910701b712cfd58c62b3ade86cf6ff0cd78719fa1ae81640381cb33f4f6b03c913e820cf9eb9b5cf7df9c878596c9ac9444cad118673fe339b4b7287b310ecff4742bfea2612d79d418293f0dfe14bc819c466473438ad71ea3b1386d17a9038b1f5a9285481500f84f4c7eabbf2eb071a101c69cce8e7495bda4c28a4e88f6a258abf58579c290eeb742b2678daab3ecc8c2bf97d89e89472901e254dd63ca7d918f8a7523161e29b28f64b285da7bb4a17d0ad734c321623e246bb0b5aaa08e8e7ac42b74ba83c70a8ca80068400be6adc3f4b01ba1050b54e6e4cf72fb567fbd27b74b2bfa7b7cabc6938851c13c6df7d5aaca79afd89b5e925379b959c7929ddfa3399695343f435772d70e5cfa3550377d23f50011ad5657e94c464cd43eb85496fd3b03bcb2d9278ceb432194d9893ffa747dfe85309f256c910e31e81dcd3cd8a13744fc2874737a2ff34bf8c89f15da7cc0853434117d744e30360b38ef1a063f9ee506f048e9980054e6c5c5688d04ece6067ac55bccc9a7773a2c4e21c039d153622130faff9fd675d64ad7284bd011b9b224713a721b4b731cf342357642a1a0bb846f5be443b7e72e9825b5f3a078c6ae09e4512dd93a5be1af13a49e6a33938509d3557aecf2356ac2329871b662a99cf3fd2486b064e7e6f90c1f8d632186a8bda338b02d45da4ea9041d42a23f40b93346dddc473a9f1a3d9f0285b7e48cbb87bc34d44b090a5e2aaf4764a10a44168f1719eff0b0d9bc1ce07750af4c21d0c67eae0799e91328c8b14869e4edd255a41735a2b1818aa9d3b271ba757af010ae6dbad89aa0d8f5b6f8ef3917adcedf247ffcf9ade407dfb5094", 0x534, 0xc001, 0x0, 0x0) r21 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x28001, 0x40002) ioctl$int_in(r21, 0x80006000005016, 0x0) sendto$inet6(r21, &(0x7f00000003c0)="3ce95c98b66a9cdea42aca63276ef1eca3f038047504ba09072b9792bbe041c012d015e0f9cdf7aa7a4d18766deff9a2735edc11437a10c0e9f265c48e7033f01161d5ca1babf5738b4c3df116d964712d2c577d1181a2a242ab4ada0b6cd45c1f36c27a7453575b33022a75d274dd585eab465795dccddd26", 0x79, 0x400c000, 0x0, 0x259) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000140)={0x4, "476374cc8f990e647f6af6c7d040a5a5f251df4da367e2f6f49921d8a109e821", 0x400, 0x9, 0x9a51, 0x10, 0x2}) fcntl$setstatus(r18, 0x4, 0x98428d57a99b5f44) 14:49:28 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, 0x0, 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:28 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, 0x0, 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:28 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) r1 = request_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000280)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0xfffffffffffffffa) keyctl$link(0x8, r1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCADDDLCI(r2, 0x8980, &(0x7f0000000580)={'nr\x0fjc\x00\xff\x03\x00\x00\x00 \x00', 0x10001}) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000000300)="ba0b94dad5126b5aad9e21532bf605c7d041cd61cc4a0fb192bb315afecb7aa8d4acdf5df091105397d032f4a0ed09153e2e6a751b0956a86655b767a8d80db40e0aa9a2f76236", 0x47}, {&(0x7f0000000380)="95edd8170a6f5111abb5e47a194d296af8c12819dbf5114ce3c96b2c7f3ba5ff748afa8c8ddb7394f4d4e9aa8ada64eff26926cd36161955ca8d1e750ccdc718900fb9a4249dfb4b6e4c207c0e94c5ff84b5c3817bf33bd429558b77993070835c4233bc1e7489b00a2068cd0133a0925ecaa1d87cd7d0b981b4c076284b28f75f1b81e13f7cca50548011de", 0x8c}, {&(0x7f0000000440)="d93d72ada570a1dfc4232e54df3fb855d308cb8a6ebdeaa860f8138e3eadbba4fdd412c2d093158f856579d535f16d2acb9c5400cfa0c38b43ffd6e54be5cf8b1eeae0d57d9d3ade0bd3b1d0ac32a2b4651412fa10cf7dd4d28a9276f0b20bd8b0cf0c8a25d1314c173b398e4ac9beb90ca58db744dcf79d3cee17f331f2d17020a4135d4b84ec939d3ac4d9c1d1ad927145a58812aab3cb5a44e7913d4c2814523a27410f012d1da5c20bfe378e2f31121751", 0xb3}, {&(0x7f0000000500)="bd093f7a5e0c2bf66dc97d5140364341a9531736ee6e3d5f26a34550fd1df6f5acd38d11bf73378f88a18570727cea730154335314dbb6363c7e2f7d284df729b537115414acff5fce4be1125b67c6100349f7f8a16850ef07d5776e36dac9d90d56e7c91ac893bbbcdd6b907358ce78dd942b6a1169ef33eff22933ddace09f47eee22d46de55c7b8ebc035a47c52f940825444ce5fa2ecd4a1c82c3c1ec0d1854e95c3e5dd", 0xa6}, {&(0x7f00000005c0)="cc3d8c23840474d64412f58c6635ac78ae301602a5ab695ce7aa951fb1368b549083ec0dff628b97023217c3295f8ba0709274cf0a6313552e61ff070fe9736468c3cc447003bb7e60abb73479a291e3f84646da144b25405c871add1454e0f484e87ac0290274b4c8b2e271c143988af95f6b295741b293bbffcd1b68888a89919b077917", 0x85}], 0x5, 0x0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) r3 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x7ff, 0x40800) ioctl$VIDIOC_S_MODULATOR(r3, 0x40445637, &(0x7f0000000700)={0x80, "dbf0ccff8b630b4fb743181e76e4b4065a2d31b756bc14e27f3c559161c42c3f", 0x8, 0x7, 0x9, 0x4, 0x2}) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)=""/80, &(0x7f0000000000)=0x50) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 484.732910] block nbd3: Device being setup by another task [ 484.741345] block nbd3: Device being setup by another task [ 484.749870] FAULT_INJECTION: forcing a failure. [ 484.749870] name failslab, interval 1, probability 0, space 0, times 0 [ 484.764026] CPU: 0 PID: 21396 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 484.771072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 484.780618] Call Trace: [ 484.783222] dump_stack+0x138/0x197 [ 484.786869] should_fail.cold+0x10f/0x159 [ 484.791038] should_failslab+0xdb/0x130 [ 484.795023] __kmalloc+0x2f0/0x7a0 [ 484.795040] ? match_token+0x22b/0x480 [ 484.802444] ? match_strdup+0x5f/0xa0 [ 484.802454] match_strdup+0x5f/0xa0 [ 484.802469] btrfs_parse_early_options+0x241/0x310 [ 484.802481] ? btrfs_freeze+0xc0/0xc0 [ 484.802488] ? find_next_bit+0x28/0x30 [ 484.802498] ? pcpu_alloc+0xcf0/0x1050 [ 484.802507] ? pcpu_alloc+0xcf0/0x1050 [ 484.802522] btrfs_mount+0x11d/0x2b28 [ 484.802534] ? lock_downgrade+0x740/0x740 [ 484.802540] ? find_held_lock+0x35/0x130 [ 484.802550] ? pcpu_alloc+0x3af/0x1050 [ 484.802563] ? _find_next_bit+0xee/0x120 [ 484.802574] ? check_preemption_disabled+0x3c/0x250 [ 484.802582] ? btrfs_remount+0x11f0/0x11f0 [ 484.802597] ? rcu_read_lock_sched_held+0x110/0x130 [ 484.802615] ? __lockdep_init_map+0x10c/0x570 [ 484.802625] ? __lockdep_init_map+0x10c/0x570 [ 484.802641] mount_fs+0x97/0x2a1 [ 484.802655] vfs_kern_mount.part.0+0x5e/0x3d0 14:49:28 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000340)='./bus\x00', 0x341042, 0x1) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) bind$tipc(r3, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x1, {0x1, 0x3, 0x4}}, 0x10) ftruncate(r2, 0x80003) sendfile(r1, r2, &(0x7f00000000c0), 0x8000fffffffe) ioctl$VIDIOC_G_DV_TIMINGS(r2, 0xc0845658, &(0x7f00000000c0)={0x0, @reserved}) close(r0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r4 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4c8, 0x501000) fcntl$getflags(r4, 0x408) [ 484.802661] ? find_held_lock+0x35/0x130 [ 484.802672] vfs_kern_mount+0x40/0x60 [ 484.802687] btrfs_mount+0x3ce/0x2b28 [ 484.802695] ? lock_downgrade+0x740/0x740 [ 484.802703] ? find_held_lock+0x35/0x130 [ 484.802710] ? pcpu_alloc+0x3af/0x1050 [ 484.802726] ? btrfs_remount+0x11f0/0x11f0 [ 484.909707] ? rcu_read_lock_sched_held+0x110/0x130 [ 484.914748] ? __lockdep_init_map+0x10c/0x570 [ 484.919251] ? __lockdep_init_map+0x10c/0x570 [ 484.923759] mount_fs+0x97/0x2a1 [ 484.927140] vfs_kern_mount.part.0+0x5e/0x3d0 [ 484.931807] do_mount+0x417/0x27d0 [ 484.936133] ? copy_mount_options+0x5c/0x2f0 [ 484.940552] ? rcu_read_lock_sched_held+0x110/0x130 [ 484.945652] ? copy_mount_string+0x40/0x40 [ 484.949893] ? copy_mount_options+0x1fe/0x2f0 [ 484.954400] SyS_mount+0xab/0x120 [ 484.957855] ? copy_mnt_ns+0x8c0/0x8c0 [ 484.961743] do_syscall_64+0x1e8/0x640 [ 484.965634] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 484.970492] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 484.975681] RIP: 0033:0x45c4aa 14:49:29 executing program 5 (fault-call:2 fault-nth:63): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) [ 484.978893] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 484.986610] RAX: ffffffffffffffda RBX: 00007f39d7da8b40 RCX: 000000000045c4aa [ 484.993889] RDX: 00007f39d7da8ae0 RSI: 0000000020000100 RDI: 00007f39d7da8b00 [ 485.001170] RBP: 0000000000000001 R08: 00007f39d7da8b40 R09: 00007f39d7da8ae0 [ 485.008554] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 485.015928] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:29 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x150) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='oveplay\x00', 0x10, &(0x7f0000000140)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}, {@xino_on='xino=on'}, {@xino_on='xino=on'}], [{@obj_type={'\bbj`\xe0\xb3\x00', 0x3d, 'xino=off'}}, {@subj_type={'subj_type', 0x3d, 'xino=off'}}], 0xf603000000000000}) [ 485.111909] FAULT_INJECTION: forcing a failure. [ 485.111909] name failslab, interval 1, probability 0, space 0, times 0 [ 485.135247] CPU: 0 PID: 21423 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 485.142316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 485.151796] Call Trace: [ 485.154828] dump_stack+0x138/0x197 [ 485.158474] should_fail.cold+0x10f/0x159 [ 485.162638] should_failslab+0xdb/0x130 [ 485.166777] __kmalloc_track_caller+0x2ec/0x790 [ 485.171479] ? kstrdup_const+0x48/0x60 [ 485.175382] kstrdup+0x3a/0x70 [ 485.179349] kstrdup_const+0x48/0x60 [ 485.183156] alloc_vfsmnt+0xe5/0x7d0 [ 485.186890] vfs_kern_mount.part.0+0x2a/0x3d0 [ 485.191629] ? find_held_lock+0x35/0x130 [ 485.195720] vfs_kern_mount+0x40/0x60 [ 485.199552] btrfs_mount+0x3ce/0x2b28 [ 485.203373] ? lock_downgrade+0x740/0x740 [ 485.207526] ? find_held_lock+0x35/0x130 [ 485.211806] ? pcpu_alloc+0x3af/0x1050 [ 485.215721] ? btrfs_remount+0x11f0/0x11f0 [ 485.219977] ? rcu_read_lock_sched_held+0x110/0x130 [ 485.225016] ? __lockdep_init_map+0x10c/0x570 [ 485.230043] ? __lockdep_init_map+0x10c/0x570 [ 485.230058] mount_fs+0x97/0x2a1 [ 485.230072] vfs_kern_mount.part.0+0x5e/0x3d0 [ 485.230085] do_mount+0x417/0x27d0 [ 485.230093] ? copy_mount_options+0x5c/0x2f0 [ 485.230103] ? rcu_read_lock_sched_held+0x110/0x130 [ 485.230114] ? copy_mount_string+0x40/0x40 14:49:29 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e22, @local}, @in={0x2, 0x4e23, @loopback}, @in6={0xa, 0x4e22, 0x0, @loopback, 0x7fffffff}], 0x4c) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000700)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x6c08280}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14, r1, 0x400, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0xfffffffffffffdb8}}, 0x20040801) r2 = socket(0x11, 0x2, 0x0) r3 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r2, 0x89e3, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000240)="ccd16170d48f367975b3d57c7f8d5b48dd2eb2392d4ca8f8820ce369ab0d56f07889141fdbcc94e08b36b4a854d5fd1b814edc35fff817bc6f6003665d3f19f6084ebc3fe86a92c2a9db732177d983bddd857868e885ffd311048a6dbaccb24799d1e28b74298fec6c27be3ca10ab6c97bea6d4e6094648abb64206da03fcf065c8b3e32ab1764c373c1917f419eb178ca7f6b1f6dd7a9e0b217ffa9fffe0ae88dca0654bcbc1cef674812cd887d54480c4166479aa602fc0c2f3246275dc1c03409ea9c21c197d1d2bcc18ebd2ca3263d1046ddd70ee03f15ccf444b74524e8694c6751b8db7b6ff2b704149058952985", 0xf1) ioctl$NBD_SET_SOCK(r3, 0xab00, r2) sendmsg$NET_DM_CMD_START(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40200800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r1, 0x8, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x30010863}, 0x48001) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000700)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x6c08280}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14, r4, 0x400, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0xfffffffffffffdb8}}, 0x20040801) r5 = socket(0x11, 0x2, 0x0) r6 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r5, 0x89e3, 0x0) ioctl$NBD_SET_SOCK(r6, 0xab00, r5) sendmsg$NET_DM_CMD_START(r5, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40200800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r4, 0x8, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x30010863}, 0x48001) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r5, 0x84, 0x1a, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000100)={r7, 0x3, 0xdd8b888e80e4f76c, 0x7, 0x8}, &(0x7f0000000140)=0x18) recvmmsg(r0, &(0x7f0000004540)=[{{&(0x7f0000000180)=@nfc_llcp, 0x80, 0x0}}], 0x1, 0x0, 0x0) [ 485.230126] ? copy_mount_options+0x1fe/0x2f0 [ 485.230138] SyS_mount+0xab/0x120 [ 485.230145] ? copy_mnt_ns+0x8c0/0x8c0 [ 485.230159] do_syscall_64+0x1e8/0x640 [ 485.238018] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 485.238039] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 485.238050] RIP: 0033:0x45c4aa [ 485.288644] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 485.296369] RAX: ffffffffffffffda RBX: 00007f39d7da8b40 RCX: 000000000045c4aa [ 485.303679] RDX: 00007f39d7da8ae0 RSI: 0000000020000100 RDI: 00007f39d7da8b00 [ 485.310965] RBP: 0000000000000001 R08: 00007f39d7da8b40 R09: 00007f39d7da8ae0 [ 485.317384] block nbd3: Device being setup by another task [ 485.318260] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 485.318267] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 [ 485.342698] block nbd3: Device being setup by another task [ 485.353219] block nbd3: Device being setup by another task 14:49:29 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r3, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r3, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) getsockopt$inet6_buf(r3, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000340)='./bus\x00', 0x341042, 0x1) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r4, 0x80003) sendfile(r3, r4, &(0x7f00000000c0), 0x8000fffffffe) ioctl$NBD_CLEAR_SOCK(r4, 0xab04) mount$9p_rdma(&(0x7f0000000040)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffff6) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:49:29 executing program 5 (fault-call:2 fault-nth:64): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) [ 485.365071] block nbd3: Device being setup by another task [ 485.479699] FAULT_INJECTION: forcing a failure. [ 485.479699] name failslab, interval 1, probability 0, space 0, times 0 [ 485.492009] CPU: 1 PID: 21443 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 485.499055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 485.508607] Call Trace: [ 485.508629] dump_stack+0x138/0x197 [ 485.508651] should_fail.cold+0x10f/0x159 [ 485.508670] should_failslab+0xdb/0x130 [ 485.523091] kmem_cache_alloc+0x2d7/0x780 [ 485.527341] ? check_preemption_disabled+0x3c/0x250 [ 485.532370] alloc_vfsmnt+0x28/0x7d0 [ 485.536089] vfs_kern_mount.part.0+0x2a/0x3d0 [ 485.540648] ? find_held_lock+0x35/0x130 [ 485.544716] vfs_kern_mount+0x40/0x60 [ 485.548525] btrfs_mount+0x3ce/0x2b28 [ 485.552555] ? lock_downgrade+0x740/0x740 [ 485.556719] ? find_held_lock+0x35/0x130 [ 485.560790] ? pcpu_alloc+0x3af/0x1050 [ 485.564690] ? btrfs_remount+0x11f0/0x11f0 [ 485.568942] ? rcu_read_lock_sched_held+0x110/0x130 [ 485.574007] ? __lockdep_init_map+0x10c/0x570 [ 485.578515] ? __lockdep_init_map+0x10c/0x570 [ 485.583725] mount_fs+0x97/0x2a1 [ 485.587114] vfs_kern_mount.part.0+0x5e/0x3d0 [ 485.591621] do_mount+0x417/0x27d0 [ 485.595173] ? copy_mount_options+0x5c/0x2f0 [ 485.599590] ? rcu_read_lock_sched_held+0x110/0x130 [ 485.604793] ? copy_mount_string+0x40/0x40 [ 485.609175] ? copy_mount_options+0x1fe/0x2f0 [ 485.613783] SyS_mount+0xab/0x120 [ 485.617247] ? copy_mnt_ns+0x8c0/0x8c0 [ 485.621249] do_syscall_64+0x1e8/0x640 [ 485.625141] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 485.630004] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 485.635228] RIP: 0033:0x45c4aa [ 485.638624] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 485.646338] RAX: ffffffffffffffda RBX: 00007f39d7da8b40 RCX: 000000000045c4aa [ 485.653708] RDX: 00007f39d7da8ae0 RSI: 0000000020000100 RDI: 00007f39d7da8b00 [ 485.660980] RBP: 0000000000000001 R08: 00007f39d7da8b40 R09: 00007f39d7da8ae0 [ 485.668256] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 485.672026] block nbd3: Device being setup by another task 14:49:29 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:29 executing program 3: r0 = perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r2, 0x0) r3 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000700)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x6c08280}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14, r3, 0x400, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0xfffffffffffffdb8}}, 0x20040801) r4 = socket(0x11, 0x2, 0x0) r5 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r4, 0x89e3, 0x0) ioctl$NBD_SET_SOCK(r5, 0xab00, r4) sendmsg$NET_DM_CMD_START(r4, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40200800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r3, 0x8, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x30010863}, 0x48001) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = getpid() sched_setattr(r7, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r8 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r8, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r8, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) getsockopt$inet6_buf(r8, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendto$inet6(r8, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r9 = open(&(0x7f0000000340)='./bus\x00', 0x341042, 0x1) setsockopt$SO_TIMESTAMPING(r8, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r9, 0x80003) sendfile(r8, r9, &(0x7f00000000c0), 0x8000fffffffe) r10 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r10, 0x0) r11 = getpid() sched_setattr(r11, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR64, @ANYRES64=r2, @ANYRES64=r0, @ANYRES32, @ANYRESHEX=r4, @ANYPTR64, @ANYPTR64, @ANYPTR64, @ANYPTR], @ANYPTR=&(0x7f0000000100)=ANY=[@ANYRESHEX=r0, @ANYRES64=0x0, @ANYRESHEX, @ANYRES16=r0], @ANYRESHEX=r6, @ANYRESDEC=r7, @ANYRESOCT=r9, @ANYRESHEX=r10], @ANYRESHEX=r1, @ANYRESDEC=r11], 0x2e) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000500)={0xa0, 0x19, 0x1}, 0xa0) r12 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r12, 0x40045431, &(0x7f0000000080)) r13 = syz_open_pts(r12, 0x0) ioctl$TIOCSETD(r13, 0x5423, &(0x7f00000000c0)=0x3) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x722, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1, 0x0, 0x0, 0x2000000000002) ioctl$TCSETSF(r13, 0x5412, &(0x7f0000000000)={0x80}) ioctl$TCSETSF(r13, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}) r14 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000500)='h5R\xf4\x00\xa5C\"\x01\xbf', 0x0, 0x0) ioctl$TCSETS(r14, 0x40045431, &(0x7f0000000080)) syz_open_pts(r14, 0x0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='9p\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000840)=ANY=[@ANYRESDEC=r0, @ANYRESDEC=r1, @ANYRES16=r13, @ANYPTR64=&(0x7f0000000600)=ANY=[@ANYRES16, @ANYRES64=r14, @ANYRES32=r0, @ANYRESDEC=r0]], @ANYRESHEX, @ANYBLOB="8000000000", @ANYRESOCT]) request_key(0x0, &(0x7f0000000440)={'syz', 0x3}, &(0x7f0000000480)='\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r15 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r15, 0x40045431, &(0x7f0000000080)) syz_open_pts(r15, 0x0) dup(r15) r16 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r16, 0x40045431, &(0x7f0000000080)) r17 = syz_open_pts(r16, 0x0) ioctl$TIOCSETD(r17, 0x5423, &(0x7f00000000c0)=0x3) ioctl$TCSETSF(r17, 0x5412, &(0x7f0000000000)={0x80}) ioctl$TCSETSF(r17, 0x5412, &(0x7f0000000000)={0x7e}) sendfile(0xffffffffffffffff, r17, 0x0, 0xffff) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) lstat(&(0x7f0000000080)='.\x00', &(0x7f0000000380)) getresgid(&(0x7f0000000000), &(0x7f0000000040), 0x0) getresgid(&(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) r18 = getpid() tkill(r18, 0x25) ptrace$cont(0x61e8ff74f9283ac9, r18, 0x4, 0x6) 14:49:29 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, 0x0, 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:29 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, 0x0, 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 485.675656] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:29 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 14:49:29 executing program 5 (fault-call:2 fault-nth:65): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) 14:49:30 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = memfd_create(&(0x7f0000000280)='^\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x200, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000040), 0x4) sendfile(r0, r1, 0x0, 0x102002700) [ 486.002762] FAULT_INJECTION: forcing a failure. [ 486.002762] name failslab, interval 1, probability 0, space 0, times 0 [ 486.076641] CPU: 1 PID: 21475 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 486.083708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 486.093199] Call Trace: [ 486.095793] dump_stack+0x138/0x197 [ 486.099966] should_fail.cold+0x10f/0x159 [ 486.104327] should_failslab+0xdb/0x130 [ 486.108323] __kmalloc_track_caller+0x2ec/0x790 [ 486.113009] ? kstrdup_const+0x48/0x60 [ 486.116916] kstrdup+0x3a/0x70 [ 486.120106] kstrdup_const+0x48/0x60 [ 486.124000] alloc_vfsmnt+0xe5/0x7d0 [ 486.127727] vfs_kern_mount.part.0+0x2a/0x3d0 [ 486.132229] ? find_held_lock+0x35/0x130 [ 486.132244] vfs_kern_mount+0x40/0x60 [ 486.132259] btrfs_mount+0x3ce/0x2b28 [ 486.132267] ? lock_downgrade+0x740/0x740 [ 486.132278] ? find_held_lock+0x35/0x130 [ 486.132286] ? pcpu_alloc+0x3af/0x1050 [ 486.132300] ? btrfs_remount+0x11f0/0x11f0 [ 486.132312] ? rcu_read_lock_sched_held+0x110/0x130 [ 486.132326] ? __lockdep_init_map+0x10c/0x570 [ 486.132334] ? __lockdep_init_map+0x10c/0x570 [ 486.132345] mount_fs+0x97/0x2a1 [ 486.132355] vfs_kern_mount.part.0+0x5e/0x3d0 [ 486.132365] do_mount+0x417/0x27d0 [ 486.140563] ? copy_mount_options+0x5c/0x2f0 [ 486.140575] ? rcu_read_lock_sched_held+0x110/0x130 [ 486.140586] ? copy_mount_string+0x40/0x40 [ 486.140599] ? copy_mount_options+0x1fe/0x2f0 [ 486.140613] SyS_mount+0xab/0x120 [ 486.148535] ? copy_mnt_ns+0x8c0/0x8c0 [ 486.148549] do_syscall_64+0x1e8/0x640 [ 486.148561] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 486.156888] entry_SYSCALL_64_after_hwframe+0x42/0xb7 14:49:30 executing program 3: r0 = perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r2, 0x0) r3 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000700)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x6c08280}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14, r3, 0x400, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0xfffffffffffffdb8}}, 0x20040801) r4 = socket(0x11, 0x2, 0x0) r5 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r4, 0x89e3, 0x0) ioctl$NBD_SET_SOCK(r5, 0xab00, r4) sendmsg$NET_DM_CMD_START(r4, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40200800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r3, 0x8, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x30010863}, 0x48001) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = getpid() sched_setattr(r7, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r8 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r8, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r8, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) getsockopt$inet6_buf(r8, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendto$inet6(r8, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r9 = open(&(0x7f0000000340)='./bus\x00', 0x341042, 0x1) setsockopt$SO_TIMESTAMPING(r8, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r9, 0x80003) sendfile(r8, r9, &(0x7f00000000c0), 0x8000fffffffe) r10 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r10, 0x0) r11 = getpid() sched_setattr(r11, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR64, @ANYRES64=r2, @ANYRES64=r0, @ANYRES32, @ANYRESHEX=r4, @ANYPTR64, @ANYPTR64, @ANYPTR64, @ANYPTR], @ANYPTR=&(0x7f0000000100)=ANY=[@ANYRESHEX=r0, @ANYRES64=0x0, @ANYRESHEX, @ANYRES16=r0], @ANYRESHEX=r6, @ANYRESDEC=r7, @ANYRESOCT=r9, @ANYRESHEX=r10], @ANYRESHEX=r1, @ANYRESDEC=r11], 0x2e) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000500)={0xa0, 0x19, 0x1}, 0xa0) r12 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r12, 0x40045431, &(0x7f0000000080)) r13 = syz_open_pts(r12, 0x0) ioctl$TIOCSETD(r13, 0x5423, &(0x7f00000000c0)=0x3) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x722, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x1, 0x0, 0x0, 0x2000000000002) ioctl$TCSETSF(r13, 0x5412, &(0x7f0000000000)={0x80}) ioctl$TCSETSF(r13, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}) r14 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000500)='h5R\xf4\x00\xa5C\"\x01\xbf', 0x0, 0x0) ioctl$TCSETS(r14, 0x40045431, &(0x7f0000000080)) syz_open_pts(r14, 0x0) mount$9p_fd(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='9p\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000840)=ANY=[@ANYRESDEC=r0, @ANYRESDEC=r1, @ANYRES16=r13, @ANYPTR64=&(0x7f0000000600)=ANY=[@ANYRES16, @ANYRES64=r14, @ANYRES32=r0, @ANYRESDEC=r0]], @ANYRESHEX, @ANYBLOB="8000000000", @ANYRESOCT]) request_key(0x0, &(0x7f0000000440)={'syz', 0x3}, &(0x7f0000000480)='\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r15 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r15, 0x40045431, &(0x7f0000000080)) syz_open_pts(r15, 0x0) dup(r15) r16 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r16, 0x40045431, &(0x7f0000000080)) r17 = syz_open_pts(r16, 0x0) ioctl$TIOCSETD(r17, 0x5423, &(0x7f00000000c0)=0x3) ioctl$TCSETSF(r17, 0x5412, &(0x7f0000000000)={0x80}) ioctl$TCSETSF(r17, 0x5412, &(0x7f0000000000)={0x7e}) sendfile(0xffffffffffffffff, r17, 0x0, 0xffff) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) lstat(&(0x7f0000000080)='.\x00', &(0x7f0000000380)) getresgid(&(0x7f0000000000), &(0x7f0000000040), 0x0) getresgid(&(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) r18 = getpid() tkill(r18, 0x25) ptrace$cont(0x61e8ff74f9283ac9, r18, 0x4, 0x6) [ 486.156896] RIP: 0033:0x45c4aa [ 486.156904] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000206 [ 486.166115] ORIG_RAX: 00000000000000a5 [ 486.166121] RAX: ffffffffffffffda RBX: 00007f39d7da8b40 RCX: 000000000045c4aa [ 486.166126] RDX: 00007f39d7da8ae0 RSI: 0000000020000100 RDI: 00007f39d7da8b00 [ 486.166132] RBP: 0000000000000001 R08: 00007f39d7da8b40 R09: 00007f39d7da8ae0 [ 486.166137] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 486.166144] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:30 executing program 5 (fault-call:2 fault-nth:66): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) 14:49:30 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 486.389962] net_ratelimit: 24 callbacks suppressed [ 486.389968] protocol 88fb is buggy, dev hsr_slave_0 [ 486.389995] protocol 88fb is buggy, dev hsr_slave_1 [ 486.395007] protocol 88fb is buggy, dev hsr_slave_1 [ 486.416419] block nbd3: Device being setup by another task [ 486.419316] FAULT_INJECTION: forcing a failure. [ 486.419316] name failslab, interval 1, probability 0, space 0, times 0 [ 486.443188] CPU: 0 PID: 21491 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 486.450233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 486.450237] Call Trace: [ 486.450254] dump_stack+0x138/0x197 [ 486.450271] should_fail.cold+0x10f/0x159 [ 486.450286] should_failslab+0xdb/0x130 [ 486.450300] __kmalloc+0x2f0/0x7a0 [ 486.450310] ? match_token+0x22b/0x480 [ 486.450324] ? match_strdup+0x5f/0xa0 [ 486.450337] match_strdup+0x5f/0xa0 [ 486.470125] btrfs_parse_early_options+0x241/0x310 [ 486.470138] ? btrfs_freeze+0xc0/0xc0 [ 486.470146] ? find_next_bit+0x28/0x30 [ 486.470155] ? pcpu_alloc+0xcf0/0x1050 [ 486.470164] ? pcpu_alloc+0xcf0/0x1050 [ 486.470179] btrfs_mount+0x11d/0x2b28 [ 486.470190] ? lock_downgrade+0x740/0x740 [ 486.470197] ? find_held_lock+0x35/0x130 [ 486.470206] ? pcpu_alloc+0x3af/0x1050 [ 486.526776] ? _find_next_bit+0xee/0x120 [ 486.530830] ? check_preemption_disabled+0x3c/0x250 [ 486.535833] ? btrfs_remount+0x11f0/0x11f0 [ 486.540406] ? rcu_read_lock_sched_held+0x110/0x130 [ 486.545481] ? __lockdep_init_map+0x10c/0x570 [ 486.549962] ? __lockdep_init_map+0x10c/0x570 [ 486.554443] mount_fs+0x97/0x2a1 [ 486.557803] vfs_kern_mount.part.0+0x5e/0x3d0 [ 486.562281] ? find_held_lock+0x35/0x130 [ 486.566330] vfs_kern_mount+0x40/0x60 [ 486.570116] btrfs_mount+0x3ce/0x2b28 [ 486.573903] ? lock_downgrade+0x740/0x740 [ 486.578034] ? find_held_lock+0x35/0x130 [ 486.582078] ? pcpu_alloc+0x3af/0x1050 [ 486.585951] ? btrfs_remount+0x11f0/0x11f0 [ 486.590350] ? rcu_read_lock_sched_held+0x110/0x130 [ 486.595384] ? __lockdep_init_map+0x10c/0x570 [ 486.599962] ? __lockdep_init_map+0x10c/0x570 [ 486.604458] mount_fs+0x97/0x2a1 [ 486.607826] vfs_kern_mount.part.0+0x5e/0x3d0 [ 486.612311] do_mount+0x417/0x27d0 [ 486.615842] ? copy_mount_options+0x5c/0x2f0 [ 486.620235] ? rcu_read_lock_sched_held+0x110/0x130 [ 486.625254] ? copy_mount_string+0x40/0x40 [ 486.629576] ? copy_mount_options+0x1fe/0x2f0 [ 486.630004] protocol 88fb is buggy, dev hsr_slave_0 [ 486.634145] SyS_mount+0xab/0x120 [ 486.634156] ? copy_mnt_ns+0x8c0/0x8c0 [ 486.634170] do_syscall_64+0x1e8/0x640 [ 486.634177] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 486.634194] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 486.639294] protocol 88fb is buggy, dev hsr_slave_1 [ 486.642647] RIP: 0033:0x45c4aa [ 486.642653] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 486.642663] RAX: ffffffffffffffda RBX: 00007f39d7da8b40 RCX: 000000000045c4aa [ 486.642667] RDX: 00007f39d7da8ae0 RSI: 0000000020000100 RDI: 00007f39d7da8b00 14:49:30 executing program 5 (fault-call:2 fault-nth:67): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) 14:49:30 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:30 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 486.642672] RBP: 0000000000000001 R08: 00007f39d7da8b40 R09: 00007f39d7da8ae0 [ 486.642677] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 486.642681] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:30 executing program 2: getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000001c0)={@dev, 0x0}, &(0x7f0000000200)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x1bc935cdaa9022e6, &(0x7f00000000c0)=ANY=[@ANYRESOCT=0x0], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x6, [], r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x94, 0x10, &(0x7f0000000000), 0x10}, 0x70) mkdir(&(0x7f0000000040)='./file0\x00', 0x20) [ 486.754280] FAULT_INJECTION: forcing a failure. [ 486.754280] name failslab, interval 1, probability 0, space 0, times 0 [ 486.820917] CPU: 0 PID: 21500 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 486.827988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 486.837384] Call Trace: [ 486.839996] dump_stack+0x138/0x197 [ 486.843644] should_fail.cold+0x10f/0x159 [ 486.847810] should_failslab+0xdb/0x130 [ 486.851800] __kmalloc+0x2f0/0x7a0 [ 486.855352] ? match_token+0x22b/0x480 [ 486.859249] ? match_strdup+0x5f/0xa0 [ 486.863057] match_strdup+0x5f/0xa0 [ 486.866699] btrfs_parse_early_options+0x241/0x310 [ 486.871731] ? btrfs_freeze+0xc0/0xc0 [ 486.875532] ? find_next_bit+0x28/0x30 [ 486.879426] ? pcpu_alloc+0xcf0/0x1050 [ 486.883327] ? pcpu_alloc+0xcf0/0x1050 [ 486.887226] btrfs_mount+0x11d/0x2b28 [ 486.891033] ? lock_downgrade+0x740/0x740 [ 486.895182] ? find_held_lock+0x35/0x130 [ 486.899244] ? pcpu_alloc+0x3af/0x1050 [ 486.903137] ? _find_next_bit+0xee/0x120 [ 486.907301] ? check_preemption_disabled+0x3c/0x250 [ 486.912322] ? btrfs_remount+0x11f0/0x11f0 [ 486.916568] ? rcu_read_lock_sched_held+0x110/0x130 [ 486.921603] ? __lockdep_init_map+0x10c/0x570 [ 486.926107] ? __lockdep_init_map+0x10c/0x570 [ 486.930614] mount_fs+0x97/0x2a1 [ 486.933990] vfs_kern_mount.part.0+0x5e/0x3d0 [ 486.938532] ? find_held_lock+0x35/0x130 [ 486.942596] vfs_kern_mount+0x40/0x60 [ 486.946430] btrfs_mount+0x3ce/0x2b28 [ 486.950375] ? lock_downgrade+0x740/0x740 [ 486.954516] ? find_held_lock+0x35/0x130 [ 486.958833] ? pcpu_alloc+0x3af/0x1050 [ 486.962718] ? btrfs_remount+0x11f0/0x11f0 [ 486.966955] ? rcu_read_lock_sched_held+0x110/0x130 [ 486.971989] ? __lockdep_init_map+0x10c/0x570 [ 486.976486] ? __lockdep_init_map+0x10c/0x570 [ 486.981162] mount_fs+0x97/0x2a1 [ 486.984887] vfs_kern_mount.part.0+0x5e/0x3d0 [ 486.989391] do_mount+0x417/0x27d0 [ 486.992936] ? copy_mount_options+0x5c/0x2f0 [ 486.997353] ? rcu_read_lock_sched_held+0x110/0x130 [ 487.002381] ? copy_mount_string+0x40/0x40 [ 487.006648] ? copy_mount_options+0x1fe/0x2f0 [ 487.011179] SyS_mount+0xab/0x120 [ 487.014729] ? copy_mnt_ns+0x8c0/0x8c0 14:49:31 executing program 2: accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x0, 0x40000000, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) r4 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r4, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0xff4f) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x4, {0x2, 0x0, 0x0, 0x0, r8}, [@IFA_LOCAL={0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, @IFA_FLAGS={0x8, 0x8, 0x400}]}, 0x28}}, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xc, 0x0, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x1, 0xd4, &(0x7f0000000380)=""/212, 0xa1a226322a7da5ce, 0x0, [], r8, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x1, 0xffffffff}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r9, 0xffffffffa0008000, 0x196, 0xfffffffffffffd4b, &(0x7f0000000200)="9d", 0x0, 0x2b1, 0x0, 0x0, 0xffffffffffffff95, &(0x7f0000000000), &(0x7f0000000480)="73ab0c3e852ca4a9d325586d08c6c846afb3315b2777dcada8a65effc6a1f246501227dd1003330e960d5968c5e74c7ea36c"}, 0x28) write$binfmt_misc(r9, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xd3) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) socket$inet6(0xa, 0x80002, 0x0) r10 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r10, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) ioctl$EXT4_IOC_SETFLAGS(r10, 0x40086602, &(0x7f0000000100)=0x80080) [ 487.018713] do_syscall_64+0x1e8/0x640 [ 487.022616] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 487.027569] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 487.033858] RIP: 0033:0x45c4aa [ 487.037043] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 487.044742] RAX: ffffffffffffffda RBX: 00007f39d7da8b40 RCX: 000000000045c4aa [ 487.052383] RDX: 00007f39d7da8ae0 RSI: 0000000020000100 RDI: 00007f39d7da8b00 [ 487.059732] RBP: 0000000000000001 R08: 00007f39d7da8b40 R09: 00007f39d7da8ae0 14:49:31 executing program 3: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="05", 0x1, r0) request_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000100)='cpuset\\\\trustedposix_acl_access\x00', r0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x2}]}}}]}, 0x3c}}, 0x0) [ 487.067098] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 487.074369] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 [ 487.083375] protocol 88fb is buggy, dev hsr_slave_0 [ 487.088484] protocol 88fb is buggy, dev hsr_slave_1 14:49:31 executing program 5 (fault-call:2 fault-nth:68): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) 14:49:31 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x40, 0x1, 0xff, 0x0, 0x0, 0x400000000007f, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x8, 0x5, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000001, 0x4010, r1, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x10000) openat$audio(0xffffffffffffff9c, 0x0, 0x200, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x0, 0x0) 14:49:31 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 487.221037] FAULT_INJECTION: forcing a failure. [ 487.221037] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 487.271588] CPU: 0 PID: 21525 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 487.278644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 487.288014] Call Trace: [ 487.288040] dump_stack+0x138/0x197 [ 487.288062] should_fail.cold+0x10f/0x159 [ 487.288076] ? __might_sleep+0x93/0xb0 [ 487.288093] __alloc_pages_nodemask+0x1d6/0x7a0 [ 487.288103] ? check_preemption_disabled+0x3c/0x250 [ 487.288113] ? __alloc_pages_slowpath+0x2930/0x2930 [ 487.288121] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 487.288131] ? __alloc_pages_nodemask+0x639/0x7a0 [ 487.288145] alloc_pages_current+0xec/0x1e0 [ 487.288156] ? btrfs_parse_early_options+0x1a2/0x310 [ 487.288170] __get_free_pages+0xf/0x40 [ 487.288180] get_zeroed_page+0x11/0x20 [ 487.288191] selinux_sb_copy_data+0x2a/0x390 [ 487.288209] security_sb_copy_data+0x75/0xb0 [ 487.288224] parse_security_options+0x37/0xa0 [ 487.288233] btrfs_mount+0x2bb/0x2b28 [ 487.288242] ? lock_downgrade+0x740/0x740 [ 487.288250] ? find_held_lock+0x35/0x130 [ 487.288258] ? pcpu_alloc+0x3af/0x1050 [ 487.288272] ? btrfs_remount+0x11f0/0x11f0 [ 487.288287] ? rcu_read_lock_sched_held+0x110/0x130 [ 487.307218] ? __lockdep_init_map+0x10c/0x570 [ 487.307241] mount_fs+0x97/0x2a1 [ 487.307258] vfs_kern_mount.part.0+0x5e/0x3d0 [ 487.307268] ? find_held_lock+0x35/0x130 [ 487.317301] vfs_kern_mount+0x40/0x60 [ 487.317321] btrfs_mount+0x3ce/0x2b28 [ 487.317335] ? lock_downgrade+0x740/0x740 [ 487.317344] ? find_held_lock+0x35/0x130 [ 487.317355] ? pcpu_alloc+0x3af/0x1050 [ 487.317373] ? btrfs_remount+0x11f0/0x11f0 [ 487.317391] ? rcu_read_lock_sched_held+0x110/0x130 [ 487.327682] ? __lockdep_init_map+0x10c/0x570 [ 487.327695] ? __lockdep_init_map+0x10c/0x570 [ 487.327713] mount_fs+0x97/0x2a1 [ 487.327731] vfs_kern_mount.part.0+0x5e/0x3d0 [ 487.327746] do_mount+0x417/0x27d0 [ 487.327758] ? retint_kernel+0x2d/0x2d [ 487.327772] ? copy_mount_string+0x40/0x40 [ 487.327787] ? __sanitizer_cov_trace_pc+0x9/0x60 [ 487.337214] ? copy_mount_options+0x1fe/0x2f0 [ 487.337229] SyS_mount+0xab/0x120 [ 487.337239] ? copy_mnt_ns+0x8c0/0x8c0 [ 487.337254] do_syscall_64+0x1e8/0x640 [ 487.337264] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 487.337283] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 487.337292] RIP: 0033:0x45c4aa [ 487.337297] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 487.337310] RAX: ffffffffffffffda RBX: 00007f39d7da8b40 RCX: 000000000045c4aa [ 487.345103] RDX: 00007f39d7da8ae0 RSI: 0000000020000100 RDI: 00007f39d7da8b00 [ 487.345110] RBP: 0000000000000001 R08: 00007f39d7da8b40 R09: 00007f39d7da8ae0 [ 487.345115] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 487.345125] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 [ 487.356442] audit: type=1800 audit(1571323771.339:213): pid=21529 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=17718 res=0 14:49:31 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:31 executing program 5 (fault-call:2 fault-nth:69): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) 14:49:31 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 487.410832] audit: type=1400 audit(1571323771.389:214): avc: denied { map } for pid=21528 comm="syz-executor.2" path="pipe:[88995]" dev="pipefs" ino=88995 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=fifo_file permissive=1 [ 487.590719] protocol 88fb is buggy, dev hsr_slave_0 [ 487.596048] protocol 88fb is buggy, dev hsr_slave_1 14:49:31 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000005c0)=""/223, 0xfc61) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x4004743d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) accept(0xffffffffffffffff, &(0x7f0000000380)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x0) [ 487.709644] FAULT_INJECTION: forcing a failure. [ 487.709644] name failslab, interval 1, probability 0, space 0, times 0 [ 487.729471] CPU: 1 PID: 21544 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 487.736626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 487.745993] Call Trace: [ 487.748600] dump_stack+0x138/0x197 [ 487.752243] should_fail.cold+0x10f/0x159 [ 487.756538] should_failslab+0xdb/0x130 [ 487.760528] kmem_cache_alloc_trace+0x2e9/0x790 [ 487.765216] selinux_parse_opts_str+0x3c1/0xa30 [ 487.769899] ? selinux_sb_show_options+0xd50/0xd50 [ 487.774846] ? free_pages+0x46/0x50 [ 487.778480] ? selinux_sb_copy_data+0x21e/0x390 [ 487.783165] security_sb_parse_opts_str+0x75/0xb0 [ 487.788019] parse_security_options+0x4e/0xa0 [ 487.792517] btrfs_mount+0x2bb/0x2b28 [ 487.796319] ? lock_downgrade+0x740/0x740 [ 487.800472] ? find_held_lock+0x35/0x130 [ 487.804539] ? pcpu_alloc+0x3af/0x1050 [ 487.808440] ? btrfs_remount+0x11f0/0x11f0 [ 487.812688] ? rcu_read_lock_sched_held+0x110/0x130 [ 487.817752] ? __lockdep_init_map+0x10c/0x570 [ 487.822265] mount_fs+0x97/0x2a1 [ 487.825661] vfs_kern_mount.part.0+0x5e/0x3d0 [ 487.830249] ? find_held_lock+0x35/0x130 [ 487.834318] vfs_kern_mount+0x40/0x60 [ 487.838127] btrfs_mount+0x3ce/0x2b28 [ 487.841927] ? lock_downgrade+0x740/0x740 [ 487.846082] ? find_held_lock+0x35/0x130 [ 487.850142] ? pcpu_alloc+0x3af/0x1050 [ 487.854039] ? btrfs_remount+0x11f0/0x11f0 [ 487.858276] ? rcu_read_lock_sched_held+0x110/0x130 [ 487.863303] ? __lockdep_init_map+0x10c/0x570 [ 487.867801] ? __lockdep_init_map+0x10c/0x570 [ 487.872504] mount_fs+0x97/0x2a1 [ 487.875882] vfs_kern_mount.part.0+0x5e/0x3d0 [ 487.880381] do_mount+0x417/0x27d0 [ 487.883918] ? retint_kernel+0x2d/0x2d [ 487.887820] ? copy_mount_string+0x40/0x40 [ 487.892065] ? copy_mount_options+0x199/0x2f0 [ 487.896565] ? copy_mount_options+0x1fe/0x2f0 [ 487.901089] SyS_mount+0xab/0x120 [ 487.904553] ? copy_mnt_ns+0x8c0/0x8c0 [ 487.908453] do_syscall_64+0x1e8/0x640 [ 487.912345] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 487.917194] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 487.922387] RIP: 0033:0x45c4aa [ 487.925575] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 487.933291] RAX: ffffffffffffffda RBX: 00007f39d7da8b40 RCX: 000000000045c4aa [ 487.940573] RDX: 00007f39d7da8ae0 RSI: 0000000020000100 RDI: 00007f39d7da8b00 [ 487.947945] RBP: 0000000000000001 R08: 00007f39d7da8b40 R09: 00007f39d7da8ae0 14:49:31 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000005c0)=""/223, 0xfc61) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x4004743d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) accept(0xffffffffffffffff, &(0x7f0000000380)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x0) [ 487.955302] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 487.962578] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 [ 487.979991] protocol 88fb is buggy, dev hsr_slave_0 14:49:32 executing program 5 (fault-call:2 fault-nth:70): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) 14:49:32 executing program 3: r0 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x80000) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() capset(&(0x7f0000000100)={0x20071026, r1}, &(0x7f0000000180)={0x400, 0x7, 0x1, 0x4, 0xda9, 0x1}) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x7f8000, 0xc2, 0x4}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r2) socket$bt_rfcomm(0x1f, 0x1, 0x3) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x8001) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x98428d57a99b5f44) io_setup(0x4, &(0x7f00000004c0)=0x0) io_submit(r6, 0x237, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x377140be6b5ef4c7}]) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1c, &(0x7f0000000040)=""/75, &(0x7f00000000c0)=0x4b) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000}, 0x4, &(0x7f00000002c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="d4000000", @ANYRESOCT, @ANYBLOB="210e25bd7000fedbdf250d000000340007000c00030008000000000000000c000400fbffffffffffffff080001000d35785c080001007500000008000100010000002400090008000100090000000800010003000000080001000400000008000200060000001c00020008000100f72e000004000400080002000000000004000400340006000400020004000200080001000b050000080001003b960000080001001294000004000200080001000600000004000200ffffffffffffff000000080001000b000000000000000000"], 0x3}, 0x1, 0x0, 0x0, 0x28084040}, 0x1000) socket$inet(0x10, 0x3, 0x0) 14:49:32 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket(0x200000000010, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff03c}, {0x6}]}, 0x10) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x202840, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) socket$inet(0x2, 0x12bbc10abe37588a, 0x6) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r2, r3}) ioctl$KDGKBDIACR(r3, 0x4b4a, &(0x7f0000000240)=""/194) [ 488.136178] FAULT_INJECTION: forcing a failure. [ 488.136178] name failslab, interval 1, probability 0, space 0, times 0 [ 488.162417] CPU: 1 PID: 21560 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 488.169495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 488.178860] Call Trace: [ 488.181461] dump_stack+0x138/0x197 [ 488.185093] should_fail.cold+0x10f/0x159 [ 488.189357] should_failslab+0xdb/0x130 [ 488.193337] kmem_cache_alloc_trace+0x2e9/0x790 [ 488.198028] selinux_parse_opts_str+0x42c/0xa30 [ 488.202719] ? selinux_sb_show_options+0xd50/0xd50 [ 488.207651] ? free_pages+0x46/0x50 [ 488.211279] ? selinux_sb_copy_data+0x21e/0x390 [ 488.215956] security_sb_parse_opts_str+0x75/0xb0 [ 488.220901] parse_security_options+0x4e/0xa0 [ 488.225404] btrfs_mount+0x2bb/0x2b28 [ 488.229208] ? lock_downgrade+0x740/0x740 [ 488.233353] ? find_held_lock+0x35/0x130 [ 488.237412] ? pcpu_alloc+0x3af/0x1050 [ 488.241308] ? btrfs_remount+0x11f0/0x11f0 [ 488.245548] ? rcu_read_lock_sched_held+0x110/0x130 [ 488.250565] ? __lockdep_init_map+0x10c/0x570 [ 488.255192] mount_fs+0x97/0x2a1 [ 488.258545] vfs_kern_mount.part.0+0x5e/0x3d0 [ 488.263020] ? find_held_lock+0x35/0x130 [ 488.267152] vfs_kern_mount+0x40/0x60 [ 488.270941] btrfs_mount+0x3ce/0x2b28 [ 488.274722] ? lock_downgrade+0x740/0x740 [ 488.278937] ? find_held_lock+0x35/0x130 [ 488.282982] ? pcpu_alloc+0x3af/0x1050 [ 488.286856] ? btrfs_remount+0x11f0/0x11f0 [ 488.291087] ? rcu_read_lock_sched_held+0x110/0x130 [ 488.296122] ? __lockdep_init_map+0x10c/0x570 [ 488.300602] ? __lockdep_init_map+0x10c/0x570 [ 488.305095] mount_fs+0x97/0x2a1 [ 488.308458] vfs_kern_mount.part.0+0x5e/0x3d0 [ 488.312939] do_mount+0x417/0x27d0 [ 488.316464] ? copy_mount_options+0x5c/0x2f0 [ 488.320855] ? rcu_read_lock_sched_held+0x110/0x130 [ 488.325859] ? copy_mount_string+0x40/0x40 [ 488.330081] ? copy_mount_options+0x1fe/0x2f0 [ 488.334567] SyS_mount+0xab/0x120 [ 488.338003] ? copy_mnt_ns+0x8c0/0x8c0 [ 488.341876] do_syscall_64+0x1e8/0x640 [ 488.345744] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 488.350578] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 488.355833] RIP: 0033:0x45c4aa [ 488.359005] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 488.366715] RAX: ffffffffffffffda RBX: 00007f39d7da8b40 RCX: 000000000045c4aa [ 488.373980] RDX: 00007f39d7da8ae0 RSI: 0000000020000100 RDI: 00007f39d7da8b00 14:49:32 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0xb) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f0000000200)={{}, {}, [{}, {}, {}, {}, {}], {}, [{}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) [ 488.381235] RBP: 0000000000000001 R08: 00007f39d7da8b40 R09: 00007f39d7da8ae0 [ 488.388486] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 488.395735] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:32 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:32 executing program 5 (fault-call:2 fault-nth:71): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) 14:49:32 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 488.581162] FAULT_INJECTION: forcing a failure. [ 488.581162] name failslab, interval 1, probability 0, space 0, times 0 [ 488.595235] CPU: 0 PID: 21588 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 488.602271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 488.611632] Call Trace: [ 488.614400] dump_stack+0x138/0x197 [ 488.618041] should_fail.cold+0x10f/0x159 [ 488.622201] should_failslab+0xdb/0x130 [ 488.626278] kmem_cache_alloc_trace+0x2e9/0x790 [ 488.630957] selinux_parse_opts_str+0x3c1/0xa30 [ 488.635622] ? selinux_sb_show_options+0xd50/0xd50 [ 488.640546] ? free_pages+0x46/0x50 [ 488.644257] ? selinux_sb_copy_data+0x21e/0x390 [ 488.648919] security_sb_parse_opts_str+0x75/0xb0 [ 488.653770] parse_security_options+0x4e/0xa0 [ 488.658264] btrfs_mount+0x2bb/0x2b28 [ 488.662743] ? lock_downgrade+0x740/0x740 [ 488.666883] ? find_held_lock+0x35/0x130 [ 488.670941] ? pcpu_alloc+0x3af/0x1050 [ 488.674993] ? btrfs_remount+0x11f0/0x11f0 [ 488.679357] ? rcu_read_lock_sched_held+0x110/0x130 [ 488.684802] ? __lockdep_init_map+0x10c/0x570 [ 488.689463] mount_fs+0x97/0x2a1 [ 488.692842] vfs_kern_mount.part.0+0x5e/0x3d0 [ 488.697351] ? find_held_lock+0x35/0x130 [ 488.701418] vfs_kern_mount+0x40/0x60 [ 488.705235] btrfs_mount+0x3ce/0x2b28 [ 488.709024] ? lock_downgrade+0x740/0x740 [ 488.713296] ? find_held_lock+0x35/0x130 [ 488.717356] ? pcpu_alloc+0x3af/0x1050 [ 488.721251] ? btrfs_remount+0x11f0/0x11f0 [ 488.725484] ? rcu_read_lock_sched_held+0x110/0x130 [ 488.730650] ? __lockdep_init_map+0x10c/0x570 [ 488.735289] ? __lockdep_init_map+0x10c/0x570 [ 488.739978] mount_fs+0x97/0x2a1 [ 488.743354] vfs_kern_mount.part.0+0x5e/0x3d0 [ 488.747853] do_mount+0x417/0x27d0 [ 488.751401] ? copy_mount_options+0x5c/0x2f0 [ 488.756004] ? rcu_read_lock_sched_held+0x110/0x130 [ 488.761023] ? copy_mount_string+0x40/0x40 [ 488.765257] ? copy_mount_options+0x1fe/0x2f0 [ 488.769738] SyS_mount+0xab/0x120 [ 488.773180] ? copy_mnt_ns+0x8c0/0x8c0 [ 488.777077] do_syscall_64+0x1e8/0x640 [ 488.780974] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 488.785826] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 488.791133] RIP: 0033:0x45c4aa [ 488.794319] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 488.802026] RAX: ffffffffffffffda RBX: 00007f39d7da8b40 RCX: 000000000045c4aa [ 488.809287] RDX: 00007f39d7da8ae0 RSI: 0000000020000100 RDI: 00007f39d7da8b00 [ 488.816551] RBP: 0000000000000001 R08: 00007f39d7da8b40 R09: 00007f39d7da8ae0 [ 488.823822] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 488.831249] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:32 executing program 5 (fault-call:2 fault-nth:72): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) 14:49:32 executing program 3: accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f00000002c0)}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0xc0, 0x1) ioctl$sock_ifreq(0xffffffffffffffff, 0xed28994e034fb51, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0xfd, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x4f5f}, 0xc75, 0x0, 0x0, 0x9, 0x200}, 0x0, 0x12, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r6, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) r7 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000700)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x6c08280}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x140, 0x0, 0x300, 0x870bd28, 0x25dfdbfd, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x20040801) r8 = socket(0x11, 0x2, 0x0) r9 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) r10 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCADDDLCI(r10, 0x8980, &(0x7f0000000580)={'nr\x0fjc\x00\xff\x03\x00\x00\x00 \x00', 0x10001}) connect$l2tp(r1, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r10, 0x0, 0x0, 0x1, 0x0, {0xa, 0x4e23, 0x5, @rand_addr="0729f53a2eb41cf86e0f833ad0aca4f1", 0x6}}}, 0x32) ioctl$SIOCX25SFACILITIES(r8, 0x89e3, 0x0) ioctl$NBD_SET_SOCK(r9, 0xab00, r8) sendmsg$NET_DM_CMD_START(r8, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40200800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r7, 0x0, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x30010863}, 0x48001) setsockopt$llc_int(r8, 0x10c, 0x1, &(0x7f0000000100)=0x7, 0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x20010, 0xffffffffffffffff, 0x0) [ 488.945966] FAULT_INJECTION: forcing a failure. [ 488.945966] name failslab, interval 1, probability 0, space 0, times 0 [ 488.961113] CPU: 0 PID: 21599 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 488.968252] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 488.977615] Call Trace: [ 488.980209] dump_stack+0x138/0x197 [ 488.983849] should_fail.cold+0x10f/0x159 [ 488.988464] should_failslab+0xdb/0x130 [ 488.992443] kmem_cache_alloc+0x2d7/0x780 [ 488.996836] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 489.002210] ? btrfs_scan_one_device+0x89/0x400 [ 489.007142] ? trace_hardirqs_on_caller+0x400/0x590 [ 489.012157] getname_kernel+0x53/0x350 [ 489.016151] kern_path+0x20/0x40 [ 489.019511] lookup_bdev.part.0+0x63/0x160 [ 489.024001] ? blkdev_open+0x260/0x260 [ 489.027898] ? free_hot_cold_page+0x763/0xca0 [ 489.032389] blkdev_get_by_path+0x76/0xf0 [ 489.036546] btrfs_scan_one_device+0x97/0x400 [ 489.041212] ? device_list_add+0x8d0/0x8d0 [ 489.045442] ? __free_pages+0x54/0x90 [ 489.049381] ? free_pages+0x46/0x50 [ 489.053004] btrfs_mount+0x2e3/0x2b28 [ 489.057004] ? lock_downgrade+0x740/0x740 [ 489.061142] ? find_held_lock+0x35/0x130 [ 489.065325] ? pcpu_alloc+0x3af/0x1050 [ 489.069216] ? btrfs_remount+0x11f0/0x11f0 [ 489.073485] ? rcu_read_lock_sched_held+0x110/0x130 [ 489.078518] ? __lockdep_init_map+0x10c/0x570 [ 489.078552] mount_fs+0x97/0x2a1 [ 489.086406] vfs_kern_mount.part.0+0x5e/0x3d0 [ 489.086417] ? find_held_lock+0x35/0x130 [ 489.086433] vfs_kern_mount+0x40/0x60 [ 489.094987] btrfs_mount+0x3ce/0x2b28 [ 489.095000] ? lock_downgrade+0x740/0x740 [ 489.095008] ? find_held_lock+0x35/0x130 [ 489.095019] ? pcpu_alloc+0x3af/0x1050 [ 489.102622] ? btrfs_remount+0x11f0/0x11f0 [ 489.102635] ? rcu_read_lock_sched_held+0x110/0x130 [ 489.102651] ? __lockdep_init_map+0x10c/0x570 [ 489.102662] ? __lockdep_init_map+0x10c/0x570 [ 489.102679] mount_fs+0x97/0x2a1 [ 489.102692] vfs_kern_mount.part.0+0x5e/0x3d0 [ 489.102704] do_mount+0x417/0x27d0 14:49:33 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, 0x0, 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 489.102715] ? copy_mount_options+0x5c/0x2f0 [ 489.110904] ? rcu_read_lock_sched_held+0x110/0x130 [ 489.110919] ? copy_mount_string+0x40/0x40 [ 489.110933] ? copy_mount_options+0x1fe/0x2f0 [ 489.110946] SyS_mount+0xab/0x120 [ 489.110955] ? copy_mnt_ns+0x8c0/0x8c0 [ 489.110970] do_syscall_64+0x1e8/0x640 [ 489.167503] block nbd3: Device being setup by another task [ 489.170665] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 489.170685] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 489.170692] RIP: 0033:0x45c4aa 14:49:33 executing program 5 (fault-call:2 fault-nth:73): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) [ 489.170697] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 489.170707] RAX: ffffffffffffffda RBX: 00007f39d7da8b40 RCX: 000000000045c4aa [ 489.170713] RDX: 00007f39d7da8ae0 RSI: 0000000020000100 RDI: 00007f39d7da8b00 [ 489.170718] RBP: 0000000000000001 R08: 00007f39d7da8b40 R09: 00007f39d7da8ae0 [ 489.170723] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 489.170727] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 [ 489.313837] FAULT_INJECTION: forcing a failure. [ 489.313837] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 489.326852] CPU: 1 PID: 21614 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 489.333990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 489.343349] Call Trace: [ 489.345946] dump_stack+0x138/0x197 [ 489.349590] should_fail.cold+0x10f/0x159 [ 489.353736] ? __might_sleep+0x93/0xb0 14:49:33 executing program 2: syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1a9b, 0x0) getuid() r0 = syz_open_dev$usbfs(0x0, 0x0, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x104140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80, 0x0, @perf_bp={0x0}, 0x1e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x81, 0x8, 0x3, 0x3f, 0x0, 0x3, 0x200, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7ff, 0x6, @perf_bp={&(0x7f0000000080), 0x5}, 0x1, 0x9, 0x1f, 0x4, 0x6, 0xffffffff, 0x7}, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0x8) r2 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r2, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) getsockopt$inet6_buf(r2, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000340)='./bus\x00', 0x341042, 0x1) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r3, 0x80003) sendfile(r2, r3, &(0x7f00000000c0), 0x8000fffffffe) sendto$rose(r3, &(0x7f0000000740)="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", 0x1000, 0x4, &(0x7f0000000180)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, 0x1, @null}, 0x1c) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = creat(&(0x7f0000000040)='./file1\x00', 0x0) fallocate(r4, 0x0, 0x2000000, 0x4) fallocate(r4, 0x8, 0x1200000, 0x8000) syz_open_procfs(0x0, 0x0) setuid(0x0) r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x5) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f00000006c0)='security.ima\x00', &(0x7f0000000700)=ANY=[@ANYBLOB="04061e642ae7d59ff102312fdbbdfa15"], 0x10, 0x1) sendmmsg(r5, &(0x7f00000092c0), 0x4e0, 0xbb8) mmap$usbfs(&(0x7f0000002000/0x4000)=nil, 0x204e00, 0x0, 0x11, r0, 0x0) r6 = epoll_create(0x1) r7 = dup2(r0, r6) mmap$binder(&(0x7f0000004000/0x2000)=nil, 0x2000, 0x1, 0x11, r7, 0x0) 14:49:33 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(0x0, 0x0) [ 489.357143] overlayfs: filesystem on './file0' not supported as upperdir [ 489.357633] __alloc_pages_nodemask+0x1d6/0x7a0 [ 489.369152] ? __alloc_pages_slowpath+0x2930/0x2930 [ 489.374179] ? lock_downgrade+0x740/0x740 [ 489.378554] alloc_pages_current+0xec/0x1e0 [ 489.382886] __page_cache_alloc+0x248/0x3e0 [ 489.387218] do_read_cache_page+0x625/0xfc0 [ 489.391720] ? blkdev_writepages+0xd0/0xd0 [ 489.395962] ? find_get_pages_contig+0xaa0/0xaa0 [ 489.400729] ? blkdev_get+0xb0/0x8e0 [ 489.404474] ? dput.part.0+0x170/0x750 [ 489.408361] ? bd_may_claim+0xd0/0xd0 [ 489.412337] ? path_put+0x50/0x70 [ 489.415799] ? lookup_bdev.part.0+0xe1/0x160 [ 489.420300] read_cache_page_gfp+0x6e/0x90 [ 489.424971] btrfs_read_disk_super+0xdd/0x440 [ 489.429545] btrfs_scan_one_device+0xc6/0x400 [ 489.434113] ? device_list_add+0x8d0/0x8d0 [ 489.438343] ? __free_pages+0x54/0x90 [ 489.442145] ? free_pages+0x46/0x50 [ 489.445980] btrfs_mount+0x2e3/0x2b28 [ 489.449772] ? lock_downgrade+0x740/0x740 [ 489.453912] ? find_held_lock+0x35/0x130 [ 489.457992] ? pcpu_alloc+0x3af/0x1050 [ 489.461868] ? btrfs_remount+0x11f0/0x11f0 [ 489.466217] ? rcu_read_lock_sched_held+0x110/0x130 [ 489.471235] ? __lockdep_init_map+0x10c/0x570 [ 489.475892] mount_fs+0x97/0x2a1 [ 489.479251] vfs_kern_mount.part.0+0x5e/0x3d0 [ 489.483889] ? find_held_lock+0x35/0x130 [ 489.487935] vfs_kern_mount+0x40/0x60 [ 489.491809] btrfs_mount+0x3ce/0x2b28 [ 489.495706] ? lock_downgrade+0x740/0x740 [ 489.499955] ? find_held_lock+0x35/0x130 [ 489.504175] ? pcpu_alloc+0x3af/0x1050 [ 489.508061] ? btrfs_remount+0x11f0/0x11f0 [ 489.512460] ? rcu_read_lock_sched_held+0x110/0x130 [ 489.517642] ? __lockdep_init_map+0x10c/0x570 [ 489.522250] ? __lockdep_init_map+0x10c/0x570 [ 489.526924] mount_fs+0x97/0x2a1 [ 489.530287] vfs_kern_mount.part.0+0x5e/0x3d0 [ 489.534783] do_mount+0x417/0x27d0 [ 489.538325] ? copy_mount_options+0x5c/0x2f0 [ 489.542870] ? rcu_read_lock_sched_held+0x110/0x130 [ 489.548030] ? copy_mount_string+0x40/0x40 [ 489.552365] ? copy_mount_options+0x1fe/0x2f0 [ 489.556849] SyS_mount+0xab/0x120 [ 489.560299] ? copy_mnt_ns+0x8c0/0x8c0 [ 489.564193] do_syscall_64+0x1e8/0x640 [ 489.568090] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 489.573039] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 489.578216] RIP: 0033:0x45c4aa [ 489.581420] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 489.589376] RAX: ffffffffffffffda RBX: 00007f39d7da8b40 RCX: 000000000045c4aa [ 489.596934] RDX: 00007f39d7da8ae0 RSI: 0000000020000100 RDI: 00007f39d7da8b00 [ 489.604218] RBP: 0000000000000001 R08: 00007f39d7da8b40 R09: 00007f39d7da8ae0 14:49:33 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(0x0, 0x0) [ 489.611746] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 489.619020] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:33 executing program 5 (fault-call:2 fault-nth:74): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) [ 489.723949] FAULT_INJECTION: forcing a failure. [ 489.723949] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 489.737464] CPU: 1 PID: 21627 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 489.744511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 489.753878] Call Trace: [ 489.756627] dump_stack+0x138/0x197 [ 489.760290] should_fail.cold+0x10f/0x159 [ 489.763804] audit: type=1400 audit(1571323773.719:215): avc: denied { map } for pid=21632 comm="syz-executor.2" path="/dev/bus/usb/001/001" dev="devtmpfs" ino=1639 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:usb_device_t:s0 tclass=chr_file permissive=1 [ 489.764447] ? __might_sleep+0x93/0xb0 [ 489.764464] __alloc_pages_nodemask+0x1d6/0x7a0 [ 489.764479] ? __alloc_pages_slowpath+0x2930/0x2930 [ 489.805927] ? lock_downgrade+0x740/0x740 [ 489.807521] audit: type=1400 audit(1571323773.719:216): avc: denied { map } for pid=21630 comm="syz-executor.2" path="socket:[90164]" dev="sockfs" ino=90164 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=tcp_socket permissive=1 [ 489.810091] alloc_pages_current+0xec/0x1e0 [ 489.810107] __page_cache_alloc+0x248/0x3e0 [ 489.810120] do_read_cache_page+0x625/0xfc0 [ 489.841220] ? blkdev_writepages+0xd0/0xd0 [ 489.841241] ? find_get_pages_contig+0xaa0/0xaa0 [ 489.841249] ? blkdev_get+0xb0/0x8e0 [ 489.841261] ? dput.part.0+0x170/0x750 [ 489.854282] ? bd_may_claim+0xd0/0xd0 [ 489.870501] ? path_put+0x50/0x70 14:49:33 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000180)='threaded\x00', 0x3d3427e) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dsp\x00', 0x40000, 0x0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r3, 0x800455d1, &(0x7f0000000400)) unlink(&(0x7f0000000100)='./file0\x00') r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000700)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x6c08280}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14, r4, 0x400, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0xfffffffffffffdb8}}, 0x20040801) r5 = socket(0x11, 0x2, 0x0) r6 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r5, 0x89e3, 0x0) ioctl$NBD_SET_SOCK(r6, 0xab00, r5) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40200800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r4, 0x8, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x30010863}, 0x48001) sendmsg$nl_netfilter(r5, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xdc, 0x14, 0x8, 0x200, 0x70bd26, 0x25dfdbfe, {0xe, 0x0, 0x2}, [@generic="3e4c7b7a4996a134c37f888fa7292928c0563fdbed7c56e00022c28a3f252b3954122a0803d70e702b1775be517dfe2c975b932e3cf0c27718c7e4d14a3526043bf144e69d684b7fea0a6c1b32d4d91acd9380be4fab0101e8c6d6ecc33053ca0d1c079ded50cd6d3382327663bccb096b3fa4b3551632f6135a0d3a9c05374235f8d94c2107788fc086f4f69f728e84026372dabb979e4b3fb73bf84db0216b51053fe3eae4888e40b9244fd0429d8169279a8e9afc12e82508bb3f7785fc9eed7601bc", @generic="3971b8"]}, 0xdc}, 0x1, 0x0, 0x0, 0x1}, 0x10) clone(0x1100100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x0, 0x0) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=@known='user.syz\x00') [ 489.873966] ? lookup_bdev.part.0+0xe1/0x160 [ 489.878382] read_cache_page_gfp+0x6e/0x90 [ 489.882625] btrfs_read_disk_super+0xdd/0x440 [ 489.887130] btrfs_scan_one_device+0xc6/0x400 [ 489.891657] ? device_list_add+0x8d0/0x8d0 [ 489.895905] ? __free_pages+0x54/0x90 [ 489.899806] ? free_pages+0x46/0x50 [ 489.903450] btrfs_mount+0x2e3/0x2b28 [ 489.907362] ? lock_downgrade+0x740/0x740 [ 489.911512] ? find_held_lock+0x35/0x130 [ 489.915661] ? pcpu_alloc+0x3af/0x1050 [ 489.919558] ? btrfs_remount+0x11f0/0x11f0 [ 489.923804] ? rcu_read_lock_sched_held+0x110/0x130 [ 489.928869] ? __lockdep_init_map+0x10c/0x570 [ 489.933379] mount_fs+0x97/0x2a1 [ 489.936767] vfs_kern_mount.part.0+0x5e/0x3d0 [ 489.941268] ? find_held_lock+0x35/0x130 [ 489.945342] vfs_kern_mount+0x40/0x60 [ 489.949155] btrfs_mount+0x3ce/0x2b28 [ 489.952960] ? lock_downgrade+0x740/0x740 [ 489.957121] ? find_held_lock+0x35/0x130 [ 489.961187] ? pcpu_alloc+0x3af/0x1050 [ 489.965212] ? btrfs_remount+0x11f0/0x11f0 [ 489.969460] ? rcu_read_lock_sched_held+0x110/0x130 [ 489.974497] ? __lockdep_init_map+0x10c/0x570 [ 489.979003] ? __lockdep_init_map+0x10c/0x570 [ 489.983514] mount_fs+0x97/0x2a1 [ 489.986892] vfs_kern_mount.part.0+0x5e/0x3d0 [ 489.991403] do_mount+0x417/0x27d0 [ 489.994968] ? retint_kernel+0x2d/0x2d [ 489.998882] ? copy_mount_string+0x40/0x40 [ 490.003145] ? copy_mount_options+0xad/0x2f0 [ 490.007749] ? copy_mount_options+0x1fe/0x2f0 [ 490.012274] SyS_mount+0xab/0x120 [ 490.015744] ? copy_mnt_ns+0x8c0/0x8c0 [ 490.019657] do_syscall_64+0x1e8/0x640 [ 490.023563] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 490.028458] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 490.033844] RIP: 0033:0x45c4aa [ 490.037048] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 490.044984] RAX: ffffffffffffffda RBX: 00007f39d7da8b40 RCX: 000000000045c4aa [ 490.052534] RDX: 00007f39d7da8ae0 RSI: 0000000020000100 RDI: 00007f39d7da8b00 [ 490.059887] RBP: 0000000000000001 R08: 00007f39d7da8b40 R09: 00007f39d7da8ae0 [ 490.067166] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 14:49:34 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, 0x0, 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 490.074664] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:34 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x578, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) mremap(&(0x7f0000282000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000268000/0x2000)=nil) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) 14:49:34 executing program 5 (fault-call:2 fault-nth:75): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) [ 490.134091] block nbd3: Device being setup by another task 14:49:34 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(0x0, 0x0) 14:49:34 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) r4 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r4, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r4, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) getsockopt$inet6_buf(r4, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = open(&(0x7f0000000340)='./bus\x00', 0x341042, 0x1) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x200000, 0x0) r7 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000700)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x6c08280}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14, r7, 0x400, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0xfffffffffffffdb8}}, 0x20040801) r8 = socket(0x11, 0x2, 0x0) r9 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r8, 0x89e3, 0x0) ioctl$NBD_SET_SOCK(r9, 0xab00, r8) sendmsg$NET_DM_CMD_START(r8, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40200800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r7, 0x8, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x30010863}, 0x48001) sendmsg$NET_DM_CMD_STOP(r6, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8600000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r7, 0x200, 0x70bd2c, 0x25dfdbff, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x8030}, 0x11) ioctl$VIDIOC_S_DV_TIMINGS(r6, 0xc0845657, &(0x7f0000000280)={0x0, @bt={0x81, 0x80000000, 0x1, 0x1, 0x7fffffff, 0x0, 0x5, 0x6, 0x2, 0x7, 0xdc8, 0x5, 0x643600, 0x7, 0x18, 0xd}}) ftruncate(r5, 0x80003) sendfile(r4, r5, &(0x7f00000000c0), 0x8000fffffffe) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r10, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(r10, 0x5380) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000040)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000140)={{0x5, 0x5, 0x6, 0x3ff, 'syz1\x00', 0x400}, 0x4, 0x20000000, 0x6, r11, 0x2, 0x1, 'syz0\x00', &(0x7f00000000c0)=['+{em0\x00', 'md5sum}%:,\x00'], 0x11, [], [0x1ff, 0x5, 0x7f, 0xc73e]}) syz_read_part_table(0x7562, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="25a533a977c03fc335b5db4dc1b9709ea73b309d6176b880d130e71b2f2969a6ce44", 0x9}]) [ 490.304723] FAULT_INJECTION: forcing a failure. [ 490.304723] name failslab, interval 1, probability 0, space 0, times 0 [ 490.344958] CPU: 1 PID: 21652 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 490.352034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 490.361415] Call Trace: [ 490.364038] dump_stack+0x138/0x197 [ 490.367693] should_fail.cold+0x10f/0x159 [ 490.371857] should_failslab+0xdb/0x130 [ 490.375846] kmem_cache_alloc_node+0x56/0x780 [ 490.380352] ? mount_fs+0x97/0x2a1 [ 490.383903] create_task_io_context+0x31/0x3d0 [ 490.388509] generic_make_request_checks+0x1505/0x1ac0 [ 490.393795] ? rcu_read_lock_sched_held+0x110/0x130 [ 490.398832] ? blk_cleanup_queue+0x610/0x610 [ 490.403338] ? trace_hardirqs_on+0x10/0x10 [ 490.407582] generic_make_request+0x7d/0xa40 [ 490.411999] ? save_trace+0x290/0x290 [ 490.415940] ? blk_queue_enter+0x520/0x520 [ 490.420187] ? find_held_lock+0x35/0x130 [ 490.424344] ? guard_bio_eod+0x161/0x530 [ 490.428417] submit_bio+0x1a5/0x3f0 [ 490.432050] ? submit_bio+0x1a5/0x3f0 [ 490.435940] ? generic_make_request+0xa40/0xa40 [ 490.440614] ? guard_bio_eod+0x1fd/0x530 [ 490.444679] submit_bh_wbc+0x550/0x720 [ 490.448576] block_read_full_page+0x7a2/0x960 [ 490.453083] ? set_init_blocksize+0x220/0x220 [ 490.457589] ? __bread_gfp+0x290/0x290 [ 490.461490] ? add_to_page_cache_lru+0x159/0x310 [ 490.466255] ? add_to_page_cache_locked+0x40/0x40 [ 490.471109] blkdev_readpage+0x1d/0x30 [ 490.475010] do_read_cache_page+0x671/0xfc0 [ 490.479514] ? blkdev_writepages+0xd0/0xd0 [ 490.483792] ? find_get_pages_contig+0xaa0/0xaa0 [ 490.488858] ? blkdev_get+0xb0/0x8e0 [ 490.492562] ? dput.part.0+0x170/0x750 [ 490.496440] ? bd_may_claim+0xd0/0xd0 [ 490.500234] ? path_put+0x50/0x70 [ 490.504368] ? lookup_bdev.part.0+0xe1/0x160 [ 490.508763] read_cache_page_gfp+0x6e/0x90 [ 490.512986] btrfs_read_disk_super+0xdd/0x440 [ 490.517544] btrfs_scan_one_device+0xc6/0x400 [ 490.522044] ? device_list_add+0x8d0/0x8d0 [ 490.526276] ? __free_pages+0x54/0x90 [ 490.530072] ? free_pages+0x46/0x50 [ 490.533722] btrfs_mount+0x2e3/0x2b28 [ 490.537550] ? lock_downgrade+0x740/0x740 [ 490.541706] ? find_held_lock+0x35/0x130 [ 490.545783] ? pcpu_alloc+0x3af/0x1050 [ 490.549692] ? btrfs_remount+0x11f0/0x11f0 [ 490.553944] ? rcu_read_lock_sched_held+0x110/0x130 [ 490.558958] ? __lockdep_init_map+0x10c/0x570 [ 490.564061] mount_fs+0x97/0x2a1 [ 490.567435] vfs_kern_mount.part.0+0x5e/0x3d0 [ 490.571916] ? find_held_lock+0x35/0x130 [ 490.575964] vfs_kern_mount+0x40/0x60 [ 490.579941] btrfs_mount+0x3ce/0x2b28 [ 490.584031] ? lock_downgrade+0x740/0x740 [ 490.588171] ? find_held_lock+0x35/0x130 [ 490.592232] ? pcpu_alloc+0x3af/0x1050 [ 490.597156] ? btrfs_remount+0x11f0/0x11f0 [ 490.601389] ? rcu_read_lock_sched_held+0x110/0x130 [ 490.606420] ? __lockdep_init_map+0x10c/0x570 [ 490.610914] ? __lockdep_init_map+0x10c/0x570 [ 490.615409] mount_fs+0x97/0x2a1 [ 490.618766] vfs_kern_mount.part.0+0x5e/0x3d0 [ 490.623275] do_mount+0x417/0x27d0 [ 490.626805] ? copy_mount_string+0x40/0x40 [ 490.631048] ? copy_mount_options+0x18f/0x2f0 [ 490.635529] ? __sanitizer_cov_trace_pc+0x4e/0x60 [ 490.640358] ? copy_mount_options+0x1fe/0x2f0 [ 490.644837] SyS_mount+0xab/0x120 [ 490.648276] ? copy_mnt_ns+0x8c0/0x8c0 [ 490.652151] do_syscall_64+0x1e8/0x640 [ 490.656036] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 490.660878] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 490.666053] RIP: 0033:0x45c4aa [ 490.669231] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 490.677203] RAX: ffffffffffffffda RBX: 00007f39d7da8b40 RCX: 000000000045c4aa [ 490.684589] RDX: 00007f39d7da8ae0 RSI: 0000000020000100 RDI: 00007f39d7da8b00 14:49:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f00000002c0)="3900000013000900edc6e91f48ec5804ab007448100000004600010700000014190001c0000000edff0003f5480000000000ef38bf461e59d7", 0x39}], 0x1) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x10000, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) pipe(0x0) socket$unix(0x1, 0x5, 0x0) 14:49:34 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000200)=ANY=[@ANYBLOB="79d589bbbb78587ce510906b29489fb394566ee14ffedd5d2f75471105851c09d3497771072aa587123db4c18bc2fc2f2fbdc3aec2f28700b2c2b69a140e0aab4a28ee01a8a8"], 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001300), 0x0, 0x10000000) write$vhci(0xffffffffffffffff, 0x0, 0x0) symlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000000)='.//ile0\x00') mkdir(&(0x7f0000000380)='./file0\x00', 0x46) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$VIDIOC_S_EDID(r0, 0xc0285629, &(0x7f0000000140)={0x0, 0x2, 0x401, [], &(0x7f00000000c0)=0x1}) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$FUSE_INTERRUPT(r1, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x400c000, 0x0, 0x0) getpgrp(0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, 0x0) ptrace(0x10, r2) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r3, &(0x7f0000000180)='.//ile0\x00', r3, &(0x7f00000007c0)='./file0/f.le.\x00') [ 490.692102] RBP: 0000000000000001 R08: 00007f39d7da8b40 R09: 00007f39d7da8ae0 [ 490.699371] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 490.706635] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:34 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(0x0, 0x0) 14:49:34 executing program 3: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3fb6cec1e3212b768eb868ea286c9d7f316f854f4c62fa7123993640817031a4aa24e895adaea42cfe5231d53ac80bedc11b47e543a8ff7dd76618b0e26f3e"}, 0x60) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x1904, 0x0) pselect6(0x40, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0xb303}, 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x8}, 0x0, 0x0) 14:49:34 executing program 5 (fault-call:2 fault-nth:76): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) 14:49:34 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x3ff, 0x0, 0xdce8}, 0x10) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='lp\x00') 14:49:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = inotify_init() inotify_add_watch(r0, 0x0, 0xfe) r1 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) sendmsg$sock(r1, &(0x7f0000000180)={&(0x7f0000000100)=@nfc={0x27, 0x1, 0x0, 0xf97253699417d13b}, 0x80, &(0x7f0000000080)=[{&(0x7f0000001300)="60a6748fa437116a9e7ed9a024d728004a58cc9563a7a025a8aa8a984d2c5efd9024436d1d33e2d6a9d6aedf2ba7b9e699c2d291579ca05b84068ee6267062d05ef146504f7135c0af6810fbbd244b1f3fd91a9eddcddb0d472bd1dd555a4c76ae5434ff994e73c5300989eaf540682cb6ee05a05fe14db6b727d3a76d6d9dce72ccfc11fa3e7fb6247d85f6509d685336a585c8976177886303348f69bf559bcb9293cd647ce5ccb5666e395096ba3712cf2045967aef5d51b48d96a7969eb59f9cb6311960dc641f9d456b1b534b327ef488547aead118b40ef3fa1b5dfa34f140e41ce2aee317f2c783cbbbe5ca2fa1620ee0599fdeb515a318b243dd83", 0xff}, {&(0x7f0000001400)="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", 0x1000}, {&(0x7f0000002400)="7a82efa49a5e8071d0f493b0da136c44fbb2a147f5d6375ac568016ffa21f1de2b4b1c4096b6433efa282d997d73f43657d694518d17279494196ecda39400b573470c8f5298183ba3fde4e6a526e503ff909106ee855a4f3662287c940a07eac6092567b523a0f9674625357d52e42a67a515b7d9db311451e35ca06a718b3e2d6e0d10e46322206a0bf738832bc821a2d72f759762ad763e489aadf44a", 0x9e}, {&(0x7f0000000000)="4c50204476f782ab4fb4d68ead2550fee912b6f19e5e116484a669db3dcbf7973f02deb0eb5b7328807710dc03d9f92ab4f765", 0x33}], 0x4, &(0x7f00000024c0)=[@txtime={{0x18}}, @mark={{0x14, 0x1, 0x24, 0x8000}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}, @mark={{0x14, 0x1, 0x24, 0x4}}, @txtime={{0x18, 0x1, 0x3d, 0x3}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}, @mark={{0x14}}, @mark={{0x14, 0x1, 0x24, 0xda75}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @timestamping={{0x14, 0x1, 0x25, 0x40}}], 0xf0}, 0x40) r2 = syz_open_dev$dspn(0x0, 0x0, 0x2) ioctl$VIDIOC_RESERVED(r2, 0x5601, 0x0) ioctl$int_in(r2, 0x800000c004500a, &(0x7f0000000040)=0x10000000006) write$UHID_INPUT(r2, &(0x7f00000002c0)={0x8, "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", 0xa943708f26830065}, 0x1006) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x10, &(0x7f0000000240)={0x0, 0x0, 0x0}}, 0x10) inotify_add_watch(r0, 0x0, 0x0) write$nbd(r1, &(0x7f00000000c0)=ANY=[@ANYRESDEC=r3], 0x1) sendfile(r1, r1, &(0x7f0000000200), 0xa198) [ 490.927484] overlayfs: filesystem on './file0' not supported as upperdir [ 490.997983] FAULT_INJECTION: forcing a failure. [ 490.997983] name failslab, interval 1, probability 0, space 0, times 0 [ 491.017664] CPU: 1 PID: 21692 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 491.024731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 491.024738] Call Trace: [ 491.024762] dump_stack+0x138/0x197 [ 491.024785] should_fail.cold+0x10f/0x159 [ 491.044495] should_failslab+0xdb/0x130 [ 491.044514] kmem_cache_alloc_node_trace+0x280/0x770 [ 491.044529] ? mutex_unlock+0xd/0x10 [ 491.044542] ? btrfs_scan_one_device+0xeb/0x400 [ 491.044556] __kmalloc_node+0x3d/0x80 [ 491.065872] kvmalloc_node+0x93/0xe0 [ 491.069602] btrfs_mount+0xf88/0x2b28 [ 491.074169] ? lock_downgrade+0x740/0x740 [ 491.078418] ? find_held_lock+0x35/0x130 [ 491.082483] ? pcpu_alloc+0x3af/0x1050 [ 491.086503] ? btrfs_remount+0x11f0/0x11f0 [ 491.090776] ? rcu_read_lock_sched_held+0x110/0x130 14:49:35 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, 0x0, 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:35 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f00000002c0)='./file0\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000440)=[{0x0, 0x0, 0xffff}], 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="636f6e746578743d757365725f752c01"]) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$SO_TIMESTAMP(r4, 0x1, 0x1d, &(0x7f0000000040), &(0x7f0000000100)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)=0x0) write$cgroup_pid(r5, &(0x7f0000000180)=r6, 0x12) 14:49:35 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(0x0, 0x0) [ 491.096081] ? __lockdep_init_map+0x10c/0x570 [ 491.100600] mount_fs+0x97/0x2a1 [ 491.103982] vfs_kern_mount.part.0+0x5e/0x3d0 [ 491.108495] ? find_held_lock+0x35/0x130 [ 491.112759] vfs_kern_mount+0x40/0x60 [ 491.116572] btrfs_mount+0x3ce/0x2b28 [ 491.120383] ? lock_downgrade+0x740/0x740 [ 491.124541] ? find_held_lock+0x35/0x130 [ 491.128613] ? pcpu_alloc+0x3af/0x1050 [ 491.132523] ? btrfs_remount+0x11f0/0x11f0 [ 491.136772] ? rcu_read_lock_sched_held+0x110/0x130 [ 491.141837] ? __lockdep_init_map+0x10c/0x570 [ 491.146373] ? __lockdep_init_map+0x10c/0x570 [ 491.151014] mount_fs+0x97/0x2a1 [ 491.154402] vfs_kern_mount.part.0+0x5e/0x3d0 [ 491.159262] do_mount+0x417/0x27d0 [ 491.162836] ? copy_mount_options+0x5c/0x2f0 [ 491.167265] ? rcu_read_lock_sched_held+0x110/0x130 [ 491.172330] ? copy_mount_string+0x40/0x40 [ 491.176591] ? copy_mount_options+0x1fe/0x2f0 [ 491.181107] SyS_mount+0xab/0x120 [ 491.184768] ? copy_mnt_ns+0x8c0/0x8c0 [ 491.188685] do_syscall_64+0x1e8/0x640 [ 491.192585] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 491.197614] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 491.202830] RIP: 0033:0x45c4aa [ 491.206030] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 491.214001] RAX: ffffffffffffffda RBX: 00007f39d7da8b40 RCX: 000000000045c4aa [ 491.221282] RDX: 00007f39d7da8ae0 RSI: 0000000020000100 RDI: 00007f39d7da8b00 [ 491.228569] RBP: 0000000000000001 R08: 00007f39d7da8b40 R09: 00007f39d7da8ae0 [ 491.228576] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 491.228581] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:35 executing program 5 (fault-call:2 fault-nth:77): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) [ 491.426814] FAULT_INJECTION: forcing a failure. [ 491.426814] name failslab, interval 1, probability 0, space 0, times 0 [ 491.477352] CPU: 1 PID: 21717 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 491.484421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 491.493788] Call Trace: [ 491.496399] dump_stack+0x138/0x197 [ 491.500048] should_fail.cold+0x10f/0x159 [ 491.504214] should_failslab+0xdb/0x130 [ 491.508205] kmem_cache_alloc_node+0x56/0x780 [ 491.512710] ? mount_fs+0x97/0x2a1 [ 491.516265] create_task_io_context+0x31/0x3d0 [ 491.520857] generic_make_request_checks+0x1505/0x1ac0 [ 491.526515] ? rcu_read_lock_sched_held+0x110/0x130 [ 491.531566] ? blk_cleanup_queue+0x610/0x610 [ 491.535987] ? trace_hardirqs_on+0x10/0x10 [ 491.540232] generic_make_request+0x7d/0xa40 [ 491.544641] ? save_trace+0x290/0x290 [ 491.548450] ? blk_queue_enter+0x520/0x520 [ 491.552701] ? find_held_lock+0x35/0x130 [ 491.556912] ? guard_bio_eod+0x161/0x530 [ 491.560981] submit_bio+0x1a5/0x3f0 [ 491.564785] ? submit_bio+0x1a5/0x3f0 [ 491.568586] ? generic_make_request+0xa40/0xa40 [ 491.573260] ? guard_bio_eod+0x1fd/0x530 [ 491.577411] submit_bh_wbc+0x550/0x720 [ 491.581314] block_read_full_page+0x7a2/0x960 [ 491.586772] ? set_init_blocksize+0x220/0x220 [ 491.591272] ? __bread_gfp+0x290/0x290 [ 491.595186] ? add_to_page_cache_lru+0x159/0x310 [ 491.599953] ? add_to_page_cache_locked+0x40/0x40 [ 491.604802] blkdev_readpage+0x1d/0x30 [ 491.608692] do_read_cache_page+0x671/0xfc0 [ 491.613012] ? blkdev_writepages+0xd0/0xd0 [ 491.617262] ? find_get_pages_contig+0xaa0/0xaa0 [ 491.622029] ? blkdev_get+0xb0/0x8e0 [ 491.625744] ? dput.part.0+0x170/0x750 [ 491.629928] ? bd_may_claim+0xd0/0xd0 [ 491.633732] ? path_put+0x50/0x70 [ 491.637194] ? lookup_bdev.part.0+0xe1/0x160 [ 491.641785] read_cache_page_gfp+0x6e/0x90 [ 491.646028] btrfs_read_disk_super+0xdd/0x440 [ 491.650532] btrfs_scan_one_device+0xc6/0x400 [ 491.655120] ? device_list_add+0x8d0/0x8d0 [ 491.659458] ? __free_pages+0x54/0x90 [ 491.663265] ? free_pages+0x46/0x50 [ 491.666906] btrfs_mount+0x2e3/0x2b28 [ 491.670709] ? lock_downgrade+0x740/0x740 [ 491.674964] ? find_held_lock+0x35/0x130 [ 491.679025] ? pcpu_alloc+0x3af/0x1050 [ 491.682927] ? btrfs_remount+0x11f0/0x11f0 [ 491.687175] ? rcu_read_lock_sched_held+0x110/0x130 [ 491.692202] ? __lockdep_init_map+0x10c/0x570 [ 491.696708] mount_fs+0x97/0x2a1 [ 491.700126] vfs_kern_mount.part.0+0x5e/0x3d0 [ 491.704620] ? find_held_lock+0x35/0x130 [ 491.708948] vfs_kern_mount+0x40/0x60 [ 491.712751] btrfs_mount+0x3ce/0x2b28 [ 491.716550] ? lock_downgrade+0x740/0x740 [ 491.720695] ? find_held_lock+0x35/0x130 [ 491.724752] ? pcpu_alloc+0x3af/0x1050 [ 491.728652] ? btrfs_remount+0x11f0/0x11f0 [ 491.732897] ? rcu_read_lock_sched_held+0x110/0x130 [ 491.737928] ? __lockdep_init_map+0x10c/0x570 [ 491.742423] ? __lockdep_init_map+0x10c/0x570 [ 491.747032] mount_fs+0x97/0x2a1 [ 491.750412] vfs_kern_mount.part.0+0x5e/0x3d0 [ 491.754917] do_mount+0x417/0x27d0 [ 491.758459] ? copy_mount_options+0x5c/0x2f0 [ 491.762872] ? rcu_read_lock_sched_held+0x110/0x130 [ 491.767912] ? copy_mount_string+0x40/0x40 [ 491.772151] ? copy_mount_options+0x1fe/0x2f0 [ 491.776857] SyS_mount+0xab/0x120 [ 491.780395] ? copy_mnt_ns+0x8c0/0x8c0 [ 491.784314] do_syscall_64+0x1e8/0x640 [ 491.788201] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 491.793057] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 491.798244] RIP: 0033:0x45c4aa [ 491.801438] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 491.809251] RAX: ffffffffffffffda RBX: 00007f39d7da8b40 RCX: 000000000045c4aa [ 491.816517] RDX: 00007f39d7da8ae0 RSI: 0000000020000100 RDI: 00007f39d7da8b00 14:49:35 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(0x0, 0x0) [ 491.823783] RBP: 0000000000000001 R08: 00007f39d7da8b40 R09: 00007f39d7da8ae0 [ 491.831049] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 491.838329] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 [ 491.848899] net_ratelimit: 25 callbacks suppressed [ 491.848904] protocol 88fb is buggy, dev hsr_slave_0 [ 491.859425] protocol 88fb is buggy, dev hsr_slave_1 14:49:35 executing program 0 (fault-call:3 fault-nth:0): write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:35 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:35 executing program 5 (fault-call:2 fault-nth:78): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) [ 492.096000] FAULT_INJECTION: forcing a failure. [ 492.096000] name failslab, interval 1, probability 0, space 0, times 0 [ 492.112972] CPU: 0 PID: 21731 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 492.122803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 492.132162] Call Trace: [ 492.132181] dump_stack+0x138/0x197 [ 492.132200] should_fail.cold+0x10f/0x159 [ 492.138381] ? __lock_is_held+0xb6/0x140 [ 492.138396] ? mempool_free+0x1d0/0x1d0 [ 492.138408] should_failslab+0xdb/0x130 [ 492.138422] kmem_cache_alloc+0x47/0x780 [ 492.158614] ? mempool_free+0x1d0/0x1d0 [ 492.162600] mempool_alloc_slab+0x47/0x60 [ 492.166758] mempool_alloc+0x138/0x300 [ 492.170650] ? __find_get_block+0x5c4/0xb10 [ 492.174981] ? remove_element.isra.0+0x1b0/0x1b0 [ 492.179744] ? mark_held_locks+0xb1/0x100 [ 492.184052] ? save_trace+0x290/0x290 [ 492.187881] ? trace_hardirqs_on_caller+0x400/0x590 [ 492.192913] bio_alloc_bioset+0x368/0x680 [ 492.197079] ? bvec_alloc+0x2e0/0x2e0 [ 492.201503] ? __getblk_gfp+0x5c/0x710 [ 492.205602] submit_bh_wbc+0xf6/0x720 [ 492.209423] __bread_gfp+0x106/0x290 [ 492.213147] btrfs_read_dev_one_super+0x9f/0x270 [ 492.217915] btrfs_read_dev_super+0x5d/0xb0 [ 492.222253] ? btrfs_read_dev_one_super+0x270/0x270 [ 492.227287] btrfs_get_bdev_and_sb+0xdc/0x2e0 [ 492.231789] __btrfs_open_devices+0x194/0xab0 [ 492.236382] ? check_preemption_disabled+0x3c/0x250 [ 492.241500] ? find_device+0x100/0x100 14:49:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) getsockopt$inet6_buf(r0, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = open(&(0x7f0000000340)='./bus\x00', 0x341042, 0x1) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r1, 0x80003) sendfile(r0, r1, &(0x7f00000000c0), 0x8000fffffffe) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={r0}) recvmmsg(r2, &(0x7f0000003ec0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000280)=""/65}, {&(0x7f00000001c0)=""/40}, {&(0x7f0000000780)=""/62}, {&(0x7f0000000400)=""/207}, {&(0x7f0000000500)=""/229}, {&(0x7f0000000600)=""/175}, {&(0x7f00000006c0)=""/6}], 0x33b}}], 0x400000000000015, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) syz_open_dev$adsp(0x0, 0x0, 0x22a000) r5 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) dup2(r3, r4) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) r7 = socket$inet_sctp(0x2, 0x1, 0x84) r8 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r7, 0x84, 0x22, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, r9}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r6, 0x84, 0x75, &(0x7f0000000100)={r9, 0x3}, &(0x7f0000000140)=0x8) ioctl$SG_GET_SCSI_ID(r5, 0x2276, &(0x7f0000000000)) writev(r4, &(0x7f00000023c0), 0x1000000000000252) 14:49:36 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x20000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xedb61ef03efde49a) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000280)=0xe8) r2 = geteuid() setreuid(r2, 0x0) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='Cpuacct.stE\xae\x00\xe7\xb5l4\x03U\xff\xf7\x02\xc0\x12\xce\xac\xbd\x04\x88cn\xb1\xa4\x81\xc0\x06\xfe\x1ct\x8e_\xd03\x90\x96\x01\x99YL\x1faq;\x1d-\x1b\a\x04\xe8`\xecv\xb9\xabW}e\x990\x9c@\x85\xba\xc8\xf0O\x8c\xff\x8b+O\'\x14\xe0\x1e4\xc0\bW8\x06\x1e\xc4\x8e\xb4>\xbf\xc8\x8a\xad\xf7}\xa2\x1a\xf8\x83\xc5\xe4\a\xc1\xcaK\'\xe4\xbb_\xfc\x1c\x11\x1f\x83?\x1dm\xbf\xbd\x80q7\xf0\xc1\x00\x90\xa3\xcb\rH\xefm\xa6\x8c\xc0q\xe6I\xe1]\xeb\xc6\xd3\xd9E\x04\xb7\xc3-F\xe6\xf7\x12\x1a63\x84\xc3\xa1w\x96\x9e\x8d\xb9\x96\x87\"O\x11x\xda', 0x275a, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) getgroups(0x5, &(0x7f0000000240)=[0x0, 0x0, 0xffffffffffffffff, 0x0, r6]) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='Cpuacct.stE\xae\x00\xe7\xb5l4\x03U\xff\xf7\x02\xc0\x12\xce\xac\xbd\x04\x88cn\xb1\xa4\x81\xc0\x06\xfe\x1ct\x8e_\xd03\x90\x96\x01\x99YL\x1faq;\x1d-\x1b\a\x04\xe8`\xecv\xb9\xabW}e\x990\x9c@\x85\xba\xc8\xf0O\x8c\xff\x8b+O\'\x14\xe0\x1e4\xc0\bW8\x06\x1e\xc4\x8e\xb4>\xbf\xc8\x8a\xad\xf7}\xa2\x1a\xf8\x83\xc5\xe4\a\xc1\xcaK\'\xe4\xbb_\xfc\x1c\x11\x1f\x83?\x1dm\xbf\xbd\x80q7\xf0\xc1\x00\x90\xa3\xcb\rH\xefm\xa6\x8c\xc0q\xe6I\xe1]\xeb\xc6\xd3\xd9E\x04\xb7\xc3-F\xe6\xf7\x12\x1a63\x84\xc3\xa1w\x96\x9e\x8d\xb9\x96\x87\"O\x11x\xda', 0x275a, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) getgroups(0x5, &(0x7f0000000240)=[0x0, 0x0, 0xffffffffffffffff, 0x0, r8]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580)={0x0, 0x0, 0x0}, &(0x7f00000005c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600)={0x0, 0x0, 0x0}, &(0x7f0000000700)=0xc) r11 = getegid() getresgid(&(0x7f0000000740)=0x0, &(0x7f00000007c0), &(0x7f0000000800)) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000840)={{}, {0x1, 0x4}, [{0x2, 0x7, r0}, {0x2, 0x2, r1}, {0x2, 0x1, r2}], {0x4, 0x1}, [{0x8, 0x1, r3}, {0x8, 0x5, r4}, {0x8, 0x6, r6}, {0x8, 0x4, r8}, {0x8, 0x3, r9}, {0x8, 0x5, r10}, {0x8, 0x1, r11}, {0x8, 0x3, r12}], {}, {0x20, 0xd27fd2045b50c3f3}}, 0x7c, 0x3) r13 = inotify_init() readv(r13, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x200, 0x0) inotify_add_watch(r13, &(0x7f0000000000)='./file0\x00', 0x82a) prctl$PR_SET_THP_DISABLE(0x29, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 492.245417] ? btrfs_mount+0x1069/0x2b28 [ 492.249577] ? rcu_read_lock_sched_held+0x110/0x130 [ 492.254606] btrfs_open_devices+0xa4/0xb0 [ 492.258857] btrfs_mount+0x11b4/0x2b28 [ 492.262842] ? lock_downgrade+0x740/0x740 [ 492.267084] ? find_held_lock+0x35/0x130 [ 492.271151] ? pcpu_alloc+0x3af/0x1050 [ 492.275227] ? btrfs_remount+0x11f0/0x11f0 [ 492.279467] ? rcu_read_lock_sched_held+0x110/0x130 [ 492.284502] ? __lockdep_init_map+0x10c/0x570 [ 492.289021] mount_fs+0x97/0x2a1 [ 492.292392] vfs_kern_mount.part.0+0x5e/0x3d0 14:49:36 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@remote}, {}, {0x0, 0x0, 0x0, 0x2}}, {{@in=@local}, 0x0, @in=@empty}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_submit(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) io_submit(0x0, 0x0, 0x0) io_setup(0x2, &(0x7f0000000180)=0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000340)='./bus\x00', 0x341042, 0x1) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r2, 0x80003) sendfile(r1, r2, &(0x7f00000000c0), 0x8000fffffffe) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) io_submit(r0, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, [], 0x23}, 0x1}, {0xa, 0x0, 0x0, @rand_addr="72e0cd1fe4fe3f3cfd3cb5ce8f15ea7d", 0x6}}}, 0x48) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) r3 = syz_open_dev$dri(0x0, 0x0, 0x0) r4 = dup2(0xffffffffffffffff, r3) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockname(r4, 0x0, &(0x7f00000002c0)) userfaultfd(0x0) [ 492.296899] ? find_held_lock+0x35/0x130 [ 492.301047] vfs_kern_mount+0x40/0x60 [ 492.304842] btrfs_mount+0x3ce/0x2b28 [ 492.304854] ? lock_downgrade+0x740/0x740 [ 492.304863] ? find_held_lock+0x35/0x130 [ 492.304872] ? pcpu_alloc+0x3af/0x1050 [ 492.304887] ? btrfs_remount+0x11f0/0x11f0 [ 492.325259] ? rcu_read_lock_sched_held+0x110/0x130 [ 492.330296] ? __lockdep_init_map+0x10c/0x570 [ 492.334794] ? __lockdep_init_map+0x10c/0x570 [ 492.339303] mount_fs+0x97/0x2a1 [ 492.342679] vfs_kern_mount.part.0+0x5e/0x3d0 [ 492.347183] do_mount+0x417/0x27d0 [ 492.350912] ? copy_mount_options+0x5c/0x2f0 [ 492.355554] ? rcu_read_lock_sched_held+0x110/0x130 [ 492.360670] ? copy_mount_string+0x40/0x40 [ 492.364916] ? copy_mount_options+0x1fe/0x2f0 [ 492.369418] SyS_mount+0xab/0x120 [ 492.372881] ? copy_mnt_ns+0x8c0/0x8c0 [ 492.376863] do_syscall_64+0x1e8/0x640 [ 492.380747] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 492.385602] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 492.385612] RIP: 0033:0x45c4aa [ 492.385617] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 492.385627] RAX: ffffffffffffffda RBX: 00007f39d7da8b40 RCX: 000000000045c4aa [ 492.385633] RDX: 00007f39d7da8ae0 RSI: 0000000020000100 RDI: 00007f39d7da8b00 [ 492.385640] RBP: 0000000000000001 R08: 00007f39d7da8b40 R09: 00007f39d7da8ae0 [ 492.385646] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 492.385652] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 [ 492.385910] protocol 88fb is buggy, dev hsr_slave_0 14:49:36 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xfffffffffffffe1b) r0 = inotify_init() socket$caif_stream(0x25, 0x1, 0x5) readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) r1 = fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(r1, &(0x7f0000000040)='cmdline\x00') r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x690c42, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, &(0x7f0000000100)={{0x2, 0x8, 0x7, 0x47, 0x6, 0x2}, 0x5, 0x3, 0x2}) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 492.409294] protocol 88fb is buggy, dev hsr_slave_1 14:49:36 executing program 5 (fault-call:2 fault-nth:79): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) [ 492.578370] BFS-fs: bfs_fill_super(): loop2 is unclean, continuing [ 492.629316] FAULT_INJECTION: forcing a failure. [ 492.629316] name failslab, interval 1, probability 0, space 0, times 0 [ 492.642327] CPU: 1 PID: 21763 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 492.649372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 492.649377] Call Trace: [ 492.649402] dump_stack+0x138/0x197 [ 492.649424] should_fail.cold+0x10f/0x159 [ 492.649442] should_failslab+0xdb/0x130 [ 492.649462] kmem_cache_alloc_trace+0x2e9/0x790 14:49:36 executing program 2: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x125082, 0x0) r4 = socket(0x11, 0x2, 0x0) r5 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r4, 0x89e3, 0x0) ioctl$NBD_SET_SOCK(r5, 0xab00, r4) dup3(r3, r5, 0x87925702af5b6999) ftruncate(r2, 0x8200) r6 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = geteuid() setreuid(r8, 0x0) setxattr$security_capability(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v3={0x3000000, [{0x9c, 0xff}, {0x80, 0x8}], r8}, 0x18, 0x0) r9 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r6, 0x0) r10 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r10, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r10, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) getsockopt$inet6_buf(r10, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendto$inet6(r10, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000340)='./bus\x00', 0x341042, 0x1) setsockopt$SO_TIMESTAMPING(r10, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r10, r11, &(0x7f00000000c0), 0x8000fffffffe) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r10, 0x400c6615, &(0x7f0000000140)={0x0, @adiantum}) getresuid(&(0x7f00000004c0), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x44800) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) [ 492.649474] ? __kmalloc_node+0x51/0x80 [ 492.682528] btrfs_mount+0x1001/0x2b28 [ 492.686446] ? lock_downgrade+0x740/0x740 [ 492.690627] ? find_held_lock+0x35/0x130 [ 492.694827] ? pcpu_alloc+0x3af/0x1050 [ 492.698904] ? btrfs_remount+0x11f0/0x11f0 [ 492.703145] ? rcu_read_lock_sched_held+0x110/0x130 [ 492.708183] ? __lockdep_init_map+0x10c/0x570 [ 492.712698] mount_fs+0x97/0x2a1 [ 492.716072] vfs_kern_mount.part.0+0x5e/0x3d0 [ 492.720574] ? find_held_lock+0x35/0x130 [ 492.724728] vfs_kern_mount+0x40/0x60 [ 492.728900] btrfs_mount+0x3ce/0x2b28 [ 492.732866] ? lock_downgrade+0x740/0x740 [ 492.737015] ? find_held_lock+0x35/0x130 [ 492.741102] ? pcpu_alloc+0x3af/0x1050 [ 492.744993] ? btrfs_remount+0x11f0/0x11f0 [ 492.749220] ? rcu_read_lock_sched_held+0x110/0x130 [ 492.754373] ? __lockdep_init_map+0x10c/0x570 [ 492.758876] ? __lockdep_init_map+0x10c/0x570 [ 492.763381] mount_fs+0x97/0x2a1 [ 492.766926] vfs_kern_mount.part.0+0x5e/0x3d0 [ 492.771425] do_mount+0x417/0x27d0 [ 492.774965] ? copy_mount_options+0x5c/0x2f0 [ 492.779399] ? rcu_read_lock_sched_held+0x110/0x130 [ 492.784508] ? copy_mount_string+0x40/0x40 [ 492.788995] ? copy_mount_options+0x1fe/0x2f0 [ 492.793484] SyS_mount+0xab/0x120 [ 492.796922] ? copy_mnt_ns+0x8c0/0x8c0 [ 492.801034] do_syscall_64+0x1e8/0x640 [ 492.804910] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 492.809745] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 492.814924] RIP: 0033:0x45c4aa [ 492.818106] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 14:49:36 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 492.825898] RAX: ffffffffffffffda RBX: 00007f39d7da8b40 RCX: 000000000045c4aa [ 492.833157] RDX: 00007f39d7da8ae0 RSI: 0000000020000100 RDI: 00007f39d7da8b00 [ 492.840427] RBP: 0000000000000001 R08: 00007f39d7da8b40 R09: 00007f39d7da8ae0 [ 492.847701] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 492.855160] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 [ 492.864122] protocol 88fb is buggy, dev hsr_slave_0 [ 492.869296] protocol 88fb is buggy, dev hsr_slave_1 [ 492.870273] protocol 88fb is buggy, dev hsr_slave_0 14:49:36 executing program 4 (fault-call:2 fault-nth:0): bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:36 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x62a, 0x0, 0x0) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f0000000040)) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 492.879400] protocol 88fb is buggy, dev hsr_slave_1 [ 492.884585] protocol 88fb is buggy, dev hsr_slave_0 [ 492.889629] protocol 88fb is buggy, dev hsr_slave_1 14:49:36 executing program 5 (fault-call:2 fault-nth:80): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) [ 492.961584] FAULT_INJECTION: forcing a failure. [ 492.961584] name failslab, interval 1, probability 0, space 0, times 0 [ 492.967338] block nbd2: Device being setup by another task [ 492.987056] CPU: 1 PID: 21775 Comm: syz-executor.4 Not tainted 4.14.149 #0 [ 492.994124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 493.003579] Call Trace: [ 493.006193] dump_stack+0x138/0x197 [ 493.009859] should_fail.cold+0x10f/0x159 [ 493.014025] should_failslab+0xdb/0x130 [ 493.014045] __kmalloc+0x2f0/0x7a0 [ 493.014063] ? __lock_acquire+0x5f7/0x4620 [ 493.014075] ? rw_copy_check_uvector+0x1d8/0x290 [ 493.014092] rw_copy_check_uvector+0x1d8/0x290 [ 493.014116] import_iovec+0xa2/0x370 [ 493.014127] ? dup_iter+0x260/0x260 [ 493.014136] ? save_trace+0x290/0x290 [ 493.014145] ? proc_fail_nth_write+0x7d/0x180 [ 493.014164] vfs_readv+0xb3/0x130 [ 493.021687] ? compat_rw_copy_check_uvector+0x310/0x310 [ 493.021704] ? lock_downgrade+0x740/0x740 [ 493.021719] ? __fget+0x237/0x370 [ 493.021734] ? __fget_light+0x172/0x1f0 [ 493.021750] do_readv+0x10a/0x2d0 [ 493.021761] ? vfs_readv+0x130/0x130 [ 493.021770] ? do_preadv+0x200/0x200 [ 493.021784] SyS_readv+0x28/0x30 [ 493.028838] FAULT_INJECTION: forcing a failure. [ 493.028838] name failslab, interval 1, probability 0, space 0, times 0 [ 493.030986] do_syscall_64+0x1e8/0x640 [ 493.030997] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 493.031017] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 493.031025] RIP: 0033:0x459a59 [ 493.031030] RSP: 002b:00007f6e80516c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 493.031039] RAX: ffffffffffffffda RBX: 00007f6e80516c90 RCX: 0000000000459a59 [ 493.031044] RDX: 0000000000000286 RSI: 00000000200006c0 RDI: 0000000000000003 [ 493.031054] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 493.143850] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6e805176d4 [ 493.151127] R13: 00000000004c6fe7 R14: 00000000004dcba8 R15: 0000000000000004 [ 493.164835] CPU: 0 PID: 21779 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 493.171901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 493.181477] Call Trace: [ 493.184081] dump_stack+0x138/0x197 [ 493.187724] should_fail.cold+0x10f/0x159 [ 493.187742] should_failslab+0xdb/0x130 [ 493.187757] kmem_cache_alloc+0x2d7/0x780 [ 493.200038] ? _atomic_dec_and_lock+0x66/0xb0 [ 493.204536] ? iput+0x476/0x900 [ 493.204550] getname_kernel+0x53/0x350 [ 493.204562] kern_path+0x20/0x40 [ 493.204576] lookup_bdev.part.0+0x63/0x160 [ 493.204585] ? blkdev_open+0x260/0x260 [ 493.204599] ? wait_for_completion+0x420/0x420 [ 493.204612] blkdev_get_by_path+0x76/0xf0 [ 493.204631] btrfs_get_bdev_and_sb+0x38/0x2e0 [ 493.236901] __btrfs_open_devices+0x194/0xab0 [ 493.241422] ? check_preemption_disabled+0x3c/0x250 [ 493.246529] ? find_device+0x100/0x100 [ 493.250587] ? btrfs_mount+0x1069/0x2b28 [ 493.254749] ? rcu_read_lock_sched_held+0x110/0x130 [ 493.259801] btrfs_open_devices+0xa4/0xb0 14:49:37 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) getsockopt$inet6_buf(r0, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = open(&(0x7f0000000340)='./bus\x00', 0x341042, 0x1) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r1, 0x80003) sendfile(r0, r1, &(0x7f00000000c0), 0x8000fffffffe) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={r0}) recvmmsg(r2, &(0x7f0000003ec0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000280)=""/65}, {&(0x7f00000001c0)=""/40}, {&(0x7f0000000780)=""/62}, {&(0x7f0000000400)=""/207}, {&(0x7f0000000500)=""/229}, {&(0x7f0000000600)=""/175}, {&(0x7f00000006c0)=""/6}], 0x33b}}], 0x400000000000015, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) syz_open_dev$adsp(0x0, 0x0, 0x22a000) r5 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) dup2(r3, r4) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) r7 = socket$inet_sctp(0x2, 0x1, 0x84) r8 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r7, 0x84, 0x22, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, r9}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r6, 0x84, 0x75, &(0x7f0000000100)={r9, 0x3}, &(0x7f0000000140)=0x8) ioctl$SG_GET_SCSI_ID(r5, 0x2276, &(0x7f0000000000)) writev(r4, &(0x7f00000023c0), 0x1000000000000252) [ 493.263966] btrfs_mount+0x11b4/0x2b28 [ 493.267874] ? lock_downgrade+0x740/0x740 [ 493.272037] ? find_held_lock+0x35/0x130 [ 493.276108] ? pcpu_alloc+0x3af/0x1050 [ 493.280023] ? btrfs_remount+0x11f0/0x11f0 [ 493.284369] ? rcu_read_lock_sched_held+0x110/0x130 [ 493.289455] ? __lockdep_init_map+0x10c/0x570 [ 493.293976] mount_fs+0x97/0x2a1 [ 493.297384] vfs_kern_mount.part.0+0x5e/0x3d0 [ 493.301900] ? find_held_lock+0x35/0x130 [ 493.305978] vfs_kern_mount+0x40/0x60 [ 493.309904] btrfs_mount+0x3ce/0x2b28 [ 493.313804] ? lock_downgrade+0x740/0x740 [ 493.318046] ? find_held_lock+0x35/0x130 [ 493.322120] ? pcpu_alloc+0x3af/0x1050 [ 493.327243] ? btrfs_remount+0x11f0/0x11f0 [ 493.331496] ? rcu_read_lock_sched_held+0x110/0x130 [ 493.336531] ? __lockdep_init_map+0x10c/0x570 [ 493.341041] ? __lockdep_init_map+0x10c/0x570 [ 493.345549] mount_fs+0x97/0x2a1 [ 493.348932] vfs_kern_mount.part.0+0x5e/0x3d0 [ 493.353432] do_mount+0x417/0x27d0 [ 493.356976] ? copy_mount_options+0x5c/0x2f0 [ 493.361395] ? rcu_read_lock_sched_held+0x110/0x130 [ 493.366423] ? copy_mount_string+0x40/0x40 [ 493.370788] ? copy_mount_options+0x1fe/0x2f0 [ 493.375295] SyS_mount+0xab/0x120 [ 493.378751] ? copy_mnt_ns+0x8c0/0x8c0 [ 493.382652] do_syscall_64+0x1e8/0x640 [ 493.386547] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 493.391404] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 493.396597] RIP: 0033:0x45c4aa [ 493.399791] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 493.408111] RAX: ffffffffffffffda RBX: 00007f39d7da8b40 RCX: 000000000045c4aa 14:49:37 executing program 4 (fault-call:2 fault-nth:1): bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 493.415380] RDX: 00007f39d7da8ae0 RSI: 0000000020000100 RDI: 00007f39d7da8b00 [ 493.415388] RBP: 0000000000000001 R08: 00007f39d7da8b40 R09: 00007f39d7da8ae0 [ 493.415393] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 493.415398] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:37 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000040)={0x7, 0x80, 0xfffffbff, 0xd1c9}, 0x10) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000080)=0x729a9e19) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x8000, 0x1) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) tkill(r1, 0x8) r2 = syz_open_procfs(r1, &(0x7f0000000140)='sched\x00') ioctl$UI_END_FF_ERASE(r2, 0x400c55cb, &(0x7f0000000180)={0x9, 0x1, 0xfff}) r3 = socket$kcm(0x29, 0x4, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f00000001c0)={'nr0\x00', {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x800, 0x0) ioctl$UI_SET_EVBIT(r4, 0x40045564, 0x0) socket$netlink(0x10, 0x3, 0x9) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x8c02, 0x0) ioctl$PPPIOCCONNECT(r5, 0x4004743a, &(0x7f0000000280)=0x1) pread64(0xffffffffffffffff, &(0x7f00000002c0)=""/4096, 0x1000, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f00000012c0)={0x9, 0x8, 0x8}) getpid() r6 = syz_open_dev$adsp(&(0x7f0000001a00)='/dev/adsp#\x00', 0x403a6921, 0x501802) getsockopt$netrom_NETROM_IDLE(r6, 0x103, 0x7, &(0x7f0000001a40)=0x2, &(0x7f0000001a80)=0x4) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000001b00)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000001bc0)={&(0x7f0000001ac0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000001b80)={&(0x7f0000001b40)={0x1c, r7, 0x10, 0x70bd29, 0x25dfdbfc}, 0x1c}, 0x1, 0x0, 0x0, 0x20000005}, 0x80) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000001c00)='/dev/vsock\x00', 0x80800, 0x0) stat(&(0x7f0000001c80)='./file0\x00', &(0x7f0000001cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(r8, &(0x7f0000003380)={&(0x7f0000001c40)={0x10, 0x0, 0x0, 0x408004}, 0xc, &(0x7f0000003340)={&(0x7f0000001d40)={0x15e0, 0x1c, 0x300, 0x70bd28, 0x25dfdbfc, {0x3}, [@generic="6212c442579c5158b1c048de2f30f7ffad59ef694cc783993b797731c84a89498b75cee9213cd76518831c4568ebbf26b0a7be049120d4742ce26559b4a50262779b4e408525d80c661c9a5b22355a91b9256591c7e90f706fa6a0209eefa5380b3b2def127d4ce0ca2e2c40071690fddc1cc6444ff5c4d648def5ece878d84c1e4499631717e4b9936289d5cdf313ce43c47e41774e916d1ea87d44bb06cf64709157167b298e71894d4d4ec8a02943fe9e078705f6163ad95e9181e0a45c028f8e5da7a22cbf7a01a0721f", @nested={0x10d8, 0x59, [@typed={0x14, 0x6f, @ipv6=@loopback}, @generic="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", @typed={0xc, 0x50, @u64=0x7ff}, @typed={0x98, 0x75, @binary="01aeab4baf5ac87fd208d3cc1bbd3ea21a98f6705fc3f45e845e986f7e3e7de9f489fbf3f10a63732fe8cc987a5546b794cfef0756339a9a111772e5304b5e47ae2973c028014e3f5edf1b96757ff4aef501e2c3fd21f1916abeeb9e045f9d8feaf9c5278924b9372663062484aed5cbf7ce2476b2d44e65723e5d571ff5b91e1f45783d3bb4e97b58e0f7301c6a8e9d86dd7b"}, @typed={0x8, 0x59, @uid=r9}, @typed={0x14, 0x1c, @ipv6=@loopback}]}, @nested={0x290, 0x3e, [@typed={0x8, 0x1d, @u32=0x7}, @generic="ee44b799301f19cda0023c7bfb579f97cdcb5254cf06aa465e9cd7e747f4d5560e69d4100cfbe32a8b929de5ce969544b28c45d9b5ff3edd104396b33d0543695e4db7bdd0b7686ed77b750469ca094afa494f5a2de6452e5003a7a9c5bdc4e14f0ef3d48f7436bdc32cc7daee7531953a1fbd2a17bcdfa80328b3457478eddeb04adfc9ea29af98cda11a28e50fcef256c8480d86944b79cf7a00956e29229f0f8ff712485194fbf9a08cfe9bbcd627b51e08eba255afd4db3459d31298b0ec21d87aa62984dbdd82fd9d3dbf472d2eb989e83cf4c6196609581b", @generic="776269ab82531909a0fea55bad076ea962c6aa33179b69b279cbf41b0bc7d99f13a9a23171f486c76f731af8fd33232c6b795e0717e647721875bbe9fc7961fc7b866fdbf0953d880b672c40152e63af95ce797d6e7320a186db89c1d2c58989759fbe8b9ea3013071f51900eadf2c3175b6a576b3d7ab0e57c20e07e2a043696a556f8f063f24a8", @typed={0x8, 0x1e, @u32=0x671}, @generic="c67203ab6a9b791f614a2d09690e3179ab9e6eb80df6b8554cad89bcb04678ecca83ae8ea0fa299463cbc5366512c6ea5f586388a7fda8fe7651c53b8984f5937e09fe30060f81b78341e80d44a3ca3baf07ad32c10394beaaf188cb8a07f5bdc53f0d878b0ed5205dbce8750f68eb1c183c551ae220544a86b2b7998af76b83362b28e18829b1589b", @typed={0x8, 0x8c, @ipv4=@empty}, @generic="e8ff8991ea3fe58fb9933539e70ca7c45a56383350d5109e53376de203d87d4b95d586e21bf95f13feb3136834be087cb9294933ce6a0d1d3802c95f74266004db8b5ed616e4dc406b8c17a8c8250d63fb5c10e3f7c4dbf7c54b82def8e3003820c2e4d645ceeef94f421b6b7ef143b21e345de8f43779f0928362575d08485df7e052d56089"]}, @typed={0x1c, 0x96, @binary="5aad75250315f8942cbc7d56948cf989ea4984c14a11"}, @typed={0x4, 0xc}, @generic="8783feb54ccf82f33a946b25cdaccf3f2190106d570faf27f48be20be35ea8d4a020982b221ea3d50dffdd5357e3a7f20762448968818a425ef42a71186792d846b2922b84691ef3024f96a7329cfaf1f81359a5f3eca5564b14265f62a6b315c61d688c56d1f481153b614e42932cfa693c19f76e51d16a7b3ae7f71728a0ebbbf7056eacba81129784b3afd1c4b3e54836023943c9a3fe88cf03354c80e59e8558f63969bf3ad5349e6b6b124357560f3a97e0c1c4e4da736970131157215e50361b3a64707e1a13c0bc2f8ca77e897a1303b26448ece1d2a706e895845406d17e251a978411e725987c", @generic="21335ad8079c0f5dc0bfffe16818f188a86ae6c45ebb8d438b9cc0d2a42591e9d1dd5087697a3e1342859fa42fe4452ef6fd488a9f41e602ae1de001819b602f0b329151671118eca25164adf906e8baae6c296d740a73c7daedca06f2d2708eb85813cf3788be03721d23085f185fb5dee3ff3db724e1a3f452890d18ba1d0d973ce05025", @typed={0x8, 0x67, @ipv4=@multicast2}]}, 0x15e0}, 0x1, 0x0, 0x0, 0x4000810}, 0x4000000) r10 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000033c0)='/dev/btrfs-control\x00', 0x200000, 0x0) bind$rds(r10, &(0x7f0000003400)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x27}}, 0x10) r11 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000003440)='cpuset.memory_spread_slab\x00', 0x2, 0x0) pwrite64(r11, &(0x7f0000003480)="a7477cf8f8c2a346932d67ae8dce4da3c7bc58bffe469af3721abe6334ce4dcda53d228f7ae679bf76e897974b057cc4bd1242d68291476c9a38e212eab1313f4c36f48994d99df27de50f529d521eed55a4bf37022bfcc7cd7759df13a0d6f8c17ddf72f0d98379dd08574119eddd95704acdfd9b10361a8f8008623743269db28ff5f65c2f108532202b267e238e6e812e4aee98438baa05c060b0d62e7a22e4f832", 0xa3, 0x0) r12 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$FS_IOC_GETFLAGS(r12, 0x80086601, &(0x7f0000003540)) 14:49:37 executing program 5 (fault-call:2 fault-nth:81): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) 14:49:37 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x2c540, 0x0) ioctl$VIDIOC_S_OUTPUT(r1, 0xc004562f, &(0x7f00000000c0)=0x81) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:37 executing program 2: socket$alg(0x26, 0x5, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() mmap(&(0x7f0000ff3000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000028c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) sched_setattr(0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) truncate(&(0x7f0000000100)='./file0\x00', 0x9) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000640)={'filter\x00', 0x5a, "36c3d65c305b2026e7e7185e2438fecdcdf3953ecc8e67297fdf52c34c76d2de35bf02ecfbd5ee388fec1a343c45f77449e2ba94cb0879140424caa821cec3e92a5fbdbab6ae542a4b1b38c8703a5a263a34a1e381887a24cf72"}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RVERSION(r2, &(0x7f0000000180)={0x15, 0x65, 0xffff, 0x8, 0x8, '9P2000.u'}, 0x15) getsockopt(0xffffffffffffffff, 0xff, 0x1, 0x0, &(0x7f0000000040)) accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000480)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x38a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x200000000, 0xffffffffffffffff}, 0x0, 0x2, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) [ 493.617485] FAULT_INJECTION: forcing a failure. [ 493.617485] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 493.629334] CPU: 1 PID: 21806 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 493.636357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 493.646415] Call Trace: [ 493.649013] dump_stack+0x138/0x197 [ 493.652640] should_fail.cold+0x10f/0x159 [ 493.656962] __alloc_pages_nodemask+0x1d6/0x7a0 [ 493.661637] ? __alloc_pages_slowpath+0x2930/0x2930 [ 493.666664] cache_grow_begin+0x80/0x400 [ 493.670727] kmem_cache_alloc+0x6a6/0x780 [ 493.674875] ? save_stack_trace+0x16/0x20 [ 493.679118] ? save_stack+0x45/0xd0 [ 493.682787] ? kmem_cache_alloc_trace+0x152/0x790 [ 493.687629] getname_kernel+0x53/0x350 [ 493.691661] kern_path+0x20/0x40 [ 493.695137] lookup_bdev.part.0+0x63/0x160 [ 493.699389] ? blkdev_open+0x260/0x260 [ 493.703279] ? btrfs_open_devices+0x27/0xb0 [ 493.707589] blkdev_get_by_path+0x76/0xf0 [ 493.711835] btrfs_get_bdev_and_sb+0x38/0x2e0 [ 493.716415] __btrfs_open_devices+0x194/0xab0 [ 493.720903] ? check_preemption_disabled+0x3c/0x250 [ 493.725913] ? find_device+0x100/0x100 [ 493.729800] ? btrfs_mount+0x1069/0x2b28 [ 493.734143] ? rcu_read_lock_sched_held+0x110/0x130 [ 493.739171] btrfs_open_devices+0xa4/0xb0 [ 493.743485] btrfs_mount+0x11b4/0x2b28 [ 493.747397] ? lock_downgrade+0x740/0x740 [ 493.751551] ? find_held_lock+0x35/0x130 [ 493.755612] ? pcpu_alloc+0x3af/0x1050 [ 493.759486] ? btrfs_remount+0x11f0/0x11f0 [ 493.763970] ? rcu_read_lock_sched_held+0x110/0x130 [ 493.769038] ? __lockdep_init_map+0x10c/0x570 [ 493.773548] mount_fs+0x97/0x2a1 [ 493.777008] vfs_kern_mount.part.0+0x5e/0x3d0 [ 493.781493] ? find_held_lock+0x35/0x130 [ 493.785563] vfs_kern_mount+0x40/0x60 [ 493.789351] btrfs_mount+0x3ce/0x2b28 [ 493.793139] ? lock_downgrade+0x740/0x740 [ 493.797268] ? find_held_lock+0x35/0x130 [ 493.801328] ? pcpu_alloc+0x3af/0x1050 [ 493.805229] ? btrfs_remount+0x11f0/0x11f0 [ 493.809454] ? rcu_read_lock_sched_held+0x110/0x130 [ 493.814461] ? __lockdep_init_map+0x10c/0x570 [ 493.818953] ? __lockdep_init_map+0x10c/0x570 [ 493.823620] mount_fs+0x97/0x2a1 [ 493.826981] vfs_kern_mount.part.0+0x5e/0x3d0 [ 493.831477] do_mount+0x417/0x27d0 [ 493.835009] ? copy_mount_options+0x5c/0x2f0 [ 493.839410] ? rcu_read_lock_sched_held+0x110/0x130 [ 493.844430] ? copy_mount_string+0x40/0x40 [ 493.848661] ? copy_mount_options+0x1fe/0x2f0 [ 493.853156] SyS_mount+0xab/0x120 [ 493.856595] ? copy_mnt_ns+0x8c0/0x8c0 [ 493.860470] do_syscall_64+0x1e8/0x640 [ 493.864433] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 493.869284] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 493.874697] RIP: 0033:0x45c4aa [ 493.877877] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 493.885844] RAX: ffffffffffffffda RBX: 00007f39d7da8b40 RCX: 000000000045c4aa [ 493.893114] RDX: 00007f39d7da8ae0 RSI: 0000000020000100 RDI: 00007f39d7da8b00 [ 493.900666] RBP: 0000000000000001 R08: 00007f39d7da8b40 R09: 00007f39d7da8ae0 [ 493.908190] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 14:49:37 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 493.915563] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:37 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000040)={0x8, 0x4}) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:37 executing program 2: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x183) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000700)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x6c08280}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14, r1, 0x400, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0xfffffffffffffdb8}}, 0x20040801) r2 = socket(0x11, 0x2, 0x0) r3 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r2, 0x89e3, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r2) sendmsg$NET_DM_CMD_START(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40200800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r1, 0x8, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x30010863}, 0x48001) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x9, 0x2}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) ioctl$VHOST_SET_VRING_ENDIAN(r4, 0x4008af13, &(0x7f00000000c0)={0x3, 0xee3}) socket$inet6_sctp(0xa, 0x0, 0x84) 14:49:37 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000340)={0x5, {{0xa, 0x4e22, 0x80000000, @local, 0x3}}, 0x1, 0x3, [{{0xa, 0x4e21, 0x8, @loopback, 0x20}}, {{0xa, 0x4e20, 0x8001, @ipv4={[], [], @remote}, 0x80000001}}, {{0xa, 0x4e20, 0x0, @rand_addr="6c36e129c7dac77e6da5b2db94e123dd", 0x4}}]}, 0x210) 14:49:38 executing program 5 (fault-call:2 fault-nth:82): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) [ 494.078074] FAULT_INJECTION: forcing a failure. [ 494.078074] name failslab, interval 1, probability 0, space 0, times 0 [ 494.089773] CPU: 1 PID: 21831 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 494.096820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 494.102945] block nbd2: Device being setup by another task [ 494.106173] Call Trace: [ 494.114542] dump_stack+0x138/0x197 [ 494.118184] should_fail.cold+0x10f/0x159 [ 494.122349] should_failslab+0xdb/0x130 [ 494.126335] kmem_cache_alloc+0x47/0x780 [ 494.126356] radix_tree_node_alloc.constprop.0+0x1c7/0x310 [ 494.126369] __radix_tree_create+0x337/0x4d0 [ 494.136068] page_cache_tree_insert+0xa7/0x2d0 [ 494.136083] ? file_check_and_advance_wb_err+0x380/0x380 [ 494.136095] ? debug_smp_processor_id+0x1c/0x20 [ 494.136115] __add_to_page_cache_locked+0x2ab/0x7e0 [ 494.145084] ? find_lock_entry+0x3f0/0x3f0 [ 494.145098] ? lock_downgrade+0x740/0x740 [ 494.145110] add_to_page_cache_lru+0xf4/0x310 [ 494.145123] ? add_to_page_cache_locked+0x40/0x40 [ 494.155233] ? __page_cache_alloc+0xdd/0x3e0 [ 494.155248] pagecache_get_page+0x1f5/0x750 [ 494.155264] __getblk_gfp+0x24b/0x710 [ 494.164498] ? lru_add_drain_all+0x18/0x20 [ 494.164519] __bread_gfp+0x2e/0x290 [ 494.164530] btrfs_read_dev_one_super+0x9f/0x270 [ 494.164541] btrfs_read_dev_super+0x5d/0xb0 [ 494.173686] ? btrfs_read_dev_one_super+0x270/0x270 [ 494.173700] btrfs_get_bdev_and_sb+0xdc/0x2e0 [ 494.173712] __btrfs_open_devices+0x194/0xab0 [ 494.173724] ? check_preemption_disabled+0x3c/0x250 14:49:38 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr\x1c\xbdn\xa9\x00', 0x2}) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r1, 0x0, 0x2000421, 0x1) fgetxattr(r0, &(0x7f0000000580)=ANY=[@ANYBLOB="73656304000000792e00ac3d9dd2dbe6bfb4634a8e84d4393f6f6f05a0351a92eb06000000000000006b013253a19c8628a9569cbe11f7fe9537c5b4cb781c9f841935de975f097ef33f43215912227073c10f8cf0af294e0b9376db0905950c60698e18c5fb9092f948"], &(0x7f0000000080)=""/54, 0x36) pipe(0x0) write(r1, &(0x7f0000002000)='/', 0x1) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000380)={'bridge_slave_1\x00', 0x1000}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x9fcc, 0x201) r4 = geteuid() setreuid(r4, 0x0) r5 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000700)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x6c08280}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14, r5, 0x400, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0xfffffffffffffdb8}}, 0x20040801) r6 = socket(0x11, 0x2, 0x0) r7 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r6, 0x89e3, 0x0) ioctl$NBD_SET_SOCK(r7, 0xab00, r6) sendmsg$NET_DM_CMD_START(r6, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40200800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r5, 0x8, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x30010863}, 0x48001) ioctl$SIOCAX25ADDUID(r6, 0x89e1, &(0x7f0000000180)={0x3, @default, r4}) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f0000000480)={{0x2, 0x3, 0xffffff00, 0xe81a06e08e8eec67, 0x3}, 0x2, 0xdd, 'id0\x00', 'timer1\x00', 0x0, 0x6628, 0x7, 0x1, 0x9}) r8 = syz_open_dev$midi(&(0x7f00000002c0)='/dev/midi#\x00', 0x8, 0x400) write$FUSE_INIT(r8, &(0x7f0000000300)={0x50, 0xfa191edc4ee36b89, 0x7, {0x7, 0x1f, 0x7f, 0x81, 0xcfa, 0x4, 0x2, 0x101}}, 0x50) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) sendfile(r1, r1, &(0x7f0000000100), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x400454d1, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r10 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/hwrng\x00', 0xc005, 0x0) setsockopt$TIPC_MCAST_BROADCAST(r10, 0x10f, 0x85) vmsplice(r9, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$EVIOCGSND(r9, 0x8040451a, &(0x7f00000001c0)=""/210) [ 494.173739] ? find_device+0x100/0x100 [ 494.173750] ? btrfs_mount+0x1069/0x2b28 [ 494.173762] ? rcu_read_lock_sched_held+0x110/0x130 [ 494.173775] btrfs_open_devices+0xa4/0xb0 [ 494.173786] btrfs_mount+0x11b4/0x2b28 [ 494.183141] ? lock_downgrade+0x740/0x740 [ 494.183151] ? find_held_lock+0x35/0x130 [ 494.183162] ? pcpu_alloc+0x3af/0x1050 [ 494.183181] ? btrfs_remount+0x11f0/0x11f0 [ 494.191277] ? rcu_read_lock_sched_held+0x110/0x130 [ 494.191300] ? __lockdep_init_map+0x10c/0x570 [ 494.191317] mount_fs+0x97/0x2a1 [ 494.191331] vfs_kern_mount.part.0+0x5e/0x3d0 [ 494.191339] ? find_held_lock+0x35/0x130 [ 494.191361] vfs_kern_mount+0x40/0x60 [ 494.199464] btrfs_mount+0x3ce/0x2b28 [ 494.199477] ? lock_downgrade+0x740/0x740 [ 494.213528] ? find_held_lock+0x35/0x130 [ 494.213542] ? pcpu_alloc+0x3af/0x1050 [ 494.213561] ? btrfs_remount+0x11f0/0x11f0 [ 494.213576] ? rcu_read_lock_sched_held+0x110/0x130 [ 494.227556] ? __lockdep_init_map+0x10c/0x570 [ 494.227569] ? __lockdep_init_map+0x10c/0x570 [ 494.227588] mount_fs+0x97/0x2a1 [ 494.235518] vfs_kern_mount.part.0+0x5e/0x3d0 [ 494.235534] do_mount+0x417/0x27d0 [ 494.235545] ? copy_mount_options+0x5c/0x2f0 [ 494.235555] ? rcu_read_lock_sched_held+0x110/0x130 [ 494.235567] ? copy_mount_string+0x40/0x40 [ 494.244727] ? copy_mount_options+0x1fe/0x2f0 [ 494.244742] SyS_mount+0xab/0x120 [ 494.244751] ? copy_mnt_ns+0x8c0/0x8c0 [ 494.244763] do_syscall_64+0x1e8/0x640 [ 494.244773] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 494.267641] block nbd3: Device being setup by another task [ 494.269962] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 494.269977] RIP: 0033:0x45c4aa [ 494.269982] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 494.269994] RAX: ffffffffffffffda RBX: 00007f39d7da8b40 RCX: 000000000045c4aa [ 494.270000] RDX: 00007f39d7da8ae0 RSI: 0000000020000100 RDI: 00007f39d7da8b00 [ 494.270005] RBP: 0000000000000001 R08: 00007f39d7da8b40 R09: 00007f39d7da8ae0 [ 494.270009] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 494.270014] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:38 executing program 5 (fault-call:2 fault-nth:83): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) [ 494.539326] FAULT_INJECTION: forcing a failure. [ 494.539326] name failslab, interval 1, probability 0, space 0, times 0 [ 494.550561] CPU: 0 PID: 21849 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 494.557587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 494.566929] Call Trace: [ 494.569515] dump_stack+0x138/0x197 [ 494.573129] should_fail.cold+0x10f/0x159 [ 494.577265] should_failslab+0xdb/0x130 [ 494.581248] kmem_cache_alloc+0x47/0x780 [ 494.585311] radix_tree_node_alloc.constprop.0+0x1c7/0x310 [ 494.590940] __radix_tree_create+0x337/0x4d0 [ 494.595344] page_cache_tree_insert+0xa7/0x2d0 [ 494.599996] ? file_check_and_advance_wb_err+0x380/0x380 [ 494.605431] ? debug_smp_processor_id+0x1c/0x20 [ 494.610089] __add_to_page_cache_locked+0x2ab/0x7e0 [ 494.615091] ? find_lock_entry+0x3f0/0x3f0 [ 494.619338] ? lock_downgrade+0x740/0x740 [ 494.623492] add_to_page_cache_lru+0xf4/0x310 [ 494.627974] ? add_to_page_cache_locked+0x40/0x40 [ 494.632800] ? __page_cache_alloc+0xdd/0x3e0 [ 494.637210] pagecache_get_page+0x1f5/0x750 [ 494.641527] __getblk_gfp+0x24b/0x710 [ 494.645314] ? lru_add_drain_all+0x18/0x20 [ 494.649712] __bread_gfp+0x2e/0x290 [ 494.653326] btrfs_read_dev_one_super+0x9f/0x270 [ 494.658087] btrfs_read_dev_super+0x5d/0xb0 [ 494.662390] ? btrfs_read_dev_one_super+0x270/0x270 [ 494.667392] btrfs_get_bdev_and_sb+0xdc/0x2e0 [ 494.671947] __btrfs_open_devices+0x194/0xab0 [ 494.676431] ? check_preemption_disabled+0x3c/0x250 [ 494.681438] ? find_device+0x100/0x100 [ 494.685500] ? btrfs_mount+0x1069/0x2b28 [ 494.689633] ? rcu_read_lock_sched_held+0x110/0x130 [ 494.694653] btrfs_open_devices+0xa4/0xb0 [ 494.699672] btrfs_mount+0x11b4/0x2b28 [ 494.703632] ? lock_downgrade+0x740/0x740 [ 494.707847] ? find_held_lock+0x35/0x130 [ 494.711989] ? pcpu_alloc+0x3af/0x1050 [ 494.715863] ? btrfs_remount+0x11f0/0x11f0 [ 494.720117] ? rcu_read_lock_sched_held+0x110/0x130 [ 494.725126] ? __lockdep_init_map+0x10c/0x570 [ 494.729716] mount_fs+0x97/0x2a1 [ 494.733068] vfs_kern_mount.part.0+0x5e/0x3d0 [ 494.737548] ? find_held_lock+0x35/0x130 [ 494.741596] vfs_kern_mount+0x40/0x60 [ 494.745384] btrfs_mount+0x3ce/0x2b28 [ 494.749174] ? lock_downgrade+0x740/0x740 [ 494.753396] ? find_held_lock+0x35/0x130 [ 494.757441] ? pcpu_alloc+0x3af/0x1050 [ 494.761322] ? btrfs_remount+0x11f0/0x11f0 [ 494.765549] ? rcu_read_lock_sched_held+0x110/0x130 [ 494.770557] ? __lockdep_init_map+0x10c/0x570 [ 494.775050] ? __lockdep_init_map+0x10c/0x570 [ 494.779532] mount_fs+0x97/0x2a1 [ 494.783935] vfs_kern_mount.part.0+0x5e/0x3d0 [ 494.789371] do_mount+0x417/0x27d0 [ 494.792900] ? copy_mount_options+0x5c/0x2f0 [ 494.797296] ? rcu_read_lock_sched_held+0x110/0x130 [ 494.802314] ? copy_mount_string+0x40/0x40 [ 494.806535] ? copy_mount_options+0x1fe/0x2f0 [ 494.811146] SyS_mount+0xab/0x120 [ 494.814579] ? copy_mnt_ns+0x8c0/0x8c0 [ 494.818450] do_syscall_64+0x1e8/0x640 [ 494.822328] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 494.827197] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 494.832369] RIP: 0033:0x45c4aa 14:49:38 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(0x0, 0x0) 14:49:38 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() prctl$PR_SVE_SET_VL(0x32, 0x21261) readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 494.835542] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 494.843233] RAX: ffffffffffffffda RBX: 00007f39d7da8b40 RCX: 000000000045c4aa [ 494.850487] RDX: 00007f39d7da8ae0 RSI: 0000000020000100 RDI: 00007f39d7da8b00 [ 494.857740] RBP: 0000000000000001 R08: 00007f39d7da8b40 R09: 00007f39d7da8ae0 [ 494.864989] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 494.872243] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:38 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x200000, 0x0) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000700)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x6c08280}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14, r1, 0x400, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0xfffffffffffffdb8}}, 0x20040801) r2 = socket(0x11, 0x2, 0x0) r3 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r2, 0x89e3, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r2) sendmsg$NET_DM_CMD_START(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40200800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r1, 0x8, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x30010863}, 0x48001) sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8600000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r1, 0x200, 0x70bd2c, 0x25dfdbff, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x8030}, 0x11) write$nbd(r0, &(0x7f00000000c0)={0x67446698, 0x0, 0x3, 0x1, 0x3, "2c67a158ab90214dd97aad999e0dc9fe41f5a185d4646586e9cb54c8a5"}, 0x2d) r4 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x1005, 0x0) r5 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000240)) readv(r4, &(0x7f0000000540)=[{&(0x7f0000000000)=""/90, 0x5a}], 0x1) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r5, 0x1000000000014) 14:49:39 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000040)={'ipddp0\x00', {0x2, 0x4e21, @multicast1}}) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:39 executing program 5 (fault-call:2 fault-nth:84): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) [ 495.020819] block nbd2: Device being setup by another task [ 495.074965] FAULT_INJECTION: forcing a failure. [ 495.074965] name failslab, interval 1, probability 0, space 0, times 0 [ 495.092924] CPU: 1 PID: 21868 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 495.099972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 495.109531] Call Trace: [ 495.112130] dump_stack+0x138/0x197 [ 495.115772] should_fail.cold+0x10f/0x159 [ 495.119932] ? __lock_is_held+0xb6/0x140 [ 495.124016] ? mempool_free+0x1d0/0x1d0 [ 495.128040] should_failslab+0xdb/0x130 [ 495.132024] kmem_cache_alloc+0x47/0x780 [ 495.136095] ? mempool_free+0x1d0/0x1d0 [ 495.140247] mempool_alloc_slab+0x47/0x60 [ 495.144397] mempool_alloc+0x138/0x300 [ 495.148288] ? __find_get_block+0x5c4/0xb10 [ 495.152625] ? remove_element.isra.0+0x1b0/0x1b0 [ 495.157391] ? mark_held_locks+0xb1/0x100 [ 495.161540] ? save_trace+0x290/0x290 [ 495.165477] ? trace_hardirqs_on_caller+0x400/0x590 [ 495.170503] bio_alloc_bioset+0x368/0x680 [ 495.174662] ? bvec_alloc+0x2e0/0x2e0 [ 495.178478] ? __getblk_gfp+0x5c/0x710 [ 495.182370] submit_bh_wbc+0xf6/0x720 [ 495.186173] __bread_gfp+0x106/0x290 [ 495.189895] btrfs_read_dev_one_super+0x9f/0x270 [ 495.192256] overlayfs: unrecognized mount option "euid>00000000000000060928" or missing value [ 495.194653] btrfs_read_dev_super+0x5d/0xb0 [ 495.194665] ? btrfs_read_dev_one_super+0x270/0x270 [ 495.194679] btrfs_get_bdev_and_sb+0xdc/0x2e0 [ 495.217254] __btrfs_open_devices+0x194/0xab0 [ 495.221757] ? check_preemption_disabled+0x3c/0x250 [ 495.226788] ? find_device+0x100/0x100 [ 495.230772] ? btrfs_mount+0x1069/0x2b28 [ 495.235043] ? rcu_read_lock_sched_held+0x110/0x130 [ 495.240070] btrfs_open_devices+0xa4/0xb0 [ 495.244225] btrfs_mount+0x11b4/0x2b28 [ 495.248122] ? lock_downgrade+0x740/0x740 [ 495.252271] ? find_held_lock+0x35/0x130 [ 495.256346] ? pcpu_alloc+0x3af/0x1050 [ 495.260249] ? btrfs_remount+0x11f0/0x11f0 [ 495.264513] ? rcu_read_lock_sched_held+0x110/0x130 [ 495.269547] ? __lockdep_init_map+0x10c/0x570 [ 495.269566] mount_fs+0x97/0x2a1 [ 495.277503] vfs_kern_mount.part.0+0x5e/0x3d0 [ 495.281993] ? find_held_lock+0x35/0x130 [ 495.282008] vfs_kern_mount+0x40/0x60 [ 495.282022] btrfs_mount+0x3ce/0x2b28 [ 495.282031] ? lock_downgrade+0x740/0x740 [ 495.282042] ? find_held_lock+0x35/0x130 [ 495.302128] ? pcpu_alloc+0x3af/0x1050 [ 495.306028] ? btrfs_remount+0x11f0/0x11f0 [ 495.310295] ? rcu_read_lock_sched_held+0x110/0x130 [ 495.315416] ? __lockdep_init_map+0x10c/0x570 [ 495.319980] ? __lockdep_init_map+0x10c/0x570 [ 495.324493] mount_fs+0x97/0x2a1 [ 495.327876] vfs_kern_mount.part.0+0x5e/0x3d0 [ 495.332382] do_mount+0x417/0x27d0 [ 495.335951] ? copy_mount_options+0x5c/0x2f0 [ 495.340378] ? rcu_read_lock_sched_held+0x110/0x130 [ 495.345491] ? copy_mount_string+0x40/0x40 [ 495.349732] ? copy_mount_options+0x1fe/0x2f0 [ 495.354235] SyS_mount+0xab/0x120 [ 495.357804] ? copy_mnt_ns+0x8c0/0x8c0 [ 495.361698] do_syscall_64+0x1e8/0x640 [ 495.365618] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 495.370754] entry_SYSCALL_64_after_hwframe+0x42/0xb7 14:49:39 executing program 3: mkdir(&(0x7f0000000180)='./bus\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = geteuid() r3 = geteuid() setreuid(r3, 0x0) r4 = geteuid() setreuid(r4, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000280)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}], [{@euid_gt={'euid>', 0xee00}}, {@uid_eq={'\t\x00d', 0x3d, r2}}, {@smackfsdef={'smackfsdef', 0x3d, 'uid'}}, {@measure='measure'}, {@fowner_eq={'fowner', 0x3d, r3}}, {@appraise='appraise'}, {@uid_lt={'uid<', r4}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 14:49:39 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSRS485(0xffffffffffffffff, 0x542f, &(0x7f0000000240)={0x9, 0x0, 0x7ff}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) timer_create(0x4, &(0x7f0000000080)={0x0, 0x11, 0x0, @thr={&(0x7f0000000340)="4221389c9cd132ff7f1a9b0e3084f8c77b23f3f704bbe7b804fd7a9906f5c4e48a07e42b5acc186a10cd9ebecbdb76b493d04ac38ac2e345af906ceeb4306a594f77007018713f0ccbc893b005ae8cb3059b3f473d9a6616e5e0582933939d40764b69dc5b86b97bf533d9b49ddc401bd3ac9cc435d60140b2cfffe20c30c011920a6c3d4d01c47e7b237f9015c3f611baab950805c11b5d9806492db8546c8aa2", &(0x7f0000000400)}}, &(0x7f00000001c0)) write$rfkill(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) fanotify_init(0x0, 0x0) [ 495.375947] RIP: 0033:0x45c4aa [ 495.379134] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 495.386870] RAX: ffffffffffffffda RBX: 00007f39d7da8b40 RCX: 000000000045c4aa [ 495.394139] RDX: 00007f39d7da8ae0 RSI: 0000000020000100 RDI: 00007f39d7da8b00 [ 495.401417] RBP: 0000000000000001 R08: 00007f39d7da8b40 R09: 00007f39d7da8ae0 [ 495.408694] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 495.415973] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:39 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x0, 0xfffffffe, 0x108f}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xfffffffffffffe0c) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000340)='./bus\x00', 0x341042, 0x1) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r2, 0x80003) sendfile(r1, r2, &(0x7f00000000c0), 0x8000fffffffe) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) utimensat(r2, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)={{}, {r3, r4/1000+30000}}, 0x100) [ 495.424557] bridge0: port 2(bridge_slave_1) entered disabled state [ 495.432421] bridge0: port 1(bridge_slave_0) entered disabled state 14:49:39 executing program 3: socket$kcm(0x2, 0x0, 0x73) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'syz_tun\x00\x00\x00\x00\x00\x01\b\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="400000001400090100000000000000000a000000", @ANYRES32=r1, @ANYBLOB="140006000000000000000040000000000000000014000100fe8000000000000000000000000000aa69a515bf95e32b714e769db608b4f33c82ef69590ddbcce00a41f8d89e3fd6aa9a0bc79061bf6ba6a036dd414bb9d6155e1d3e1efdb07f450141f7330cdf0916eb13e9443ec5915e8695c6855a83e24eb2b16c7bc55107b6830bf3220873f216f4565580f53bd2e51ac0687950f2a1de82298b18b8a79a88871a2c7ffa73b532ce1f84b1514898437ddeafaa0eabfee845f2be5b66c734baec43fbf99ad5a2f11e7f228e55e02565747f130582516187d471f9c800c2ca831e8bc87ba6b8ce66345ab6c91fa97833a02877"], 0x40}}, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mq_getsetattr(r2, &(0x7f00000000c0)={0x3, 0xffffffffa836ebaf, 0x5e, 0x8, 0x5, 0x200, 0xceb8, 0x9}, &(0x7f0000000100)) socket$nl_route(0x10, 0x3, 0x0) 14:49:39 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x7) creat(&(0x7f00000001c0)='./file0\x00', 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) getresuid(&(0x7f0000000180), &(0x7f0000000600)=0x0, &(0x7f0000000700)) syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x6, &(0x7f0000000540)=[{&(0x7f0000000340)="97e1dd9126e0ee22e0c9101a094b674166741e7f8430ba83623c2eb84ae0cbd48203807ffcf2532d599542ef1ffd9393a8e2a0b7223ba0353acfc8fae7d313fd754f0630f869465d752c90a43da3fd3a222ec0b3f4cb582268a16e28262294fabcba591f313cc9c4b9f76800cda44d09dc611cdb39068eaab9bc32f13ee13de1c852bd3845b46ea333da907b1bf718df30e97dc9b1dc2620fbad2288add59eaa6a6b0f160cf712b02d6eb3448904a5f37fd206f32ce359615e651fe98e7c5da4c2311baf6cf0c8d0baabcad503822a180d5120a7949ab7581c3fd64c8169e30aa0bdd3f031020b6be6d2", 0xea, 0x7}, {&(0x7f00000007c0)="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", 0x1000, 0x9}, {&(0x7f0000000240)="b4f5761705c97e545a5eec2c41d5959b27ffa47ecf81a0d18c27d788c8d21a0767c40af1407ba26d54ee8a430a777b9798da384f46b43f2c66acbdee9313c155d89520500bc3d9c2834d03f0fc0accf2af205c3dca5c4ee4159a2c78dbebec3790051a76ecd76bab6d34a6b83bae8fe92aeee5f7a540b49ed9eabf02a903acfc69d1365081c094f4f7fbbebb28a9da551aa9205e78398eef57276a848a81bf76ffa7d3b2dde052eaa3905b91c96e30d25afd0b8801f6ba", 0xb7, 0x1a8}, {&(0x7f0000000440)="755a8945ffc5d1b411a8f7e7f4ad99a1f0b9f6aae2201663a5c5d11640b9a0b5fef5a9ea58d1b830851dc0b003ff697a23edad9c6772973333d02ec22fcf13ef85941d57f1928de5fbcdb5d417c5783e04ca9e88b90285fcce4958dec913b997e82c4cf8c92c513ea7017880753045a59b4e82a62ef097bc3a29e92b694d01f619f3e81d3979209184962468c880dd079f5e27b1990484ecdefa835ca5478900de3ed7cf2a4d098ca9730f827c45f504721f8ee44705ffd21fd9b6d6ab7539bc145bd9eed6662b1f93d11fc68d60cb3cac9dd9a12a04762b52069b1803217f855f4f631d19d762b4dcd7f079e663e698fc0e8acb227ed0371569056e3ca21d", 0xff, 0x4}, {&(0x7f00000017c0)="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", 0x1000, 0x2}, {&(0x7f00000027c0)="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", 0x1000, 0x7f}], 0x124042, &(0x7f00000037c0)={[{@errors_remount='errors=remount-ro'}, {@nls={'nls', 0x3d, 'maccenteuro'}}], [{@context={'context', 0x3d, 'root'}}, {@fsname={'fsname', 0x3d, '+GPL)+bdev'}}, {@appraise_type='appraise_type=imasig'}, {@pcr={'pcr', 0x3d, 0x26}}, {@smackfsfloor={'smackfsfloor'}}, {@fowner_eq={'fowner', 0x3d, r3}}, {@smackfsfloor={'smackfsfloor', 0x3d, '^bdevsystem\'#%@,'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}) write(r2, &(0x7f0000000340), 0x41395527) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f0000000040)) [ 496.027759] block nbd2: Device being setup by another task 14:49:40 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(0x0, 0x0) 14:49:40 executing program 5 (fault-call:2 fault-nth:85): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) 14:49:40 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) ioctl$TCFLSH(r0, 0x540b, 0x6) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:40 executing program 2: perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) open(0x0, 0x1a3204, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x2, 0x3, 0xff) connect$inet(r4, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x29) r5 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r5, 0x84, 0x7b, &(0x7f00000002c0)={0x0, 0x7}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000340)={r6, 0x41}, 0x8) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1000002, 0x50, 0xffffffffffffffff, 0x0) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="cd0000", @ANYRESHEX=r7, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, 0x0) [ 496.335389] block nbd3: shutting down sockets [ 496.345741] FAULT_INJECTION: forcing a failure. [ 496.345741] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 496.357591] CPU: 0 PID: 21900 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 496.364616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 496.373982] Call Trace: [ 496.376596] dump_stack+0x138/0x197 [ 496.380256] should_fail.cold+0x10f/0x159 [ 496.384423] __alloc_pages_nodemask+0x1d6/0x7a0 [ 496.389105] ? __alloc_pages_slowpath+0x2930/0x2930 [ 496.394152] cache_grow_begin+0x80/0x400 [ 496.398258] kmem_cache_alloc+0x6a6/0x780 [ 496.402428] ? save_stack_trace+0x16/0x20 [ 496.406587] ? save_stack+0x45/0xd0 [ 496.410231] ? kmem_cache_alloc_trace+0x152/0x790 [ 496.415088] getname_kernel+0x53/0x350 [ 496.418987] kern_path+0x20/0x40 [ 496.422372] lookup_bdev.part.0+0x63/0x160 [ 496.426618] ? blkdev_open+0x260/0x260 [ 496.430517] ? btrfs_open_devices+0x27/0xb0 [ 496.434866] blkdev_get_by_path+0x76/0xf0 [ 496.439030] btrfs_get_bdev_and_sb+0x38/0x2e0 [ 496.443539] __btrfs_open_devices+0x194/0xab0 [ 496.448053] ? check_preemption_disabled+0x3c/0x250 [ 496.453084] ? find_device+0x100/0x100 [ 496.457085] ? btrfs_mount+0x1069/0x2b28 [ 496.461165] ? rcu_read_lock_sched_held+0x110/0x130 [ 496.466295] btrfs_open_devices+0xa4/0xb0 [ 496.470459] btrfs_mount+0x11b4/0x2b28 [ 496.474437] ? lock_downgrade+0x740/0x740 [ 496.478592] ? find_held_lock+0x35/0x130 [ 496.482667] ? pcpu_alloc+0x3af/0x1050 [ 496.486571] ? btrfs_remount+0x11f0/0x11f0 [ 496.490822] ? rcu_read_lock_sched_held+0x110/0x130 [ 496.495889] ? __lockdep_init_map+0x10c/0x570 [ 496.500404] mount_fs+0x97/0x2a1 [ 496.503779] vfs_kern_mount.part.0+0x5e/0x3d0 [ 496.508276] ? find_held_lock+0x35/0x130 [ 496.512370] vfs_kern_mount+0x40/0x60 [ 496.516179] btrfs_mount+0x3ce/0x2b28 [ 496.520128] ? lock_downgrade+0x740/0x740 [ 496.524286] ? find_held_lock+0x35/0x130 [ 496.528455] ? pcpu_alloc+0x3af/0x1050 [ 496.532370] ? btrfs_remount+0x11f0/0x11f0 [ 496.536743] ? rcu_read_lock_sched_held+0x110/0x130 [ 496.541780] ? __lockdep_init_map+0x10c/0x570 [ 496.546373] ? __lockdep_init_map+0x10c/0x570 [ 496.550887] mount_fs+0x97/0x2a1 [ 496.554271] vfs_kern_mount.part.0+0x5e/0x3d0 [ 496.558777] do_mount+0x417/0x27d0 [ 496.562323] ? copy_mount_options+0x5c/0x2f0 [ 496.566738] ? rcu_read_lock_sched_held+0x110/0x130 [ 496.571765] ? copy_mount_string+0x40/0x40 [ 496.576016] ? copy_mount_options+0x1fe/0x2f0 [ 496.580523] SyS_mount+0xab/0x120 [ 496.584334] ? copy_mnt_ns+0x8c0/0x8c0 [ 496.588220] do_syscall_64+0x1e8/0x640 [ 496.592225] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 496.597089] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 496.602282] RIP: 0033:0x45c4aa [ 496.605563] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 496.613319] RAX: ffffffffffffffda RBX: 00007f39d7da8b40 RCX: 000000000045c4aa [ 496.620603] RDX: 00007f39d7da8ae0 RSI: 0000000020000100 RDI: 00007f39d7da8b00 [ 496.627880] RBP: 0000000000000001 R08: 00007f39d7da8b40 R09: 00007f39d7da8ae0 [ 496.635155] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 496.642460] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 14:49:40 executing program 3: mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0xfffffff4) syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) fcntl$setsig(r0, 0xa, 0x16) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r2 = socket(0x2000000000000010, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=@can_delroute={0x14, 0x19, 0x1, 0x0, 0x0, {0x1d, 0x0}}, 0x14}}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 14:49:40 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r0, 0xfffffffffffffe2c, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x0, 0xf, 0x401, 0x38}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f0000000580)={'nr\x0fjc\x00\xff\x03\x00\x00\x00 \x00', 0x10001}) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000180)='nbd\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r4, &(0x7f0000008880), 0x62a, 0x0, 0x0) write(r0, &(0x7f0000000e00)="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", 0x210) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x74, 0x27, 0x7f, 0x34, 0x0, 0x100000000000000, 0x40, 0x4, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3ff, 0x8, @perf_bp={&(0x7f00000002c0), 0x4}, 0x10900, 0xe000, 0x9, 0x7, 0x2, 0xcca0, 0x2}, 0xffffffffffffffff, 0x5, r0, 0x2) fcntl$setpipe(r6, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r7, 0x407, 0x0) write(r7, &(0x7f0000000340), 0x41395527) r8 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r8, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r8, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) getsockopt$inet6_buf(r8, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendto$inet6(r8, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r9 = open(&(0x7f0000000340)='./bus\x00', 0x341042, 0x1) setsockopt$SO_TIMESTAMPING(r8, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r9, 0x80003) sendfile(r8, r9, &(0x7f00000000c0), 0x8000fffffffe) r10 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', 0x682a20, 0x0) r11 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0x1, 0x2) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r12, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000340)={&(0x7f00000008c0)=ANY=[@ANYBLOB='p\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="004400070008000100"/22, @ANYRES32=r3, @ANYBLOB="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"/291, @ANYRES32=r5, @ANYBLOB="3b7a45ffff", @ANYRES32=r7, @ANYBLOB="08000100", @ANYRES32=r9, @ANYBLOB="0801000025a6cb5723ba6de92c4b50c672cbd38dfe77471e5508c854050000000f0b4c9153a68f0d7105a875ba00de4a77c7", @ANYRES32=r10, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="fb88a7ff", @ANYRES32=r11, @ANYBLOB="08000100", @ANYRES32=r12, @ANYBLOB="0c0008000500000000f3ffff2b0008001c0000000000004600"], 0x13}, 0x1, 0x0, 0x0, 0x8000}, 0x1) r13 = inotify_init() readv(r13, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) r14 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCADDDLCI(r14, 0x8980, &(0x7f0000000580)={'nr\x0fjc\x00\xff\x03\x00\x00\x00 \x00', 0x10001}) dup(r14) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./bus\x00', 0x8000022e) r15 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_MAX_BURST(r15, 0x84, 0x14, &(0x7f0000000040)=@int=0x8, 0x4) 14:49:40 executing program 2: r0 = socket$inet6(0xa, 0x800000003, 0xff) r1 = open(&(0x7f0000000040)='./file0\x00', 0x80102, 0x0) write$selinux_load(r1, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "dfd4579e2afbe93af2eabdc0b4879d7069f4ad3b8db6118d300d0728abfe4ec160cd46a0cac7657ef844b62ca7dc92252befb9a78f658a06a0102109026ed83861d39d399e66a4e1eb5773b876dfc769d5ebfb9bfb4eb5457ac6e96658d8cbb568b2138e8398e70231b95622bf8679b1499b92bfa628c04bcc335a015b21b3408036c354a003b80ab3b624513db4a68f6ed33741d8d2d2716db789a3e3c942b9a138ffd8eb5950ce58fddee07f2365"}, 0xbf) connect$inet6(r0, &(0x7f0000000000), 0x1c) r2 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r2, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) getsockopt$inet6_buf(r2, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000340)='./bus\x00', 0x341042, 0x1) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r3, 0x80003) sendfile(r2, r3, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000180)={@local, 0x1, 0x1, 0x0, 0xc, 0x0, 0xffff}, 0x20) sendmmsg(r0, &(0x7f00000002c0)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000000600)="3f6b9c7bb156507048284dc93fc1c2ddadb65d197997c114536b4a384a0b9bbe51721b99ca74bded", 0x28}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[{0x10, 0x29, 0x37}], 0x10}}], 0x2, 0x0) 14:49:40 executing program 2: syz_mount_image$f2fs(&(0x7f0000000240)='f2fs.', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0xcd60, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0x7, 0x0, 0x65d59bee9bb0ee4c, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(r0, 0xc0106438, &(0x7f0000000080)={0x2, r1}) 14:49:40 executing program 3: syz_emit_ethernet(0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001300), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) ioctl$sock_x25_SIOCDELRT(r0, 0x890c, &(0x7f0000000800)={@null=' \x00', 0x2, 'ip6gretap0\x00'}) syz_genetlink_get_family_id$tipc2(0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/snmp\x00') preadv(0xffffffffffffffff, &(0x7f0000001300), 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, &(0x7f0000000380)) write$vhci(0xffffffffffffffff, 0x0, 0x0) symlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000000)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) renameat(r1, &(0x7f00000000c0)='./file2\x00', 0xffffffffffffff9c, 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000400)={0x2d8}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000700)) syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x3, 0x2000) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6, @in6=@initdev}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000280)=0xe8) mount$9p_rdma(&(0x7f00000001c0)='127.0.0.1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='9p\x00', 0x100002, &(0x7f0000000580)={'trans=rdma,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x400}}, {@common=@access_user='access=user'}, {@rq={'rq', 0x3d, 0x31}}, {@common=@afid={'a\xff\xff{', 0x3d, 0x2}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@appraise='appraise'}, {@obj_role={'obj_role', 0x3d, 'net/udp\x00'}}]}}) r3 = dup(r2) r4 = socket$inet6(0xa, 0x80003, 0x9) getsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f00000003c0), &(0x7f0000000640)=0x4) setsockopt$inet6_int(r4, 0x29, 0x16, &(0x7f0000000000), 0x4) getsockopt$inet6_mtu(r4, 0x29, 0x17, &(0x7f0000000680), &(0x7f00000006c0)=0x4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x523) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, 0x0, 0x4800) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r5, &(0x7f0000000180)='.//ile0\x00', r5, &(0x7f00000007c0)='./file0/f.le.\x00') [ 497.030039] net_ratelimit: 22 callbacks suppressed [ 497.030045] protocol 88fb is buggy, dev hsr_slave_0 [ 497.040003] protocol 88fb is buggy, dev hsr_slave_0 [ 497.040175] protocol 88fb is buggy, dev hsr_slave_1 [ 497.045161] protocol 88fb is buggy, dev hsr_slave_1 [ 497.055418] protocol 88fb is buggy, dev hsr_slave_0 [ 497.060496] protocol 88fb is buggy, dev hsr_slave_1 14:49:41 executing program 5 (fault-call:2 fault-nth:86): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) 14:49:41 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x200000, 0x0) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000700)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x6c08280}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14, r1, 0x400, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0xfffffffffffffdb8}}, 0x20040801) r2 = socket(0x11, 0x2, 0x0) r3 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r2, 0x89e3, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r2) sendmsg$NET_DM_CMD_START(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40200800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r1, 0x8, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x30010863}, 0x48001) sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8600000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r1, 0x200, 0x70bd2c, 0x25dfdbff, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x8030}, 0x11) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000040)={'bond0\x00', 0xffffffff}) readv(0xffffffffffffffff, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:41 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(0x0, 0x0) [ 497.110046] protocol 88fb is buggy, dev hsr_slave_0 [ 497.115214] protocol 88fb is buggy, dev hsr_slave_1 14:49:41 executing program 2: syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0x0) r1 = request_key(&(0x7f0000000280)='encrypted\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)='mime_typeproc[vboxnet1em1\x00', 0xfffffffffffffffe) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000240)=[{&(0x7f0000000180)="3bdb94b4f6f302a9d53cacc3fe541fae6ef6662ae52eab738b9a4c555673f266b00bdc197a450d8841437a9f218268d92c49bcdbeb357e9d34a0e5a33f2b1e1a9e6164b6b5a831356405f21e89f0ed34a5dadcff8ed803613265f5e0893eddc6599d7aacdb1139f97cda0f827822d47eeb72bd39f1cfa3acce95721d05d20015608761d8cd5974eb8704d9f0683ca070a4e256e380192d", 0x97}], 0x1, r1) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000000)=ANY=[@ANYBLOB="3000000010000108000000000101000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b000000000008000d0003000000"], 0x30}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 497.205939] FAULT_INJECTION: forcing a failure. [ 497.205939] name failslab, interval 1, probability 0, space 0, times 0 [ 497.216265] block nbd4: shutting down sockets [ 497.246755] CPU: 0 PID: 21942 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 497.253813] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 497.263274] Call Trace: [ 497.265970] dump_stack+0x138/0x197 [ 497.269618] should_fail.cold+0x10f/0x159 [ 497.274222] should_failslab+0xdb/0x130 [ 497.278874] kmem_cache_alloc+0x2d7/0x780 [ 497.283463] ? _atomic_dec_and_lock+0x66/0xb0 [ 497.288069] ? iput+0x476/0x900 [ 497.291354] getname_kernel+0x53/0x350 [ 497.295498] kern_path+0x20/0x40 [ 497.299046] lookup_bdev.part.0+0x63/0x160 [ 497.303284] ? blkdev_open+0x260/0x260 [ 497.307183] ? wait_for_completion+0x420/0x420 [ 497.311795] blkdev_get_by_path+0x76/0xf0 [ 497.315958] btrfs_get_bdev_and_sb+0x38/0x2e0 [ 497.320459] __btrfs_open_devices+0x194/0xab0 [ 497.324962] ? check_preemption_disabled+0x3c/0x250 [ 497.330108] ? find_device+0x100/0x100 [ 497.334204] ? btrfs_mount+0x1069/0x2b28 [ 497.338271] ? rcu_read_lock_sched_held+0x110/0x130 [ 497.343295] btrfs_open_devices+0xa4/0xb0 [ 497.347637] btrfs_mount+0x11b4/0x2b28 [ 497.351616] ? lock_downgrade+0x740/0x740 [ 497.355782] ? find_held_lock+0x35/0x130 [ 497.359843] ? pcpu_alloc+0x3af/0x1050 [ 497.364009] ? btrfs_remount+0x11f0/0x11f0 [ 497.368254] ? rcu_read_lock_sched_held+0x110/0x130 [ 497.373326] ? __lockdep_init_map+0x10c/0x570 [ 497.375337] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 497.378441] mount_fs+0x97/0x2a1 [ 497.378459] vfs_kern_mount.part.0+0x5e/0x3d0 [ 497.378470] ? find_held_lock+0x35/0x130 [ 497.378483] vfs_kern_mount+0x40/0x60 [ 497.378499] btrfs_mount+0x3ce/0x2b28 [ 497.378508] ? lock_downgrade+0x740/0x740 [ 497.378517] ? find_held_lock+0x35/0x130 [ 497.378526] ? pcpu_alloc+0x3af/0x1050 [ 497.378542] ? btrfs_remount+0x11f0/0x11f0 [ 497.421601] ? rcu_read_lock_sched_held+0x110/0x130 [ 497.426640] ? __lockdep_init_map+0x10c/0x570 [ 497.431171] ? __lockdep_init_map+0x10c/0x570 [ 497.435779] mount_fs+0x97/0x2a1 [ 497.439162] vfs_kern_mount.part.0+0x5e/0x3d0 [ 497.444818] do_mount+0x417/0x27d0 [ 497.448891] ? retint_kernel+0x2d/0x2d [ 497.452790] ? copy_mount_string+0x40/0x40 [ 497.457038] ? __sanitizer_cov_trace_pc+0x52/0x60 [ 497.462151] ? copy_mount_options+0x1fe/0x2f0 [ 497.466733] SyS_mount+0xab/0x120 [ 497.470195] ? copy_mnt_ns+0x8c0/0x8c0 [ 497.474091] do_syscall_64+0x1e8/0x640 [ 497.478002] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 497.482856] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 497.488157] RIP: 0033:0x45c4aa [ 497.492045] RSP: 002b:00007f39d7da8a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 497.499846] RAX: ffffffffffffffda RBX: 00007f39d7da8b40 RCX: 000000000045c4aa [ 497.507170] RDX: 00007f39d7da8ae0 RSI: 0000000020000100 RDI: 00007f39d7da8b00 [ 497.514474] RBP: 0000000000000001 R08: 00007f39d7da8b40 R09: 00007f39d7da8ae0 [ 497.521922] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 497.529552] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 [ 497.537123] protocol 88fb is buggy, dev hsr_slave_0 [ 497.542235] protocol 88fb is buggy, dev hsr_slave_1 14:49:41 executing program 5 (fault-call:2 fault-nth:87): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bf", 0x80, 0x10000}], 0x0, 0x0) [ 497.573868] block nbd4: shutting down sockets 14:49:41 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x2b0800, 0x0) ioctl$KVM_REINJECT_CONTROL(r0, 0xae71, &(0x7f0000000100)={0x39}) r1 = inotify_init() readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000040)=0x4, 0x4) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 14:49:41 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000200)=""/134, &(0x7f0000000040)=0x86) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = socket$nl_crypto(0x10, 0x3, 0x15) fallocate(r2, 0x2, 0x1, 0x3f) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x200000, 0x0) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000700)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x6c08280}, 0x3, &(0x7f0000000780)={&(0x7f0000000740)={0x3f5, r4, 0x400, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0xfffffffffffffdb8}}, 0x20040801) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x200000, 0x0) r6 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000700)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x6c08280}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14, r6, 0x400, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0xfffffffffffffdb8}}, 0x20040801) r7 = socket(0x11, 0x2, 0x0) r8 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r7, 0x89e3, 0x0) ioctl$NBD_SET_SOCK(r8, 0xab00, r7) sendmsg$NET_DM_CMD_START(r7, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40200800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r6, 0x8, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x30010863}, 0x48001) sendmsg$NET_DM_CMD_STOP(r5, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8600000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r6, 0x200, 0x70bd2c, 0x25dfdbff, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x8030}, 0x11) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r5, &(0x7f00000005c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x54, r9, 0x200, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x14, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xdc88}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1c000000}]}, @TIPC_NLA_BEARER={0xc, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xd0}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x46000}, 0x40000800) ioctl$VIDIOC_G_JPEGCOMP(r1, 0x808c563d, &(0x7f0000000400)) r10 = socket(0x11, 0x2, 0x0) r11 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r10, 0x89e3, 0x0) ioctl$NBD_SET_SOCK(r11, 0xab00, r10) sendmsg$NET_DM_CMD_START(r10, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40200800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r4, 0x8, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x30010863}, 0x48001) sendmsg$NET_DM_CMD_STOP(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8600000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r4, 0x200, 0x70bd2c, 0x25dfdbff, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x8030}, 0x11) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2980, 0x0) ioctl$SIOCX25GCALLUSERDATA(r3, 0x89e4, &(0x7f0000000340)={0x3e, "bbc5264bfbe3c436e7895ee03aa546fac3a60dbd97b4c41a0e84dc58be7f635d81de6e8e923ea9043be184138ddcf6e7466331bc066939f7323a6c0a30e4d6e9a96b4c3ebed67b0d97625025d2f3051da1ac56070ffd7dc28d9b1d201887d6932f4ce0c3452ebdc2153bc663dee334170d9324e6215dc42129d53401ee21fb73"}) prctl$PR_GET_NO_NEW_PRIVS(0x27) [ 497.730477] FAULT_INJECTION: forcing a failure. [ 497.730477] name failslab, interval 1, probability 0, space 0, times 0 [ 497.775316] audit: type=1400 audit(1571323781.759:217): avc: denied { create } for pid=21960 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 [ 497.809529] CPU: 1 PID: 21961 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 497.816592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 497.816604] Call Trace: [ 497.816622] dump_stack+0x138/0x197 [ 497.816639] should_fail.cold+0x10f/0x159 [ 497.816655] should_failslab+0xdb/0x130 [ 497.840358] __kmalloc+0x2f0/0x7a0 [ 497.843915] ? __lock_is_held+0xb6/0x140 [ 497.847983] ? check_preemption_disabled+0x3c/0x250 [ 497.853356] ? bio_alloc_bioset+0x3ae/0x680 [ 497.853369] bio_alloc_bioset+0x3ae/0x680 [ 497.853380] ? btrfs_alloc_device+0xa4/0x6a0 [ 497.853390] ? rcu_read_lock_sched_held+0x110/0x130 [ 497.853401] ? bvec_alloc+0x2e0/0x2e0 [ 497.853414] btrfs_alloc_device+0xc3/0x6a0 [ 497.853424] ? btrfs_find_device_by_devspec+0xf0/0xf0 [ 497.853437] __btrfs_close_devices+0x2c6/0xa90 [ 497.853451] ? __mutex_unlock_slowpath+0x71/0x800 [ 497.853465] ? btrfs_alloc_device+0x6a0/0x6a0 [ 497.853482] btrfs_close_devices+0x29/0x140 [ 497.853495] btrfs_mount+0x1fd9/0x2b28 [ 497.853507] ? lock_downgrade+0x740/0x740 [ 497.911142] ? find_held_lock+0x35/0x130 [ 497.915214] ? pcpu_alloc+0x3af/0x1050 [ 497.919124] ? btrfs_remount+0x11f0/0x11f0 [ 497.923373] ? rcu_read_lock_sched_held+0x110/0x130 [ 497.928407] ? __lockdep_init_map+0x10c/0x570 [ 497.932918] mount_fs+0x97/0x2a1 [ 497.936317] vfs_kern_mount.part.0+0x5e/0x3d0 [ 497.940818] ? find_held_lock+0x35/0x130 [ 497.945420] vfs_kern_mount+0x40/0x60 [ 497.949242] btrfs_mount+0x3ce/0x2b28 [ 497.953299] ? lock_downgrade+0x740/0x740 [ 497.957459] ? find_held_lock+0x35/0x130 [ 497.961526] ? pcpu_alloc+0x3af/0x1050 [ 497.965428] ? btrfs_remount+0x11f0/0x11f0 [ 497.969673] ? rcu_read_lock_sched_held+0x110/0x130 [ 497.974703] ? __lockdep_init_map+0x10c/0x570 [ 497.979219] ? __lockdep_init_map+0x10c/0x570 [ 497.983824] mount_fs+0x97/0x2a1 [ 497.987199] vfs_kern_mount.part.0+0x5e/0x3d0 [ 497.991700] do_mount+0x417/0x27d0 [ 497.995260] ? copy_mount_options+0x5c/0x2f0 [ 497.999682] ? rcu_read_lock_sched_held+0x110/0x130 [ 498.004710] ? copy_mount_string+0x40/0x40 [ 498.009081] ? copy_mount_options+0x1fe/0x2f0 [ 498.014027] SyS_mount+0xab/0x120 [ 498.018177] ? copy_mnt_ns+0x8c0/0x8c0 [ 498.022076] do_syscall_64+0x1e8/0x640 [ 498.026015] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 498.030879] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 498.036075] RIP: 0033:0x45c4aa [ 498.039268] RSP: 002b:00007f39d7d87a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 498.047090] RAX: ffffffffffffffda RBX: 00007f39d7d87b40 RCX: 000000000045c4aa [ 498.054456] RDX: 00007f39d7d87ae0 RSI: 0000000020000100 RDI: 00007f39d7d87b00 [ 498.062081] RBP: 0000000000000001 R08: 00007f39d7d87b40 R09: 00007f39d7d87ae0 [ 498.069535] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 14:49:41 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0xff, 0x40) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f00000000c0)={0x7, 0x800, 0x4}, 0xc) [ 498.076824] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 [ 498.153870] ------------[ cut here ]------------ [ 498.158766] kernel BUG at fs/btrfs/volumes.c:890! [ 498.166775] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 498.172152] Modules linked in: [ 498.175343] CPU: 1 PID: 21961 Comm: syz-executor.5 Not tainted 4.14.149 #0 [ 498.182343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 498.191704] task: ffff888047046740 task.stack: ffff888056eb0000 [ 498.197795] RIP: 0010:__btrfs_close_devices+0x7d8/0xa90 [ 498.203154] RSP: 0018:ffff888056eb7700 EFLAGS: 00010246 [ 498.208515] RAX: 0000000000040000 RBX: ffff888092e92dc0 RCX: ffffc90005e3d000 [ 498.215997] RDX: 0000000000040000 RSI: ffffffff82659188 RDI: 0000000000000286 [ 498.223352] RBP: ffff888056eb77c8 R08: ffff888047046740 R09: ffff888047047008 [ 498.230622] R10: 0000000000000000 R11: 0000000000000000 R12: ffff888077d07500 [ 498.237895] R13: ffff888092e92e88 R14: fffffffffffffff4 R15: dffffc0000000000 [ 498.245163] FS: 00007f39d7d88700(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 498.253473] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 498.259476] CR2: 00000000007136b4 CR3: 0000000099ead000 CR4: 00000000001426e0 [ 498.266751] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 498.274021] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 498.281377] Call Trace: [ 498.283984] ? __mutex_unlock_slowpath+0x71/0x800 [ 498.288838] ? btrfs_alloc_device+0x6a0/0x6a0 [ 498.293360] btrfs_close_devices+0x29/0x140 [ 498.297694] btrfs_mount+0x1fd9/0x2b28 [ 498.301806] ? lock_downgrade+0x740/0x740 [ 498.306481] ? find_held_lock+0x35/0x130 [ 498.310652] ? pcpu_alloc+0x3af/0x1050 [ 498.314550] ? btrfs_remount+0x11f0/0x11f0 [ 498.318787] ? rcu_read_lock_sched_held+0x110/0x130 [ 498.323896] ? __lockdep_init_map+0x10c/0x570 [ 498.328393] mount_fs+0x97/0x2a1 [ 498.331763] vfs_kern_mount.part.0+0x5e/0x3d0 [ 498.336258] ? find_held_lock+0x35/0x130 [ 498.340325] vfs_kern_mount+0x40/0x60 [ 498.344136] btrfs_mount+0x3ce/0x2b28 [ 498.347937] ? lock_downgrade+0x740/0x740 [ 498.352080] ? find_held_lock+0x35/0x130 [ 498.356146] ? pcpu_alloc+0x3af/0x1050 [ 498.360155] ? btrfs_remount+0x11f0/0x11f0 [ 498.364393] ? rcu_read_lock_sched_held+0x110/0x130 [ 498.369416] ? __lockdep_init_map+0x10c/0x570 [ 498.374035] ? __lockdep_init_map+0x10c/0x570 [ 498.378531] mount_fs+0x97/0x2a1 [ 498.381902] vfs_kern_mount.part.0+0x5e/0x3d0 [ 498.386492] do_mount+0x417/0x27d0 [ 498.390036] ? copy_mount_options+0x5c/0x2f0 [ 498.394445] ? rcu_read_lock_sched_held+0x110/0x130 [ 498.399468] ? copy_mount_string+0x40/0x40 [ 498.403802] ? copy_mount_options+0x1fe/0x2f0 [ 498.408306] SyS_mount+0xab/0x120 [ 498.411760] ? copy_mnt_ns+0x8c0/0x8c0 [ 498.415652] do_syscall_64+0x1e8/0x640 [ 498.419541] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 498.424419] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 498.429611] RIP: 0033:0x45c4aa [ 498.432882] RSP: 002b:00007f39d7d87a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 498.439323] kobject: 'loop5' (ffff8880a4ab73e0): kobject_uevent_env [ 498.440705] RAX: ffffffffffffffda RBX: 00007f39d7d87b40 RCX: 000000000045c4aa [ 498.440710] RDX: 00007f39d7d87ae0 RSI: 0000000020000100 RDI: 00007f39d7d87b00 [ 498.440714] RBP: 0000000000000001 R08: 00007f39d7d87b40 R09: 00007f39d7d87ae0 [ 498.440719] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 498.440723] R13: 00000000004c8dca R14: 00000000004e0358 R15: 0000000000000005 [ 498.440733] Code: [ 498.447266] kobject: 'loop5' (ffff8880a4ab73e0): fill_kobj_path: path = '/devices/virtual/block/loop5' 14:49:42 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000040)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 498.454503] c1 ea 03 0f b6 04 02 84 c0 74 08 3c 03 0f 8e 59 02 00 00 48 8b 45 80 c7 80 10 01 00 00 00 00 00 00 e9 e2 f8 ff ff e8 18 63 f7 fe <0f> 0b e8 11 63 f7 fe 0f 0b 48 89 f7 e8 97 16 21 ff e9 ad f8 ff [ 498.514089] RIP: __btrfs_close_devices+0x7d8/0xa90 RSP: ffff888056eb7700 [ 498.531770] kobject: 'sit0' (ffff88805d320630): kobject_cleanup, parent (null) [ 498.541615] kobject: 'sit0' (ffff88805d320630): calling ktype release [ 498.549703] kobject: 'sit0': free name 14:49:42 executing program 1 (fault-call:2 fault-nth:0): bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = inotify_init() readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) [ 498.562750] kobject: 'rx-0' (ffff8880a98f7790): kobject_cleanup, parent ffff88809fc85a48 [ 498.571669] kobject: 'rx-0' (ffff8880a98f7790): auto cleanup 'remove' event [ 498.578944] kobject: 'rx-0' (ffff8880a98f7790): kobject_uevent_env [ 498.601718] kobject: 'loop2' (ffff8880a49ce160): kobject_uevent_env 14:49:42 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x8200, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0x2, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) [ 498.604503] kobject: 'rx-0' (ffff8880a98f7790): kobject_uevent_env: uevent_suppress caused the event to drop! [ 498.617134] kobject: 'loop2' (ffff8880a49ce160): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 498.629073] kobject: 'rx-0' (ffff8880a98f7790): auto cleanup kobject_del [ 498.635239] FAULT_INJECTION: forcing a failure. [ 498.635239] name failslab, interval 1, probability 0, space 0, times 0 [ 498.641356] kobject: 'loop2' (ffff8880a49ce160): kobject_uevent_env [ 498.655101] kobject: 'rx-0' (ffff8880a98f7790): calling ktype release [ 498.661857] kobject: 'rx-0': free name [ 498.666582] kobject: 'loop2' (ffff8880a49ce160): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 498.677521] kobject: 'tx-0' (ffff8880a5d6b558): kobject_cleanup, parent ffff88809fc85a48 [ 498.691634] kobject: 'tx-0' (ffff8880a5d6b558): auto cleanup 'remove' event [ 498.702997] CPU: 0 PID: 21977 Comm: syz-executor.1 Tainted: G D 4.14.149 #0 [ 498.709491] BFS-fs: bfs_fill_super(): loop2 is unclean, continuing [ 498.711259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 498.711266] Call Trace: [ 498.711293] dump_stack+0x138/0x197 [ 498.711311] should_fail.cold+0x10f/0x159 [ 498.711330] should_failslab+0xdb/0x130 [ 498.711343] __kmalloc+0x2f0/0x7a0 [ 498.711356] ? kstrtouint+0xf8/0x140 [ 498.711364] ? _kstrtoul+0x120/0x120 [ 498.711374] ? rw_copy_check_uvector+0x1d8/0x290 [ 498.711384] rw_copy_check_uvector+0x1d8/0x290 [ 498.711400] import_iovec+0xa2/0x370 [ 498.711417] ? dup_iter+0x260/0x260 [ 498.721532] kobject: 'tx-0' (ffff8880a5d6b558): kobject_uevent_env [ 498.727366] ? proc_fail_nth_write+0x7d/0x180 [ 498.727381] vfs_readv+0xb3/0x130 [ 498.727390] ? compat_rw_copy_check_uvector+0x310/0x310 [ 498.727406] ? lock_downgrade+0x740/0x740 [ 498.748817] kobject: 'tx-0' (ffff8880a5d6b558): kobject_uevent_env: uevent_suppress caused the event to drop! [ 498.749647] ? __fget+0x237/0x370 [ 498.749661] ? __fget_light+0x172/0x1f0 [ 498.753503] kobject: 'tx-0' (ffff8880a5d6b558): auto cleanup kobject_del [ 498.758476] do_readv+0x10a/0x2d0 [ 498.758488] ? vfs_readv+0x130/0x130 [ 498.758499] ? SyS_read+0x230/0x230 [ 498.763331] kobject: 'tx-0' (ffff8880a5d6b558): calling ktype release [ 498.766853] ? do_preadv+0x200/0x200 [ 498.766867] SyS_readv+0x28/0x30 [ 498.766879] do_syscall_64+0x1e8/0x640 [ 498.766888] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 498.770626] kobject: 'tx-0': free name [ 498.780755] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 498.780764] RIP: 0033:0x459a59 [ 498.780768] RSP: 002b:00007f31ccd5fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 498.780779] RAX: ffffffffffffffda RBX: 00007f31ccd5fc90 RCX: 0000000000459a59 [ 498.780785] RDX: 0000000000000286 RSI: 00000000200006c0 RDI: 0000000000000003 [ 498.780790] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 498.780796] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f31ccd606d4 [ 498.780802] R13: 00000000004c6fe7 R14: 00000000004dcba8 R15: 0000000000000004 [ 498.915372] kobject: 'queues' (ffff88809fc85a48): kobject_cleanup, parent (null) [ 498.925153] kobject: 'queues' (ffff88809fc85a48): calling ktype release [ 498.935053] kobject: 'loop2' (ffff8880a49ce160): kobject_uevent_env [ 498.941834] kobject: 'queues' (ffff88809fc85a48): kset_release [ 498.948702] kobject: 'loop2' (ffff8880a49ce160): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 498.967904] kobject: 'queues': free name [ 498.973613] kobject: 'loop4' (ffff8880a4a5eae0): kobject_uevent_env [ 498.974950] kobject: 'ip6_vti0' (ffff88805d2e50b0): kobject_uevent_env [ 498.987115] kobject: 'loop4' (ffff8880a4a5eae0): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 498.993898] kobject: 'ip6_vti0' (ffff88805d2e50b0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 499.013639] kobject: 'loop2' (ffff8880a49ce160): kobject_uevent_env [ 499.020948] kobject: 'loop2' (ffff8880a49ce160): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 499.041085] BFS-fs: bfs_fill_super(): loop2 is unclean, continuing [ 499.055551] ---[ end trace b293f5947031cf43 ]--- [ 499.061854] Kernel panic - not syncing: Fatal exception [ 499.069466] Kernel Offset: disabled [ 499.073095] Rebooting in 86400 seconds..